@ledgerhq/device-signer-kit-solana 1.3.0 → 1.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (92) hide show
  1. package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
  2. package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
  3. package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
  4. package/lib/cjs/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
  5. package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js +1 -1
  6. package/lib/cjs/internal/app-binder/command/GetChallengeCommand.js.map +2 -2
  7. package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js +1 -1
  8. package/lib/cjs/internal/app-binder/command/GetChallengeCommand.test.js.map +2 -2
  9. package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js +1 -1
  10. package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.js.map +2 -2
  11. package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
  12. package/lib/cjs/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
  13. package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js +1 -1
  14. package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +2 -2
  15. package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +1 -1
  16. package/lib/cjs/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +2 -2
  17. package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js +1 -1
  18. package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +2 -2
  19. package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +1 -1
  20. package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +2 -2
  21. package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
  22. package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.js.map +3 -3
  23. package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
  24. package/lib/cjs/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
  25. package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js +1 -1
  26. package/lib/cjs/internal/app-binder/command/SignTransactionCommand.js.map +2 -2
  27. package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
  28. package/lib/cjs/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
  29. package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
  30. package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +2 -2
  31. package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
  32. package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js.map +2 -2
  33. package/lib/cjs/internal/app-binder/task/SendSignMessageTask.js +1 -1
  34. package/lib/cjs/internal/app-binder/task/SendSignMessageTask.js.map +3 -3
  35. package/lib/cjs/internal/app-binder/task/SendSignMessageTask.test.js +3 -1
  36. package/lib/cjs/internal/app-binder/task/SendSignMessageTask.test.js.map +3 -3
  37. package/lib/cjs/package.json +3 -3
  38. package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js +1 -1
  39. package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.js.map +2 -2
  40. package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js +1 -1
  41. package/lib/esm/internal/app-binder/command/GetAppConfigurationCommand.test.js.map +2 -2
  42. package/lib/esm/internal/app-binder/command/GetChallengeCommand.js +1 -1
  43. package/lib/esm/internal/app-binder/command/GetChallengeCommand.js.map +2 -2
  44. package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js +1 -1
  45. package/lib/esm/internal/app-binder/command/GetChallengeCommand.test.js.map +2 -2
  46. package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js +1 -1
  47. package/lib/esm/internal/app-binder/command/GetPubKeyCommand.js.map +2 -2
  48. package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js +1 -1
  49. package/lib/esm/internal/app-binder/command/GetPubKeyCommand.test.js.map +2 -2
  50. package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js +1 -1
  51. package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.js.map +2 -2
  52. package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js +1 -1
  53. package/lib/esm/internal/app-binder/command/ProvideTLVDescriptorCommand.test.js.map +2 -2
  54. package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js +1 -1
  55. package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +2 -2
  56. package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +1 -1
  57. package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +2 -2
  58. package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js +1 -1
  59. package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.js.map +3 -3
  60. package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js +1 -1
  61. package/lib/esm/internal/app-binder/command/SignOffChainMessageCommand.test.js.map +3 -3
  62. package/lib/esm/internal/app-binder/command/SignTransactionCommand.js +1 -1
  63. package/lib/esm/internal/app-binder/command/SignTransactionCommand.js.map +2 -2
  64. package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js +1 -1
  65. package/lib/esm/internal/app-binder/command/SignTransactionCommand.test.js.map +3 -3
  66. package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
  67. package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +2 -2
  68. package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
  69. package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js.map +2 -2
  70. package/lib/esm/internal/app-binder/task/SendSignMessageTask.js +1 -1
  71. package/lib/esm/internal/app-binder/task/SendSignMessageTask.js.map +3 -3
  72. package/lib/esm/internal/app-binder/task/SendSignMessageTask.test.js +3 -1
  73. package/lib/esm/internal/app-binder/task/SendSignMessageTask.test.js.map +3 -3
  74. package/lib/esm/package.json +3 -3
  75. package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts +1 -0
  76. package/lib/types/internal/app-binder/command/GetAppConfigurationCommand.d.ts.map +1 -1
  77. package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts +1 -0
  78. package/lib/types/internal/app-binder/command/GetChallengeCommand.d.ts.map +1 -1
  79. package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts +1 -0
  80. package/lib/types/internal/app-binder/command/GetPubKeyCommand.d.ts.map +1 -1
  81. package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts +1 -0
  82. package/lib/types/internal/app-binder/command/ProvideTLVDescriptorCommand.d.ts.map +1 -1
  83. package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts +1 -0
  84. package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts.map +1 -1
  85. package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts +14 -12
  86. package/lib/types/internal/app-binder/command/SignOffChainMessageCommand.d.ts.map +1 -1
  87. package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts +1 -0
  88. package/lib/types/internal/app-binder/command/SignTransactionCommand.d.ts.map +1 -1
  89. package/lib/types/internal/app-binder/task/SendSignMessageTask.d.ts +19 -5
  90. package/lib/types/internal/app-binder/task/SendSignMessageTask.d.ts.map +1 -1
  91. package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
  92. package/package.json +5 -5
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/command/SignTransactionCommand.test.ts"],
4
- "sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\n\nimport {\n SignTransactionCommand,\n type SignTransactionCommandArgs,\n} from \"./SignTransactionCommand\";\n\ndescribe(\"SignTransactionCommand\", () => {\n const defaultArgs: SignTransactionCommandArgs = {\n serializedTransaction: new Uint8Array(),\n more: false,\n extend: false,\n };\n\n describe(\"getApdu\", () => {\n it(\"should return the correct APDU when the data is empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array());\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x00);\n });\n\n it(\"should return the correct APDU when the data is not empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: false,\n extend: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x00);\n });\n\n it(\"should return the correct APDU when the more flag is set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: true,\n extend: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x02);\n });\n\n it(\"should return the correct APDU when the extend flag is set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: false,\n extend: true,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x01);\n });\n\n it(\"should return the correct APDU when the more and extend flags are set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: true,\n extend: true,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x03);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return Noting when the response is empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: new Uint8Array([]),\n }),\n );\n\n // THEN\n expect(result).toStrictEqual(CommandResultFactory({ data: Nothing }));\n });\n\n it(\"should return the signature when the response is not empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n const data = new Uint8Array(Array.from({ length: 64 }, (_, i) => i + 1));\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data,\n }),\n );\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n data: Just(data),\n }),\n );\n });\n\n it(\"should return an error when the response data is not valid\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: new Uint8Array([0x01]),\n }),\n );\n\n // THEN\n if (isSuccessCommandResult(result))\n assert.fail(\"The result should be an error.\");\n else {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Signature is missing\"),\n );\n }\n });\n });\n});\n"],
5
- "mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAE9B,OACE,0BAAAC,MAEK,2BAEP,SAAS,yBAA0B,IAAM,CACvC,MAAMC,EAA0C,CAC9C,sBAAuB,IAAI,WAC3B,KAAM,GACN,OAAQ,EACV,EAEA,SAAS,UAAW,IAAM,CACxB,GAAG,wDAAyD,IAAM,CAKhE,MAAMC,EAHU,IAAIF,EAAuBC,CAAW,EAGjC,QAAQ,EAG7B,OAAOC,EAAK,IAAI,EAAE,cAAc,IAAI,UAAY,EAChD,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,4DAA6D,IAAM,CASpE,MAAMA,EAPU,IAAIF,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOE,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,2DAA4D,IAAM,CASnE,MAAMA,EAPU,IAAIF,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOE,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,6DAA8D,IAAM,CASrE,MAAMA,EAPU,IAAIF,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOE,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,wEAAyE,IAAM,CAShF,MAAMA,EAPU,IAAIF,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOE,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,kDAAmD,IAAM,CAK1D,MAAMC,EAHU,IAAIH,EAAuBC,CAAW,EAG/B,cACrB,IAAIP,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CAAC,CACzB,CAAC,CACH,EAGA,OAAOS,CAAM,EAAE,cAAcR,EAAqB,CAAE,KAAMI,CAAQ,CAAC,CAAC,CACtE,CAAC,EAED,GAAG,6DAA8D,IAAM,CAErE,MAAMK,EAAU,IAAIJ,EAAuBC,CAAW,EAChDI,EAAO,IAAI,WAAW,MAAM,KAAK,CAAE,OAAQ,EAAG,EAAG,CAACC,EAAGC,IAAMA,EAAI,CAAC,CAAC,EAGjEJ,EAASC,EAAQ,cACrB,IAAIV,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAAW,CACF,CAAC,CACH,EAGA,OAAOF,CAAM,EAAE,cACbR,EAAqB,CACnB,KAAMG,EAAKO,CAAI,CACjB,CAAC,CACH,CACF,CAAC,EAED,GAAG,6DAA8D,IAAM,CAKrE,MAAMF,EAHU,IAAIH,EAAuBC,CAAW,EAG/B,cACrB,IAAIP,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CAAI,CAAC,CAC7B,CAAC,CACH,EAGIG,EAAuBM,CAAM,EAC/B,OAAO,KAAK,gCAAgC,EAE5C,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAIP,EAAuB,sBAAsB,CACnD,CAEJ,CAAC,CACH,CAAC,CACH,CAAC",
6
- "names": ["ApduResponse", "CommandResultFactory", "InvalidStatusWordError", "isSuccessCommandResult", "Just", "Nothing", "SignTransactionCommand", "defaultArgs", "apdu", "result", "command", "data", "_", "i"]
4
+ "sourcesContent": ["import {\n ApduResponse,\n CommandResultFactory,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\n\nimport {\n SignTransactionCommand,\n type SignTransactionCommandArgs,\n} from \"./SignTransactionCommand\";\n\ndescribe(\"SignTransactionCommand\", () => {\n const defaultArgs: SignTransactionCommandArgs = {\n serializedTransaction: new Uint8Array(),\n more: false,\n extend: false,\n };\n\n describe(\"name\", () => {\n it(\"should be 'signTransaction'\", () => {\n const command = new SignTransactionCommand(defaultArgs);\n expect(command.name).toBe(\"signTransaction\");\n });\n });\n\n describe(\"getApdu\", () => {\n it(\"should return the correct APDU when the data is empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array());\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x00);\n });\n\n it(\"should return the correct APDU when the data is not empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: false,\n extend: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x00);\n });\n\n it(\"should return the correct APDU when the more flag is set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: true,\n extend: false,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x02);\n });\n\n it(\"should return the correct APDU when the extend flag is set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: false,\n extend: true,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x01);\n });\n\n it(\"should return the correct APDU when the more and extend flags are set\", () => {\n // GIVEN\n const command = new SignTransactionCommand({\n serializedTransaction: new Uint8Array([0x01, 0x02, 0x03]),\n more: true,\n extend: true,\n });\n\n // WHEN\n const apdu = command.getApdu();\n\n // THEN\n expect(apdu.data).toStrictEqual(new Uint8Array([0x01, 0x02, 0x03]));\n expect(apdu.cla).toBe(0xe0);\n expect(apdu.ins).toBe(0x06);\n expect(apdu.p1).toBe(0x01);\n expect(apdu.p2).toBe(0x03);\n });\n });\n\n describe(\"parseResponse\", () => {\n it(\"should return Noting when the response is empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: new Uint8Array([]),\n }),\n );\n\n // THEN\n expect(result).toStrictEqual(CommandResultFactory({ data: Nothing }));\n });\n\n it(\"should return the signature when the response is not empty\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n const data = new Uint8Array(Array.from({ length: 64 }, (_, i) => i + 1));\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data,\n }),\n );\n\n // THEN\n expect(result).toStrictEqual(\n CommandResultFactory({\n data: Just(data),\n }),\n );\n });\n\n it(\"should return an error when the response data is not valid\", () => {\n // GIVEN\n const command = new SignTransactionCommand(defaultArgs);\n\n // WHEN\n const result = command.parseResponse(\n new ApduResponse({\n statusCode: Uint8Array.from([0x90, 0x00]),\n data: new Uint8Array([0x01]),\n }),\n );\n\n // THEN\n if (isSuccessCommandResult(result))\n assert.fail(\"The result should be an error.\");\n else {\n expect(result.error).toEqual(\n new InvalidStatusWordError(\"Signature is missing\"),\n );\n }\n });\n });\n});\n"],
5
+ "mappings": "AAAA,OACE,gBAAAA,EACA,wBAAAC,EACA,0BAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAE9B,OACE,0BAAAC,MAEK,2BAEP,SAAS,yBAA0B,IAAM,CACvC,MAAMC,EAA0C,CAC9C,sBAAuB,IAAI,WAC3B,KAAM,GACN,OAAQ,EACV,EAEA,SAAS,OAAQ,IAAM,CACrB,GAAG,8BAA+B,IAAM,CACtC,MAAMC,EAAU,IAAIF,EAAuBC,CAAW,EACtD,OAAOC,EAAQ,IAAI,EAAE,KAAK,iBAAiB,CAC7C,CAAC,CACH,CAAC,EAED,SAAS,UAAW,IAAM,CACxB,GAAG,wDAAyD,IAAM,CAKhE,MAAMC,EAHU,IAAIH,EAAuBC,CAAW,EAGjC,QAAQ,EAG7B,OAAOE,EAAK,IAAI,EAAE,cAAc,IAAI,UAAY,EAChD,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,4DAA6D,IAAM,CASpE,MAAMA,EAPU,IAAIH,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOG,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,2DAA4D,IAAM,CASnE,MAAMA,EAPU,IAAIH,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOG,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,6DAA8D,IAAM,CASrE,MAAMA,EAPU,IAAIH,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOG,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,EAED,GAAG,wEAAyE,IAAM,CAShF,MAAMA,EAPU,IAAIH,EAAuB,CACzC,sBAAuB,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,EACxD,KAAM,GACN,OAAQ,EACV,CAAC,EAGoB,QAAQ,EAG7B,OAAOG,EAAK,IAAI,EAAE,cAAc,IAAI,WAAW,CAAC,EAAM,EAAM,CAAI,CAAC,CAAC,EAClE,OAAOA,EAAK,GAAG,EAAE,KAAK,GAAI,EAC1B,OAAOA,EAAK,GAAG,EAAE,KAAK,CAAI,EAC1B,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,EACzB,OAAOA,EAAK,EAAE,EAAE,KAAK,CAAI,CAC3B,CAAC,CACH,CAAC,EAED,SAAS,gBAAiB,IAAM,CAC9B,GAAG,kDAAmD,IAAM,CAK1D,MAAMC,EAHU,IAAIJ,EAAuBC,CAAW,EAG/B,cACrB,IAAIP,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CAAC,CACzB,CAAC,CACH,EAGA,OAAOU,CAAM,EAAE,cAAcT,EAAqB,CAAE,KAAMI,CAAQ,CAAC,CAAC,CACtE,CAAC,EAED,GAAG,6DAA8D,IAAM,CAErE,MAAMG,EAAU,IAAIF,EAAuBC,CAAW,EAChDI,EAAO,IAAI,WAAW,MAAM,KAAK,CAAE,OAAQ,EAAG,EAAG,CAACC,EAAGC,IAAMA,EAAI,CAAC,CAAC,EAGjEH,EAASF,EAAQ,cACrB,IAAIR,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAAW,CACF,CAAC,CACH,EAGA,OAAOD,CAAM,EAAE,cACbT,EAAqB,CACnB,KAAMG,EAAKO,CAAI,CACjB,CAAC,CACH,CACF,CAAC,EAED,GAAG,6DAA8D,IAAM,CAKrE,MAAMD,EAHU,IAAIJ,EAAuBC,CAAW,EAG/B,cACrB,IAAIP,EAAa,CACf,WAAY,WAAW,KAAK,CAAC,IAAM,CAAI,CAAC,EACxC,KAAM,IAAI,WAAW,CAAC,CAAI,CAAC,CAC7B,CAAC,CACH,EAGIG,EAAuBO,CAAM,EAC/B,OAAO,KAAK,gCAAgC,EAE5C,OAAOA,EAAO,KAAK,EAAE,QACnB,IAAIR,EAAuB,sBAAsB,CACnD,CAEJ,CAAC,CACH,CAAC,CACH,CAAC",
6
+ "names": ["ApduResponse", "CommandResultFactory", "InvalidStatusWordError", "isSuccessCommandResult", "Just", "Nothing", "SignTransactionCommand", "defaultArgs", "command", "apdu", "result", "data", "_", "i"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{CommandResultFactory as o,DeviceActionStatus as e,DeviceModelId as g,DeviceSessionStateType as v,DeviceStatus as y,InvalidStatusWordError as C,UserInteractionRequired as t}from"@ledgerhq/device-management-kit";import{Just as T,Nothing as N}from"purify-ts";import{beforeEach as P,describe as w,it as D,vi as n}from"vitest";import{testDeviceActionStates as f}from"../../app-binder/device-action/__test-utils__/testDeviceActionStates";import{SolanaTransactionTypes as m}from"../../app-binder/services/TransactionInspector";import{makeDeviceActionInternalApiMock as E}from"./__test-utils__/makeInternalApi";import{SignTransactionDeviceAction as k}from"./SignTransactionDeviceAction";const V="44'/501'/0'/0'",x=new Uint8Array([222,173,190,239]),I={getSolanaContext:n.fn(),getFieldContext:n.fn(),getContexts:n.fn(),getTypedDataFilters:n.fn(),getWeb3Checks:n.fn()};let r,u,d,A,S,l;function R(){return{getAppConfig:u,buildContext:d,provideContext:A,signTransaction:S,inspectTransaction:l}}w("SignTransactionDeviceAction (Solana)",()=>{P(()=>{r=E(),u=n.fn(),d=n.fn(),A=n.fn(),S=n.fn(),l=n.fn().mockResolvedValue({transactionType:m.SPL,data:{tokenAddress:null,createATA:!1}})}),D("happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL});const a={descriptor:new Uint8Array([1]),calCertificate:{keyUsageNumber:0,payload:new Uint8Array([1])},challenge:void 0,addressResult:{tokenAccount:"",owner:"",contract:""}};d.mockResolvedValue(a),A.mockResolvedValue(N);const i=new Uint8Array([170,187]);S.mockResolvedValue(o({data:T(i)}));const p=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(p,"extractDependencies").mockReturnValue(R());const U=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction},status:e.Pending},{output:i,status:e.Completed}];f(p,U,r,{onDone:s,onError:c})})),D("failure in provideContext still signs",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL}),d.mockResolvedValue({descriptor:new Uint8Array([2]),calCertificate:{keyUsageNumber:0,payload:new Uint8Array},challenge:void 0,addressResult:{tokenAccount:"",owner:"",contract:""}}),A.mockResolvedValue(T(o({error:new C("ctxErr")})));const a=new Uint8Array([254]);S.mockResolvedValue(o({data:T(a)}));const i=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(i,"extractDependencies").mockReturnValue(R());const p=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction},status:e.Pending},{output:a,status:e.Completed}];f(i,p,r,{onDone:s,onError:c})})),D("buildContext throws \u2192 error",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL}),d.mockRejectedValue(new C("bldErr"));const a=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(a,"extractDependencies").mockReturnValue(R());const i=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{error:expect.anything(),status:e.Error}];f(a,i,r,{onDone:s,onError:c})}))});
1
+ import{CommandResultFactory as o,DeviceActionStatus as e,DeviceModelId as g,DeviceSessionStateType as v,DeviceStatus as y,InvalidStatusWordError as C,UserInteractionRequired as t}from"@ledgerhq/device-management-kit";import{Just as T,Nothing as N}from"purify-ts";import{beforeEach as w,describe as P,it as D,vi as n}from"vitest";import{testDeviceActionStates as f}from"../../app-binder/device-action/__test-utils__/testDeviceActionStates";import{SolanaTransactionTypes as m}from"../../app-binder/services/TransactionInspector";import{makeDeviceActionInternalApiMock as E}from"./__test-utils__/makeInternalApi";import{SignTransactionDeviceAction as k}from"./SignTransactionDeviceAction";const V="44'/501'/0'/0'",x=new Uint8Array([222,173,190,239]),I={getSolanaContext:n.fn()};let r,u,d,A,S,l;function R(){return{getAppConfig:u,buildContext:d,provideContext:A,signTransaction:S,inspectTransaction:l}}P("SignTransactionDeviceAction (Solana)",()=>{w(()=>{r=E(),u=n.fn(),d=n.fn(),A=n.fn(),S=n.fn(),l=n.fn().mockResolvedValue({transactionType:m.SPL,data:{tokenAddress:null,createATA:!1}})}),D("happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL});const a={descriptor:new Uint8Array([1]),calCertificate:{keyUsageNumber:0,payload:new Uint8Array([1])},challenge:void 0,addressResult:{tokenAccount:"",owner:"",contract:""}};d.mockResolvedValue(a),A.mockResolvedValue(N);const i=new Uint8Array([170,187]);S.mockResolvedValue(o({data:T(i)}));const p=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(p,"extractDependencies").mockReturnValue(R());const U=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction},status:e.Pending},{output:i,status:e.Completed}];f(p,U,r,{onDone:s,onError:c})})),D("failure in provideContext still signs",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL}),d.mockResolvedValue({descriptor:new Uint8Array([2]),calCertificate:{keyUsageNumber:0,payload:new Uint8Array},challenge:void 0,addressResult:{tokenAccount:"",owner:"",contract:""}}),A.mockResolvedValue(T(o({error:new C("ctxErr")})));const a=new Uint8Array([254]);S.mockResolvedValue(o({data:T(a)}));const i=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(i,"extractDependencies").mockReturnValue(R());const p=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.SignTransaction},status:e.Pending},{output:a,status:e.Completed}];f(i,p,r,{onDone:s,onError:c})})),D("buildContext throws \u2192 error",()=>new Promise((s,c)=>{r.getDeviceSessionState.mockReturnValue({sessionStateType:v.ReadyWithoutSecureChannel,deviceStatus:y.CONNECTED,installedApps:[],currentApp:{name:"Solana",version:"1.4.1"},deviceModelId:g.NANO_X,isSecureConnectionAllowed:!0}),u.mockResolvedValue(o({data:{}})),l.mockResolvedValue({transactionType:m.SPL}),d.mockRejectedValue(new C("bldErr"));const a=new k({input:{derivationPath:V,transaction:x,transactionOptions:{skipOpenApp:!0},contextModule:I}});n.spyOn(a,"extractDependencies").mockReturnValue(R());const i=[{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{intermediateValue:{requiredUserInteraction:t.None},status:e.Pending},{error:expect.anything(),status:e.Error}];f(a,i,r,{onDone:s,onError:c})}))});
2
2
  //# sourceMappingURL=SignTransactionDeviceAction.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/device-action/SignTransactionDeviceAction.test.ts"],
4
- "sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n type DeviceActionState,\n DeviceActionStatus,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n InvalidStatusWordError,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\nimport { beforeEach, describe, it, vi } from \"vitest\";\n\nimport {\n type SignTransactionDAError,\n type SignTransactionDAInput,\n type SignTransactionDAIntermediateValue,\n} from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { testDeviceActionStates } from \"@internal/app-binder/device-action/__test-utils__/testDeviceActionStates\";\nimport { SolanaTransactionTypes } from \"@internal/app-binder/services/TransactionInspector\";\nimport { type SolanaBuildContextResult } from \"@internal/app-binder/task/BuildTransactionContextTask\";\n\nimport { makeDeviceActionInternalApiMock } from \"./__test-utils__/makeInternalApi\";\nimport { SignTransactionDeviceAction } from \"./SignTransactionDeviceAction\";\n\nconst defaultDerivation = \"44'/501'/0'/0'\";\nconst exampleTx = new Uint8Array([0xde, 0xad, 0xbe, 0xef]);\n\nconst contextModuleStub: ContextModule = {\n getSolanaContext: vi.fn(),\n getFieldContext: vi.fn(),\n getContexts: vi.fn(),\n getTypedDataFilters: vi.fn(),\n getWeb3Checks: vi.fn(),\n};\n\nlet apiMock: ReturnType<typeof makeDeviceActionInternalApiMock>;\nlet getAppConfigMock: ReturnType<typeof vi.fn>;\nlet buildContextMock: ReturnType<typeof vi.fn>;\nlet provideContextMock: ReturnType<typeof vi.fn>;\nlet signMock: ReturnType<typeof vi.fn>;\nlet inspectTransactionMock: ReturnType<typeof vi.fn>;\n\nfunction extractDeps() {\n return {\n getAppConfig: getAppConfigMock,\n buildContext: buildContextMock,\n provideContext: provideContextMock,\n signTransaction: signMock,\n inspectTransaction: inspectTransactionMock,\n };\n}\n\ndescribe(\"SignTransactionDeviceAction (Solana)\", () => {\n beforeEach(() => {\n apiMock = makeDeviceActionInternalApiMock();\n getAppConfigMock = vi.fn();\n buildContextMock = vi.fn();\n provideContextMock = vi.fn();\n signMock = vi.fn();\n inspectTransactionMock = vi.fn().mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n data: { tokenAddress: null, createATA: false },\n });\n });\n\n it(\"happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n const ctx: SolanaBuildContextResult = {\n descriptor: new Uint8Array([1]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array([0x01]) },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n };\n buildContextMock.mockResolvedValue(ctx);\n provideContextMock.mockResolvedValue(Nothing);\n\n const signature = new Uint8Array([0xaa, 0xbb]);\n signMock.mockResolvedValue(\n CommandResultFactory({ data: Just(signature) }),\n );\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: signature, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"failure in provideContext still signs\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockResolvedValue({\n descriptor: new Uint8Array([2]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array() },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n });\n provideContextMock.mockResolvedValue(\n Just(\n CommandResultFactory({ error: new InvalidStatusWordError(\"ctxErr\") }),\n ),\n );\n const sig = new Uint8Array([0xfe]);\n signMock.mockResolvedValue(CommandResultFactory({ data: Just(sig) }));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext (returns error but continues)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: sig, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"buildContext throws \u2192 error\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockRejectedValue(new InvalidStatusWordError(\"bldErr\"));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext (throws)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // error raised from buildContext\n {\n error: expect.anything() as unknown as SignTransactionDAError,\n status: DeviceActionStatus.Error,\n },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n});\n"],
5
- "mappings": "AACA,OACE,wBAAAA,EAEA,sBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,EACA,0BAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAC9B,OAAS,cAAAC,EAAY,YAAAC,EAAU,MAAAC,EAAI,MAAAC,MAAU,SAO7C,OAAS,0BAAAC,MAA8B,2EACvC,OAAS,0BAAAC,MAA8B,qDAGvC,OAAS,mCAAAC,MAAuC,mCAChD,OAAS,+BAAAC,MAAmC,gCAE5C,MAAMC,EAAoB,iBACpBC,EAAY,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,EAEnDC,EAAmC,CACvC,iBAAkBP,EAAG,GAAG,EACxB,gBAAiBA,EAAG,GAAG,EACvB,YAAaA,EAAG,GAAG,EACnB,oBAAqBA,EAAG,GAAG,EAC3B,cAAeA,EAAG,GAAG,CACvB,EAEA,IAAIQ,EACAC,EACAC,EACAC,EACAC,EACAC,EAEJ,SAASC,GAAc,CACrB,MAAO,CACL,aAAcL,EACd,aAAcC,EACd,eAAgBC,EAChB,gBAAiBC,EACjB,mBAAoBC,CACtB,CACF,CAEAf,EAAS,uCAAwC,IAAM,CACrDD,EAAW,IAAM,CACfW,EAAUL,EAAgC,EAC1CM,EAAmBT,EAAG,GAAG,EACzBU,EAAmBV,EAAG,GAAG,EACzBW,EAAqBX,EAAG,GAAG,EAC3BY,EAAWZ,EAAG,GAAG,EACjBa,EAAyBb,EAAG,GAAG,EAAE,kBAAkB,CACjD,gBAAiBE,EAAuB,IACxC,KAAM,CAAE,aAAc,KAAM,UAAW,EAAM,CAC/C,CAAC,CACH,CAAC,EAEDH,EAAG,8EAA+E,IAChF,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAED,MAAMe,EAAgC,CACpC,WAAY,IAAI,WAAW,CAAC,CAAC,CAAC,EAC9B,eAAgB,CAAE,eAAgB,EAAG,QAAS,IAAI,WAAW,CAAC,CAAI,CAAC,CAAE,EACrE,UAAW,OACX,cAAe,CAAE,aAAc,GAAI,MAAO,GAAI,SAAU,EAAG,CAC7D,EACAP,EAAiB,kBAAkBO,CAAG,EACtCN,EAAmB,kBAAkBf,CAAO,EAE5C,MAAMsB,EAAY,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAC7CN,EAAS,kBACPxB,EAAqB,CAAE,KAAMO,EAAKuB,CAAS,CAAE,CAAC,CAChD,EAEA,MAAMC,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,eACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CAAE,OAAQ6B,EAAW,OAAQ7B,EAAmB,SAAU,CAC5D,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJjB,EAAG,wCAAyC,IAC1C,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,CACjC,WAAY,IAAI,WAAW,CAAC,CAAC,CAAC,EAC9B,eAAgB,CAAE,eAAgB,EAAG,QAAS,IAAI,UAAa,EAC/D,UAAW,OACX,cAAe,CAAE,aAAc,GAAI,MAAO,GAAI,SAAU,EAAG,CAC7D,CAAC,EACDC,EAAmB,kBACjBhB,EACEP,EAAqB,CAAE,MAAO,IAAIK,EAAuB,QAAQ,CAAE,CAAC,CACtE,CACF,EACA,MAAM4B,EAAM,IAAI,WAAW,CAAC,GAAI,CAAC,EACjCT,EAAS,kBAAkBxB,EAAqB,CAAE,KAAMO,EAAK0B,CAAG,CAAE,CAAC,CAAC,EAEpE,MAAMF,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,eACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CAAE,OAAQgC,EAAK,OAAQhC,EAAmB,SAAU,CACtD,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJjB,EAAG,mCAA+B,IAChC,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,IAAIjB,EAAuB,QAAQ,CAAC,EAEvE,MAAM0B,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,MAAO,OAAO,SAAS,EACvB,OAAQA,EAAmB,KAC7B,CACF,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,CACN,CAAC",
4
+ "sourcesContent": ["import { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultFactory,\n type DeviceActionState,\n DeviceActionStatus,\n DeviceModelId,\n DeviceSessionStateType,\n DeviceStatus,\n InvalidStatusWordError,\n UserInteractionRequired,\n} from \"@ledgerhq/device-management-kit\";\nimport { Just, Nothing } from \"purify-ts\";\nimport { beforeEach, describe, it, vi } from \"vitest\";\n\nimport {\n type SignTransactionDAError,\n type SignTransactionDAInput,\n type SignTransactionDAIntermediateValue,\n} from \"@api/app-binder/SignTransactionDeviceActionTypes\";\nimport { testDeviceActionStates } from \"@internal/app-binder/device-action/__test-utils__/testDeviceActionStates\";\nimport { SolanaTransactionTypes } from \"@internal/app-binder/services/TransactionInspector\";\nimport { type SolanaBuildContextResult } from \"@internal/app-binder/task/BuildTransactionContextTask\";\n\nimport { makeDeviceActionInternalApiMock } from \"./__test-utils__/makeInternalApi\";\nimport { SignTransactionDeviceAction } from \"./SignTransactionDeviceAction\";\n\nconst defaultDerivation = \"44'/501'/0'/0'\";\nconst exampleTx = new Uint8Array([0xde, 0xad, 0xbe, 0xef]);\n\nconst contextModuleStub: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nlet apiMock: ReturnType<typeof makeDeviceActionInternalApiMock>;\nlet getAppConfigMock: ReturnType<typeof vi.fn>;\nlet buildContextMock: ReturnType<typeof vi.fn>;\nlet provideContextMock: ReturnType<typeof vi.fn>;\nlet signMock: ReturnType<typeof vi.fn>;\nlet inspectTransactionMock: ReturnType<typeof vi.fn>;\n\nfunction extractDeps() {\n return {\n getAppConfig: getAppConfigMock,\n buildContext: buildContextMock,\n provideContext: provideContextMock,\n signTransaction: signMock,\n inspectTransaction: inspectTransactionMock,\n };\n}\n\ndescribe(\"SignTransactionDeviceAction (Solana)\", () => {\n beforeEach(() => {\n apiMock = makeDeviceActionInternalApiMock();\n getAppConfigMock = vi.fn();\n buildContextMock = vi.fn();\n provideContextMock = vi.fn();\n signMock = vi.fn();\n inspectTransactionMock = vi.fn().mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n data: { tokenAddress: null, createATA: false },\n });\n });\n\n it(\"happy path (skip open): getAppConfig -> inspect -> build -> provide -> sign\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n const ctx: SolanaBuildContextResult = {\n descriptor: new Uint8Array([1]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array([0x01]) },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n };\n buildContextMock.mockResolvedValue(ctx);\n provideContextMock.mockResolvedValue(Nothing);\n\n const signature = new Uint8Array([0xaa, 0xbb]);\n signMock.mockResolvedValue(\n CommandResultFactory({ data: Just(signature) }),\n );\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: signature, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"failure in provideContext still signs\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockResolvedValue({\n descriptor: new Uint8Array([2]),\n calCertificate: { keyUsageNumber: 0, payload: new Uint8Array() },\n challenge: undefined,\n addressResult: { tokenAccount: \"\", owner: \"\", contract: \"\" },\n });\n provideContextMock.mockResolvedValue(\n Just(\n CommandResultFactory({ error: new InvalidStatusWordError(\"ctxErr\") }),\n ),\n );\n const sig = new Uint8Array([0xfe]);\n signMock.mockResolvedValue(CommandResultFactory({ data: Just(sig) }));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // provideContext (returns error but continues)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // signTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.SignTransaction,\n },\n status: DeviceActionStatus.Pending,\n },\n // success\n { output: sig, status: DeviceActionStatus.Completed },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n\n it(\"buildContext throws \u2192 error\", () =>\n new Promise<void>((resolve, reject) => {\n apiMock.getDeviceSessionState.mockReturnValue({\n sessionStateType: DeviceSessionStateType.ReadyWithoutSecureChannel,\n deviceStatus: DeviceStatus.CONNECTED,\n installedApps: [],\n currentApp: { name: \"Solana\", version: \"1.4.1\" },\n deviceModelId: DeviceModelId.NANO_X,\n isSecureConnectionAllowed: true,\n });\n\n getAppConfigMock.mockResolvedValue(CommandResultFactory({ data: {} }));\n inspectTransactionMock.mockResolvedValue({\n transactionType: SolanaTransactionTypes.SPL,\n });\n\n buildContextMock.mockRejectedValue(new InvalidStatusWordError(\"bldErr\"));\n\n const action = new SignTransactionDeviceAction({\n input: {\n derivationPath: defaultDerivation,\n transaction: exampleTx,\n transactionOptions: { skipOpenApp: true },\n contextModule: contextModuleStub,\n } as SignTransactionDAInput,\n });\n vi.spyOn(action, \"extractDependencies\").mockReturnValue(extractDeps());\n\n const expected = [\n // getAppConfig\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // inspectTransaction\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // buildContext (throws)\n {\n intermediateValue: {\n requiredUserInteraction: UserInteractionRequired.None,\n },\n status: DeviceActionStatus.Pending,\n },\n // error raised from buildContext\n {\n error: expect.anything() as unknown as SignTransactionDAError,\n status: DeviceActionStatus.Error,\n },\n ] as DeviceActionState<\n Uint8Array,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >[];\n\n testDeviceActionStates<\n Uint8Array,\n SignTransactionDAInput,\n SignTransactionDAError,\n SignTransactionDAIntermediateValue\n >(action, expected, apiMock, { onDone: resolve, onError: reject });\n }));\n});\n"],
5
+ "mappings": "AACA,OACE,wBAAAA,EAEA,sBAAAC,EACA,iBAAAC,EACA,0BAAAC,EACA,gBAAAC,EACA,0BAAAC,EACA,2BAAAC,MACK,kCACP,OAAS,QAAAC,EAAM,WAAAC,MAAe,YAC9B,OAAS,cAAAC,EAAY,YAAAC,EAAU,MAAAC,EAAI,MAAAC,MAAU,SAO7C,OAAS,0BAAAC,MAA8B,2EACvC,OAAS,0BAAAC,MAA8B,qDAGvC,OAAS,mCAAAC,MAAuC,mCAChD,OAAS,+BAAAC,MAAmC,gCAE5C,MAAMC,EAAoB,iBACpBC,EAAY,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,EAEnDC,EAAmC,CACvC,iBAAkBP,EAAG,GAAG,CAC1B,EAEA,IAAIQ,EACAC,EACAC,EACAC,EACAC,EACAC,EAEJ,SAASC,GAAc,CACrB,MAAO,CACL,aAAcL,EACd,aAAcC,EACd,eAAgBC,EAChB,gBAAiBC,EACjB,mBAAoBC,CACtB,CACF,CAEAf,EAAS,uCAAwC,IAAM,CACrDD,EAAW,IAAM,CACfW,EAAUL,EAAgC,EAC1CM,EAAmBT,EAAG,GAAG,EACzBU,EAAmBV,EAAG,GAAG,EACzBW,EAAqBX,EAAG,GAAG,EAC3BY,EAAWZ,EAAG,GAAG,EACjBa,EAAyBb,EAAG,GAAG,EAAE,kBAAkB,CACjD,gBAAiBE,EAAuB,IACxC,KAAM,CAAE,aAAc,KAAM,UAAW,EAAM,CAC/C,CAAC,CACH,CAAC,EAEDH,EAAG,8EAA+E,IAChF,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAED,MAAMe,EAAgC,CACpC,WAAY,IAAI,WAAW,CAAC,CAAC,CAAC,EAC9B,eAAgB,CAAE,eAAgB,EAAG,QAAS,IAAI,WAAW,CAAC,CAAI,CAAC,CAAE,EACrE,UAAW,OACX,cAAe,CAAE,aAAc,GAAI,MAAO,GAAI,SAAU,EAAG,CAC7D,EACAP,EAAiB,kBAAkBO,CAAG,EACtCN,EAAmB,kBAAkBf,CAAO,EAE5C,MAAMsB,EAAY,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAC7CN,EAAS,kBACPxB,EAAqB,CAAE,KAAMO,EAAKuB,CAAS,CAAE,CAAC,CAChD,EAEA,MAAMC,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,eACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CAAE,OAAQ6B,EAAW,OAAQ7B,EAAmB,SAAU,CAC5D,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJjB,EAAG,wCAAyC,IAC1C,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,CACjC,WAAY,IAAI,WAAW,CAAC,CAAC,CAAC,EAC9B,eAAgB,CAAE,eAAgB,EAAG,QAAS,IAAI,UAAa,EAC/D,UAAW,OACX,cAAe,CAAE,aAAc,GAAI,MAAO,GAAI,SAAU,EAAG,CAC7D,CAAC,EACDC,EAAmB,kBACjBhB,EACEP,EAAqB,CAAE,MAAO,IAAIK,EAAuB,QAAQ,CAAE,CAAC,CACtE,CACF,EACA,MAAM4B,EAAM,IAAI,WAAW,CAAC,GAAI,CAAC,EACjCT,EAAS,kBAAkBxB,EAAqB,CAAE,KAAMO,EAAK0B,CAAG,CAAE,CAAC,CAAC,EAEpE,MAAMF,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,eACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CAAE,OAAQgC,EAAK,OAAQhC,EAAmB,SAAU,CACtD,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,EAEJjB,EAAG,mCAA+B,IAChC,IAAI,QAAc,CAACgB,EAASC,IAAW,CACrCR,EAAQ,sBAAsB,gBAAgB,CAC5C,iBAAkBjB,EAAuB,0BACzC,aAAcC,EAAa,UAC3B,cAAe,CAAC,EAChB,WAAY,CAAE,KAAM,SAAU,QAAS,OAAQ,EAC/C,cAAeF,EAAc,OAC7B,0BAA2B,EAC7B,CAAC,EAEDmB,EAAiB,kBAAkBrB,EAAqB,CAAE,KAAM,CAAC,CAAE,CAAC,CAAC,EACrEyB,EAAuB,kBAAkB,CACvC,gBAAiBX,EAAuB,GAC1C,CAAC,EAEDQ,EAAiB,kBAAkB,IAAIjB,EAAuB,QAAQ,CAAC,EAEvE,MAAM0B,EAAS,IAAIf,EAA4B,CAC7C,MAAO,CACL,eAAgBC,EAChB,YAAaC,EACb,mBAAoB,CAAE,YAAa,EAAK,EACxC,cAAeC,CACjB,CACF,CAAC,EACDP,EAAG,MAAMmB,EAAQ,qBAAqB,EAAE,gBAAgBL,EAAY,CAAC,EAErE,MAAMM,EAAW,CAEf,CACE,kBAAmB,CACjB,wBAAyB1B,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,kBAAmB,CACjB,wBAAyBK,EAAwB,IACnD,EACA,OAAQL,EAAmB,OAC7B,EAEA,CACE,MAAO,OAAO,SAAS,EACvB,OAAQA,EAAmB,KAC7B,CACF,EAMAY,EAKEkB,EAAQC,EAAUZ,EAAS,CAAE,OAAQO,EAAS,QAASC,CAAO,CAAC,CACnE,CAAC,CAAC,CACN,CAAC",
6
6
  "names": ["CommandResultFactory", "DeviceActionStatus", "DeviceModelId", "DeviceSessionStateType", "DeviceStatus", "InvalidStatusWordError", "UserInteractionRequired", "Just", "Nothing", "beforeEach", "describe", "it", "vi", "testDeviceActionStates", "SolanaTransactionTypes", "makeDeviceActionInternalApiMock", "SignTransactionDeviceAction", "defaultDerivation", "exampleTx", "contextModuleStub", "apiMock", "getAppConfigMock", "buildContextMock", "provideContextMock", "signMock", "inspectTransactionMock", "extractDeps", "resolve", "reject", "ctx", "signature", "action", "expected", "sig"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{CommandResultStatus as u,DeviceModelId as l}from"@ledgerhq/device-management-kit";import{Left as f,Right as m}from"purify-ts";import{beforeEach as C,describe as k,expect as n,it as r,vi as t}from"vitest";import{GetChallengeCommand as A}from"../../app-binder/command/GetChallengeCommand";import{BuildTransactionContextTask as d}from"./BuildTransactionContextTask";const a={getSolanaContext:t.fn(),getFieldContext:t.fn(),getContexts:t.fn(),getTypedDataFilters:t.fn(),getWeb3Checks:t.fn()},i={contextModule:a,options:{tokenAddress:"someAddress",createATA:void 0}},e={descriptor:new Uint8Array([1,2,3]),tokenAccount:"someTokenAccount",owner:"someOwner",contract:"someContract",certificate:{payload:new Uint8Array([170,187]),keyUsageNumber:1}};let o;k("BuildTransactionContextTask",()=>{C(()=>{t.resetAllMocks(),o={getDeviceSessionState:t.fn().mockReturnValue({deviceModelId:l.NANO_X}),sendCommand:t.fn().mockResolvedValue({status:u.Success,data:{challenge:"someChallenge"}})}}),r("returns context successfully when challenge command succeeds",async()=>{a.getSolanaContext.mockResolvedValue(m(e));const s=await new d(o,i).run();n(o.sendCommand).toHaveBeenCalledWith(n.any(A)),n(a.getSolanaContext).toHaveBeenCalledWith({deviceModelId:l.NANO_X,tokenAddress:"someAddress",challenge:"someChallenge",createATA:void 0}),n(s).toEqual({challenge:"someChallenge",descriptor:e.descriptor,calCertificate:e.certificate,addressResult:{tokenAccount:e.tokenAccount,owner:e.owner,contract:e.contract}})}),r("returns context when challenge command fails",async()=>{o.sendCommand.mockResolvedValue({status:u.Error,data:{}}),a.getSolanaContext.mockResolvedValue(m(e));const s=await new d(o,i).run();n(a.getSolanaContext).toHaveBeenCalledWith({deviceModelId:l.NANO_X,tokenAddress:"someAddress",challenge:void 0,createATA:void 0}),n(s).toEqual({challenge:void 0,descriptor:e.descriptor,calCertificate:e.certificate,addressResult:{tokenAccount:e.tokenAccount,owner:e.owner,contract:e.contract}})}),r("throws if getSolanaContext returns Left",async()=>{const c=new Error("Solana context failure");a.getSolanaContext.mockResolvedValue(f(c));const s=new d(o,i);await n(s.run()).rejects.toThrow("Solana context failure")})});
1
+ import{CommandResultStatus as u,DeviceModelId as l}from"@ledgerhq/device-management-kit";import{Left as C,Right as m}from"purify-ts";import{beforeEach as f,describe as k,expect as t,it as r,vi as s}from"vitest";import{GetChallengeCommand as A}from"../../app-binder/command/GetChallengeCommand";import{BuildTransactionContextTask as d}from"./BuildTransactionContextTask";const o={getSolanaContext:s.fn()},i={contextModule:o,options:{tokenAddress:"someAddress",createATA:void 0}},e={descriptor:new Uint8Array([1,2,3]),tokenAccount:"someTokenAccount",owner:"someOwner",contract:"someContract",certificate:{payload:new Uint8Array([170,187]),keyUsageNumber:1}};let n;k("BuildTransactionContextTask",()=>{f(()=>{s.resetAllMocks(),n={getDeviceSessionState:s.fn().mockReturnValue({deviceModelId:l.NANO_X}),sendCommand:s.fn().mockResolvedValue({status:u.Success,data:{challenge:"someChallenge"}})}}),r("returns context successfully when challenge command succeeds",async()=>{o.getSolanaContext.mockResolvedValue(m(e));const a=await new d(n,i).run();t(n.sendCommand).toHaveBeenCalledWith(t.any(A)),t(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:l.NANO_X,tokenAddress:"someAddress",challenge:"someChallenge",createATA:void 0}),t(a).toEqual({challenge:"someChallenge",descriptor:e.descriptor,calCertificate:e.certificate,addressResult:{tokenAccount:e.tokenAccount,owner:e.owner,contract:e.contract}})}),r("returns context when challenge command fails",async()=>{n.sendCommand.mockResolvedValue({status:u.Error,data:{}}),o.getSolanaContext.mockResolvedValue(m(e));const a=await new d(n,i).run();t(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:l.NANO_X,tokenAddress:"someAddress",challenge:void 0,createATA:void 0}),t(a).toEqual({challenge:void 0,descriptor:e.descriptor,calCertificate:e.certificate,addressResult:{tokenAccount:e.tokenAccount,owner:e.owner,contract:e.contract}})}),r("throws if getSolanaContext returns Left",async()=>{const c=new Error("Solana context failure");o.getSolanaContext.mockResolvedValue(C(c));const a=new d(n,i);await t(a.run()).rejects.toThrow("Solana context failure")})});
2
2
  //# sourceMappingURL=BuildTransactionContextTask.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.test.ts"],
4
- "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n getFieldContext: vi.fn(),\n getContexts: vi.fn(),\n getTypedDataFilters: vi.fn(),\n getWeb3Checks: vi.fn(),\n};\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst domainSolanaPayload = {\n descriptor: new Uint8Array([1, 2, 3]),\n tokenAccount: \"someTokenAccount\",\n owner: \"someOwner\",\n contract: \"someContract\",\n certificate: { payload: new Uint8Array([0xaa, 0xbb]), keyUsageNumber: 1 },\n} as const;\n\nlet apiMock: InternalApi;\n\ndescribe(\"BuildTransactionContextTask\", () => {\n beforeEach(() => {\n vi.resetAllMocks();\n\n apiMock = {\n getDeviceSessionState: vi\n .fn()\n .mockReturnValue({ deviceModelId: DeviceModelId.NANO_X }),\n sendCommand: vi.fn().mockResolvedValue({\n status: CommandResultStatus.Success,\n data: { challenge: \"someChallenge\" },\n }),\n } as unknown as InternalApi;\n });\n\n it(\"returns context successfully when challenge command succeeds\", async () => {\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(domainSolanaPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledWith(\n expect.any(GetChallengeCommand),\n );\n\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: \"someChallenge\",\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n challenge: \"someChallenge\",\n descriptor: domainSolanaPayload.descriptor,\n calCertificate: domainSolanaPayload.certificate,\n addressResult: {\n tokenAccount: domainSolanaPayload.tokenAccount,\n owner: domainSolanaPayload.owner,\n contract: domainSolanaPayload.contract,\n },\n });\n });\n\n it(\"returns context when challenge command fails\", async () => {\n (apiMock.sendCommand as any).mockResolvedValue({\n status: CommandResultStatus.Error,\n data: {},\n });\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(domainSolanaPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: undefined,\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n challenge: undefined,\n descriptor: domainSolanaPayload.descriptor,\n calCertificate: domainSolanaPayload.certificate,\n addressResult: {\n tokenAccount: domainSolanaPayload.tokenAccount,\n owner: domainSolanaPayload.owner,\n contract: domainSolanaPayload.contract,\n },\n });\n });\n\n it(\"throws if getSolanaContext returns Left\", async () => {\n const error = new Error(\"Solana context failure\");\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(Left(error));\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n\n await expect(task.run()).rejects.toThrow(\"Solana context failure\");\n });\n});\n"],
5
- "mappings": "AAIA,OACE,uBAAAA,EACA,iBAAAC,MAEK,kCACP,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAErD,OAAS,uBAAAC,MAA2B,mDAEpC,OACE,+BAAAC,MAEK,gCAEP,MAAMC,EAAmC,CACvC,iBAAkBH,EAAG,GAAG,EACxB,gBAAiBA,EAAG,GAAG,EACvB,YAAaA,EAAG,GAAG,EACnB,oBAAqBA,EAAG,GAAG,EAC3B,cAAeA,EAAG,GAAG,CACvB,EAEMI,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,EAAsB,CAC1B,WAAY,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EACpC,aAAc,mBACd,MAAO,YACP,SAAU,eACV,YAAa,CAAE,QAAS,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAAG,eAAgB,CAAE,CAC1E,EAEA,IAAIC,EAEJT,EAAS,8BAA+B,IAAM,CAC5CD,EAAW,IAAM,CACfI,EAAG,cAAc,EAEjBM,EAAU,CACR,sBAAuBN,EACpB,GAAG,EACH,gBAAgB,CAAE,cAAeP,EAAc,MAAO,CAAC,EAC1D,YAAaO,EAAG,GAAG,EAAE,kBAAkB,CACrC,OAAQR,EAAoB,QAC5B,KAAM,CAAE,UAAW,eAAgB,CACrC,CAAC,CACH,CACF,CAAC,EAEDO,EAAG,+DAAgE,SAAY,CAC5EI,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAmB,CAC3B,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAE9BN,EAAOQ,EAAQ,WAAW,EAAE,qBAC1BR,EAAO,IAAIG,CAAmB,CAChC,EAEAH,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,gBACX,UAAW,MACb,CAAC,EAEDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,UAAW,gBACX,WAAYF,EAAoB,WAChC,eAAgBA,EAAoB,YACpC,cAAe,CACb,aAAcA,EAAoB,aAClC,MAAOA,EAAoB,MAC3B,SAAUA,EAAoB,QAChC,CACF,CAAC,CACH,CAAC,EAEDN,EAAG,+CAAgD,SAAY,CAC5DO,EAAQ,YAAoB,kBAAkB,CAC7C,OAAQd,EAAoB,MAC5B,KAAM,CAAC,CACT,CAAC,EACAW,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAmB,CAC3B,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAE9BN,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,OACX,UAAW,MACb,CAAC,EAEDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,UAAW,OACX,WAAYF,EAAoB,WAChC,eAAgBA,EAAoB,YACpC,cAAe,CACb,aAAcA,EAAoB,aAClC,MAAOA,EAAoB,MAC3B,SAAUA,EAAoB,QAChC,CACF,CAAC,CACH,CAAC,EAEDN,EAAG,0CAA2C,SAAY,CACxD,MAAMS,EAAQ,IAAI,MAAM,wBAAwB,EAC/CL,EAAkB,iBAAyB,kBAAkBT,EAAKc,CAAK,CAAC,EAEzE,MAAMC,EAAO,IAAIP,EAA4BI,EAASF,CAAW,EAEjE,MAAMN,EAAOW,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,wBAAwB,CACnE,CAAC,CACH,CAAC",
4
+ "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst domainSolanaPayload = {\n descriptor: new Uint8Array([1, 2, 3]),\n tokenAccount: \"someTokenAccount\",\n owner: \"someOwner\",\n contract: \"someContract\",\n certificate: { payload: new Uint8Array([0xaa, 0xbb]), keyUsageNumber: 1 },\n} as const;\n\nlet apiMock: InternalApi;\n\ndescribe(\"BuildTransactionContextTask\", () => {\n beforeEach(() => {\n vi.resetAllMocks();\n\n apiMock = {\n getDeviceSessionState: vi\n .fn()\n .mockReturnValue({ deviceModelId: DeviceModelId.NANO_X }),\n sendCommand: vi.fn().mockResolvedValue({\n status: CommandResultStatus.Success,\n data: { challenge: \"someChallenge\" },\n }),\n } as unknown as InternalApi;\n });\n\n it(\"returns context successfully when challenge command succeeds\", async () => {\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(domainSolanaPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledWith(\n expect.any(GetChallengeCommand),\n );\n\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: \"someChallenge\",\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n challenge: \"someChallenge\",\n descriptor: domainSolanaPayload.descriptor,\n calCertificate: domainSolanaPayload.certificate,\n addressResult: {\n tokenAccount: domainSolanaPayload.tokenAccount,\n owner: domainSolanaPayload.owner,\n contract: domainSolanaPayload.contract,\n },\n });\n });\n\n it(\"returns context when challenge command fails\", async () => {\n (apiMock.sendCommand as any).mockResolvedValue({\n status: CommandResultStatus.Error,\n data: {},\n });\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(domainSolanaPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: undefined,\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n challenge: undefined,\n descriptor: domainSolanaPayload.descriptor,\n calCertificate: domainSolanaPayload.certificate,\n addressResult: {\n tokenAccount: domainSolanaPayload.tokenAccount,\n owner: domainSolanaPayload.owner,\n contract: domainSolanaPayload.contract,\n },\n });\n });\n\n it(\"throws if getSolanaContext returns Left\", async () => {\n const error = new Error(\"Solana context failure\");\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(Left(error));\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n\n await expect(task.run()).rejects.toThrow(\"Solana context failure\");\n });\n});\n"],
5
+ "mappings": "AAIA,OACE,uBAAAA,EACA,iBAAAC,MAEK,kCACP,OAAS,QAAAC,EAAM,SAAAC,MAAa,YAC5B,OAAS,cAAAC,EAAY,YAAAC,EAAU,UAAAC,EAAQ,MAAAC,EAAI,MAAAC,MAAU,SAErD,OAAS,uBAAAC,MAA2B,mDAEpC,OACE,+BAAAC,MAEK,gCAEP,MAAMC,EAAmC,CACvC,iBAAkBH,EAAG,GAAG,CAC1B,EAEMI,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,EAAsB,CAC1B,WAAY,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EACpC,aAAc,mBACd,MAAO,YACP,SAAU,eACV,YAAa,CAAE,QAAS,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EAAG,eAAgB,CAAE,CAC1E,EAEA,IAAIC,EAEJT,EAAS,8BAA+B,IAAM,CAC5CD,EAAW,IAAM,CACfI,EAAG,cAAc,EAEjBM,EAAU,CACR,sBAAuBN,EACpB,GAAG,EACH,gBAAgB,CAAE,cAAeP,EAAc,MAAO,CAAC,EAC1D,YAAaO,EAAG,GAAG,EAAE,kBAAkB,CACrC,OAAQR,EAAoB,QAC5B,KAAM,CAAE,UAAW,eAAgB,CACrC,CAAC,CACH,CACF,CAAC,EAEDO,EAAG,+DAAgE,SAAY,CAC5EI,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAmB,CAC3B,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAE9BN,EAAOQ,EAAQ,WAAW,EAAE,qBAC1BR,EAAO,IAAIG,CAAmB,CAChC,EAEAH,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,gBACX,UAAW,MACb,CAAC,EAEDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,UAAW,gBACX,WAAYF,EAAoB,WAChC,eAAgBA,EAAoB,YACpC,cAAe,CACb,aAAcA,EAAoB,aAClC,MAAOA,EAAoB,MAC3B,SAAUA,EAAoB,QAChC,CACF,CAAC,CACH,CAAC,EAEDN,EAAG,+CAAgD,SAAY,CAC5DO,EAAQ,YAAoB,kBAAkB,CAC7C,OAAQd,EAAoB,MAC5B,KAAM,CAAC,CACT,CAAC,EACAW,EAAkB,iBAAyB,kBAC1CR,EAAMU,CAAmB,CAC3B,EAGA,MAAME,EAAS,MADF,IAAIL,EAA4BI,EAASF,CAAW,EACvC,IAAI,EAE9BN,EAAOK,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAeV,EAAc,OAC7B,aAAc,cACd,UAAW,OACX,UAAW,MACb,CAAC,EAEDK,EAAOS,CAAM,EAAE,QAAkC,CAC/C,UAAW,OACX,WAAYF,EAAoB,WAChC,eAAgBA,EAAoB,YACpC,cAAe,CACb,aAAcA,EAAoB,aAClC,MAAOA,EAAoB,MAC3B,SAAUA,EAAoB,QAChC,CACF,CAAC,CACH,CAAC,EAEDN,EAAG,0CAA2C,SAAY,CACxD,MAAMS,EAAQ,IAAI,MAAM,wBAAwB,EAC/CL,EAAkB,iBAAyB,kBAAkBT,EAAKc,CAAK,CAAC,EAEzE,MAAMC,EAAO,IAAIP,EAA4BI,EAASF,CAAW,EAEjE,MAAMN,EAAOW,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,wBAAwB,CACnE,CAAC,CACH,CAAC",
6
6
  "names": ["CommandResultStatus", "DeviceModelId", "Left", "Right", "beforeEach", "describe", "expect", "it", "vi", "GetChallengeCommand", "BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "domainSolanaPayload", "apiMock", "result", "error", "task"]
7
7
  }
@@ -1,2 +1,2 @@
1
- import{APDU_MAX_PAYLOAD as m,ByteArrayBuilder as f,CommandResultFactory as r,InvalidStatusWordError as o}from"@ledgerhq/device-management-kit";import{DerivationPathUtils as g}from"@ledgerhq/signer-utils";import{GetPubKeyCommand as l}from"../../app-binder/command/GetPubKeyCommand";import{SignOffChainMessageCommand as p}from"../../app-binder/command/SignOffChainMessageCommand";import{DefaultBs58Encoder as c}from"../../app-binder/services/bs58Encoder";const y=65535;class B{constructor(e,t,i=c){this.api=e;this.args=t;this.bs58Encoder=i}async run(){const{sendingData:e,derivationPath:t}=this.args;if(e.length===0)return r({error:new o("Message cannot be empty")});if(e.length>y)return r({error:new o(`Message too long: ${e.length} bytes (max is 65535)`)});const i=g.splitPath(t),s=await this.api.sendCommand(new l({derivationPath:t,checkOnDevice:!1}));if(!("data"in s))return r({error:new o("Error getting public key from device")});const d=this.bs58Encoder.decode(s.data),n=this._buildFullMessage(e,d),a=this._buildApduCommand(n,i);return a.length>m?r({error:new o("The APDU command exceeds the maximum allowable size (255 bytes)")}):this.api.sendCommand(new p({message:a}))}_buildFullMessage(e,t){return new f().add8BitUIntToData(255).addAsciiStringToData("solana offchain").add8BitUIntToData(0).addBufferToData(new Uint8Array(32)).add8BitUIntToData(0).add8BitUIntToData(1).addBufferToData(t).add8BitUIntToData(e.length&255).add8BitUIntToData(e.length>>8&255).addBufferToData(e).build()}_buildApduCommand(e,t){const d=t.length*4,n=new f(e.length+1+1+d);return n.add8BitUIntToData(1),n.add8BitUIntToData(t.length),t.forEach(a=>{const u=new Uint8Array(4);new DataView(u.buffer).setUint32(0,a,!1),n.addBufferToData(u)}),n.addBufferToData(e),n.build()}}export{y as MAX_MESSAGE_LENGTH,B as SendSignMessageTask};
1
+ import{ByteArrayBuilder as g,CommandResultFactory as i,InvalidStatusWordError as s,isSuccessCommandResult as h}from"@ledgerhq/device-management-kit";import{DerivationPathUtils as I}from"@ledgerhq/signer-utils";import{GetPubKeyCommand as S}from"../../app-binder/command/GetPubKeyCommand";import{SignOffChainMessageCommand as b}from"../../app-binder/command/SignOffChainMessageCommand";import{DefaultBs58Encoder as U}from"../../app-binder/services/bs58Encoder";import{SendCommandInChunksTask as T}from"./SendCommandInChunksTask";const R=15*1024,v=1280,m=40,E=8,D=R-m-E,p=v-m-E,u=65515,w=126,B=32,M=10;var F=(n=>(n[n.Ascii=0]="Ascii",n[n.Utf8=1]="Utf8",n[n.Utf8LongV0=2]="Utf8LongV0",n))(F||{});const A=u;class V{constructor(t,e,n=U){this.api=t;this.args=e;this.bs58Encoder=n}async run(){const{sendingData:t,derivationPath:e}=this.args;if(t.length===0)return i({error:new s("Message cannot be empty")});if(t.length>A)return i({error:new s(`Message too long: ${t.length} bytes (max is ${A})`)});const n=I.splitPath(e),r=await this.api.sendCommand(new S({derivationPath:e,checkOnDevice:!1}));if(!("data"in r))return i({error:new s("Error getting public key from device")});const a=this.bs58Encoder.decode(r.data),f=this._buildFullMessage(t,a,!1),_=this._buildApduCommand(f,n),d=await this._sendInChunks(_);if(h(d))try{const o=this._buildEnvelopeBase58(d.data,f);return i({data:{signature:o}})}catch(o){return i({error:new s(o instanceof Error?o.message:String(o))})}const C="error"in d?d.error:void 0;if(this._isInvalidOffchainHeaderError(C)){if(t.length>p)return d;const o=this._buildFullMessage(t,a,!0),y=this._buildApduCommand(o,n),c=await this._sendInChunks(y);if(h(c))try{const l=this._buildEnvelopeBase58(c.data,o);return i({data:{signature:l}})}catch(l){return i({error:new s(l instanceof Error?l.message:String(l))})}return c}return d}_isUTF8(t){try{return new TextDecoder("utf-8",{fatal:!0}).decode(t),!0}catch{return!1}}_findMessageFormat(t,e){const n=e?p:D;if(t.length<=n){if(this._isPrintableASCII(t,e))return 0;if(this._isUTF8(t))return 1}else if(t.length<=u){if(this._isUTF8(t))return 2}else throw new s(`Message too long: ${t.length} bytes (max is ${u})`);return 0}_isPrintableASCII(t,e){for(let n=0;n<t.length;n++){const r=t[n];if(!(!e&&r===M)&&(r<B||r>w))return!1}return!0}_buildFullMessage(t,e,n){const r=this._findMessageFormat(t,n),a=new g;return a.add8BitUIntToData(255).addAsciiStringToData("solana offchain"),a.add8BitUIntToData(0),n||a.addBufferToData(new Uint8Array(32)),a.add8BitUIntToData(r),n||(a.add8BitUIntToData(1),a.addBufferToData(e)),a.add8BitUIntToData(t.length&255),a.add8BitUIntToData(t.length>>8&255),a.addBufferToData(t),a.build()}_isInvalidOffchainHeaderError(t){if(!t||typeof t!="object")return!1;const e=t,n=e._tag,r=e.errorCode;return typeof n=="string"&&typeof r=="string"&&r.toLowerCase()==="6a81"}_buildApduCommand(t,e){const n=new g(2+e.length*4+t.length);return n.add8BitUIntToData(1),n.add8BitUIntToData(e.length),e.forEach(r=>n.add32BitUIntToData(r)),n.addBufferToData(t),n.build()}async _sendInChunks(t){const e=n=>new b(n);return await new T(this.api,{data:t,commandFactory:e}).run()}_buildEnvelopeBase58(t,e){if(t.length!==64)throw new s(`Invalid signature length: ${t.length} (expected 64)`);const n=Uint8Array.of(1),r=new Uint8Array(n.length+t.length+e.length);return r.set(n,0),r.set(t,n.length),r.set(e,n.length+t.length),this.bs58Encoder.encode(r)}}export{A as MAX_MESSAGE_LENGTH,F as MessageFormat,V as SendSignMessageTask};
2
2
  //# sourceMappingURL=SendSignMessageTask.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/task/SendSignMessageTask.ts"],
4
- "sourcesContent": ["import {\n APDU_MAX_PAYLOAD,\n ByteArrayBuilder,\n type CommandResult,\n CommandResultFactory,\n type InternalApi,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\nimport { DerivationPathUtils } from \"@ledgerhq/signer-utils\";\n\nimport { GetPubKeyCommand } from \"@internal/app-binder/command/GetPubKeyCommand\";\nimport {\n SignOffChainMessageCommand,\n type SignOffChainMessageCommandResponse,\n} from \"@internal/app-binder/command/SignOffChainMessageCommand\";\nimport { type SolanaAppErrorCodes } from \"@internal/app-binder/command/utils/SolanaApplicationErrors\";\nimport {\n type Bs58Encoder,\n DefaultBs58Encoder,\n} from \"@internal/app-binder/services/bs58Encoder\";\n\nexport type SendSignMessageTaskArgs = {\n sendingData: Uint8Array;\n derivationPath: string;\n};\n\nexport type SendSignMessageTaskRunFunctionReturn = Promise<\n CommandResult<SignOffChainMessageCommandResponse, SolanaAppErrorCodes>\n>;\n\nexport const MAX_MESSAGE_LENGTH = 0xffff;\n\nexport class SendSignMessageTask {\n constructor(\n private api: InternalApi,\n private args: SendSignMessageTaskArgs,\n private readonly bs58Encoder: Bs58Encoder = DefaultBs58Encoder,\n ) {}\n\n async run(): SendSignMessageTaskRunFunctionReturn {\n const { sendingData, derivationPath } = this.args;\n\n if (sendingData.length === 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Message cannot be empty\"),\n });\n }\n\n if (sendingData.length > MAX_MESSAGE_LENGTH) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n `Message too long: ${sendingData.length} bytes (max is 65535)`,\n ),\n });\n }\n\n const pathIndexes = DerivationPathUtils.splitPath(derivationPath);\n\n const pubkeyResult = await this.api.sendCommand(\n new GetPubKeyCommand({ derivationPath, checkOnDevice: false }),\n );\n\n if (!(\"data\" in pubkeyResult)) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"Error getting public key from device\",\n ),\n });\n }\n\n const signerPubkey = this.bs58Encoder.decode(pubkeyResult.data);\n const fullMessage = this._buildFullMessage(sendingData, signerPubkey);\n const commandBuffer = this._buildApduCommand(fullMessage, pathIndexes);\n\n if (commandBuffer.length > APDU_MAX_PAYLOAD) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"The APDU command exceeds the maximum allowable size (255 bytes)\",\n ),\n });\n }\n\n return this.api.sendCommand(\n new SignOffChainMessageCommand({ message: commandBuffer }),\n );\n }\n\n /**\n * builds the serialised off-chain message header and body\n */\n private _buildFullMessage(\n sendingData: Uint8Array,\n signerPubkey: Uint8Array,\n ): Uint8Array {\n return (\n new ByteArrayBuilder()\n // 0xFF + prefix\n .add8BitUIntToData(0xff)\n .addAsciiStringToData(\"solana offchain\")\n // version = 0\n .add8BitUIntToData(0)\n // domain = 32 zeros\n .addBufferToData(new Uint8Array(32))\n // format = 0\n .add8BitUIntToData(0)\n // signer count = 1\n .add8BitUIntToData(1)\n // signer pubkey (32 bytes)\n .addBufferToData(signerPubkey)\n // message length (2 bytes, little endian)\n .add8BitUIntToData(sendingData.length & 0xff)\n .add8BitUIntToData((sendingData.length >> 8) & 0xff)\n // message body\n .addBufferToData(sendingData)\n .build()\n );\n }\n\n /**\n * builds the APDU command to send to the device\n */\n private _buildApduCommand(\n fullMessage: Uint8Array,\n paths: number[],\n ): Uint8Array {\n const numberOfSigners = 1;\n const derivationCount = 1;\n const pathBytes = paths.length * 4;\n const builder = new ByteArrayBuilder(\n fullMessage.length + numberOfSigners + derivationCount + pathBytes,\n );\n\n // number of signers\n builder.add8BitUIntToData(numberOfSigners);\n // number of BIP32 derivations\n builder.add8BitUIntToData(paths.length);\n // each derivation index\n paths.forEach((idx) => {\n const buf = new Uint8Array(4);\n new DataView(buf.buffer).setUint32(0, idx, false);\n builder.addBufferToData(buf);\n });\n // serialised off-chain message\n builder.addBufferToData(fullMessage);\n\n return builder.build();\n }\n}\n"],
5
- "mappings": "AAAA,OACE,oBAAAA,EACA,oBAAAC,EAEA,wBAAAC,EAEA,0BAAAC,MACK,kCACP,OAAS,uBAAAC,MAA2B,yBAEpC,OAAS,oBAAAC,MAAwB,gDACjC,OACE,8BAAAC,MAEK,0DAEP,OAEE,sBAAAC,MACK,4CAWA,MAAMC,EAAqB,MAE3B,MAAMC,CAAoB,CAC/B,YACUC,EACAC,EACSC,EAA2BL,EAC5C,CAHQ,SAAAG,EACA,UAAAC,EACS,iBAAAC,CAChB,CAEH,MAAM,KAA4C,CAChD,KAAM,CAAE,YAAAC,EAAa,eAAAC,CAAe,EAAI,KAAK,KAE7C,GAAID,EAAY,SAAW,EACzB,OAAOX,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,yBAAyB,CAC7D,CAAC,EAGH,GAAIU,EAAY,OAASL,EACvB,OAAON,EAAqB,CAC1B,MAAO,IAAIC,EACT,qBAAqBU,EAAY,MAAM,uBACzC,CACF,CAAC,EAGH,MAAME,EAAcX,EAAoB,UAAUU,CAAc,EAE1DE,EAAe,MAAM,KAAK,IAAI,YAClC,IAAIX,EAAiB,CAAE,eAAAS,EAAgB,cAAe,EAAM,CAAC,CAC/D,EAEA,GAAI,EAAE,SAAUE,GACd,OAAOd,EAAqB,CAC1B,MAAO,IAAIC,EACT,sCACF,CACF,CAAC,EAGH,MAAMc,EAAe,KAAK,YAAY,OAAOD,EAAa,IAAI,EACxDE,EAAc,KAAK,kBAAkBL,EAAaI,CAAY,EAC9DE,EAAgB,KAAK,kBAAkBD,EAAaH,CAAW,EAErE,OAAII,EAAc,OAASnB,EAClBE,EAAqB,CAC1B,MAAO,IAAIC,EACT,iEACF,CACF,CAAC,EAGI,KAAK,IAAI,YACd,IAAIG,EAA2B,CAAE,QAASa,CAAc,CAAC,CAC3D,CACF,CAKQ,kBACNN,EACAI,EACY,CACZ,OACE,IAAIhB,EAAiB,EAElB,kBAAkB,GAAI,EACtB,qBAAqB,iBAAiB,EAEtC,kBAAkB,CAAC,EAEnB,gBAAgB,IAAI,WAAW,EAAE,CAAC,EAElC,kBAAkB,CAAC,EAEnB,kBAAkB,CAAC,EAEnB,gBAAgBgB,CAAY,EAE5B,kBAAkBJ,EAAY,OAAS,GAAI,EAC3C,kBAAmBA,EAAY,QAAU,EAAK,GAAI,EAElD,gBAAgBA,CAAW,EAC3B,MAAM,CAEb,CAKQ,kBACNK,EACAE,EACY,CAGZ,MAAMC,EAAYD,EAAM,OAAS,EAC3BE,EAAU,IAAIrB,EAClBiB,EAAY,OAAS,EAAkB,EAAkBG,CAC3D,EAGA,OAAAC,EAAQ,kBAAkB,CAAe,EAEzCA,EAAQ,kBAAkBF,EAAM,MAAM,EAEtCA,EAAM,QAASG,GAAQ,CACrB,MAAMC,EAAM,IAAI,WAAW,CAAC,EAC5B,IAAI,SAASA,EAAI,MAAM,EAAE,UAAU,EAAGD,EAAK,EAAK,EAChDD,EAAQ,gBAAgBE,CAAG,CAC7B,CAAC,EAEDF,EAAQ,gBAAgBJ,CAAW,EAE5BI,EAAQ,MAAM,CACvB,CACF",
6
- "names": ["APDU_MAX_PAYLOAD", "ByteArrayBuilder", "CommandResultFactory", "InvalidStatusWordError", "DerivationPathUtils", "GetPubKeyCommand", "SignOffChainMessageCommand", "DefaultBs58Encoder", "MAX_MESSAGE_LENGTH", "SendSignMessageTask", "api", "args", "bs58Encoder", "sendingData", "derivationPath", "pathIndexes", "pubkeyResult", "signerPubkey", "fullMessage", "commandBuffer", "paths", "pathBytes", "builder", "idx", "buf"]
4
+ "sourcesContent": ["import {\n ByteArrayBuilder,\n type CommandResult,\n CommandResultFactory,\n type InternalApi,\n InvalidStatusWordError,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\nimport { DerivationPathUtils } from \"@ledgerhq/signer-utils\";\n\nimport { GetPubKeyCommand } from \"@internal/app-binder/command/GetPubKeyCommand\";\nimport {\n SignOffChainMessageCommand,\n type SignOffChainRawResponse,\n} from \"@internal/app-binder/command/SignOffChainMessageCommand\";\nimport { type SolanaAppErrorCodes } from \"@internal/app-binder/command/utils/SolanaApplicationErrors\";\nimport {\n type Bs58Encoder,\n DefaultBs58Encoder,\n} from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n type CommandFactory,\n SendCommandInChunksTask,\n} from \"./SendCommandInChunksTask\";\n\nconst DEVICE_V0_PAYLOAD_CEILING = 15 * 1024; // 15360\nconst DEVICE_LEGACY_PAYLOAD_CEILING = 1280;\n\n// bytes reserved by app/header and transport\nconst RESERVED_HEADER_BYTES = 40;\nconst RESERVED_TRANSPORT_BYTES = 8;\n\n// derived usable body sizes\nconst OFFCHAINMSG_MAX_LEN =\n DEVICE_V0_PAYLOAD_CEILING - RESERVED_HEADER_BYTES - RESERVED_TRANSPORT_BYTES; // 15312\n\nconst LEGACY_OFFCHAINMSG_MAX_LEN =\n DEVICE_LEGACY_PAYLOAD_CEILING -\n RESERVED_HEADER_BYTES -\n RESERVED_TRANSPORT_BYTES; // 1232\n\n// device cap for v0 long UTF-8\nconst OFFCHAINMSG_MAX_V0_LEN = 65515;\n\nconst MAX_PRINTABLE_ASCII = 0x7e;\nconst MIN_PRINTABLE_ASCII = 0x20;\nconst LINE_FEED_ASCII = 0x0a;\n\nexport enum MessageFormat {\n Ascii = 0,\n Utf8 = 1,\n Utf8LongV0 = 2,\n}\n\nexport const MAX_MESSAGE_LENGTH = OFFCHAINMSG_MAX_V0_LEN;\n\nexport type SendSignMessageTaskArgs = {\n sendingData: Uint8Array;\n derivationPath: string;\n};\n\nexport type SendSignMessageTaskRunFunctionReturn = Promise<\n CommandResult<{ signature: string }, SolanaAppErrorCodes>\n>;\n\nexport class SendSignMessageTask {\n constructor(\n private api: InternalApi,\n private args: SendSignMessageTaskArgs,\n private readonly bs58Encoder: Bs58Encoder = DefaultBs58Encoder,\n ) {}\n\n async run(): SendSignMessageTaskRunFunctionReturn {\n const { sendingData, derivationPath } = this.args;\n\n if (sendingData.length === 0) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\"Message cannot be empty\"),\n });\n }\n if (sendingData.length > MAX_MESSAGE_LENGTH) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n `Message too long: ${sendingData.length} bytes (max is ${MAX_MESSAGE_LENGTH})`,\n ),\n });\n }\n\n const paths = DerivationPathUtils.splitPath(derivationPath);\n\n const pubkeyResult = await this.api.sendCommand(\n new GetPubKeyCommand({ derivationPath, checkOnDevice: false }),\n );\n if (!(\"data\" in pubkeyResult)) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n \"Error getting public key from device\",\n ),\n });\n }\n const signerPubkey = this.bs58Encoder.decode(pubkeyResult.data);\n\n // try v0 first\n const v0OCM = this._buildFullMessage(sendingData, signerPubkey, false);\n const v0Payload = this._buildApduCommand(v0OCM, paths);\n const v0Res = await this._sendInChunks(v0Payload);\n\n if (isSuccessCommandResult(v0Res)) {\n try {\n const sigB58 = this._buildEnvelopeBase58(v0Res.data, v0OCM);\n return CommandResultFactory({ data: { signature: sigB58 } });\n } catch (e) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n e instanceof Error ? e.message : String(e),\n ),\n });\n }\n }\n\n // if the app says header invalid, try legacy\n const v0Error: unknown =\n \"error\" in v0Res ? (v0Res as { error: unknown }).error : undefined;\n\n if (this._isInvalidOffchainHeaderError(v0Error)) {\n if (sendingData.length > LEGACY_OFFCHAINMSG_MAX_LEN) {\n return v0Res;\n }\n\n const legacyOCM = this._buildFullMessage(sendingData, signerPubkey, true);\n const legacyPayload = this._buildApduCommand(legacyOCM, paths);\n const legacyRes = await this._sendInChunks(legacyPayload);\n\n if (isSuccessCommandResult(legacyRes)) {\n try {\n const sigB58 = this._buildEnvelopeBase58(legacyRes.data, legacyOCM);\n return CommandResultFactory({ data: { signature: sigB58 } });\n } catch (e) {\n return CommandResultFactory({\n error: new InvalidStatusWordError(\n e instanceof Error ? e.message : String(e),\n ),\n });\n }\n }\n return legacyRes;\n }\n\n return v0Res;\n }\n\n private _isUTF8(buf: Uint8Array): boolean {\n try {\n new TextDecoder(\"utf-8\", { fatal: true }).decode(buf);\n return true;\n } catch {\n return false;\n }\n }\n\n private _findMessageFormat(\n message: Uint8Array,\n isLegacy: boolean,\n ): MessageFormat {\n const maxLedgerLen = isLegacy\n ? LEGACY_OFFCHAINMSG_MAX_LEN\n : OFFCHAINMSG_MAX_LEN;\n\n if (message.length <= maxLedgerLen) {\n if (this._isPrintableASCII(message, isLegacy)) return MessageFormat.Ascii;\n if (this._isUTF8(message)) return MessageFormat.Utf8;\n } else if (message.length <= OFFCHAINMSG_MAX_V0_LEN) {\n if (this._isUTF8(message)) return MessageFormat.Utf8LongV0;\n } else {\n // unreachable if run() guards length\n throw new InvalidStatusWordError(\n `Message too long: ${message.length} bytes (max is ${OFFCHAINMSG_MAX_V0_LEN})`,\n );\n }\n // default to ASCII like legacy\n return MessageFormat.Ascii;\n }\n\n private _isPrintableASCII(buf: Uint8Array, isLegacy: boolean): boolean {\n for (let i = 0; i < buf.length; i++) {\n const ch: number = buf[i]!;\n if (!isLegacy && ch === LINE_FEED_ASCII) continue; // newline allowed only for non-legacy\n if (ch < MIN_PRINTABLE_ASCII || ch > MAX_PRINTABLE_ASCII) return false;\n }\n return true;\n }\n\n /**\n * build serialised off-chain message header + body\n * when `isLegacy` is true, build the short legacy header (no app-domain or signers).\n */\n private _buildFullMessage(\n messageBody: Uint8Array,\n signerPubkey: Uint8Array,\n isLegacy: boolean,\n ): Uint8Array {\n const format: MessageFormat = this._findMessageFormat(\n messageBody,\n isLegacy,\n );\n\n const builder = new ByteArrayBuilder();\n\n // signing domain: 0xFF + \"solana offchain\" (16 bytes)\n builder.add8BitUIntToData(0xff).addAsciiStringToData(\"solana offchain\");\n\n // header version = 0\n builder.add8BitUIntToData(0);\n\n if (!isLegacy) {\n // application domain = 32 zeros\n builder.addBufferToData(new Uint8Array(32));\n }\n\n // message format\n builder.add8BitUIntToData(format);\n\n if (!isLegacy) {\n // signer count = 1\n builder.add8BitUIntToData(1);\n // signer pubkey (32 bytes)\n builder.addBufferToData(signerPubkey);\n }\n\n // message length (LE, 2 bytes)\n builder.add8BitUIntToData(messageBody.length & 0xff);\n builder.add8BitUIntToData((messageBody.length >> 8) & 0xff);\n\n // message body\n builder.addBufferToData(messageBody);\n\n return builder.build();\n }\n\n // guard for the device\u2019s 0x6A81 \u201CInvalid off-chain message header\u201D error\n private _isInvalidOffchainHeaderError(\n e: unknown,\n ): e is { _tag: string; errorCode: string } {\n if (!e || typeof e !== \"object\") return false;\n const obj = e as Record<string, unknown>;\n const tag = obj[\"_tag\"];\n const code = obj[\"errorCode\"];\n return (\n typeof tag === \"string\" &&\n typeof code === \"string\" &&\n code.toLowerCase() === \"6a81\"\n );\n }\n\n /**\n * build APDU payload:\n * [signerCount=1][derivationsCount][each 4-byte index][OCM message]\n */\n private _buildApduCommand(\n fullMessage: Uint8Array,\n paths: number[],\n ): Uint8Array {\n const builder = new ByteArrayBuilder(\n 1 + 1 + paths.length * 4 + fullMessage.length,\n );\n\n builder.add8BitUIntToData(1); // number of signers\n builder.add8BitUIntToData(paths.length); // number of derivations\n paths.forEach((idx) => builder.add32BitUIntToData(idx)); // big-endian\n builder.addBufferToData(fullMessage);\n\n return builder.build(); // larger than 255 is ok, SendCommandInChunksTask will chunk it\n }\n\n // send APDU payload using chunk task, return raw 64-byte signature (last chunk)\n private async _sendInChunks(\n apduPayload: Uint8Array,\n ): Promise<CommandResult<SignOffChainRawResponse, SolanaAppErrorCodes>> {\n const commandFactory: CommandFactory<SignOffChainRawResponse> = (\n chunkArgs,\n ) => new SignOffChainMessageCommand(chunkArgs);\n\n return await new SendCommandInChunksTask<SignOffChainRawResponse>(\n this.api,\n {\n data: apduPayload,\n commandFactory,\n },\n ).run();\n }\n\n // build base58 OCM envelope: [signatureCount=1][signature(64)][serialized OCM]\n private _buildEnvelopeBase58(\n rawSignature: Uint8Array,\n serializedOCM: Uint8Array,\n ): string {\n if (rawSignature.length !== 64) {\n throw new InvalidStatusWordError(\n `Invalid signature length: ${rawSignature.length} (expected 64)`,\n );\n }\n const sigCount = Uint8Array.of(1);\n const envelope = new Uint8Array(\n sigCount.length + rawSignature.length + serializedOCM.length,\n );\n envelope.set(sigCount, 0);\n envelope.set(rawSignature, sigCount.length);\n envelope.set(serializedOCM, sigCount.length + rawSignature.length);\n return this.bs58Encoder.encode(envelope);\n }\n}\n"],
5
+ "mappings": "AAAA,OACE,oBAAAA,EAEA,wBAAAC,EAEA,0BAAAC,EACA,0BAAAC,MACK,kCACP,OAAS,uBAAAC,MAA2B,yBAEpC,OAAS,oBAAAC,MAAwB,gDACjC,OACE,8BAAAC,MAEK,0DAEP,OAEE,sBAAAC,MACK,4CAEP,OAEE,2BAAAC,MACK,4BAEP,MAAMC,EAA4B,GAAK,KACjCC,EAAgC,KAGhCC,EAAwB,GACxBC,EAA2B,EAG3BC,EACJJ,EAA4BE,EAAwBC,EAEhDE,EACJJ,EACAC,EACAC,EAGIG,EAAyB,MAEzBC,EAAsB,IACtBC,EAAsB,GACtBC,EAAkB,GAEjB,IAAKC,OACVA,IAAA,MAAQ,GAAR,QACAA,IAAA,KAAO,GAAP,OACAA,IAAA,WAAa,GAAb,aAHUA,OAAA,IAML,MAAMC,EAAqBL,EAW3B,MAAMM,CAAoB,CAC/B,YACUC,EACAC,EACSC,EAA2BjB,EAC5C,CAHQ,SAAAe,EACA,UAAAC,EACS,iBAAAC,CAChB,CAEH,MAAM,KAA4C,CAChD,KAAM,CAAE,YAAAC,EAAa,eAAAC,CAAe,EAAI,KAAK,KAE7C,GAAID,EAAY,SAAW,EACzB,OAAOxB,EAAqB,CAC1B,MAAO,IAAIC,EAAuB,yBAAyB,CAC7D,CAAC,EAEH,GAAIuB,EAAY,OAASL,EACvB,OAAOnB,EAAqB,CAC1B,MAAO,IAAIC,EACT,qBAAqBuB,EAAY,MAAM,kBAAkBL,CAAkB,GAC7E,CACF,CAAC,EAGH,MAAMO,EAAQvB,EAAoB,UAAUsB,CAAc,EAEpDE,EAAe,MAAM,KAAK,IAAI,YAClC,IAAIvB,EAAiB,CAAE,eAAAqB,EAAgB,cAAe,EAAM,CAAC,CAC/D,EACA,GAAI,EAAE,SAAUE,GACd,OAAO3B,EAAqB,CAC1B,MAAO,IAAIC,EACT,sCACF,CACF,CAAC,EAEH,MAAM2B,EAAe,KAAK,YAAY,OAAOD,EAAa,IAAI,EAGxDE,EAAQ,KAAK,kBAAkBL,EAAaI,EAAc,EAAK,EAC/DE,EAAY,KAAK,kBAAkBD,EAAOH,CAAK,EAC/CK,EAAQ,MAAM,KAAK,cAAcD,CAAS,EAEhD,GAAI5B,EAAuB6B,CAAK,EAC9B,GAAI,CACF,MAAMC,EAAS,KAAK,qBAAqBD,EAAM,KAAMF,CAAK,EAC1D,OAAO7B,EAAqB,CAAE,KAAM,CAAE,UAAWgC,CAAO,CAAE,CAAC,CAC7D,OAASC,EAAG,CACV,OAAOjC,EAAqB,CAC1B,MAAO,IAAIC,EACTgC,aAAa,MAAQA,EAAE,QAAU,OAAOA,CAAC,CAC3C,CACF,CAAC,CACH,CAIF,MAAMC,EACJ,UAAWH,EAASA,EAA6B,MAAQ,OAE3D,GAAI,KAAK,8BAA8BG,CAAO,EAAG,CAC/C,GAAIV,EAAY,OAASX,EACvB,OAAOkB,EAGT,MAAMI,EAAY,KAAK,kBAAkBX,EAAaI,EAAc,EAAI,EAClEQ,EAAgB,KAAK,kBAAkBD,EAAWT,CAAK,EACvDW,EAAY,MAAM,KAAK,cAAcD,CAAa,EAExD,GAAIlC,EAAuBmC,CAAS,EAClC,GAAI,CACF,MAAML,EAAS,KAAK,qBAAqBK,EAAU,KAAMF,CAAS,EAClE,OAAOnC,EAAqB,CAAE,KAAM,CAAE,UAAWgC,CAAO,CAAE,CAAC,CAC7D,OAASC,EAAG,CACV,OAAOjC,EAAqB,CAC1B,MAAO,IAAIC,EACTgC,aAAa,MAAQA,EAAE,QAAU,OAAOA,CAAC,CAC3C,CACF,CAAC,CACH,CAEF,OAAOI,CACT,CAEA,OAAON,CACT,CAEQ,QAAQO,EAA0B,CACxC,GAAI,CACF,WAAI,YAAY,QAAS,CAAE,MAAO,EAAK,CAAC,EAAE,OAAOA,CAAG,EAC7C,EACT,MAAQ,CACN,MAAO,EACT,CACF,CAEQ,mBACNC,EACAC,EACe,CACf,MAAMC,EAAeD,EACjB3B,EACAD,EAEJ,GAAI2B,EAAQ,QAAUE,EAAc,CAClC,GAAI,KAAK,kBAAkBF,EAASC,CAAQ,EAAG,MAAO,GACtD,GAAI,KAAK,QAAQD,CAAO,EAAG,MAAO,EACpC,SAAWA,EAAQ,QAAUzB,GAC3B,GAAI,KAAK,QAAQyB,CAAO,EAAG,MAAO,OAGlC,OAAM,IAAItC,EACR,qBAAqBsC,EAAQ,MAAM,kBAAkBzB,CAAsB,GAC7E,EAGF,MAAO,EACT,CAEQ,kBAAkBwB,EAAiBE,EAA4B,CACrE,QAASE,EAAI,EAAGA,EAAIJ,EAAI,OAAQI,IAAK,CACnC,MAAMC,EAAaL,EAAII,CAAC,EACxB,GAAI,GAACF,GAAYG,IAAO1B,KACpB0B,EAAK3B,GAAuB2B,EAAK5B,GAAqB,MAAO,EACnE,CACA,MAAO,EACT,CAMQ,kBACN6B,EACAhB,EACAY,EACY,CACZ,MAAMK,EAAwB,KAAK,mBACjCD,EACAJ,CACF,EAEMM,EAAU,IAAI/C,EAGpB,OAAA+C,EAAQ,kBAAkB,GAAI,EAAE,qBAAqB,iBAAiB,EAGtEA,EAAQ,kBAAkB,CAAC,EAEtBN,GAEHM,EAAQ,gBAAgB,IAAI,WAAW,EAAE,CAAC,EAI5CA,EAAQ,kBAAkBD,CAAM,EAE3BL,IAEHM,EAAQ,kBAAkB,CAAC,EAE3BA,EAAQ,gBAAgBlB,CAAY,GAItCkB,EAAQ,kBAAkBF,EAAY,OAAS,GAAI,EACnDE,EAAQ,kBAAmBF,EAAY,QAAU,EAAK,GAAI,EAG1DE,EAAQ,gBAAgBF,CAAW,EAE5BE,EAAQ,MAAM,CACvB,CAGQ,8BACNb,EAC0C,CAC1C,GAAI,CAACA,GAAK,OAAOA,GAAM,SAAU,MAAO,GACxC,MAAMc,EAAMd,EACNe,EAAMD,EAAI,KACVE,EAAOF,EAAI,UACjB,OACE,OAAOC,GAAQ,UACf,OAAOC,GAAS,UAChBA,EAAK,YAAY,IAAM,MAE3B,CAMQ,kBACNC,EACAxB,EACY,CACZ,MAAMoB,EAAU,IAAI/C,EAClB,EAAQ2B,EAAM,OAAS,EAAIwB,EAAY,MACzC,EAEA,OAAAJ,EAAQ,kBAAkB,CAAC,EAC3BA,EAAQ,kBAAkBpB,EAAM,MAAM,EACtCA,EAAM,QAASyB,GAAQL,EAAQ,mBAAmBK,CAAG,CAAC,EACtDL,EAAQ,gBAAgBI,CAAW,EAE5BJ,EAAQ,MAAM,CACvB,CAGA,MAAc,cACZM,EACsE,CACtE,MAAMC,EACJC,GACG,IAAIjD,EAA2BiD,CAAS,EAE7C,OAAO,MAAM,IAAI/C,EACf,KAAK,IACL,CACE,KAAM6C,EACN,eAAAC,CACF,CACF,EAAE,IAAI,CACR,CAGQ,qBACNE,EACAC,EACQ,CACR,GAAID,EAAa,SAAW,GAC1B,MAAM,IAAItD,EACR,6BAA6BsD,EAAa,MAAM,gBAClD,EAEF,MAAME,EAAW,WAAW,GAAG,CAAC,EAC1BC,EAAW,IAAI,WACnBD,EAAS,OAASF,EAAa,OAASC,EAAc,MACxD,EACA,OAAAE,EAAS,IAAID,EAAU,CAAC,EACxBC,EAAS,IAAIH,EAAcE,EAAS,MAAM,EAC1CC,EAAS,IAAIF,EAAeC,EAAS,OAASF,EAAa,MAAM,EAC1D,KAAK,YAAY,OAAOG,CAAQ,CACzC,CACF",
6
+ "names": ["ByteArrayBuilder", "CommandResultFactory", "InvalidStatusWordError", "isSuccessCommandResult", "DerivationPathUtils", "GetPubKeyCommand", "SignOffChainMessageCommand", "DefaultBs58Encoder", "SendCommandInChunksTask", "DEVICE_V0_PAYLOAD_CEILING", "DEVICE_LEGACY_PAYLOAD_CEILING", "RESERVED_HEADER_BYTES", "RESERVED_TRANSPORT_BYTES", "OFFCHAINMSG_MAX_LEN", "LEGACY_OFFCHAINMSG_MAX_LEN", "OFFCHAINMSG_MAX_V0_LEN", "MAX_PRINTABLE_ASCII", "MIN_PRINTABLE_ASCII", "LINE_FEED_ASCII", "MessageFormat", "MAX_MESSAGE_LENGTH", "SendSignMessageTask", "api", "args", "bs58Encoder", "sendingData", "derivationPath", "paths", "pubkeyResult", "signerPubkey", "v0OCM", "v0Payload", "v0Res", "sigB58", "e", "v0Error", "legacyOCM", "legacyPayload", "legacyRes", "buf", "message", "isLegacy", "maxLedgerLen", "i", "ch", "messageBody", "format", "builder", "obj", "tag", "code", "fullMessage", "idx", "apduPayload", "commandFactory", "chunkArgs", "rawSignature", "serializedOCM", "sigCount", "envelope"]
7
7
  }
@@ -1,2 +1,4 @@
1
- import{CommandResultFactory as o,InvalidStatusWordError as c}from"@ledgerhq/device-management-kit";import{makeDeviceActionInternalApiMock as x}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{DefaultBs58Encoder as h}from"../../app-binder/services/bs58Encoder";import{MAX_MESSAGE_LENGTH as w,SendSignMessageTask as t}from"../../app-binder/task/SendSignMessageTask";const r="44'/501'/0'/0'",u=new Uint8Array(32).fill(0),m=h.encode(u),d=new Uint8Array([240,202,204,26]);describe("SendSignMessageTask",()=>{const e=x();beforeEach(()=>{vi.resetAllMocks()}),describe("run()",()=>{it("should error on empty message before any device call",async()=>{const a={derivationPath:r,sendingData:new Uint8Array([])},n=await new t(e,a).run();expect(e.sendCommand).toHaveBeenCalledTimes(0),expect(n.error).toEqual(new c("Message cannot be empty"))}),it("should return error if GET_PUBKEY fails",async()=>{e.sendCommand.mockResolvedValueOnce(o({error:new c("pubkey error")}));const a={derivationPath:r,sendingData:d},n=await new t(e,a).run();expect(e.sendCommand).toHaveBeenCalledTimes(1),expect(n.error).toEqual(new c("Error getting public key from device"))}),it("should return error if SignOffChainMessageCommand fails",async()=>{e.sendCommand.mockResolvedValueOnce(o({data:m})).mockResolvedValueOnce(o({error:new c("no signature returned")}));const a={derivationPath:r,sendingData:d},n=await new t(e,a).run();expect(e.sendCommand).toHaveBeenCalledTimes(2),expect(n.error).toEqual(new c("no signature returned"))}),it("should return success when signing succeeds",async()=>{const a=new Uint8Array([240,202,204,26]);e.sendCommand.mockResolvedValueOnce(o({data:m})).mockResolvedValueOnce(o({data:a}));const n={derivationPath:r,sendingData:d},s=await new t(e,n).run();expect(e.sendCommand).toHaveBeenCalledTimes(2),expect(s.data).toEqual(a)}),it("should reject invalid derivation path",async()=>{const a={derivationPath:"not/a/path",sendingData:d};await expect(new t(e,a).run()).rejects.toThrow()}),it("should correctly build APDU command lengths",()=>{const a=new t(e,{derivationPath:r,sendingData:d}),n=a._buildFullMessage(d,u),s=[-2147483604,-2147483147,-2147483648,0],l=a._buildApduCommand(n,s),i=2+s.length*4+n.length;expect(l.length).toBe(i)}),it("should handle maximum allowed message length",async()=>{const l=new Uint8Array(152).fill(1),i=new Uint8Array([240,202,204,26]);e.sendCommand.mockResolvedValueOnce(o({data:m})).mockResolvedValueOnce(o({data:i}));const g=await new t(e,{derivationPath:r,sendingData:l}).run();expect(e.sendCommand).toHaveBeenCalledTimes(2),expect(g.data).toEqual(i)}),it("should error on message exceeding 16-bit length (65535)",async()=>{const a=new Uint8Array(w+1).fill(170),n={derivationPath:r,sendingData:a},s=await new t(e,n).run();expect(e.sendCommand).toHaveBeenCalledTimes(0),expect(s.error).toEqual(new c(`Message too long: ${a.length} bytes (max is 65535)`))})})});
1
+ import{CommandResultFactory as r,InvalidStatusWordError as m}from"@ledgerhq/device-management-kit";import{makeDeviceActionInternalApiMock as h}from"../../app-binder/device-action/__test-utils__/makeInternalApi";import{DefaultBs58Encoder as x}from"../../app-binder/services/bs58Encoder";import{MAX_MESSAGE_LENGTH as v,MessageFormat as u,SendSignMessageTask as s}from"../../app-binder/task/SendSignMessageTask";const o="44'/501'/0'/0'",c=new Uint8Array(32).fill(17),g=x.encode(c);function y(){return{_tag:"SolanaAppCommandError",errorCode:"6a81",message:"Invalid off-chain message header"}}describe("SendSignMessageTask",()=>{const n=h();beforeEach(()=>{vi.resetAllMocks()}),describe("run()",()=>{it("errors on empty message before any device call",async()=>{const e=await new s(n,{derivationPath:o,sendingData:new Uint8Array([])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(0),expect(e.error).toEqual(new m("Message cannot be empty"))}),it("errors when GET_PUBKEY fails",async()=>{n.sendCommand.mockResolvedValueOnce(r({error:new m("pubkey error")}));const e=await new s(n,{derivationPath:o,sendingData:new Uint8Array([1,2,3])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(1),expect(e.error).toEqual(new m("Error getting public key from device"))}),it("surfaces command error when signing fails",async()=>{n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({error:new m("no signature returned")}));const e=await new s(n,{derivationPath:o,sendingData:new Uint8Array([170,187])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(e.error).toEqual(new m("no signature returned"))}),it("returns base58 envelope when signing succeeds",async()=>{const e=new Uint8Array([240,202,204,26]),a=new Uint8Array(64).fill(51);n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({data:a}));const t=new s(n,{derivationPath:o,sendingData:e}),i=t._buildFullMessage(e,c,!1),d=await t.run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect("data"in d).toBe(!0);const w=d.data.signature,l=new Uint8Array(1+a.length+i.length);l.set(Uint8Array.of(1),0),l.set(a,1),l.set(i,1+a.length),expect(x.decode(w)).toEqual(l)}),it("rejects invalid derivation path",async()=>{const e={derivationPath:"not/a/path",sendingData:new Uint8Array([1])};await expect(new s(n,e).run()).rejects.toThrow()}),it("builds APDU command with correct structure (prefix + tail)",()=>{const e=new Uint8Array([1,2,3]),a=new s(n,{derivationPath:o,sendingData:e}),t=a._buildFullMessage(e,c,!1),i=[-2147483604,-2147483147,-2147483648,0],d=a._buildApduCommand(t,i);expect(d[0]).toBe(1),expect(d[1]).toBe(i.length),expect(d.slice(d.length-t.length)).toEqual(t)}),it("handles large messages via chunking (no exact call count assertion)",async()=>{const e=new Uint8Array(4e3).fill(1),a=new Uint8Array(64).fill(68);n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValue(r({data:a}));const t=await new s(n,{derivationPath:o,sendingData:e}).run();expect("data"in t).toBe(!0)}),it("errors on message exceeding v0 max (65515)",async()=>{const e=new Uint8Array(v+1).fill(170),a=await new s(n,{derivationPath:o,sendingData:e}).run();expect(n.sendCommand).toHaveBeenCalledTimes(0),expect(a.error).toEqual(new m(`Message too long: ${e.length} bytes (max is ${v})`))}),it("falls back to legacy when v0 returns 6a81 (header error)",async()=>{const e=new Uint8Array([97,98,99]),a=new Uint8Array(64).fill(85);n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({error:y()})).mockResolvedValueOnce(r({data:a}));const t=new s(n,{derivationPath:o,sendingData:e}),i=t._buildFullMessage(e,c,!0),d=await t.run();expect(n.sendCommand).toHaveBeenCalledTimes(3);const w=d.data.signature,l=new Uint8Array(1+a.length+i.length);l.set(Uint8Array.of(1),0),l.set(a,1),l.set(i,1+a.length),expect(x.decode(w)).toEqual(l)}),it("does NOT fallback on non-6a81 errors",async()=>{n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({error:new m("oups")}));const e=await new s(n,{derivationPath:o,sendingData:new Uint8Array([1,2])}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(e.error).toBeInstanceOf(m)}),it("propagates 6a81 if body is too large for legacy",async()=>{const e=new Uint8Array(2e3).fill(49);n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({error:y()}));const a=await new s(n,{derivationPath:o,sendingData:e}).run();expect(n.sendCommand).toHaveBeenCalledTimes(2),expect(a.error).toEqual(y())})}),describe("message format detection (indirect via header byte)",()=>{it("sets format=0 for ASCII \u2264 maxLedgerLen (v0 header)",()=>{const e=new TextEncoder().encode(`hello
2
+ world`),t=new s(n,{derivationPath:o,sendingData:e})._buildFullMessage(e,c,!1);expect(t[49]).toBe(u.Ascii)}),it("sets format=1 for short UTF-8 non-ASCII (v0 header)",()=>{const e=new TextEncoder().encode("h\xE9ll\xF8"),t=new s(n,{derivationPath:o,sendingData:e})._buildFullMessage(e,c,!1);expect(t[49]).toBe(u.Utf8)}),it("sets format=2 for long UTF-8 (v0 header)",()=>{const e=new TextEncoder().encode("x".repeat(15313)),t=new s(n,{derivationPath:o,sendingData:e})._buildFullMessage(e,c,!1);expect(t[49]).toBe(u.Utf8LongV0)}),it("legacy header forbids newline in ASCII (so format becomes UTF-8=1)",()=>{const e=new TextEncoder().encode(`hello
3
+ world`),t=new s(n,{derivationPath:o,sendingData:e})._buildFullMessage(e,c,!0);expect(t[17]).toBe(u.Utf8)}),it("legacy header sets format=0 for plain ASCII (no newline)",()=>{const e=new TextEncoder().encode("HELLO_123"),t=new s(n,{derivationPath:o,sendingData:e})._buildFullMessage(e,c,!0);expect(t[17]).toBe(u.Ascii)}),it("message length is little-endian in both headers",()=>{const e=new Uint8Array([1,2,3]),a=new s(n,{derivationPath:o,sendingData:e}),t=a._buildFullMessage(e,c,!1);expect(t[83]).toBe(3),expect(t[84]).toBe(0);const i=a._buildFullMessage(e,c,!0);expect(i[18]).toBe(3),expect(i[19]).toBe(0)})}),it("returns error when device returns non-64-byte signature on final chunk",async()=>{const e=new Uint8Array([1,2,3]);n.sendCommand.mockResolvedValueOnce(r({data:g})).mockResolvedValueOnce(r({data:new Uint8Array(0)}));const a=await new s(n,{derivationPath:o,sendingData:e}).run();expect("error"in a).toBe(!0);const t=a.error;expect(t).toBeInstanceOf(m)})});
2
4
  //# sourceMappingURL=SendSignMessageTask.test.js.map
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "version": 3,
3
3
  "sources": ["../../../../../src/internal/app-binder/task/SendSignMessageTask.test.ts"],
4
- "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\nimport {\n MAX_MESSAGE_LENGTH,\n SendSignMessageTask,\n} from \"@internal/app-binder/task/SendSignMessageTask\";\n\nconst DERIVATION_PATH = \"44'/501'/0'/0'\";\nconst PUBKEY = new Uint8Array(32).fill(0x00);\nconst PUBKEY_BASE58 = DefaultBs58Encoder.encode(PUBKEY);\nconst MESSAGE = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n\ndescribe(\"SendSignMessageTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"run()\", () => {\n it(\"should error on empty message before any device call\", async () => {\n // given\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([]),\n };\n\n // when\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\"Message cannot be empty\"),\n );\n });\n\n it(\"should return error if GET_PUBKEY fails\", async () => {\n // given\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"pubkey error\"),\n }),\n );\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: MESSAGE,\n };\n\n // when\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\"Error getting public key from device\"),\n );\n });\n\n it(\"should return error if SignOffChainMessageCommand fails\", async () => {\n // given\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: MESSAGE,\n };\n\n // when\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\"no signature returned\"),\n );\n });\n\n it(\"should return success when signing succeeds\", async () => {\n // given\n const mockSig = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(CommandResultFactory({ data: mockSig }));\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: MESSAGE,\n };\n\n // when\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((result as any).data).toEqual(mockSig);\n });\n\n it(\"should reject invalid derivation path\", async () => {\n const args = {\n derivationPath: \"not/a/path\",\n sendingData: MESSAGE,\n };\n await expect(\n new SendSignMessageTask(apiMock, args).run(),\n ).rejects.toThrow();\n });\n\n it(\"should correctly build APDU command lengths\", () => {\n // given\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: MESSAGE,\n });\n\n // when\n const fullMsg = task._buildFullMessage(MESSAGE, PUBKEY);\n const paths = [44 | 0x80000000, 501 | 0x80000000, 0 | 0x80000000, 0];\n const apdu = task._buildApduCommand(fullMsg, paths);\n const expectedLen = 1 + 1 + paths.length * 4 + fullMsg.length;\n\n // then\n expect(apdu.length).toBe(expectedLen);\n });\n\n it(\"should handle maximum allowed message length\", async () => {\n // given\n const headerAPDU = 1 + 1 + 4 * 4;\n const fullMsgHeader = 1 + 15 + 1 + 32 + 1 + 1 + 32 + 2;\n const maxBody = 255 - headerAPDU - fullMsgHeader;\n const bigMsg = new Uint8Array(maxBody).fill(0x01);\n const mockSig = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(CommandResultFactory({ data: mockSig }));\n\n // when\n const result = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: bigMsg,\n }).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((result as any).data).toEqual(mockSig);\n });\n\n it(\"should error on message exceeding 16-bit length (65535)\", async () => {\n // given\n const tooBig = new Uint8Array(MAX_MESSAGE_LENGTH + 1).fill(0xaa);\n const args = {\n derivationPath: DERIVATION_PATH,\n sendingData: tooBig,\n };\n\n // when\n const result = await new SendSignMessageTask(apiMock, args).run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\n `Message too long: ${tooBig.length} bytes (max is 65535)`,\n ),\n );\n });\n });\n});\n"],
5
- "mappings": "AAIA,OACE,wBAAAA,EACA,0BAAAC,MACK,kCAEP,OAAS,mCAAAC,MAAuC,oEAChD,OAAS,sBAAAC,MAA0B,4CACnC,OACE,sBAAAC,EACA,uBAAAC,MACK,gDAEP,MAAMC,EAAkB,iBAClBC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,CAAI,EACrCC,EAAgBL,EAAmB,OAAOI,CAAM,EAChDE,EAAU,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAEvD,SAAS,sBAAuB,IAAM,CACpC,MAAMC,EAAUR,EAAgC,EAEhD,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,uDAAwD,SAAY,CAErE,MAAMS,EAAO,CACX,eAAgBL,EAChB,YAAa,IAAI,WAAW,CAAC,CAAC,CAChC,EAGMM,EAAS,MAAM,IAAIP,EAAoBK,EAASC,CAAI,EAAE,IAAI,EAGhE,OAAOD,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,KAAK,EAAE,QAC5B,IAAIX,EAAuB,yBAAyB,CACtD,CACF,CAAC,EAED,GAAG,0CAA2C,SAAY,CAExDS,EAAQ,YAAY,sBAClBV,EAAqB,CACnB,MAAO,IAAIC,EAAuB,cAAc,CAClD,CAAC,CACH,EACA,MAAMU,EAAO,CACX,eAAgBL,EAChB,YAAaG,CACf,EAGMG,EAAS,MAAM,IAAIP,EAAoBK,EAASC,CAAI,EAAE,IAAI,EAGhE,OAAOD,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,KAAK,EAAE,QAC5B,IAAIX,EAAuB,sCAAsC,CACnE,CACF,CAAC,EAED,GAAG,0DAA2D,SAAY,CAExES,EAAQ,YACL,sBAAsBV,EAAqB,CAAE,KAAMQ,CAAc,CAAC,CAAC,EACnE,sBACCR,EAAqB,CACnB,MAAO,IAAIC,EAAuB,uBAAuB,CAC3D,CAAC,CACH,EACF,MAAMU,EAAO,CACX,eAAgBL,EAChB,YAAaG,CACf,EAGMG,EAAS,MAAM,IAAIP,EAAoBK,EAASC,CAAI,EAAE,IAAI,EAGhE,OAAOD,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,KAAK,EAAE,QAC5B,IAAIX,EAAuB,uBAAuB,CACpD,CACF,CAAC,EAED,GAAG,8CAA+C,SAAY,CAE5D,MAAMY,EAAU,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EACvDH,EAAQ,YACL,sBAAsBV,EAAqB,CAAE,KAAMQ,CAAc,CAAC,CAAC,EACnE,sBAAsBR,EAAqB,CAAE,KAAMa,CAAQ,CAAC,CAAC,EAChE,MAAMF,EAAO,CACX,eAAgBL,EAChB,YAAaG,CACf,EAGMG,EAAS,MAAM,IAAIP,EAAoBK,EAASC,CAAI,EAAE,IAAI,EAGhE,OAAOD,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,IAAI,EAAE,QAAQC,CAAO,CAC9C,CAAC,EAED,GAAG,wCAAyC,SAAY,CACtD,MAAMF,EAAO,CACX,eAAgB,aAChB,YAAaF,CACf,EACA,MAAM,OACJ,IAAIJ,EAAoBK,EAASC,CAAI,EAAE,IAAI,CAC7C,EAAE,QAAQ,QAAQ,CACpB,CAAC,EAED,GAAG,8CAA+C,IAAM,CAEtD,MAAMG,EAAY,IAAIT,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaG,CACf,CAAC,EAGKM,EAAUD,EAAK,kBAAkBL,EAASF,CAAM,EAChDS,EAAQ,CAAC,YAAiB,YAAkB,YAAgB,CAAC,EAC7DC,EAAOH,EAAK,kBAAkBC,EAASC,CAAK,EAC5CE,EAAc,EAAQF,EAAM,OAAS,EAAID,EAAQ,OAGvD,OAAOE,EAAK,MAAM,EAAE,KAAKC,CAAW,CACtC,CAAC,EAED,GAAG,+CAAgD,SAAY,CAK7D,MAAMC,EAAS,IAAI,WAAW,GAAO,EAAE,KAAK,CAAI,EAC1CN,EAAU,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EACvDH,EAAQ,YACL,sBAAsBV,EAAqB,CAAE,KAAMQ,CAAc,CAAC,CAAC,EACnE,sBAAsBR,EAAqB,CAAE,KAAMa,CAAQ,CAAC,CAAC,EAGhE,MAAMD,EAAS,MAAM,IAAIP,EAAoBK,EAAS,CACpD,eAAgBJ,EAChB,YAAaa,CACf,CAAC,EAAE,IAAI,EAGP,OAAOT,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,IAAI,EAAE,QAAQC,CAAO,CAC9C,CAAC,EAED,GAAG,0DAA2D,SAAY,CAExE,MAAMO,EAAS,IAAI,WAAWhB,EAAqB,CAAC,EAAE,KAAK,GAAI,EACzDO,EAAO,CACX,eAAgBL,EAChB,YAAac,CACf,EAGMR,EAAS,MAAM,IAAIP,EAAoBK,EAASC,CAAI,EAAE,IAAI,EAGhE,OAAOD,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAe,KAAK,EAAE,QAC5B,IAAIX,EACF,qBAAqBmB,EAAO,MAAM,uBACpC,CACF,CACF,CAAC,CACH,CAAC,CACH,CAAC",
6
- "names": ["CommandResultFactory", "InvalidStatusWordError", "makeDeviceActionInternalApiMock", "DefaultBs58Encoder", "MAX_MESSAGE_LENGTH", "SendSignMessageTask", "DERIVATION_PATH", "PUBKEY", "PUBKEY_BASE58", "MESSAGE", "apiMock", "args", "result", "mockSig", "task", "fullMsg", "paths", "apdu", "expectedLen", "bigMsg", "tooBig"]
4
+ "sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-assignment */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport {\n CommandResultFactory,\n InvalidStatusWordError,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { makeDeviceActionInternalApiMock } from \"@internal/app-binder/device-action/__test-utils__/makeInternalApi\";\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\nimport {\n MAX_MESSAGE_LENGTH,\n MessageFormat,\n SendSignMessageTask,\n} from \"@internal/app-binder/task/SendSignMessageTask\";\n\nconst DERIVATION_PATH = \"44'/501'/0'/0'\";\nconst PUBKEY = new Uint8Array(32).fill(0x11);\nconst PUBKEY_BASE58 = DefaultBs58Encoder.encode(PUBKEY);\n\nfunction solanaHeaderErr() {\n return {\n _tag: \"SolanaAppCommandError\",\n errorCode: \"6a81\",\n message: \"Invalid off-chain message header\",\n } as const;\n}\n\ndescribe(\"SendSignMessageTask\", () => {\n const apiMock = makeDeviceActionInternalApiMock();\n\n beforeEach(() => {\n vi.resetAllMocks();\n });\n\n describe(\"run()\", () => {\n it(\"errors on empty message before any device call\", async () => {\n const result = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((result as any).error).toEqual(\n new InvalidStatusWordError(\"Message cannot be empty\"),\n );\n });\n\n it(\"errors when GET_PUBKEY fails\", async () => {\n apiMock.sendCommand.mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"pubkey error\"),\n }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([1, 2, 3]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(1);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\"Error getting public key from device\"),\n );\n });\n\n it(\"surfaces command error when signing fails\", async () => {\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({\n error: new InvalidStatusWordError(\"no signature returned\"),\n }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([0xaa, 0xbb]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\"no signature returned\"),\n );\n });\n\n it(\"returns base58 envelope when signing succeeds\", async () => {\n // given\n const msg = new Uint8Array([0xf0, 0xca, 0xcc, 0x1a]);\n const rawSig = new Uint8Array(64).fill(0x33); // mock 64-byte signature\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(CommandResultFactory({ data: rawSig })); // v0 last chunk\n\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n const v0OCM: Uint8Array = task._buildFullMessage(msg, PUBKEY, false);\n\n // when\n const res = await task.run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect(\"data\" in res).toBe(true);\n const b58 = (res as any).data.signature as string;\n\n // expected envelope = [1][rawSig][v0OCM]\n const expected = new Uint8Array(1 + rawSig.length + v0OCM.length);\n expected.set(Uint8Array.of(1), 0);\n expected.set(rawSig, 1);\n expected.set(v0OCM, 1 + rawSig.length);\n\n expect(DefaultBs58Encoder.decode(b58)).toEqual(expected);\n });\n\n it(\"rejects invalid derivation path\", async () => {\n const args = {\n derivationPath: \"not/a/path\",\n sendingData: new Uint8Array([1]),\n };\n await expect(\n new SendSignMessageTask(apiMock, args).run(),\n ).rejects.toThrow();\n });\n\n it(\"builds APDU command with correct structure (prefix + tail)\", () => {\n const msg = new Uint8Array([1, 2, 3]);\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n\n const fullMsg = task._buildFullMessage(msg, PUBKEY, false);\n const paths = [44 | 0x80000000, 501 | 0x80000000, 0 | 0x80000000, 0];\n const apdu = task._buildApduCommand(fullMsg, paths);\n\n // first byte: number of signers\n expect(apdu[0]).toBe(1);\n // second byte: number of derivation indices\n expect(apdu[1]).toBe(paths.length);\n // tail equals the serialized OCM\n expect(apdu.slice(apdu.length - fullMsg.length)).toEqual(fullMsg);\n });\n\n it(\"handles large messages via chunking (no exact call count assertion)\", async () => {\n const bigMsg = new Uint8Array(4000).fill(0x01);\n const rawSig = new Uint8Array(64).fill(0x44);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValue(CommandResultFactory({ data: rawSig })); // all subsequent chunks\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: bigMsg,\n }).run();\n\n expect(\"data\" in res).toBe(true);\n });\n\n it(\"errors on message exceeding v0 max (65515)\", async () => {\n const tooBig = new Uint8Array(MAX_MESSAGE_LENGTH + 1).fill(0xaa);\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: tooBig,\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(0);\n expect((res as any).error).toEqual(\n new InvalidStatusWordError(\n `Message too long: ${tooBig.length} bytes (max is ${MAX_MESSAGE_LENGTH})`,\n ),\n );\n });\n\n it(\"falls back to legacy when v0 returns 6a81 (header error)\", async () => {\n // given\n const msg = new Uint8Array([0x61, 0x62, 0x63]); // \"abc\"\n const rawSig = new Uint8Array(64).fill(0x55);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({ error: solanaHeaderErr() as any }),\n ) // v0 -> 6a81\n .mockResolvedValueOnce(CommandResultFactory({ data: rawSig })); // legacy -> OK\n\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n });\n\n // build expected LEGACY OCM to verify envelope\n const legacyOCM: Uint8Array = task._buildFullMessage(msg, PUBKEY, true);\n\n // when\n const res = await task.run();\n\n // then\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(3); // pubkey + v0 + legacy\n const b58 = (res as any).data.signature as string;\n\n const expected = new Uint8Array(1 + rawSig.length + legacyOCM.length);\n expected.set(Uint8Array.of(1), 0);\n expected.set(rawSig, 1);\n expected.set(legacyOCM, 1 + rawSig.length);\n\n expect(DefaultBs58Encoder.decode(b58)).toEqual(expected);\n });\n\n it(\"does NOT fallback on non-6a81 errors\", async () => {\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(\n CommandResultFactory({ error: new InvalidStatusWordError(\"oups\") }),\n );\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: new Uint8Array([1, 2]),\n }).run();\n\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toBeInstanceOf(InvalidStatusWordError);\n });\n\n it(\"propagates 6a81 if body is too large for legacy\", async () => {\n const msg = new Uint8Array(2000).fill(0x31); // > 1232 legacy limit\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 })) // pubkey\n .mockResolvedValueOnce(\n CommandResultFactory({ error: solanaHeaderErr() as any }),\n ); // v0 -> 6a81\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n }).run();\n\n // no legacy retry\n expect(apiMock.sendCommand).toHaveBeenCalledTimes(2);\n expect((res as any).error).toEqual(solanaHeaderErr());\n });\n });\n\n describe(\"message format detection (indirect via header byte)\", () => {\n it(\"sets format=0 for ASCII \u2264 maxLedgerLen (v0 header)\", () => {\n const ascii = new TextEncoder().encode(\"hello\\nworld\"); // newline allowed in non-legacy\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: ascii,\n });\n const v0 = task._buildFullMessage(ascii, PUBKEY, false);\n // in v0 format byte is at offset: 16 (domain) + 1 (ver) + 32 (app) = 49\n expect(v0[49]).toBe(MessageFormat.Ascii);\n });\n\n it(\"sets format=1 for short UTF-8 non-ASCII (v0 header)\", () => {\n const utf8 = new TextEncoder().encode(\"h\u00E9ll\u00F8\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: utf8,\n });\n const v0 = task._buildFullMessage(utf8, PUBKEY, false);\n expect(v0[49]).toBe(MessageFormat.Utf8);\n });\n\n it(\"sets format=2 for long UTF-8 (v0 header)\", () => {\n // must exceed OFFCM_MAX_LEDGER_LEN to get format=2\n const longUtf8 = new TextEncoder().encode(\"x\".repeat(15313));\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: longUtf8,\n });\n const v0 = task._buildFullMessage(longUtf8, PUBKEY, false);\n expect(v0[49]).toBe(MessageFormat.Utf8LongV0);\n });\n\n it(\"legacy header forbids newline in ASCII (so format becomes UTF-8=1)\", () => {\n const asciiWithNl = new TextEncoder().encode(\"hello\\nworld\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: asciiWithNl,\n });\n const legacy = task._buildFullMessage(asciiWithNl, PUBKEY, true);\n // in legacy: format byte is at offset 16 (domain) + 1 (ver) = 17\n expect(legacy[17]).toBe(MessageFormat.Utf8);\n });\n\n it(\"legacy header sets format=0 for plain ASCII (no newline)\", () => {\n const ascii = new TextEncoder().encode(\"HELLO_123\");\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: ascii,\n });\n const legacy = task._buildFullMessage(ascii, PUBKEY, true);\n expect(legacy[17]).toBe(MessageFormat.Ascii);\n });\n\n it(\"message length is little-endian in both headers\", () => {\n const body = new Uint8Array([1, 2, 3]); // length = 3\n const task: any = new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: body,\n });\n\n // v0 offsets:\n // length starts at: 16(domain) + 1(ver) + 32(app) + 1(format) + 1(count) + 32(pubkey) = 83\n const v0 = task._buildFullMessage(body, PUBKEY, false);\n expect(v0[83]).toBe(3); // LSB (0x03)\n expect(v0[84]).toBe(0); // MSB (0x00)\n\n // legacy offsets:\n // length starts at: 16(domain) + 1(ver) + 1(format) = 18\n const legacy = task._buildFullMessage(body, PUBKEY, true);\n expect(legacy[18]).toBe(3); // LSB (0x03)\n expect(legacy[19]).toBe(0); // MSB (0x00)\n });\n });\n\n it(\"returns error when device returns non-64-byte signature on final chunk\", async () => {\n const msg = new Uint8Array([1, 2, 3]);\n\n apiMock.sendCommand\n .mockResolvedValueOnce(CommandResultFactory({ data: PUBKEY_BASE58 }))\n .mockResolvedValueOnce(CommandResultFactory({ data: new Uint8Array(0) }));\n\n const res = await new SendSignMessageTask(apiMock, {\n derivationPath: DERIVATION_PATH,\n sendingData: msg,\n }).run();\n\n expect(\"error\" in res).toBe(true);\n\n const err = (res as any).error as unknown;\n expect(err).toBeInstanceOf(InvalidStatusWordError);\n });\n});\n"],
5
+ "mappings": "AAIA,OACE,wBAAAA,EACA,0BAAAC,MACK,kCAEP,OAAS,mCAAAC,MAAuC,oEAChD,OAAS,sBAAAC,MAA0B,4CACnC,OACE,sBAAAC,EACA,iBAAAC,EACA,uBAAAC,MACK,gDAEP,MAAMC,EAAkB,iBAClBC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EACrCC,EAAgBN,EAAmB,OAAOK,CAAM,EAEtD,SAASE,GAAkB,CACzB,MAAO,CACL,KAAM,wBACN,UAAW,OACX,QAAS,kCACX,CACF,CAEA,SAAS,sBAAuB,IAAM,CACpC,MAAMC,EAAUT,EAAgC,EAEhD,WAAW,IAAM,CACf,GAAG,cAAc,CACnB,CAAC,EAED,SAAS,QAAS,IAAM,CACtB,GAAG,iDAAkD,SAAY,CAC/D,MAAMU,EAAS,MAAM,IAAIN,EAAoBK,EAAS,CACpD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,CAAC,CAChC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQC,EAAe,KAAK,EAAE,QAC5B,IAAIX,EAAuB,yBAAyB,CACtD,CACF,CAAC,EAED,GAAG,+BAAgC,SAAY,CAC7CU,EAAQ,YAAY,sBAClBX,EAAqB,CACnB,MAAO,IAAIC,EAAuB,cAAc,CAClD,CAAC,CACH,EAEA,MAAMY,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,CACvC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAIZ,EAAuB,sCAAsC,CACnE,CACF,CAAC,EAED,GAAG,4CAA6C,SAAY,CAC1DU,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBACCT,EAAqB,CACnB,MAAO,IAAIC,EAAuB,uBAAuB,CAC3D,CAAC,CACH,EAEF,MAAMY,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,CAC1C,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAIZ,EAAuB,uBAAuB,CACpD,CACF,CAAC,EAED,GAAG,gDAAiD,SAAY,CAE9D,MAAMa,EAAM,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,EAAI,CAAC,EAC7CC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBAAsBT,EAAqB,CAAE,KAAMe,CAAO,CAAC,CAAC,EAE/D,MAAMC,EAAY,IAAIV,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EACKG,EAAoBD,EAAK,kBAAkBF,EAAKN,EAAQ,EAAK,EAG7DK,EAAM,MAAMG,EAAK,IAAI,EAG3B,OAAOL,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAO,SAAUE,CAAG,EAAE,KAAK,EAAI,EAC/B,MAAMK,EAAOL,EAAY,KAAK,UAGxBM,EAAW,IAAI,WAAW,EAAIJ,EAAO,OAASE,EAAM,MAAM,EAChEE,EAAS,IAAI,WAAW,GAAG,CAAC,EAAG,CAAC,EAChCA,EAAS,IAAIJ,EAAQ,CAAC,EACtBI,EAAS,IAAIF,EAAO,EAAIF,EAAO,MAAM,EAErC,OAAOZ,EAAmB,OAAOe,CAAG,CAAC,EAAE,QAAQC,CAAQ,CACzD,CAAC,EAED,GAAG,kCAAmC,SAAY,CAChD,MAAMC,EAAO,CACX,eAAgB,aAChB,YAAa,IAAI,WAAW,CAAC,CAAC,CAAC,CACjC,EACA,MAAM,OACJ,IAAId,EAAoBK,EAASS,CAAI,EAAE,IAAI,CAC7C,EAAE,QAAQ,QAAQ,CACpB,CAAC,EAED,GAAG,6DAA8D,IAAM,CACrE,MAAMN,EAAM,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAC9BE,EAAY,IAAIV,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAEKO,EAAUL,EAAK,kBAAkBF,EAAKN,EAAQ,EAAK,EACnDc,EAAQ,CAAC,YAAiB,YAAkB,YAAgB,CAAC,EAC7DC,EAAOP,EAAK,kBAAkBK,EAASC,CAAK,EAGlD,OAAOC,EAAK,CAAC,CAAC,EAAE,KAAK,CAAC,EAEtB,OAAOA,EAAK,CAAC,CAAC,EAAE,KAAKD,EAAM,MAAM,EAEjC,OAAOC,EAAK,MAAMA,EAAK,OAASF,EAAQ,MAAM,CAAC,EAAE,QAAQA,CAAO,CAClE,CAAC,EAED,GAAG,sEAAuE,SAAY,CACpF,MAAMG,EAAS,IAAI,WAAW,GAAI,EAAE,KAAK,CAAI,EACvCT,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,kBAAkBT,EAAqB,CAAE,KAAMe,CAAO,CAAC,CAAC,EAE3D,MAAMF,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaiB,CACf,CAAC,EAAE,IAAI,EAEP,OAAO,SAAUX,CAAG,EAAE,KAAK,EAAI,CACjC,CAAC,EAED,GAAG,6CAA8C,SAAY,CAC3D,MAAMY,EAAS,IAAI,WAAWrB,EAAqB,CAAC,EAAE,KAAK,GAAI,EACzDS,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAakB,CACf,CAAC,EAAE,IAAI,EAEP,OAAOd,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QACzB,IAAIZ,EACF,qBAAqBwB,EAAO,MAAM,kBAAkBrB,CAAkB,GACxE,CACF,CACF,CAAC,EAED,GAAG,2DAA4D,SAAY,CAEzE,MAAMU,EAAM,IAAI,WAAW,CAAC,GAAM,GAAM,EAAI,CAAC,EACvCC,EAAS,IAAI,WAAW,EAAE,EAAE,KAAK,EAAI,EAE3CJ,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBACCT,EAAqB,CAAE,MAAOU,EAAgB,CAAS,CAAC,CAC1D,EACC,sBAAsBV,EAAqB,CAAE,KAAMe,CAAO,CAAC,CAAC,EAE/D,MAAMC,EAAY,IAAIV,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAGKY,EAAwBV,EAAK,kBAAkBF,EAAKN,EAAQ,EAAI,EAGhEK,EAAM,MAAMG,EAAK,IAAI,EAG3B,OAAOL,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,MAAMO,EAAOL,EAAY,KAAK,UAExBM,EAAW,IAAI,WAAW,EAAIJ,EAAO,OAASW,EAAU,MAAM,EACpEP,EAAS,IAAI,WAAW,GAAG,CAAC,EAAG,CAAC,EAChCA,EAAS,IAAIJ,EAAQ,CAAC,EACtBI,EAAS,IAAIO,EAAW,EAAIX,EAAO,MAAM,EAEzC,OAAOZ,EAAmB,OAAOe,CAAG,CAAC,EAAE,QAAQC,CAAQ,CACzD,CAAC,EAED,GAAG,uCAAwC,SAAY,CACrDR,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBACCT,EAAqB,CAAE,MAAO,IAAIC,EAAuB,MAAM,CAAE,CAAC,CACpE,EAEF,MAAMY,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAa,IAAI,WAAW,CAAC,EAAG,CAAC,CAAC,CACpC,CAAC,EAAE,IAAI,EAEP,OAAOI,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,eAAeZ,CAAsB,CAClE,CAAC,EAED,GAAG,kDAAmD,SAAY,CAChE,MAAMa,EAAM,IAAI,WAAW,GAAI,EAAE,KAAK,EAAI,EAE1CH,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBACCT,EAAqB,CAAE,MAAOU,EAAgB,CAAS,CAAC,CAC1D,EAEF,MAAMG,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAAE,IAAI,EAGP,OAAOH,EAAQ,WAAW,EAAE,sBAAsB,CAAC,EACnD,OAAQE,EAAY,KAAK,EAAE,QAAQH,EAAgB,CAAC,CACtD,CAAC,CACH,CAAC,EAED,SAAS,sDAAuD,IAAM,CACpE,GAAG,0DAAsD,IAAM,CAC7D,MAAMiB,EAAQ,IAAI,YAAY,EAAE,OAAO;AAAA,MAAc,EAK/CC,EAJY,IAAItB,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaoB,CACf,CAAC,EACe,kBAAkBA,EAAOnB,EAAQ,EAAK,EAEtD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAKvB,EAAc,KAAK,CACzC,CAAC,EAED,GAAG,sDAAuD,IAAM,CAC9D,MAAMwB,EAAO,IAAI,YAAY,EAAE,OAAO,aAAO,EAKvCD,EAJY,IAAItB,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAasB,CACf,CAAC,EACe,kBAAkBA,EAAMrB,EAAQ,EAAK,EACrD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAKvB,EAAc,IAAI,CACxC,CAAC,EAED,GAAG,2CAA4C,IAAM,CAEnD,MAAMyB,EAAW,IAAI,YAAY,EAAE,OAAO,IAAI,OAAO,KAAK,CAAC,EAKrDF,EAJY,IAAItB,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAauB,CACf,CAAC,EACe,kBAAkBA,EAAUtB,EAAQ,EAAK,EACzD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAKvB,EAAc,UAAU,CAC9C,CAAC,EAED,GAAG,qEAAsE,IAAM,CAC7E,MAAM0B,EAAc,IAAI,YAAY,EAAE,OAAO;AAAA,MAAc,EAKrDC,EAJY,IAAI1B,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAawB,CACf,CAAC,EACmB,kBAAkBA,EAAavB,EAAQ,EAAI,EAE/D,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK3B,EAAc,IAAI,CAC5C,CAAC,EAED,GAAG,2DAA4D,IAAM,CACnE,MAAMsB,EAAQ,IAAI,YAAY,EAAE,OAAO,WAAW,EAK5CK,EAJY,IAAI1B,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaoB,CACf,CAAC,EACmB,kBAAkBA,EAAOnB,EAAQ,EAAI,EACzD,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK3B,EAAc,KAAK,CAC7C,CAAC,EAED,GAAG,kDAAmD,IAAM,CAC1D,MAAM4B,EAAO,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAC/BjB,EAAY,IAAIV,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAa0B,CACf,CAAC,EAIKL,EAAKZ,EAAK,kBAAkBiB,EAAMzB,EAAQ,EAAK,EACrD,OAAOoB,EAAG,EAAE,CAAC,EAAE,KAAK,CAAC,EACrB,OAAOA,EAAG,EAAE,CAAC,EAAE,KAAK,CAAC,EAIrB,MAAMI,EAAShB,EAAK,kBAAkBiB,EAAMzB,EAAQ,EAAI,EACxD,OAAOwB,EAAO,EAAE,CAAC,EAAE,KAAK,CAAC,EACzB,OAAOA,EAAO,EAAE,CAAC,EAAE,KAAK,CAAC,CAC3B,CAAC,CACH,CAAC,EAED,GAAG,yEAA0E,SAAY,CACvF,MAAMlB,EAAM,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EAEpCH,EAAQ,YACL,sBAAsBX,EAAqB,CAAE,KAAMS,CAAc,CAAC,CAAC,EACnE,sBAAsBT,EAAqB,CAAE,KAAM,IAAI,WAAW,CAAC,CAAE,CAAC,CAAC,EAE1E,MAAMa,EAAM,MAAM,IAAIP,EAAoBK,EAAS,CACjD,eAAgBJ,EAChB,YAAaO,CACf,CAAC,EAAE,IAAI,EAEP,OAAO,UAAWD,CAAG,EAAE,KAAK,EAAI,EAEhC,MAAMqB,EAAOrB,EAAY,MACzB,OAAOqB,CAAG,EAAE,eAAejC,CAAsB,CACnD,CAAC,CACH,CAAC",
6
+ "names": ["CommandResultFactory", "InvalidStatusWordError", "makeDeviceActionInternalApiMock", "DefaultBs58Encoder", "MAX_MESSAGE_LENGTH", "MessageFormat", "SendSignMessageTask", "DERIVATION_PATH", "PUBKEY", "PUBKEY_BASE58", "solanaHeaderErr", "apiMock", "result", "res", "msg", "rawSig", "task", "v0OCM", "b58", "expected", "args", "fullMsg", "paths", "apdu", "bigMsg", "tooBig", "legacyOCM", "ascii", "v0", "utf8", "longUtf8", "asciiWithNl", "legacy", "body", "err"]
7
7
  }
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@ledgerhq/device-signer-kit-solana",
3
- "version": "1.3.0",
3
+ "version": "1.4.1",
4
4
  "private": false,
5
5
  "license": "Apache-2.0",
6
6
  "exports": {
@@ -35,7 +35,7 @@
35
35
  "test:coverage": "vitest run --coverage"
36
36
  },
37
37
  "dependencies": {
38
- "@ledgerhq/context-module": "^1.8.0",
38
+ "@ledgerhq/context-module": "^1.10.0",
39
39
  "@ledgerhq/signer-utils": "^1.1.0",
40
40
  "@solana/spl-token": "catalog:",
41
41
  "@solana/web3.js": "catalog:",
@@ -59,6 +59,6 @@
59
59
  "ts-node": "catalog:"
60
60
  },
61
61
  "peerDependencies": {
62
- "@ledgerhq/device-management-kit": "^0.9.1"
62
+ "@ledgerhq/device-management-kit": "workspace:*"
63
63
  }
64
64
  }
@@ -3,6 +3,7 @@ import { type AppConfiguration } from "../../../api/model/AppConfiguration";
3
3
  import { type SolanaAppErrorCodes } from "./utils/SolanaApplicationErrors";
4
4
  type GetAppConfigurationCommandArgs = void;
5
5
  export declare class GetAppConfigurationCommand implements Command<AppConfiguration, GetAppConfigurationCommandArgs, SolanaAppErrorCodes> {
6
+ readonly name = "getAppConfiguration";
6
7
  private readonly errorHelper;
7
8
  args: GetAppConfigurationCommandArgs;
8
9
  constructor(args: GetAppConfigurationCommandArgs);
@@ -1 +1 @@
1
- {"version":3,"file":"GetAppConfigurationCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetAppConfigurationCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAIzC,OAAO,EAAE,KAAK,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAGpE,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAEzC,KAAK,8BAA8B,GAAG,IAAI,CAAC;AAE3C,qBAAa,0BACX,YACE,OAAO,CACL,gBAAgB,EAChB,8BAA8B,EAC9B,mBAAmB,CACpB;IAEH,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,IAAI,EAAE,8BAA8B,CAAC;gBAEzB,IAAI,EAAE,8BAA8B;IAIhD,OAAO,IAAI,IAAI;IASf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,gBAAgB,EAAE,mBAAmB,CAAC;CA8BxD"}
1
+ {"version":3,"file":"GetAppConfigurationCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetAppConfigurationCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAIzC,OAAO,EAAE,KAAK,gBAAgB,EAAE,MAAM,6BAA6B,CAAC;AAGpE,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAEzC,KAAK,8BAA8B,GAAG,IAAI,CAAC;AAE3C,qBAAa,0BACX,YACE,OAAO,CACL,gBAAgB,EAChB,8BAA8B,EAC9B,mBAAmB,CACpB;IAEH,QAAQ,CAAC,IAAI,yBAAyB;IACtC,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,IAAI,EAAE,8BAA8B,CAAC;gBAEzB,IAAI,EAAE,8BAA8B;IAIhD,OAAO,IAAI,IAAI;IASf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,gBAAgB,EAAE,mBAAmB,CAAC;CA8BxD"}
@@ -4,6 +4,7 @@ export type GetChallengeCommandResponse = {
4
4
  challenge: string;
5
5
  };
6
6
  export declare class GetChallengeCommand implements Command<GetChallengeCommandResponse, void, SolanaAppErrorCodes> {
7
+ readonly name = "getChallenge";
7
8
  private readonly errorHelper;
8
9
  getApdu(): Apdu;
9
10
  parseResponse(response: ApduResponse): CommandResult<GetChallengeCommandResponse, SolanaAppErrorCodes>;
@@ -1 +1 @@
1
- {"version":3,"file":"GetChallengeCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetChallengeCommand.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAIzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAQzC,MAAM,MAAM,2BAA2B,GAAG;IACxC,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,qBAAa,mBACX,YAAW,OAAO,CAAC,2BAA2B,EAAE,IAAI,EAAE,mBAAmB,CAAC;IAE1E,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,OAAO,IAAI,IAAI;IASf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,2BAA2B,EAAE,mBAAmB,CAAC;CAuBnE"}
1
+ {"version":3,"file":"GetChallengeCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetChallengeCommand.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAIzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAQzC,MAAM,MAAM,2BAA2B,GAAG;IACxC,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,qBAAa,mBACX,YAAW,OAAO,CAAC,2BAA2B,EAAE,IAAI,EAAE,mBAAmB,CAAC;IAE1E,QAAQ,CAAC,IAAI,kBAAkB;IAC/B,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,OAAO,IAAI,IAAI;IASf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,2BAA2B,EAAE,mBAAmB,CAAC;CAuBnE"}
@@ -9,6 +9,7 @@ export type GetPubKeyCommandArgs = {
9
9
  };
10
10
  export declare class GetPubKeyCommand implements Command<GetPubKeyCommandResponse, GetPubKeyCommandArgs, SolanaAppErrorCodes> {
11
11
  private readonly bs58Encoder;
12
+ readonly name = "getPubKey";
12
13
  private readonly errorHelper;
13
14
  args: GetPubKeyCommandArgs;
14
15
  constructor(args: GetPubKeyCommandArgs, bs58Encoder?: Bs58Encoder);
@@ -1 +1 @@
1
- {"version":3,"file":"GetPubKeyCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetPubKeyCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAIT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAOzC,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EACL,KAAK,WAAW,EAEjB,MAAM,2CAA2C,CAAC;AAEnD,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAIzC,MAAM,MAAM,wBAAwB,GAAG,SAAS,CAAC;AAEjD,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC;AAEF,qBAAa,gBACX,YACE,OAAO,CAAC,wBAAwB,EAAE,oBAAoB,EAAE,mBAAmB,CAAC;IAW5E,OAAO,CAAC,QAAQ,CAAC,WAAW;IAT9B,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,IAAI,EAAE,oBAAoB,CAAC;gBAGzB,IAAI,EAAE,oBAAoB,EACT,WAAW,GAAE,WAAgC;IAKhE,OAAO,IAAI,IAAI;IAmBf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,wBAAwB,EAAE,mBAAmB,CAAC;CAwBhE"}
1
+ {"version":3,"file":"GetPubKeyCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/GetPubKeyCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAIT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAOzC,OAAO,EAAE,KAAK,SAAS,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EACL,KAAK,WAAW,EAEjB,MAAM,2CAA2C,CAAC;AAEnD,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAIzC,MAAM,MAAM,wBAAwB,GAAG,SAAS,CAAC;AAEjD,MAAM,MAAM,oBAAoB,GAAG;IACjC,cAAc,EAAE,MAAM,CAAC;IACvB,aAAa,EAAE,OAAO,CAAC;CACxB,CAAC;AAEF,qBAAa,gBACX,YACE,OAAO,CAAC,wBAAwB,EAAE,oBAAoB,EAAE,mBAAmB,CAAC;IAY5E,OAAO,CAAC,QAAQ,CAAC,WAAW;IAV9B,QAAQ,CAAC,IAAI,eAAe;IAC5B,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;IAEnD,IAAI,EAAE,oBAAoB,CAAC;gBAGzB,IAAI,EAAE,oBAAoB,EACT,WAAW,GAAE,WAAgC;IAKhE,OAAO,IAAI,IAAI;IAmBf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,wBAAwB,EAAE,mBAAmB,CAAC;CAwBhE"}
@@ -5,6 +5,7 @@ export type ProvideTLVDescriptorCommandArgs = {
5
5
  };
6
6
  export declare class ProvideTLVDescriptorCommand implements Command<void, ProvideTLVDescriptorCommandArgs, SolanaAppErrorCodes> {
7
7
  readonly args: ProvideTLVDescriptorCommandArgs;
8
+ readonly name = "provideTLVDescriptor";
8
9
  private readonly errorHelper;
9
10
  constructor(args: ProvideTLVDescriptorCommandArgs);
10
11
  getApdu(): Apdu;
@@ -1 +1 @@
1
- {"version":3,"file":"ProvideTLVDescriptorCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/ProvideTLVDescriptorCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAOzC,MAAM,MAAM,+BAA+B,GAAG;IAC5C,OAAO,EAAE,UAAU,CAAC;CACrB,CAAC;AAEF,qBAAa,2BACX,YAAW,OAAO,CAAC,IAAI,EAAE,+BAA+B,EAAE,mBAAmB,CAAC;IAOlE,QAAQ,CAAC,IAAI,EAAE,+BAA+B;IAL1D,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;gBAE9B,IAAI,EAAE,+BAA+B;IAE1D,OAAO,IAAI,IAAI;IAYf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,IAAI,EAAE,mBAAmB,CAAC;CAc5C"}
1
+ {"version":3,"file":"ProvideTLVDescriptorCommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/ProvideTLVDescriptorCommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAOzC,MAAM,MAAM,+BAA+B,GAAG;IAC5C,OAAO,EAAE,UAAU,CAAC;CACrB,CAAC;AAEF,qBAAa,2BACX,YAAW,OAAO,CAAC,IAAI,EAAE,+BAA+B,EAAE,mBAAmB,CAAC;IAQlE,QAAQ,CAAC,IAAI,EAAE,+BAA+B;IAN1D,QAAQ,CAAC,IAAI,0BAA0B;IACvC,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;gBAE9B,IAAI,EAAE,+BAA+B;IAE1D,OAAO,IAAI,IAAI;IAYf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,IAAI,EAAE,mBAAmB,CAAC;CAc5C"}
@@ -5,6 +5,7 @@ export type ProvideTrustedNamePKICommandArgs = {
5
5
  };
6
6
  export declare class ProvideTrustedNamePKICommand implements Command<void, ProvideTrustedNamePKICommandArgs, SolanaAppErrorCodes> {
7
7
  readonly args: ProvideTrustedNamePKICommandArgs;
8
+ readonly name = "provideTrustedNamePKI";
8
9
  private readonly errorHelper;
9
10
  constructor(args: ProvideTrustedNamePKICommandArgs);
10
11
  getApdu(): Apdu;
@@ -1 +1 @@
1
- {"version":3,"file":"ProvideTrustedNamePKICommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/ProvideTrustedNamePKICommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAOzC,MAAM,MAAM,gCAAgC,GAAG;IAC7C,OAAO,EAAE,UAAU,CAAC;CACrB,CAAC;AAEF,qBAAa,4BACX,YACE,OAAO,CAAC,IAAI,EAAE,gCAAgC,EAAE,mBAAmB,CAAC;IAO1D,QAAQ,CAAC,IAAI,EAAE,gCAAgC;IAL3D,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;gBAE9B,IAAI,EAAE,gCAAgC;IAE3D,OAAO,IAAI,IAAI;IAYf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,IAAI,EAAE,mBAAmB,CAAC;CAc5C"}
1
+ {"version":3,"file":"ProvideTrustedNamePKICommand.d.ts","sourceRoot":"","sources":["../../../../../src/internal/app-binder/command/ProvideTrustedNamePKICommand.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,IAAI,EAGT,KAAK,YAAY,EACjB,KAAK,OAAO,EACZ,KAAK,aAAa,EAGnB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAGL,KAAK,mBAAmB,EACzB,MAAM,iCAAiC,CAAC;AAOzC,MAAM,MAAM,gCAAgC,GAAG;IAC7C,OAAO,EAAE,UAAU,CAAC;CACrB,CAAC;AAEF,qBAAa,4BACX,YACE,OAAO,CAAC,IAAI,EAAE,gCAAgC,EAAE,mBAAmB,CAAC;IAQ1D,QAAQ,CAAC,IAAI,EAAE,gCAAgC;IAN3D,QAAQ,CAAC,IAAI,2BAA2B;IACxC,OAAO,CAAC,QAAQ,CAAC,WAAW,CAGuB;gBAE9B,IAAI,EAAE,gCAAgC;IAE3D,OAAO,IAAI,IAAI;IAYf,aAAa,CACX,QAAQ,EAAE,YAAY,GACrB,aAAa,CAAC,IAAI,EAAE,mBAAmB,CAAC;CAc5C"}