@ledgerhq/device-signer-kit-solana 1.4.1 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +3 -0
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js +1 -1
- package/lib/cjs/api/app-binder/SignTransactionDeviceActionTypes.js.map +3 -3
- package/lib/cjs/api/model/TransactionResolutionContext.js +1 -1
- package/lib/cjs/api/model/TransactionResolutionContext.js.map +1 -1
- package/lib/cjs/internal/DefaultSignerSolana.js.map +2 -2
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/cjs/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/cjs/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js +1 -1
- package/lib/cjs/internal/app-binder/services/TransactionInspector.js.map +3 -3
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js +1 -1
- package/lib/cjs/internal/app-binder/services/TransactionInspector.test.js.map +2 -2
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/cjs/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.js.map +2 -2
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/BuildTransactionContextTask.test.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js +1 -1
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.js.map +3 -3
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js +1 -1
- package/lib/cjs/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +3 -3
- package/lib/cjs/package.json +2 -2
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js +1 -0
- package/lib/esm/api/app-binder/SignTransactionDeviceActionTypes.js.map +4 -4
- package/lib/esm/internal/DefaultSignerSolana.js.map +2 -2
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.js.map +7 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js +2 -0
- package/lib/esm/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.js.map +7 -0
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.js.map +3 -3
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js +1 -1
- package/lib/esm/internal/app-binder/device-action/SignTransactionDeviceAction.test.js.map +3 -3
- package/lib/esm/internal/app-binder/services/TransactionInspector.js +1 -1
- package/lib/esm/internal/app-binder/services/TransactionInspector.js.map +3 -3
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js +1 -1
- package/lib/esm/internal/app-binder/services/TransactionInspector.test.js.map +2 -2
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.js.map +7 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js +2 -0
- package/lib/esm/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.js.map +7 -0
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js +1 -1
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.js.map +2 -2
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/BuildTransactionContextTask.test.js.map +3 -3
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js +1 -1
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.js.map +3 -3
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js +1 -1
- package/lib/esm/internal/app-binder/task/ProvideTransactionContextTask.test.js.map +3 -3
- package/lib/esm/package.json +2 -2
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts +10 -0
- package/lib/types/api/app-binder/SignTransactionDeviceActionTypes.d.ts.map +1 -1
- package/lib/types/api/model/TransactionResolutionContext.d.ts +2 -0
- package/lib/types/api/model/TransactionResolutionContext.d.ts.map +1 -1
- package/lib/types/internal/DefaultSignerSolana.d.ts +3 -0
- package/lib/types/internal/DefaultSignerSolana.d.ts.map +1 -1
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts +29 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.d.ts.map +1 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts +2 -0
- package/lib/types/internal/app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts +2 -2
- package/lib/types/internal/app-binder/device-action/SignTransactionDeviceAction.d.ts.map +1 -1
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts +7 -10
- package/lib/types/internal/app-binder/services/TransactionInspector.d.ts.map +1 -1
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts +8 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.d.ts.map +1 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts +2 -0
- package/lib/types/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.d.ts.map +1 -0
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts +4 -9
- package/lib/types/internal/app-binder/task/BuildTransactionContextTask.d.ts.map +1 -1
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts +9 -5
- package/lib/types/internal/app-binder/task/ProvideTransactionContextTask.d.ts.map +1 -1
- package/lib/types/tsconfig.prod.tsbuildinfo +1 -1
- package/package.json +7 -7
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js +0 -2
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +0 -7
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +0 -2
- package/lib/cjs/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +0 -7
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js +0 -2
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.js.map +0 -7
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js +0 -2
- package/lib/esm/internal/app-binder/command/ProvideTrustedNamePKICommand.test.js.map +0 -7
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts +0 -14
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.d.ts.map +0 -1
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.test.d.ts +0 -2
- package/lib/types/internal/app-binder/command/ProvideTrustedNamePKICommand.test.d.ts.map +0 -1
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/services/TransactionInspector.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Connection,\n type PublicKey,\n Transaction,\n TransactionInstruction,\n VersionedMessage,\n VersionedTransaction,\n} from \"@solana/web3.js\";\nimport { Buffer } from \"buffer\";\n\nimport {\n DECODERS,\n type IxContext,\n} from \"@internal/app-binder/services/utils/transactionDecoders\";\n\nexport enum SolanaTransactionTypes {\n STANDARD = \"Standard\",\n SPL = \"SPL\",\n}\n\nexport type NormalizedCompiledIx = {\n programIdIndex: number;\n accountKeyIndexes: number[];\n data: Uint8Array;\n};\n\nexport type NormalizedMessage = {\n compiledInstructions: NormalizedCompiledIx[];\n allKeys: PublicKey[];\n};\n\nexport type TxInspectorResult = {\n transactionType: SolanaTransactionTypes;\n data: {\n tokenAddress?: string;\n createATA?: { address: string; mintAddress: string };\n };\n};\n\ntype LoadedAddresses = { writable: PublicKey[]; readonly: PublicKey[] };\n\nconst
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,4BAAAE,EAAA,yBAAAC,IAAA,eAAAC,EAAAJ,GAAA,IAAAK,EAIO,6BACPC,EAOO,2BACPC,EAAuB,kBAEvBC,EAGO,mEAEKN,OACVA,EAAA,SAAW,WACXA,EAAA,IAAM,MAFIA,OAAA,IA0BZ,MAAMO,
|
|
6
|
-
"names": ["TransactionInspector_exports", "__export", "SolanaTransactionTypes", "TransactionInspector", "__toCommonJS", "import_spl_token", "import_web3", "import_buffer", "import_transactionDecoders", "
|
|
4
|
+
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Connection,\n type PublicKey,\n Transaction,\n TransactionInstruction,\n VersionedMessage,\n VersionedTransaction,\n} from \"@solana/web3.js\";\nimport { Buffer } from \"buffer\";\n\nimport {\n DECODERS,\n type IxContext,\n} from \"@internal/app-binder/services/utils/transactionDecoders\";\n\nexport enum SolanaTransactionTypes {\n STANDARD = \"Standard\",\n SPL = \"SPL\",\n}\n\nexport type NormalizedCompiledIx = {\n programIdIndex: number;\n accountKeyIndexes: number[];\n data: Uint8Array;\n};\n\nexport type NormalizedMessage = {\n compiledInstructions: NormalizedCompiledIx[];\n allKeys: PublicKey[];\n};\n\nexport type TxInspectorResult = {\n transactionType: SolanaTransactionTypes;\n data: {\n tokenAddress?: string;\n createATA?: { address: string; mintAddress: string };\n };\n};\n\ntype LoadedAddresses = { writable: PublicKey[]; readonly: PublicKey[] };\n\nconst DEFAULT_RPC_URL = \"https://api.mainnet-beta.solana.com/\";\n\nconst defaultConnection = (rpcUrl: string) =>\n new Connection(rpcUrl, { commitment: \"confirmed\" });\n\nconst isSPLProgramId = (pid: PublicKey | undefined) =>\n !!pid &&\n (pid.equals(ASSOCIATED_TOKEN_PROGRAM_ID) ||\n pid.equals(TOKEN_PROGRAM_ID) ||\n pid.equals(TOKEN_2022_PROGRAM_ID));\n\nexport class TransactionInspector {\n private readonly RPCURL: string | undefined;\n constructor(injectedRPCURL?: string | undefined) {\n this.RPCURL = injectedRPCURL;\n }\n\n public async inspectTransactionType(\n rawTransactionBytes: Uint8Array,\n tokenAddress?: string | undefined,\n createATA?:\n | {\n address: string;\n mintAddress: string;\n }\n | undefined,\n ): Promise<TxInspectorResult> {\n try {\n const message = await TransactionInspector.normaliseMessage(\n rawTransactionBytes,\n this.RPCURL || DEFAULT_RPC_URL,\n );\n\n // fast path when transaction resolution is provided\n if (tokenAddress || createATA) {\n const looksSPL = message.compiledInstructions.some((instruction) =>\n isSPLProgramId(message.allKeys[instruction.programIdIndex]),\n );\n return {\n transactionType: looksSPL\n ? SolanaTransactionTypes.SPL\n : SolanaTransactionTypes.STANDARD,\n data: {\n ...(tokenAddress ? { tokenAddress: tokenAddress } : {}),\n ...(createATA ? { createATA: createATA } : {}),\n },\n };\n }\n\n // accumulate best data across all instructions\n let sawSPL = false;\n let best: TxInspectorResult[\"data\"] = {};\n\n for (const ixMeta of message.compiledInstructions) {\n const programId = message.allKeys[ixMeta.programIdIndex];\n if (!programId) continue; // unresolved index, skip\n if (isSPLProgramId(programId)) sawSPL = true;\n\n const resolvedKeys = ixMeta.accountKeyIndexes\n .map((i) => message.allKeys[i])\n .filter((k): k is PublicKey => !!k);\n\n const instruction = new TransactionInstruction({\n programId,\n keys: resolvedKeys.map((pk) => ({\n pubkey: pk,\n isSigner: false,\n isWritable: false,\n })),\n data: Buffer.from(ixMeta.data),\n });\n\n const ctx: IxContext = { programId, ixMeta, message, instruction };\n\n for (const decoder of DECODERS) {\n if (!decoder.when(ctx)) continue;\n const data = decoder.decode(ctx);\n if (!data) continue;\n\n // prefer createATA (needed when destination ATA doesn\u2019t exist yet)\n if (data.createATA && !best.createATA) {\n best = { ...best, createATA: data.createATA };\n } else if (\n data.tokenAddress &&\n !best.tokenAddress &&\n !best.createATA\n ) {\n best = { ...best, tokenAddress: data.tokenAddress };\n }\n }\n }\n\n if (best.createATA)\n return { transactionType: SolanaTransactionTypes.SPL, data: best };\n\n if (best.tokenAddress)\n return { transactionType: SolanaTransactionTypes.SPL, data: best };\n\n if (sawSPL)\n return { transactionType: SolanaTransactionTypes.SPL, data: {} }; // we should never reach here, in case we do tx will fall back to blind sign\n\n return { transactionType: SolanaTransactionTypes.STANDARD, data: {} };\n } catch {\n return { transactionType: SolanaTransactionTypes.STANDARD, data: {} };\n }\n }\n\n /**\n * Normalise any tx (legacy or v0) into { compiledInstructions, allKeys }.\n * For v0, auto-fetch looked-up addresses from ALT(s) via the connection.\n */\n static async normaliseMessage(\n rawBytes: Uint8Array,\n rpcURL?: string,\n ): Promise<NormalizedMessage> {\n const versionedTX = TransactionInspector.tryDeserialiseVersioned(rawBytes);\n\n if (versionedTX) {\n const msg = versionedTX.message as VersionedMessage & {\n getAccountKeys?: (options?: {\n accountKeysFromLookups?: LoadedAddresses;\n }) => {\n staticAccountKeys: PublicKey[];\n accountKeysFromLookups?: LoadedAddresses;\n keySegments: () => PublicKey[][];\n };\n compiledInstructions: Array<{\n programIdIndex: number;\n accountKeyIndexes?: number[]; // legacy field name\n accounts?: number[]; // v0 field name\n data: Uint8Array | string | number[];\n }>;\n staticAccountKeys: PublicKey[];\n };\n\n const lookedUp = rpcURL\n ? await TransactionInspector.resolveLookedUpAddressesFromMessage(\n msg,\n rpcURL,\n )\n : undefined;\n\n const allKeys: PublicKey[] = [\n ...msg.staticAccountKeys,\n ...(lookedUp?.writable ?? []),\n ...(lookedUp?.readonly ?? []),\n ];\n\n const compiledInstructions: NormalizedCompiledIx[] =\n msg.compiledInstructions.map((instruction) => {\n const ixWithAccounts = instruction as typeof instruction & {\n accounts?: number[];\n };\n\n const accountKeyIndexes = Array.from(\n ixWithAccounts.accounts ?? instruction.accountKeyIndexes ?? [],\n ) as number[];\n\n let data: Uint8Array;\n if (instruction.data instanceof Uint8Array) {\n data = instruction.data;\n } else if (typeof instruction.data === \"string\") {\n data = Buffer.from(instruction.data, \"base64\"); // v0 encodes instruction data as base64\n } else {\n data = Uint8Array.from(instruction.data ?? []);\n }\n\n return {\n programIdIndex: instruction.programIdIndex,\n accountKeyIndexes,\n data,\n };\n });\n\n return { compiledInstructions, allKeys };\n }\n\n // legacy (no ALTs)\n const legacy = Transaction.from(rawBytes);\n\n const allKeyMap = new Map<string, PublicKey>();\n\n const add = (pubkey?: PublicKey | null) => {\n if (!pubkey) return;\n const key = pubkey.toBase58();\n if (!allKeyMap.has(key)) allKeyMap.set(key, pubkey);\n };\n\n add(legacy.feePayer ?? null);\n\n for (const instruction of legacy.instructions) {\n add(instruction.programId);\n for (const key of instruction.keys) add(key.pubkey);\n }\n\n const allKeys = Array.from(allKeyMap.values());\n const indexByB58 = new Map(allKeys.map((pk, i) => [pk.toBase58(), i]));\n\n const compiledInstructions: NormalizedCompiledIx[] =\n legacy.instructions.map((instruction) => ({\n programIdIndex: indexByB58.get(instruction.programId.toBase58()) ?? -1,\n accountKeyIndexes: instruction.keys.map(\n (key) => indexByB58.get(key.pubkey.toBase58()) ?? -1,\n ),\n data: instruction.data,\n }));\n\n return { compiledInstructions, allKeys };\n }\n\n private static tryDeserialiseVersioned(\n rawBytes: Uint8Array,\n ): VersionedTransaction | null {\n try {\n return VersionedTransaction.deserialize(rawBytes);\n } catch {\n try {\n const msg = VersionedMessage.deserialize(rawBytes);\n return { message: msg } as VersionedTransaction;\n } catch {\n return null;\n }\n }\n }\n\n /**\n * For v0, fetch looked-up addresses from ALT(s) via the connection\n */\n private static async resolveLookedUpAddressesFromMessage(\n msg: VersionedMessage,\n rpcURL: string,\n ): Promise<LoadedAddresses | undefined> {\n const lookups = msg.addressTableLookups ?? [];\n if (!lookups.length) return;\n\n const writable: PublicKey[] = [];\n const readonly: PublicKey[] = [];\n\n for (const lu of lookups) {\n const res = await defaultConnection(rpcURL).getAddressLookupTable(\n lu.accountKey,\n );\n const table = res.value;\n if (!table) continue;\n const addrs = table.state.addresses;\n\n for (const i of lu.writableIndexes ?? []) {\n const pk = addrs[i];\n if (pk) writable.push(pk);\n }\n for (const i of lu.readonlyIndexes ?? []) {\n const pk = addrs[i];\n if (pk) readonly.push(pk);\n }\n }\n\n return { writable, readonly };\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,4BAAAE,EAAA,yBAAAC,IAAA,eAAAC,EAAAJ,GAAA,IAAAK,EAIO,6BACPC,EAOO,2BACPC,EAAuB,kBAEvBC,EAGO,mEAEKN,OACVA,EAAA,SAAW,WACXA,EAAA,IAAM,MAFIA,OAAA,IA0BZ,MAAMO,EAAkB,uCAElBC,EAAqBC,GACzB,IAAI,aAAWA,EAAQ,CAAE,WAAY,WAAY,CAAC,EAE9CC,EAAkBC,GACtB,CAAC,CAACA,IACDA,EAAI,OAAO,6BAA2B,GACrCA,EAAI,OAAO,kBAAgB,GAC3BA,EAAI,OAAO,uBAAqB,GAE7B,MAAMV,CAAqB,CACf,OACjB,YAAYW,EAAqC,CAC/C,KAAK,OAASA,CAChB,CAEA,MAAa,uBACXC,EACAC,EACAC,EAM4B,CAC5B,GAAI,CACF,MAAMC,EAAU,MAAMf,EAAqB,iBACzCY,EACA,KAAK,QAAUN,CACjB,EAGA,GAAIO,GAAgBC,EAIlB,MAAO,CACL,gBAJeC,EAAQ,qBAAqB,KAAMC,GAClDP,EAAeM,EAAQ,QAAQC,EAAY,cAAc,CAAC,CAC5D,EAGM,MACA,WACJ,KAAM,CACJ,GAAIH,EAAe,CAAE,aAAcA,CAAa,EAAI,CAAC,EACrD,GAAIC,EAAY,CAAE,UAAWA,CAAU,EAAI,CAAC,CAC9C,CACF,EAIF,IAAIG,EAAS,GACTC,EAAkC,CAAC,EAEvC,UAAWC,KAAUJ,EAAQ,qBAAsB,CACjD,MAAMK,EAAYL,EAAQ,QAAQI,EAAO,cAAc,EACvD,GAAI,CAACC,EAAW,SACZX,EAAeW,CAAS,IAAGH,EAAS,IAExC,MAAMI,EAAeF,EAAO,kBACzB,IAAKG,GAAMP,EAAQ,QAAQO,CAAC,CAAC,EAC7B,OAAQC,GAAsB,CAAC,CAACA,CAAC,EAE9BP,EAAc,IAAI,yBAAuB,CAC7C,UAAAI,EACA,KAAMC,EAAa,IAAKG,IAAQ,CAC9B,OAAQA,EACR,SAAU,GACV,WAAY,EACd,EAAE,EACF,KAAM,SAAO,KAAKL,EAAO,IAAI,CAC/B,CAAC,EAEKM,EAAiB,CAAE,UAAAL,EAAW,OAAAD,EAAQ,QAAAJ,EAAS,YAAAC,CAAY,EAEjE,UAAWU,KAAW,WAAU,CAC9B,GAAI,CAACA,EAAQ,KAAKD,CAAG,EAAG,SACxB,MAAME,EAAOD,EAAQ,OAAOD,CAAG,EAC1BE,IAGDA,EAAK,WAAa,CAACT,EAAK,UAC1BA,EAAO,CAAE,GAAGA,EAAM,UAAWS,EAAK,SAAU,EAE5CA,EAAK,cACL,CAACT,EAAK,cACN,CAACA,EAAK,YAENA,EAAO,CAAE,GAAGA,EAAM,aAAcS,EAAK,YAAa,GAEtD,CACF,CAEA,OAAIT,EAAK,UACA,CAAE,gBAAiB,MAA4B,KAAMA,CAAK,EAE/DA,EAAK,aACA,CAAE,gBAAiB,MAA4B,KAAMA,CAAK,EAE/DD,EACK,CAAE,gBAAiB,MAA4B,KAAM,CAAC,CAAE,EAE1D,CAAE,gBAAiB,WAAiC,KAAM,CAAC,CAAE,CACtE,MAAQ,CACN,MAAO,CAAE,gBAAiB,WAAiC,KAAM,CAAC,CAAE,CACtE,CACF,CAMA,aAAa,iBACXW,EACAC,EAC4B,CAC5B,MAAMC,EAAc9B,EAAqB,wBAAwB4B,CAAQ,EAEzE,GAAIE,EAAa,CACf,MAAMC,EAAMD,EAAY,QAiBlBE,EAAWH,EACb,MAAM7B,EAAqB,oCACzB+B,EACAF,CACF,EACA,OAEEI,EAAuB,CAC3B,GAAGF,EAAI,kBACP,GAAIC,GAAU,UAAY,CAAC,EAC3B,GAAIA,GAAU,UAAY,CAAC,CAC7B,EA4BA,MAAO,CAAE,qBAzBPD,EAAI,qBAAqB,IAAKf,GAAgB,CAC5C,MAAMkB,EAAiBlB,EAIjBmB,EAAoB,MAAM,KAC9BD,EAAe,UAAYlB,EAAY,mBAAqB,CAAC,CAC/D,EAEA,IAAIW,EACJ,OAAIX,EAAY,gBAAgB,WAC9BW,EAAOX,EAAY,KACV,OAAOA,EAAY,MAAS,SACrCW,EAAO,SAAO,KAAKX,EAAY,KAAM,QAAQ,EAE7CW,EAAO,WAAW,KAAKX,EAAY,MAAQ,CAAC,CAAC,EAGxC,CACL,eAAgBA,EAAY,eAC5B,kBAAAmB,EACA,KAAAR,CACF,CACF,CAAC,EAE4B,QAAAM,CAAQ,CACzC,CAGA,MAAMG,EAAS,cAAY,KAAKR,CAAQ,EAElCS,EAAY,IAAI,IAEhBC,EAAOC,GAA8B,CACzC,GAAI,CAACA,EAAQ,OACb,MAAMC,EAAMD,EAAO,SAAS,EACvBF,EAAU,IAAIG,CAAG,GAAGH,EAAU,IAAIG,EAAKD,CAAM,CACpD,EAEAD,EAAIF,EAAO,UAAY,IAAI,EAE3B,UAAWpB,KAAeoB,EAAO,aAAc,CAC7CE,EAAItB,EAAY,SAAS,EACzB,UAAWwB,KAAOxB,EAAY,KAAMsB,EAAIE,EAAI,MAAM,CACpD,CAEA,MAAMP,EAAU,MAAM,KAAKI,EAAU,OAAO,CAAC,EACvCI,EAAa,IAAI,IAAIR,EAAQ,IAAI,CAACT,EAAIF,IAAM,CAACE,EAAG,SAAS,EAAGF,CAAC,CAAC,CAAC,EAWrE,MAAO,CAAE,qBARPc,EAAO,aAAa,IAAKpB,IAAiB,CACxC,eAAgByB,EAAW,IAAIzB,EAAY,UAAU,SAAS,CAAC,GAAK,GACpE,kBAAmBA,EAAY,KAAK,IACjCwB,GAAQC,EAAW,IAAID,EAAI,OAAO,SAAS,CAAC,GAAK,EACpD,EACA,KAAMxB,EAAY,IACpB,EAAE,EAE2B,QAAAiB,CAAQ,CACzC,CAEA,OAAe,wBACbL,EAC6B,CAC7B,GAAI,CACF,OAAO,uBAAqB,YAAYA,CAAQ,CAClD,MAAQ,CACN,GAAI,CAEF,MAAO,CAAE,QADG,mBAAiB,YAAYA,CAAQ,CAC3B,CACxB,MAAQ,CACN,OAAO,IACT,CACF,CACF,CAKA,aAAqB,oCACnBG,EACAF,EACsC,CACtC,MAAMa,EAAUX,EAAI,qBAAuB,CAAC,EAC5C,GAAI,CAACW,EAAQ,OAAQ,OAErB,MAAMC,EAAwB,CAAC,EACzBC,EAAwB,CAAC,EAE/B,UAAWC,KAAMH,EAAS,CAIxB,MAAMI,GAHM,MAAMvC,EAAkBsB,CAAM,EAAE,sBAC1CgB,EAAG,UACL,GACkB,MAClB,GAAI,CAACC,EAAO,SACZ,MAAMC,EAAQD,EAAM,MAAM,UAE1B,UAAWxB,KAAKuB,EAAG,iBAAmB,CAAC,EAAG,CACxC,MAAMrB,EAAKuB,EAAMzB,CAAC,EACdE,GAAImB,EAAS,KAAKnB,CAAE,CAC1B,CACA,UAAWF,KAAKuB,EAAG,iBAAmB,CAAC,EAAG,CACxC,MAAMrB,EAAKuB,EAAMzB,CAAC,EACdE,GAAIoB,EAAS,KAAKpB,CAAE,CAC1B,CACF,CAEA,MAAO,CAAE,SAAAmB,EAAU,SAAAC,CAAS,CAC9B,CACF",
|
|
6
|
+
"names": ["TransactionInspector_exports", "__export", "SolanaTransactionTypes", "TransactionInspector", "__toCommonJS", "import_spl_token", "import_web3", "import_buffer", "import_transactionDecoders", "DEFAULT_RPC_URL", "defaultConnection", "rpcUrl", "isSPLProgramId", "pid", "injectedRPCURL", "rawTransactionBytes", "tokenAddress", "createATA", "message", "instruction", "sawSPL", "best", "ixMeta", "programId", "resolvedKeys", "i", "k", "pk", "ctx", "decoder", "data", "rawBytes", "rpcURL", "versionedTX", "msg", "lookedUp", "allKeys", "ixWithAccounts", "accountKeyIndexes", "legacy", "allKeyMap", "add", "pubkey", "key", "indexByB58", "lookups", "writable", "readonly", "lu", "table", "addrs"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var a=require("@solana/spl-token"),e=require("@solana/web3.js"),n=require("vitest"),T=require("../../app-binder/services/bs58Encoder"),i=require("./TransactionInspector");const A=T.DefaultBs58Encoder.encode(new Uint8Array(32).fill(170));function p(t,s,c){const r=c??s[0]??e.Keypair.generate(),o=new e.Transaction;o.recentBlockhash=A,o.feePayer=r.publicKey,o.add(...t);const u=new Set,d=[r,...s].filter(y=>{const l=y.publicKey.toBase58();return u.has(l)?!1:(u.add(l),!0)});return o.sign(...d),{raw:o.serialize(),payer:r}}(0,n.describe)("TransactionInspector",()=>{(0,n.it)("falls back to STANDARD for a plain SystemProgram transfer",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:s,lamports:1e3}),{raw:r}=p([c],[t],t),o=await new i.TransactionInspector(
|
|
1
|
+
"use strict";var a=require("@solana/spl-token"),e=require("@solana/web3.js"),n=require("vitest"),T=require("../../app-binder/services/bs58Encoder"),i=require("./TransactionInspector");const A=T.DefaultBs58Encoder.encode(new Uint8Array(32).fill(170));function p(t,s,c){const r=c??s[0]??e.Keypair.generate(),o=new e.Transaction;o.recentBlockhash=A,o.feePayer=r.publicKey,o.add(...t);const u=new Set,d=[r,...s].filter(y=>{const l=y.publicKey.toBase58();return u.has(l)?!1:(u.add(l),!0)});return o.sign(...d),{raw:o.serialize(),payer:r}}(0,n.describe)("TransactionInspector",()=>{(0,n.it)("falls back to STANDARD for a plain SystemProgram transfer",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:s,lamports:1e3}),{raw:r}=p([c],[t],t),o=await new i.TransactionInspector().inspectTransactionType(r);(0,n.expect)(o.transactionType).toBe(i.SolanaTransactionTypes.STANDARD),(0,n.expect)(o.data).toEqual({})}),(0,n.it)("detects an SPL Transfer and returns the destination address",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.createTransferInstruction)(s,c,t.publicKey,42n,[],a.TOKEN_PROGRAM_ID),{raw:o}=p([r],[t],t),u=await new i.TransactionInspector().inspectTransactionType(o);(0,n.expect)(u.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(u.data.tokenAddress).toBe(c.toBase58())}),(0,n.it)("detects an SPL TransferChecked and returns the destination address",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=e.Keypair.generate().publicKey,o=(0,a.createTransferCheckedInstruction)(c,s,r,t.publicKey,123n,0,[],a.TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d=await new i.TransactionInspector().inspectTransactionType(u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.tokenAddress).toBe(r.toBase58())}),(0,n.it)("detects InitializeAccount and returns the new account and mint",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=e.Keypair.generate().publicKey,o=(0,a.createInitializeAccountInstruction)(c,s,r,a.TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d=await new i.TransactionInspector().inspectTransactionType(u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.createATA).toEqual({address:c.toBase58(),mintAddress:s.toBase58()})}),(0,n.it)("detects InitializeAccount2 and returns the new account and mint",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=e.Keypair.generate().publicKey,o=(0,a.createInitializeAccount2Instruction)(c,s,r,a.TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d=await new i.TransactionInspector().inspectTransactionType(u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.createATA).toEqual({address:c.toBase58(),mintAddress:s.toBase58()})}),(0,n.it)("detects InitializeAccount3 and returns the new account and mint",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.createInitializeAccount3Instruction)(c,s,a.TOKEN_PROGRAM_ID),{raw:o}=p([r],[t],t),u=await new i.TransactionInspector().inspectTransactionType(o);(0,n.expect)(u.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(u.data.createATA).toEqual({address:c.toBase58(),mintAddress:s.toBase58()})}),(0,n.it)("detects ATA creation via Associated Token Program (classic TOKEN program)",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.getAssociatedTokenAddressSync)(c,s,!0,a.TOKEN_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),o=(0,a.createAssociatedTokenAccountInstruction)(t.publicKey,r,s,c,a.TOKEN_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d=await new i.TransactionInspector().inspectTransactionType(u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.createATA).toEqual({address:s.toBase58(),mintAddress:c.toBase58()})}),(0,n.it)("detects ATA creation via Associated Token Program (TOKEN-2022 program)",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.getAssociatedTokenAddressSync)(c,s,!0,a.TOKEN_2022_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),o=(0,a.createAssociatedTokenAccountInstruction)(t.publicKey,r,s,c,a.TOKEN_2022_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d=await new i.TransactionInspector().inspectTransactionType(u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.createATA).toEqual({address:s.toBase58(),mintAddress:c.toBase58()})}),(0,n.it)("detects CloseAccount and returns the closed token account",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.createCloseAccountInstruction)(s,c,t.publicKey),{raw:o}=p([r],[t],t),u=await new i.TransactionInspector().inspectTransactionType(o);(0,n.expect)(u.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(u.data.tokenAddress).toBe(s.toBase58())}),(0,n.it)("detects SyncNative and returns the WSOL account",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=(0,a.createSyncNativeInstruction)(s,a.TOKEN_PROGRAM_ID),{raw:r}=p([c],[t],t),o=await new i.TransactionInspector().inspectTransactionType(r);(0,n.expect)(o.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(o.data.tokenAddress).toBe(s.toBase58())}),(0,n.it)("marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)",async()=>{const t=e.Keypair.generate(),s=new e.TransactionInstruction({programId:a.TOKEN_PROGRAM_ID,keys:[],data:Buffer.from([])}),{raw:c}=p([s],[t],t),r=await new i.TransactionInspector().inspectTransactionType(c);(0,n.expect)(r.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(r.data).toEqual({})}),(0,n.it)("falls back to STANDARD if the payload is unparseable",async()=>{const t=new Uint8Array([171,173,190,239]),s=await new i.TransactionInspector().inspectTransactionType(t);(0,n.expect)(s.transactionType).toBe(i.SolanaTransactionTypes.STANDARD),(0,n.expect)(s.data).toEqual({})}),(0,n.it)("fast path: tokenAddress override + SPL instruction, SPL and returns override",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.createTransferInstruction)(s,c,t.publicKey,1n,[],a.TOKEN_PROGRAM_ID),{raw:o}=p([r],[t],t),u=e.Keypair.generate().publicKey.toBase58(),d=await new i.TransactionInspector().inspectTransactionType(o,u);(0,n.expect)(d.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(d.data.tokenAddress).toBe(u)}),(0,n.it)("fast path: createATA override + ATA instruction, SPL and returns override",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.getAssociatedTokenAddressSync)(c,s,!0,a.TOKEN_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),o=(0,a.createAssociatedTokenAccountInstruction)(t.publicKey,r,s,c,a.TOKEN_PROGRAM_ID,a.ASSOCIATED_TOKEN_PROGRAM_ID),{raw:u}=p([o],[t],t),d={address:e.Keypair.generate().publicKey.toBase58(),mintAddress:e.Keypair.generate().publicKey.toBase58()},y=await new i.TransactionInspector().inspectTransactionType(u,void 0,d);(0,n.expect)(y.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(y.data.createATA).toEqual(d)}),(0,n.it)("fast path: both overrides + SPL instruction, SPL and returns both",async()=>{const t=e.Keypair.generate(),s=e.Keypair.generate().publicKey,c=e.Keypair.generate().publicKey,r=(0,a.createTransferInstruction)(s,c,t.publicKey,7n,[],a.TOKEN_PROGRAM_ID),{raw:o}=p([r],[t],t),u=e.Keypair.generate().publicKey.toBase58(),d={address:e.Keypair.generate().publicKey.toBase58(),mintAddress:e.Keypair.generate().publicKey.toBase58()},y=await new i.TransactionInspector().inspectTransactionType(o,u,d);(0,n.expect)(y.transactionType).toBe(i.SolanaTransactionTypes.SPL),(0,n.expect)(y.data.tokenAddress).toBe(u),(0,n.expect)(y.data.createATA).toEqual(d)})});
|
|
2
2
|
//# sourceMappingURL=TransactionInspector.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/services/TransactionInspector.test.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n createAssociatedTokenAccountInstruction,\n createCloseAccountInstruction,\n createInitializeAccount2Instruction,\n createInitializeAccount3Instruction,\n createInitializeAccountInstruction,\n createSyncNativeInstruction,\n createTransferCheckedInstruction,\n createTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Keypair,\n SystemProgram,\n Transaction,\n TransactionInstruction,\n} from \"@solana/web3.js\";\nimport { describe, expect, it } from \"vitest\";\n\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n SolanaTransactionTypes,\n TransactionInspector,\n} from \"./TransactionInspector\";\n\nconst DUMMY_BLOCKHASH = DefaultBs58Encoder.encode(\n new Uint8Array(32).fill(0xaa),\n);\n\nfunction makeSignedRawTx(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...ixs);\n const seen = new Set<string>();\n const uniqueSigners = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniqueSigners);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"TransactionInspector\", () => {\n it(\"falls back to STANDARD for a plain SystemProgram transfer\", async () => {\n // given\n const payer = Keypair.generate();\n const dest = Keypair.generate().publicKey;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: dest,\n lamports: 1_000,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"detects an SPL Transfer and returns the destination address\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 42n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects an SPL TransferChecked and returns the destination address\", async () => {\n // given\n const owner = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferCheckedInstruction(\n source,\n mint,\n destination,\n owner.publicKey,\n 123n,\n 0,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects InitializeAccount and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccountInstruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount2 and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount2Instruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount3 and returns the new account and mint\", async () => {\n // given\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount3Instruction(\n newAccount,\n mint,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (classic TOKEN program)\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (TOKEN-2022 program)\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata22 = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata22,\n owner,\n mint,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects CloseAccount and returns the closed token account\", async () => {\n // given\n const owner = Keypair.generate();\n const account = Keypair.generate().publicKey;\n const dest = Keypair.generate().publicKey;\n\n const instruction = createCloseAccountInstruction(\n account,\n dest,\n owner.publicKey,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"detects SyncNative and returns the WSOL account\", async () => {\n // given\n const payer = Keypair.generate();\n const account = Keypair.generate().publicKey;\n\n const instruction = createSyncNativeInstruction(account, TOKEN_PROGRAM_ID);\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)\", async () => {\n // given\n const payer = Keypair.generate();\n const bogusIx = new TransactionInstruction({\n programId: TOKEN_PROGRAM_ID,\n keys: [],\n data: Buffer.from([]),\n });\n\n const { raw } = makeSignedRawTx([bogusIx], [payer], payer);\n\n // when\n const result = await new TransactionInspector(raw).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data).toEqual({});\n });\n\n it(\"falls back to STANDARD if the payload is unparseable\", async () => {\n // given\n const garbage = new Uint8Array([0xab, 0xad, 0xbe, 0xef]);\n\n // when\n const result = await new TransactionInspector(\n garbage,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"fast path: tokenAddress override + SPL instruction, SPL and returns override\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 1n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const overrideToken = Keypair.generate().publicKey.toBase58();\n\n // when\n const result = await new TransactionInspector(\n raw,\n overrideToken,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(overrideToken);\n });\n\n it(\"fast path: createATA override + ATA instruction, SPL and returns override\", async () => {\n // given\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const overrideATA = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n // when\n const result = await new TransactionInspector(\n raw,\n undefined,\n overrideATA,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual(overrideATA);\n });\n\n it(\"fast path: both overrides + SPL instruction, SPL and returns both\", async () => {\n // given\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 7n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const tokenOverride = Keypair.generate().publicKey.toBase58();\n const ataOverride = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n // when\n const result = await new TransactionInspector(\n raw,\n tokenOverride,\n ataOverride,\n ).inspectTransactionType();\n\n // then\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(tokenOverride);\n expect(result.data.createATA).toEqual(ataOverride);\n });\n});\n"],
|
|
5
|
-
"mappings": "aAAA,IAAAA,EAaO,6BACPC,EAKO,2BACPC,EAAqC,kBAErCC,EAAmC,qDAEnCC,EAGO,kCAEP,MAAMC,EAAkB,qBAAmB,OACzC,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAC9B,EAEA,SAASC,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAK,UAAQ,SAAS,EACnDG,EAAK,IAAI,cACfA,EAAG,gBAAkBN,EACrBM,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAG,EACb,MAAMK,EAAO,IAAI,IACXC,EAAgB,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CACvD,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAa,EACjB,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,IAEA,YAAS,uBAAwB,IAAM,IACrC,MAAG,4DAA6D,SAAY,
|
|
4
|
+
"sourcesContent": ["import {\n ASSOCIATED_TOKEN_PROGRAM_ID,\n createAssociatedTokenAccountInstruction,\n createCloseAccountInstruction,\n createInitializeAccount2Instruction,\n createInitializeAccount3Instruction,\n createInitializeAccountInstruction,\n createSyncNativeInstruction,\n createTransferCheckedInstruction,\n createTransferInstruction,\n getAssociatedTokenAddressSync,\n TOKEN_2022_PROGRAM_ID,\n TOKEN_PROGRAM_ID,\n} from \"@solana/spl-token\";\nimport {\n Keypair,\n SystemProgram,\n Transaction,\n TransactionInstruction,\n} from \"@solana/web3.js\";\nimport { describe, expect, it } from \"vitest\";\n\nimport { DefaultBs58Encoder } from \"@internal/app-binder/services/bs58Encoder\";\n\nimport {\n SolanaTransactionTypes,\n TransactionInspector,\n} from \"./TransactionInspector\";\n\nconst DUMMY_BLOCKHASH = DefaultBs58Encoder.encode(\n new Uint8Array(32).fill(0xaa),\n);\n\nfunction makeSignedRawTx(\n ixs: TransactionInstruction[],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...ixs);\n const seen = new Set<string>();\n const uniqueSigners = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniqueSigners);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"TransactionInspector\", () => {\n it(\"falls back to STANDARD for a plain SystemProgram transfer\", async () => {\n const payer = Keypair.generate();\n const dest = Keypair.generate().publicKey;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: dest,\n lamports: 1_000,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"detects an SPL Transfer and returns the destination address\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 42n,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects an SPL TransferChecked and returns the destination address\", async () => {\n const owner = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferCheckedInstruction(\n source,\n mint,\n destination,\n owner.publicKey,\n 123n,\n 0,\n [],\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(destination.toBase58());\n });\n\n it(\"detects InitializeAccount and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccountInstruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount2 and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n const owner = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount2Instruction(\n newAccount,\n mint,\n owner,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects InitializeAccount3 and returns the new account and mint\", async () => {\n const payer = Keypair.generate();\n const mint = Keypair.generate().publicKey;\n const newAccount = Keypair.generate().publicKey;\n\n const instruction = createInitializeAccount3Instruction(\n newAccount,\n mint,\n TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: newAccount.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (classic TOKEN program)\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects ATA creation via Associated Token Program (TOKEN-2022 program)\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata22 = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata22,\n owner,\n mint,\n TOKEN_2022_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual({\n address: owner.toBase58(),\n mintAddress: mint.toBase58(),\n });\n });\n\n it(\"detects CloseAccount and returns the closed token account\", async () => {\n const owner = Keypair.generate();\n const account = Keypair.generate().publicKey;\n const dest = Keypair.generate().publicKey;\n\n const instruction = createCloseAccountInstruction(\n account,\n dest,\n owner.publicKey,\n );\n\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"detects SyncNative and returns the WSOL account\", async () => {\n const payer = Keypair.generate();\n const account = Keypair.generate().publicKey;\n\n const instruction = createSyncNativeInstruction(account, TOKEN_PROGRAM_ID);\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(account.toBase58());\n });\n\n it(\"marks transaction as SPL even if decoders can't parse (last-resort SPL by program id)\", async () => {\n const payer = Keypair.generate();\n const bogusIx = new TransactionInstruction({\n programId: TOKEN_PROGRAM_ID,\n keys: [],\n data: Buffer.from([]),\n });\n\n const { raw } = makeSignedRawTx([bogusIx], [payer], payer);\n\n const result = await new TransactionInspector().inspectTransactionType(raw);\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data).toEqual({});\n });\n\n it(\"falls back to STANDARD if the payload is unparseable\", async () => {\n const garbage = new Uint8Array([0xab, 0xad, 0xbe, 0xef]);\n\n const result = await new TransactionInspector().inspectTransactionType(\n garbage,\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.STANDARD);\n expect(result.data).toEqual({});\n });\n\n it(\"fast path: tokenAddress override + SPL instruction, SPL and returns override\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 1n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const overrideToken = Keypair.generate().publicKey.toBase58();\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n overrideToken, // tokenAddress override\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(overrideToken);\n });\n\n it(\"fast path: createATA override + ATA instruction, SPL and returns override\", async () => {\n const payer = Keypair.generate();\n const owner = Keypair.generate().publicKey;\n const mint = Keypair.generate().publicKey;\n const ata = getAssociatedTokenAddressSync(\n mint,\n owner,\n true,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n\n const instruction = createAssociatedTokenAccountInstruction(\n payer.publicKey,\n ata,\n owner,\n mint,\n TOKEN_PROGRAM_ID,\n ASSOCIATED_TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n const overrideATA = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n undefined, // no tokenAddress override\n overrideATA, // createATA override\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.createATA).toEqual(overrideATA);\n });\n\n it(\"fast path: both overrides + SPL instruction, SPL and returns both\", async () => {\n const owner = Keypair.generate();\n const source = Keypair.generate().publicKey;\n const destination = Keypair.generate().publicKey;\n\n const instruction = createTransferInstruction(\n source,\n destination,\n owner.publicKey,\n 7n,\n [],\n TOKEN_PROGRAM_ID,\n );\n const { raw } = makeSignedRawTx([instruction], [owner], owner);\n\n const tokenOverride = Keypair.generate().publicKey.toBase58();\n const ataOverride = {\n address: Keypair.generate().publicKey.toBase58(),\n mintAddress: Keypair.generate().publicKey.toBase58(),\n };\n\n const result = await new TransactionInspector().inspectTransactionType(\n raw,\n tokenOverride,\n ataOverride,\n );\n\n expect(result.transactionType).toBe(SolanaTransactionTypes.SPL);\n expect(result.data.tokenAddress).toBe(tokenOverride);\n expect(result.data.createATA).toEqual(ataOverride);\n });\n});\n"],
|
|
5
|
+
"mappings": "aAAA,IAAAA,EAaO,6BACPC,EAKO,2BACPC,EAAqC,kBAErCC,EAAmC,qDAEnCC,EAGO,kCAEP,MAAMC,EAAkB,qBAAmB,OACzC,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAC9B,EAEA,SAASC,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAK,UAAQ,SAAS,EACnDG,EAAK,IAAI,cACfA,EAAG,gBAAkBN,EACrBM,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAG,EACb,MAAMK,EAAO,IAAI,IACXC,EAAgB,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CACvD,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAa,EACjB,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,IAEA,YAAS,uBAAwB,IAAM,IACrC,MAAG,4DAA6D,SAAY,CAC1E,MAAMA,EAAQ,UAAQ,SAAS,EACzBM,EAAO,UAAQ,SAAS,EAAE,UAE1BC,EAAc,gBAAc,SAAS,CACzC,WAAYP,EAAM,UAClB,SAAUM,EACV,SAAU,GACZ,CAAC,EAEK,CAAE,IAAAE,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,QAAQ,KACnE,UAAOA,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,KAED,MAAG,8DAA+D,SAAY,CAC5E,MAAMC,EAAQ,UAAQ,SAAS,EACzBC,EAAS,UAAQ,SAAS,EAAE,UAC5BC,EAAc,UAAQ,SAAS,EAAE,UAEjCL,KAAc,6BAClBI,EACAC,EACAF,EAAM,UACN,IACA,CAAC,EACD,kBACF,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKG,EAAY,SAAS,CAAC,CAC9D,CAAC,KAED,MAAG,qEAAsE,SAAY,CACnF,MAAMF,EAAQ,UAAQ,SAAS,EACzBG,EAAO,UAAQ,SAAS,EAAE,UAC1BF,EAAS,UAAQ,SAAS,EAAE,UAC5BC,EAAc,UAAQ,SAAS,EAAE,UAEjCL,KAAc,oCAClBI,EACAE,EACAD,EACAF,EAAM,UACN,KACA,EACA,CAAC,EACD,kBACF,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKG,EAAY,SAAS,CAAC,CAC9D,CAAC,KAED,MAAG,iEAAkE,SAAY,CAC/E,MAAMZ,EAAQ,UAAQ,SAAS,EACzBa,EAAO,UAAQ,SAAS,EAAE,UAC1BC,EAAa,UAAQ,SAAS,EAAE,UAChCJ,EAAQ,UAAQ,SAAS,EAAE,UAE3BH,KAAc,sCAClBO,EACAD,EACAH,EACA,kBACF,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,KAED,MAAG,kEAAmE,SAAY,CAChF,MAAMb,EAAQ,UAAQ,SAAS,EACzBa,EAAO,UAAQ,SAAS,EAAE,UAC1BC,EAAa,UAAQ,SAAS,EAAE,UAChCJ,EAAQ,UAAQ,SAAS,EAAE,UAE3BH,KAAc,uCAClBO,EACAD,EACAH,EACA,kBACF,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,KAED,MAAG,kEAAmE,SAAY,CAChF,MAAMb,EAAQ,UAAQ,SAAS,EACzBa,EAAO,UAAQ,SAAS,EAAE,UAC1BC,EAAa,UAAQ,SAAS,EAAE,UAEhCP,KAAc,uCAClBO,EACAD,EACA,kBACF,EAEM,CAAE,IAAAL,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASK,EAAW,SAAS,EAC7B,YAAaD,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,KAED,MAAG,4EAA6E,SAAY,CAC1F,MAAMb,EAAQ,UAAQ,SAAS,EACzBU,EAAQ,UAAQ,SAAS,EAAE,UAC3BG,EAAO,UAAQ,SAAS,EAAE,UAC1BE,KAAM,iCACVF,EACAH,EACA,GACA,mBACA,6BACF,EAEMH,KAAc,2CAClBP,EAAM,UACNe,EACAL,EACAG,EACA,mBACA,6BACF,EAEM,CAAE,IAAAL,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASC,EAAM,SAAS,EACxB,YAAaG,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,KAED,MAAG,yEAA0E,SAAY,CACvF,MAAMb,EAAQ,UAAQ,SAAS,EACzBU,EAAQ,UAAQ,SAAS,EAAE,UAC3BG,EAAO,UAAQ,SAAS,EAAE,UAC1BG,KAAQ,iCACZH,EACAH,EACA,GACA,wBACA,6BACF,EAEMH,KAAc,2CAClBP,EAAM,UACNgB,EACAN,EACAG,EACA,wBACA,6BACF,EAEM,CAAE,IAAAL,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQ,CACpC,QAASC,EAAM,SAAS,EACxB,YAAaG,EAAK,SAAS,CAC7B,CAAC,CACH,CAAC,KAED,MAAG,4DAA6D,SAAY,CAC1E,MAAMH,EAAQ,UAAQ,SAAS,EACzBO,EAAU,UAAQ,SAAS,EAAE,UAC7BX,EAAO,UAAQ,SAAS,EAAE,UAE1BC,KAAc,iCAClBU,EACAX,EACAI,EAAM,SACR,EAEM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDD,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKQ,EAAQ,SAAS,CAAC,CAC1D,CAAC,KAED,MAAG,kDAAmD,SAAY,CAChE,MAAMjB,EAAQ,UAAQ,SAAS,EACzBiB,EAAU,UAAQ,SAAS,EAAE,UAE7BV,KAAc,+BAA4BU,EAAS,kBAAgB,EAEnE,CAAE,IAAAT,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKQ,EAAQ,SAAS,CAAC,CAC1D,CAAC,KAED,MAAG,wFAAyF,SAAY,CACtG,MAAMjB,EAAQ,UAAQ,SAAS,EACzBkB,EAAU,IAAI,yBAAuB,CACzC,UAAW,mBACX,KAAM,CAAC,EACP,KAAM,OAAO,KAAK,CAAC,CAAC,CACtB,CAAC,EAEK,CAAE,IAAAV,CAAI,EAAIZ,EAAgB,CAACsB,CAAO,EAAG,CAAClB,CAAK,EAAGA,CAAK,EAEnDS,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAAuBD,CAAG,KAE1E,UAAOC,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,KAED,MAAG,uDAAwD,SAAY,CACrE,MAAMU,EAAU,IAAI,WAAW,CAAC,IAAM,IAAM,IAAM,GAAI,CAAC,EAEjDV,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAC9CU,CACF,KAEA,UAAOV,EAAO,eAAe,EAAE,KAAK,yBAAuB,QAAQ,KACnE,UAAOA,EAAO,IAAI,EAAE,QAAQ,CAAC,CAAC,CAChC,CAAC,KAED,MAAG,+EAAgF,SAAY,CAC7F,MAAMC,EAAQ,UAAQ,SAAS,EACzBC,EAAS,UAAQ,SAAS,EAAE,UAC5BC,EAAc,UAAQ,SAAS,EAAE,UAEjCL,KAAc,6BAClBI,EACAC,EACAF,EAAM,UACN,GACA,CAAC,EACD,kBACF,EACM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDU,EAAgB,UAAQ,SAAS,EAAE,UAAU,SAAS,EAEtDX,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAC9CD,EACAY,CACF,KAEA,UAAOX,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKW,CAAa,CACrD,CAAC,KAED,MAAG,4EAA6E,SAAY,CAC1F,MAAMpB,EAAQ,UAAQ,SAAS,EACzBU,EAAQ,UAAQ,SAAS,EAAE,UAC3BG,EAAO,UAAQ,SAAS,EAAE,UAC1BE,KAAM,iCACVF,EACAH,EACA,GACA,mBACA,6BACF,EAEMH,KAAc,2CAClBP,EAAM,UACNe,EACAL,EACAG,EACA,mBACA,6BACF,EACM,CAAE,IAAAL,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACP,CAAK,EAAGA,CAAK,EAEvDqB,EAAc,CAClB,QAAS,UAAQ,SAAS,EAAE,UAAU,SAAS,EAC/C,YAAa,UAAQ,SAAS,EAAE,UAAU,SAAS,CACrD,EAEMZ,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAC9CD,EACA,OACAa,CACF,KAEA,UAAOZ,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,SAAS,EAAE,QAAQY,CAAW,CACnD,CAAC,KAED,MAAG,oEAAqE,SAAY,CAClF,MAAMX,EAAQ,UAAQ,SAAS,EACzBC,EAAS,UAAQ,SAAS,EAAE,UAC5BC,EAAc,UAAQ,SAAS,EAAE,UAEjCL,KAAc,6BAClBI,EACAC,EACAF,EAAM,UACN,GACA,CAAC,EACD,kBACF,EACM,CAAE,IAAAF,CAAI,EAAIZ,EAAgB,CAACW,CAAW,EAAG,CAACG,CAAK,EAAGA,CAAK,EAEvDY,EAAgB,UAAQ,SAAS,EAAE,UAAU,SAAS,EACtDC,EAAc,CAClB,QAAS,UAAQ,SAAS,EAAE,UAAU,SAAS,EAC/C,YAAa,UAAQ,SAAS,EAAE,UAAU,SAAS,CACrD,EAEMd,EAAS,MAAM,IAAI,uBAAqB,EAAE,uBAC9CD,EACAc,EACAC,CACF,KAEA,UAAOd,EAAO,eAAe,EAAE,KAAK,yBAAuB,GAAG,KAC9D,UAAOA,EAAO,KAAK,YAAY,EAAE,KAAKa,CAAa,KACnD,UAAOb,EAAO,KAAK,SAAS,EAAE,QAAQc,CAAW,CACnD,CAAC,CACH,CAAC",
|
|
6
6
|
"names": ["import_spl_token", "import_web3", "import_vitest", "import_bs58Encoder", "import_TransactionInspector", "DUMMY_BLOCKHASH", "makeSignedRawTx", "ixs", "signers", "feePayer", "payer", "tx", "seen", "uniqueSigners", "kp", "k", "dest", "instruction", "raw", "result", "owner", "source", "destination", "mint", "newAccount", "ata", "ata22", "account", "bogusIx", "garbage", "overrideToken", "overrideATA", "tokenOverride", "ataOverride"]
|
|
7
7
|
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var o=Object.defineProperty;var t=Object.getOwnPropertyDescriptor;var m=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(r,e)=>{for(var a in e)o(r,a,{get:e[a],enumerable:!0})},p=(r,e,a,i)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of m(e))!l.call(r,s)&&s!==a&&o(r,s,{get:()=>e[s],enumerable:!(i=t(e,s))||i.enumerable});return r};var g=r=>p(o({},"__esModule",{value:!0}),r);var y={};c(y,{DefaultSolanaMessageNormaliser:()=>M});module.exports=g(y);var n=require("../../../app-binder/services/TransactionInspector");class M{static async normaliseMessage(e){return n.TransactionInspector.normaliseMessage(e)}}0&&(module.exports={DefaultSolanaMessageNormaliser});
|
|
2
|
+
//# sourceMappingURL=DefaultSolanaMessageNormaliser.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../../src/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.ts"],
|
|
4
|
+
"sourcesContent": ["import type { NormalizedMessage } from \"@internal/app-binder/services/TransactionInspector\";\nimport { TransactionInspector } from \"@internal/app-binder/services/TransactionInspector\";\n\nexport interface SolanaMessageNormaliserConstructor {\n normaliseMessage(rawBytes: Uint8Array): Promise<NormalizedMessage>;\n}\n\nexport class DefaultSolanaMessageNormaliser {\n static async normaliseMessage(\n rawBytes: Uint8Array,\n ): Promise<NormalizedMessage> {\n return TransactionInspector.normaliseMessage(rawBytes);\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,oCAAAE,IAAA,eAAAC,EAAAH,GACA,IAAAI,EAAqC,8DAM9B,MAAMF,CAA+B,CAC1C,aAAa,iBACXG,EAC4B,CAC5B,OAAO,uBAAqB,iBAAiBA,CAAQ,CACvD,CACF",
|
|
6
|
+
"names": ["DefaultSolanaMessageNormaliser_exports", "__export", "DefaultSolanaMessageNormaliser", "__toCommonJS", "import_TransactionInspector", "rawBytes"]
|
|
7
|
+
}
|
|
@@ -0,0 +1,2 @@
|
|
|
1
|
+
"use strict";var b=Object.create;var d=Object.defineProperty;var f=Object.getOwnPropertyDescriptor;var P=Object.getOwnPropertyNames;var I=Object.getPrototypeOf,B=Object.prototype.hasOwnProperty;var h=(e,a,i,o)=>{if(a&&typeof a=="object"||typeof a=="function")for(let n of P(a))!B.call(e,n)&&n!==i&&d(e,n,{get:()=>a[n],enumerable:!(o=f(a,n))||o.enumerable});return e};var w=(e,a,i)=>(i=e!=null?b(I(e)):{},h(a||!e||!e.__esModule?d(i,"default",{value:e,enumerable:!0}):i,e));var r=require("@solana/web3.js"),K=w(require("bs58")),t=require("vitest"),m=require("./DefaultSolanaMessageNormaliser");const x=K.default.encode(new Uint8Array(32).fill(170));function g(e,a,i){const o=i??a[0]??r.Keypair.generate(),n=new r.Transaction;n.recentBlockhash=x,n.feePayer=o.publicKey,n.add(...e);const s=new Set,c=[o,...a].filter(l=>{const u=l.publicKey.toBase58();return s.has(u)?!1:(s.add(u),!0)});return n.sign(...c),{raw:n.serialize(),payer:o}}(0,t.describe)("DefaultSolanaMessageNormaliser",()=>{(0,t.it)("normalises a legacy tx with multiple SystemProgram.transfer instructions preserving order",async()=>{const e=r.Keypair.generate(),a=[r.Keypair.generate(),r.Keypair.generate(),r.Keypair.generate()],i=1234,o=a.map(c=>r.SystemProgram.transfer({fromPubkey:e.publicKey,toPubkey:c.publicKey,lamports:i})),{raw:n}=g(o,[e],e),s=await m.DefaultSolanaMessageNormaliser.normaliseMessage(n);(0,t.expect)(s.compiledInstructions).toHaveLength(o.length);for(let c=0;c<o.length;c++){const l=s.compiledInstructions[c],u=s.allKeys[l.programIdIndex];(0,t.expect)(u.equals(r.SystemProgram.programId)).toBe(!0);const p=l.accountKeyIndexes.map(y=>s.allKeys[y]);(0,t.expect)(p[0].equals(e.publicKey)).toBe(!0),(0,t.expect)(p[1].equals(a[c].publicKey)).toBe(!0),(0,t.expect)(l.data instanceof Uint8Array).toBe(!0),(0,t.expect)(l.data.length).toBeGreaterThan(0)}}),(0,t.it)("can be used via the SolanaMessageNormaliserConstructor interface",async()=>{const e=r.Keypair.generate(),a=r.Keypair.generate(),i=r.SystemProgram.transfer({fromPubkey:e.publicKey,toPubkey:a.publicKey,lamports:1e3}),{raw:o}=g([i],[e],e),s=await m.DefaultSolanaMessageNormaliser.normaliseMessage(o);(0,t.expect)(s.compiledInstructions).toHaveLength(1);const c=s.compiledInstructions[0],l=s.allKeys[c.programIdIndex];(0,t.expect)(l.equals(r.SystemProgram.programId)).toBe(!0);const u=c.accountKeyIndexes.map(p=>s.allKeys[p]);(0,t.expect)(u[0].equals(e.publicKey)).toBe(!0),(0,t.expect)(u[1].equals(a.publicKey)).toBe(!0)}),(0,t.it)("handles single-instruction tx and preserves indices mapping",async()=>{const e=r.Keypair.generate(),a=r.Keypair.generate(),o=r.SystemProgram.transfer({fromPubkey:e.publicKey,toPubkey:a.publicKey,lamports:5}),{raw:n}=g([o],[e],e),s=await m.DefaultSolanaMessageNormaliser.normaliseMessage(n);(0,t.expect)(Array.isArray(s.allKeys)).toBe(!0),(0,t.expect)(s.allKeys.length).toBeGreaterThanOrEqual(3);const c=s.compiledInstructions[0],l=s.allKeys[c.programIdIndex];(0,t.expect)(l.equals(r.SystemProgram.programId)).toBe(!0);const[u,p]=c.accountKeyIndexes.map(y=>s.allKeys[y]);(0,t.expect)(u.equals(e.publicKey)).toBe(!0),(0,t.expect)(p.equals(a.publicKey)).toBe(!0)})});
|
|
2
|
+
//# sourceMappingURL=DefaultSolanaMessageNormaliser.test.js.map
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
{
|
|
2
|
+
"version": 3,
|
|
3
|
+
"sources": ["../../../../../../src/internal/app-binder/services/utils/DefaultSolanaMessageNormaliser.test.ts"],
|
|
4
|
+
"sourcesContent": ["import {\n Keypair,\n type PublicKey,\n SystemProgram,\n Transaction,\n} from \"@solana/web3.js\";\nimport bs58 from \"bs58\";\nimport { describe, expect, it } from \"vitest\";\n\nimport {\n DefaultSolanaMessageNormaliser,\n type SolanaMessageNormaliserConstructor,\n} from \"./DefaultSolanaMessageNormaliser\";\n\nconst DUMMY_BLOCKHASH = bs58.encode(new Uint8Array(32).fill(0xaa));\n\nfunction makeSignedRawTx(\n instructions: Parameters<Transaction[\"add\"]>[0][],\n signers: Keypair[],\n feePayer?: Keypair,\n) {\n const payer = feePayer ?? signers[0] ?? Keypair.generate();\n const tx = new Transaction();\n tx.recentBlockhash = DUMMY_BLOCKHASH;\n tx.feePayer = payer.publicKey;\n tx.add(...instructions);\n\n // unique signers: fee payer first\n const seen = new Set<string>();\n const uniq = [payer, ...signers].filter((kp) => {\n const k = kp.publicKey.toBase58();\n if (seen.has(k)) return false;\n seen.add(k);\n return true;\n });\n\n tx.sign(...uniq);\n return { raw: tx.serialize(), payer };\n}\n\ndescribe(\"DefaultSolanaMessageNormaliser\", () => {\n it(\"normalises a legacy tx with multiple SystemProgram.transfer instructions preserving order\", async () => {\n // given\n const payer = Keypair.generate();\n const recipients = [\n Keypair.generate(),\n Keypair.generate(),\n Keypair.generate(),\n ];\n const lamports = 1234;\n\n const instructions = recipients.map((r) =>\n SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: r.publicKey,\n lamports,\n }),\n );\n\n const { raw } = makeSignedRawTx(instructions, [payer], payer);\n\n // when\n const msg = await DefaultSolanaMessageNormaliser.normaliseMessage(raw);\n\n // then\n // same number of compiled instructions\n expect(msg.compiledInstructions).toHaveLength(instructions.length);\n\n for (let i = 0; i < instructions.length; i++) {\n const compiled = msg.compiledInstructions[i]!;\n const programId = msg.allKeys[compiled.programIdIndex]!;\n // program resolves to SystemProgram\n expect(programId.equals(SystemProgram.programId)).toBe(true);\n\n // accounts resolve to [from, to] in order\n const accounts = compiled.accountKeyIndexes.map(\n (idx) => msg.allKeys[idx]!,\n );\n expect((accounts[0] as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((accounts[1] as PublicKey).equals(recipients[i]!.publicKey)).toBe(\n true,\n );\n\n // data is present (SystemProgram.transfer has non-empty data)\n expect(compiled.data instanceof Uint8Array).toBe(true);\n expect(compiled.data.length).toBeGreaterThan(0);\n }\n });\n\n it(\"can be used via the SolanaMessageNormaliserConstructor interface\", async () => {\n // given\n const payer = Keypair.generate();\n const recipient = Keypair.generate();\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: recipient.publicKey,\n lamports: 1_000,\n });\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when (note: using the class as a static 'constructor-like' value)\n const Normaliser: SolanaMessageNormaliserConstructor =\n DefaultSolanaMessageNormaliser;\n const msg = await Normaliser.normaliseMessage(raw);\n\n // then\n expect(msg.compiledInstructions).toHaveLength(1);\n const compiled = msg.compiledInstructions[0]!;\n const programId = msg.allKeys[compiled.programIdIndex]!;\n expect(programId.equals(SystemProgram.programId)).toBe(true);\n\n const accounts = compiled.accountKeyIndexes.map((i) => msg.allKeys[i]!);\n expect((accounts[0] as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((accounts[1] as PublicKey).equals(recipient.publicKey)).toBe(true);\n });\n\n it(\"handles single-instruction tx and preserves indices mapping\", async () => {\n // given\n const payer = Keypair.generate();\n const recipient = Keypair.generate();\n const lamports = 5;\n\n const instruction = SystemProgram.transfer({\n fromPubkey: payer.publicKey,\n toPubkey: recipient.publicKey,\n lamports,\n });\n\n const { raw } = makeSignedRawTx([instruction], [payer], payer);\n\n // when\n const msg = await DefaultSolanaMessageNormaliser.normaliseMessage(raw);\n\n // then\n expect(Array.isArray(msg.allKeys)).toBe(true);\n expect(msg.allKeys.length).toBeGreaterThanOrEqual(3);\n\n const compiled = msg.compiledInstructions[0]!;\n const resolvedPid = msg.allKeys[compiled.programIdIndex]!;\n expect(resolvedPid.equals(SystemProgram.programId)).toBe(true);\n\n const [fromPk, toPk] = compiled.accountKeyIndexes.map(\n (i) => msg.allKeys[i]!,\n );\n expect((fromPk as PublicKey).equals(payer.publicKey)).toBe(true);\n expect((toPk as PublicKey).equals(recipient.publicKey)).toBe(true);\n });\n});\n"],
|
|
5
|
+
"mappings": "wdAAA,IAAAA,EAKO,2BACPC,EAAiB,mBACjBC,EAAqC,kBAErCC,EAGO,4CAEP,MAAMC,EAAkB,EAAAC,QAAK,OAAO,IAAI,WAAW,EAAE,EAAE,KAAK,GAAI,CAAC,EAEjE,SAASC,EACPC,EACAC,EACAC,EACA,CACA,MAAMC,EAAQD,GAAYD,EAAQ,CAAC,GAAK,UAAQ,SAAS,EACnDG,EAAK,IAAI,cACfA,EAAG,gBAAkBP,EACrBO,EAAG,SAAWD,EAAM,UACpBC,EAAG,IAAI,GAAGJ,CAAY,EAGtB,MAAMK,EAAO,IAAI,IACXC,EAAO,CAACH,EAAO,GAAGF,CAAO,EAAE,OAAQM,GAAO,CAC9C,MAAMC,EAAID,EAAG,UAAU,SAAS,EAChC,OAAIF,EAAK,IAAIG,CAAC,EAAU,IACxBH,EAAK,IAAIG,CAAC,EACH,GACT,CAAC,EAED,OAAAJ,EAAG,KAAK,GAAGE,CAAI,EACR,CAAE,IAAKF,EAAG,UAAU,EAAG,MAAAD,CAAM,CACtC,IAEA,YAAS,iCAAkC,IAAM,IAC/C,MAAG,4FAA6F,SAAY,CAE1G,MAAMA,EAAQ,UAAQ,SAAS,EACzBM,EAAa,CACjB,UAAQ,SAAS,EACjB,UAAQ,SAAS,EACjB,UAAQ,SAAS,CACnB,EACMC,EAAW,KAEXV,EAAeS,EAAW,IAAKE,GACnC,gBAAc,SAAS,CACrB,WAAYR,EAAM,UAClB,SAAUQ,EAAE,UACZ,SAAAD,CACF,CAAC,CACH,EAEM,CAAE,IAAAE,CAAI,EAAIb,EAAgBC,EAAc,CAACG,CAAK,EAAGA,CAAK,EAGtDU,EAAM,MAAM,iCAA+B,iBAAiBD,CAAG,KAIrE,UAAOC,EAAI,oBAAoB,EAAE,aAAab,EAAa,MAAM,EAEjE,QAASc,EAAI,EAAGA,EAAId,EAAa,OAAQc,IAAK,CAC5C,MAAMC,EAAWF,EAAI,qBAAqBC,CAAC,EACrCE,EAAYH,EAAI,QAAQE,EAAS,cAAc,KAErD,UAAOC,EAAU,OAAO,gBAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAG3D,MAAMC,EAAWF,EAAS,kBAAkB,IACzCG,GAAQL,EAAI,QAAQK,CAAG,CAC1B,KACA,UAAQD,EAAS,CAAC,EAAgB,OAAOd,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,KACpE,UAAQc,EAAS,CAAC,EAAgB,OAAOR,EAAWK,CAAC,EAAG,SAAS,CAAC,EAAE,KAClE,EACF,KAGA,UAAOC,EAAS,gBAAgB,UAAU,EAAE,KAAK,EAAI,KACrD,UAAOA,EAAS,KAAK,MAAM,EAAE,gBAAgB,CAAC,CAChD,CACF,CAAC,KAED,MAAG,mEAAoE,SAAY,CAEjF,MAAMZ,EAAQ,UAAQ,SAAS,EACzBgB,EAAY,UAAQ,SAAS,EAC7BC,EAAc,gBAAc,SAAS,CACzC,WAAYjB,EAAM,UAClB,SAAUgB,EAAU,UACpB,SAAU,GACZ,CAAC,EACK,CAAE,IAAAP,CAAI,EAAIb,EAAgB,CAACqB,CAAW,EAAG,CAACjB,CAAK,EAAGA,CAAK,EAKvDU,EAAM,MADV,iCAC2B,iBAAiBD,CAAG,KAGjD,UAAOC,EAAI,oBAAoB,EAAE,aAAa,CAAC,EAC/C,MAAME,EAAWF,EAAI,qBAAqB,CAAC,EACrCG,EAAYH,EAAI,QAAQE,EAAS,cAAc,KACrD,UAAOC,EAAU,OAAO,gBAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAE3D,MAAMC,EAAWF,EAAS,kBAAkB,IAAKD,GAAMD,EAAI,QAAQC,CAAC,CAAE,KACtE,UAAQG,EAAS,CAAC,EAAgB,OAAOd,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,KACpE,UAAQc,EAAS,CAAC,EAAgB,OAAOE,EAAU,SAAS,CAAC,EAAE,KAAK,EAAI,CAC1E,CAAC,KAED,MAAG,8DAA+D,SAAY,CAE5E,MAAMhB,EAAQ,UAAQ,SAAS,EACzBgB,EAAY,UAAQ,SAAS,EAG7BC,EAAc,gBAAc,SAAS,CACzC,WAAYjB,EAAM,UAClB,SAAUgB,EAAU,UACpB,SALe,CAMjB,CAAC,EAEK,CAAE,IAAAP,CAAI,EAAIb,EAAgB,CAACqB,CAAW,EAAG,CAACjB,CAAK,EAAGA,CAAK,EAGvDU,EAAM,MAAM,iCAA+B,iBAAiBD,CAAG,KAGrE,UAAO,MAAM,QAAQC,EAAI,OAAO,CAAC,EAAE,KAAK,EAAI,KAC5C,UAAOA,EAAI,QAAQ,MAAM,EAAE,uBAAuB,CAAC,EAEnD,MAAME,EAAWF,EAAI,qBAAqB,CAAC,EACrCQ,EAAcR,EAAI,QAAQE,EAAS,cAAc,KACvD,UAAOM,EAAY,OAAO,gBAAc,SAAS,CAAC,EAAE,KAAK,EAAI,EAE7D,KAAM,CAACC,EAAQC,CAAI,EAAIR,EAAS,kBAAkB,IAC/CD,GAAMD,EAAI,QAAQC,CAAC,CACtB,KACA,UAAQQ,EAAqB,OAAOnB,EAAM,SAAS,CAAC,EAAE,KAAK,EAAI,KAC/D,UAAQoB,EAAmB,OAAOJ,EAAU,SAAS,CAAC,EAAE,KAAK,EAAI,CACnE,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_web3", "import_bs58", "import_vitest", "import_DefaultSolanaMessageNormaliser", "DUMMY_BLOCKHASH", "bs58", "makeSignedRawTx", "instructions", "signers", "feePayer", "payer", "tx", "seen", "uniq", "kp", "k", "recipients", "lamports", "r", "raw", "msg", "i", "compiled", "programId", "accounts", "idx", "recipient", "instruction", "resolvedPid", "fromPk", "toPk"]
|
|
7
|
+
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var s=Object.defineProperty;var c=Object.getOwnPropertyDescriptor;var u=Object.getOwnPropertyNames;var p=Object.prototype.hasOwnProperty;var C=(o,t)=>{for(var e in t)s(o,e,{get:t[e],enumerable:!0})},m=(o,t,e,r)=>{if(t&&typeof t=="object"||typeof t=="function")for(let a of u(t))!p.call(o,a)&&a!==e&&s(o,a,{get:()=>t[a],enumerable:!(r=c(t,a))||r.enumerable});return o};var x=o=>m(s({},"__esModule",{value:!0}),o);var f={};C(f,{BuildTransactionContextTask:()=>R});module.exports=x(f);var l=require("@ledgerhq/device-management-kit"),d=require("../../app-binder/command/GetChallengeCommand");class R{constructor(t,e){this.api=t;this.args=e}async run(){const{contextModule:t,options:e}=this.args,r=this.api.getDeviceSessionState();let a;const i=await this.api.sendCommand(new d.GetChallengeCommand);return(0,l.isSuccessCommandResult)(i)&&(a=i.data.challenge),(await t.getSolanaContext({deviceModelId:r.deviceModelId,tokenAddress:e.tokenAddress,challenge:a,createATA:e.createATA,tokenInternalId:e.tokenInternalId,templateId:e.templateId})).caseOf({Left:n=>{throw n},Right:n=>({tlvDescriptor:n.tlvDescriptor,trustedNamePKICertificate:n.trustedNamePKICertificate,loadersResults:n.loadersResults})})}}0&&(module.exports={BuildTransactionContextTask});
|
|
2
2
|
//# sourceMappingURL=BuildTransactionContextTask.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.ts"],
|
|
4
|
-
"sourcesContent": ["import {\n type ContextModule,\n type PkiCertificate,\n} from \"@ledgerhq/context-module\";\nimport {\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type TransactionResolutionContext } from \"@api/model/TransactionResolutionContext\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type SolanaBuildContextResult = {\n
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,
|
|
4
|
+
"sourcesContent": ["import {\n type ContextModule,\n type PkiCertificate,\n type SolanaContextLoaderResults,\n} from \"@ledgerhq/context-module\";\nimport {\n type InternalApi,\n isSuccessCommandResult,\n} from \"@ledgerhq/device-management-kit\";\n\nimport { type TransactionResolutionContext } from \"@api/model/TransactionResolutionContext\";\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nexport type SolanaBuildContextResult = {\n trustedNamePKICertificate: PkiCertificate;\n tlvDescriptor: Uint8Array;\n loadersResults: SolanaContextLoaderResults;\n};\n\nexport type BuildTransactionContextTaskArgs = {\n readonly contextModule: ContextModule;\n readonly options: TransactionResolutionContext;\n};\n\nexport class BuildTransactionContextTask {\n constructor(\n private readonly api: InternalApi,\n private readonly args: BuildTransactionContextTaskArgs,\n ) {}\n\n async run(): Promise<SolanaBuildContextResult> {\n const { contextModule, options } = this.args;\n const deviceState = this.api.getDeviceSessionState();\n\n // get challenge\n let challenge: string | undefined;\n const challengeRes = await this.api.sendCommand(new GetChallengeCommand());\n if (isSuccessCommandResult(challengeRes)) {\n challenge = challengeRes.data.challenge;\n }\n\n // get Solana context\n const contextResult = await contextModule.getSolanaContext({\n deviceModelId: deviceState.deviceModelId,\n tokenAddress: options.tokenAddress,\n challenge,\n createATA: options.createATA,\n tokenInternalId: options.tokenInternalId,\n templateId: options.templateId,\n });\n\n return contextResult.caseOf({\n Left: (err) => {\n throw err;\n },\n Right: (ctx) => {\n return {\n tlvDescriptor: ctx.tlvDescriptor,\n trustedNamePKICertificate: ctx.trustedNamePKICertificate,\n loadersResults: ctx.loadersResults,\n };\n },\n });\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,iCAAAE,IAAA,eAAAC,EAAAH,GAKA,IAAAI,EAGO,2CAGPC,EAAoC,4DAa7B,MAAMH,CAA4B,CACvC,YACmBI,EACAC,EACjB,CAFiB,SAAAD,EACA,UAAAC,CAChB,CAEH,MAAM,KAAyC,CAC7C,KAAM,CAAE,cAAAC,EAAe,QAAAC,CAAQ,EAAI,KAAK,KAClCC,EAAc,KAAK,IAAI,sBAAsB,EAGnD,IAAIC,EACJ,MAAMC,EAAe,MAAM,KAAK,IAAI,YAAY,IAAI,qBAAqB,EACzE,SAAI,0BAAuBA,CAAY,IACrCD,EAAYC,EAAa,KAAK,YAIV,MAAMJ,EAAc,iBAAiB,CACzD,cAAeE,EAAY,cAC3B,aAAcD,EAAQ,aACtB,UAAAE,EACA,UAAWF,EAAQ,UACnB,gBAAiBA,EAAQ,gBACzB,WAAYA,EAAQ,UACtB,CAAC,GAEoB,OAAO,CAC1B,KAAOI,GAAQ,CACb,MAAMA,CACR,EACA,MAAQC,IACC,CACL,cAAeA,EAAI,cACnB,0BAA2BA,EAAI,0BAC/B,eAAgBA,EAAI,cACtB,EAEJ,CAAC,CACH,CACF",
|
|
6
6
|
"names": ["BuildTransactionContextTask_exports", "__export", "BuildTransactionContextTask", "__toCommonJS", "import_device_management_kit", "import_GetChallengeCommand", "api", "args", "contextModule", "options", "deviceState", "challenge", "challengeRes", "err", "ctx"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var t=require("@ledgerhq/device-management-kit"),l=require("purify-ts"),e=require("vitest"),i=require("../../app-binder/command/GetChallengeCommand"),r=require("./BuildTransactionContextTask");const o={getSolanaContext:e.vi.fn()},c={contextModule:o,options:{tokenAddress:"someAddress",createATA:void 0}},a={tlvDescriptor:new Uint8Array([1,2,3]),trustedNamePKICertificate:{payload:new Uint8Array([170,187]),keyUsageNumber:1},loadersResults:[]};let n;(0,e.describe)("BuildTransactionContextTask",()=>{(0,e.beforeEach)(()=>{e.vi.resetAllMocks(),n={getDeviceSessionState:e.vi.fn().mockReturnValue({deviceModelId:t.DeviceModelId.NANO_X}),sendCommand:e.vi.fn().mockResolvedValue({status:t.CommandResultStatus.Success,data:{challenge:"someChallenge"}})}}),(0,e.it)("returns context successfully when challenge command succeeds",async()=>{o.getSolanaContext.mockResolvedValue((0,l.Right)(a));const s=await new r.BuildTransactionContextTask(n,c).run();(0,e.expect)(n.sendCommand).toHaveBeenCalledWith(e.expect.any(i.GetChallengeCommand)),(0,e.expect)(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:t.DeviceModelId.NANO_X,tokenAddress:"someAddress",challenge:"someChallenge",createATA:void 0}),(0,e.expect)(s).toEqual({tlvDescriptor:a.tlvDescriptor,trustedNamePKICertificate:a.trustedNamePKICertificate,loadersResults:[]})}),(0,e.it)("returns context when challenge command fails (challenge undefined)",async()=>{n.sendCommand.mockResolvedValue({status:t.CommandResultStatus.Error,data:{}}),o.getSolanaContext.mockResolvedValue((0,l.Right)(a));const s=await new r.BuildTransactionContextTask(n,c).run();(0,e.expect)(o.getSolanaContext).toHaveBeenCalledWith({deviceModelId:t.DeviceModelId.NANO_X,tokenAddress:"someAddress",challenge:void 0,createATA:void 0}),(0,e.expect)(s).toEqual({tlvDescriptor:a.tlvDescriptor,trustedNamePKICertificate:a.trustedNamePKICertificate,loadersResults:[]})}),(0,e.it)("throws if getSolanaContext returns Left",async()=>{const d=new Error("Solana context failure");o.getSolanaContext.mockResolvedValue((0,l.Left)(d));const s=new r.BuildTransactionContextTask(n,c);await(0,e.expect)(s.run()).rejects.toThrow("Solana context failure")})});
|
|
2
2
|
//# sourceMappingURL=BuildTransactionContextTask.test.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/BuildTransactionContextTask.test.ts"],
|
|
4
|
-
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst
|
|
5
|
-
"mappings": "aAIA,IAAAA,EAIO,2CACPC,EAA4B,qBAC5BC,EAAqD,kBAErDC,EAAoC,4DAEpCC,EAGO,yCAEP,MAAMC,EAAmC,CACvC,iBAAkB,KAAG,GAAG,CAC1B,EAEMC,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,
|
|
6
|
-
"names": ["import_device_management_kit", "import_purify_ts", "import_vitest", "import_GetChallengeCommand", "import_BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "
|
|
4
|
+
"sourcesContent": ["/* eslint-disable @typescript-eslint/no-unsafe-call */\n/* eslint-disable @typescript-eslint/no-unsafe-member-access */\n/* eslint-disable @typescript-eslint/no-explicit-any */\nimport { type ContextModule } from \"@ledgerhq/context-module\";\nimport {\n CommandResultStatus,\n DeviceModelId,\n type InternalApi,\n} from \"@ledgerhq/device-management-kit\";\nimport { Left, Right } from \"purify-ts\";\nimport { beforeEach, describe, expect, it, vi } from \"vitest\";\n\nimport { GetChallengeCommand } from \"@internal/app-binder/command/GetChallengeCommand\";\n\nimport {\n BuildTransactionContextTask,\n type SolanaBuildContextResult,\n} from \"./BuildTransactionContextTask\";\n\nconst contextModuleMock: ContextModule = {\n getSolanaContext: vi.fn(),\n} as unknown as ContextModule;\n\nconst defaultArgs = {\n contextModule: contextModuleMock,\n options: {\n tokenAddress: \"someAddress\",\n createATA: undefined,\n },\n};\n\nconst solanaContextRightPayload = {\n tlvDescriptor: new Uint8Array([1, 2, 3]),\n trustedNamePKICertificate: {\n payload: new Uint8Array([0xaa, 0xbb]),\n keyUsageNumber: 1,\n },\n loadersResults: [], // required by the task's return type\n} as const;\n\nlet apiMock: InternalApi;\n\ndescribe(\"BuildTransactionContextTask\", () => {\n beforeEach(() => {\n vi.resetAllMocks();\n\n apiMock = {\n getDeviceSessionState: vi\n .fn()\n .mockReturnValue({ deviceModelId: DeviceModelId.NANO_X }),\n sendCommand: vi.fn().mockResolvedValue({\n status: CommandResultStatus.Success,\n data: { challenge: \"someChallenge\" },\n }),\n } as unknown as InternalApi;\n });\n\n it(\"returns context successfully when challenge command succeeds\", async () => {\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // challenge is fetched\n expect(apiMock.sendCommand).toHaveBeenCalledWith(\n expect.any(GetChallengeCommand),\n );\n\n // getSolanaContext called with challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: \"someChallenge\",\n createATA: undefined,\n });\n\n // matches SolanaBuildContextResult shape\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"returns context when challenge command fails (challenge undefined)\", async () => {\n (apiMock.sendCommand as any).mockResolvedValue({\n status: CommandResultStatus.Error,\n data: {},\n });\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(\n Right(solanaContextRightPayload),\n );\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n const result = await task.run();\n\n // getSolanaContext called without challenge\n expect(contextModuleMock.getSolanaContext).toHaveBeenCalledWith({\n deviceModelId: DeviceModelId.NANO_X,\n tokenAddress: \"someAddress\",\n challenge: undefined,\n createATA: undefined,\n });\n\n expect(result).toEqual<SolanaBuildContextResult>({\n tlvDescriptor: solanaContextRightPayload.tlvDescriptor,\n trustedNamePKICertificate:\n solanaContextRightPayload.trustedNamePKICertificate,\n loadersResults: [],\n });\n });\n\n it(\"throws if getSolanaContext returns Left\", async () => {\n const error = new Error(\"Solana context failure\");\n (contextModuleMock.getSolanaContext as any).mockResolvedValue(Left(error));\n\n const task = new BuildTransactionContextTask(apiMock, defaultArgs);\n\n await expect(task.run()).rejects.toThrow(\"Solana context failure\");\n });\n});\n"],
|
|
5
|
+
"mappings": "aAIA,IAAAA,EAIO,2CACPC,EAA4B,qBAC5BC,EAAqD,kBAErDC,EAAoC,4DAEpCC,EAGO,yCAEP,MAAMC,EAAmC,CACvC,iBAAkB,KAAG,GAAG,CAC1B,EAEMC,EAAc,CAClB,cAAeD,EACf,QAAS,CACP,aAAc,cACd,UAAW,MACb,CACF,EAEME,EAA4B,CAChC,cAAe,IAAI,WAAW,CAAC,EAAG,EAAG,CAAC,CAAC,EACvC,0BAA2B,CACzB,QAAS,IAAI,WAAW,CAAC,IAAM,GAAI,CAAC,EACpC,eAAgB,CAClB,EACA,eAAgB,CAAC,CACnB,EAEA,IAAIC,KAEJ,YAAS,8BAA+B,IAAM,IAC5C,cAAW,IAAM,CACf,KAAG,cAAc,EAEjBA,EAAU,CACR,sBAAuB,KACpB,GAAG,EACH,gBAAgB,CAAE,cAAe,gBAAc,MAAO,CAAC,EAC1D,YAAa,KAAG,GAAG,EAAE,kBAAkB,CACrC,OAAQ,sBAAoB,QAC5B,KAAM,CAAE,UAAW,eAAgB,CACrC,CAAC,CACH,CACF,CAAC,KAED,MAAG,+DAAgE,SAAY,CAC5EH,EAAkB,iBAAyB,qBAC1C,SAAME,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAI,8BAA4BD,EAASF,CAAW,EACvC,IAAI,KAG9B,UAAOE,EAAQ,WAAW,EAAE,qBAC1B,SAAO,IAAI,qBAAmB,CAChC,KAGA,UAAOH,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAe,gBAAc,OAC7B,aAAc,cACd,UAAW,gBACX,UAAW,MACb,CAAC,KAGD,UAAOI,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,KAED,MAAG,qEAAsE,SAAY,CAClFC,EAAQ,YAAoB,kBAAkB,CAC7C,OAAQ,sBAAoB,MAC5B,KAAM,CAAC,CACT,CAAC,EACAH,EAAkB,iBAAyB,qBAC1C,SAAME,CAAyB,CACjC,EAGA,MAAME,EAAS,MADF,IAAI,8BAA4BD,EAASF,CAAW,EACvC,IAAI,KAG9B,UAAOD,EAAkB,gBAAgB,EAAE,qBAAqB,CAC9D,cAAe,gBAAc,OAC7B,aAAc,cACd,UAAW,OACX,UAAW,MACb,CAAC,KAED,UAAOI,CAAM,EAAE,QAAkC,CAC/C,cAAeF,EAA0B,cACzC,0BACEA,EAA0B,0BAC5B,eAAgB,CAAC,CACnB,CAAC,CACH,CAAC,KAED,MAAG,0CAA2C,SAAY,CACxD,MAAMG,EAAQ,IAAI,MAAM,wBAAwB,EAC/CL,EAAkB,iBAAyB,qBAAkB,QAAKK,CAAK,CAAC,EAEzE,MAAMC,EAAO,IAAI,8BAA4BH,EAASF,CAAW,EAEjE,QAAM,UAAOK,EAAK,IAAI,CAAC,EAAE,QAAQ,QAAQ,wBAAwB,CACnE,CAAC,CACH,CAAC",
|
|
6
|
+
"names": ["import_device_management_kit", "import_purify_ts", "import_vitest", "import_GetChallengeCommand", "import_BuildTransactionContextTask", "contextModuleMock", "defaultArgs", "solanaContextRightPayload", "apiMock", "result", "error", "task"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var
|
|
1
|
+
"use strict";var m=Object.defineProperty;var x=Object.getOwnPropertyDescriptor;var k=Object.getOwnPropertyNames;var w=Object.prototype.hasOwnProperty;var T=(r,e)=>{for(var t in e)m(r,t,{get:e[t],enumerable:!0})},v=(r,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let o of k(e))!w.call(r,o)&&o!==t&&m(r,o,{get:()=>e[o],enumerable:!(a=x(e,o))||a.enumerable});return r};var M=r=>v(m({},"__esModule",{value:!0}),r);var I={};T(I,{ProvideSolanaTransactionContextTask:()=>A,SWAP_MODE:()=>g});module.exports=M(I);var i=require("@ledgerhq/context-module"),n=require("@ledgerhq/device-management-kit"),f=require("purify-ts"),l=require("../../app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand"),y=require("../../app-binder/command/ProvideTLVDescriptorCommand"),S=require("../../app-binder/services/utils/DefaultSolanaMessageNormaliser");const g="test";class A{constructor(e,t,a=S.DefaultSolanaMessageNormaliser){this.api=e;this.context=t;this.normaliser=a}async run(){const{tlvDescriptor:e,trustedNamePKICertificate:t,loadersResults:a,transactionBytes:o}=this.context;await this.api.sendCommand(new n.LoadCertificateCommand({certificate:t.payload,keyUsage:t.keyUsageNumber})),await this.api.sendCommand(new y.ProvideTLVDescriptorCommand({payload:e}));for(const d of a)switch(d.type){case i.SolanaContextTypes.SOLANA_TOKEN:{const s=a.find(c=>c.type===i.SolanaContextTypes.SOLANA_TOKEN);s&&await this.provideTokenMetadataContext(s);break}case i.SolanaContextTypes.SOLANA_LIFI:{const s=a.find(c=>c.type===i.SolanaContextTypes.SOLANA_LIFI);s&&await this.provideSwapContext(s,o);break}case i.SolanaContextTypes.ERROR:break;default:break}return f.Nothing}async provideTokenMetadataContext(e){const{payload:t,certificate:a}=e;if(t&&a){const o=await this.api.sendCommand(new n.LoadCertificateCommand({certificate:a.payload,keyUsage:a.keyUsageNumber}));if(!(0,n.isSuccessCommandResult)(o))throw new Error("[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required");await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"descriptor",dataHex:t.solanaTokenDescriptor.data,signatureHex:t.solanaTokenDescriptor.signature,isFirstMessage:!0,swapSignatureTag:!1}))}}async provideSwapContext(e,t){const a=e.payload;if(a){const o=await this.normaliser.normaliseMessage(t);for(const[d,s]of o.compiledInstructions.entries()){const u=o.allKeys[s.programIdIndex]?.toBase58(),p=u?a[u]:void 0,C=p&&p.signatures[g];p&&C?await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"descriptor",dataHex:p.data,signatureHex:C,isFirstMessage:d===0,swapSignatureTag:!0})):await this.api.sendCommand(new l.ProvideTLVTransactionInstructionDescriptorCommand({kind:"empty",isFirstMessage:d===0,swapSignatureTag:!0}))}}}}0&&(module.exports={ProvideSolanaTransactionContextTask,SWAP_MODE});
|
|
2
2
|
//# sourceMappingURL=ProvideTransactionContextTask.js.map
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"version": 3,
|
|
3
3
|
"sources": ["../../../../../src/internal/app-binder/task/ProvideTransactionContextTask.ts"],
|
|
4
|
-
"sourcesContent": ["import { type
|
|
5
|
-
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,yCAAAE,IAAA,eAAAC,
|
|
6
|
-
"names": ["ProvideTransactionContextTask_exports", "__export", "ProvideSolanaTransactionContextTask", "__toCommonJS", "import_device_management_kit", "import_purify_ts", "import_ProvideTLVDescriptorCommand", "
|
|
4
|
+
"sourcesContent": ["import {\n SolanaContextTypes,\n type SolanaLifiContextSuccess,\n type SolanaTokenContextSuccess,\n} from \"@ledgerhq/context-module\";\nimport {\n type CommandErrorResult,\n type InternalApi,\n isSuccessCommandResult,\n LoadCertificateCommand,\n} from \"@ledgerhq/device-management-kit\";\nimport { type Maybe, Nothing } from \"purify-ts\";\n\nimport { ProvideTLVTransactionInstructionDescriptorCommand } from \"@internal/app-binder//command/ProvideTLVTransactionInstructionDescriptorCommand\";\nimport { ProvideTLVDescriptorCommand } from \"@internal/app-binder/command/ProvideTLVDescriptorCommand\";\nimport { type SolanaAppErrorCodes } from \"@internal/app-binder/command/utils/SolanaApplicationErrors\";\nimport {\n DefaultSolanaMessageNormaliser,\n type SolanaMessageNormaliserConstructor,\n} from \"@internal/app-binder/services/utils/DefaultSolanaMessageNormaliser\";\n\nimport { type SolanaBuildContextResult } from \"./BuildTransactionContextTask\";\n\nexport const SWAP_MODE = \"test\";\n\nexport type ProvideSolanaTransactionContextTaskContext =\n SolanaBuildContextResult & {\n transactionBytes: Uint8Array;\n };\n\nexport class ProvideSolanaTransactionContextTask {\n constructor(\n private readonly api: InternalApi,\n private readonly context: ProvideSolanaTransactionContextTaskContext,\n private readonly normaliser: SolanaMessageNormaliserConstructor = DefaultSolanaMessageNormaliser,\n ) {}\n\n async run(): Promise<Maybe<CommandErrorResult<SolanaAppErrorCodes>>> {\n const {\n tlvDescriptor,\n trustedNamePKICertificate,\n loadersResults,\n transactionBytes,\n } = this.context;\n\n // --------------------------------------------------------------------\n // providing default solana context\n\n // send PKI certificate + signature\n await this.api.sendCommand(\n new LoadCertificateCommand({\n certificate: trustedNamePKICertificate.payload,\n keyUsage: trustedNamePKICertificate.keyUsageNumber,\n }),\n );\n\n // send signed descriptor\n await this.api.sendCommand(\n new ProvideTLVDescriptorCommand({ payload: tlvDescriptor }),\n );\n\n // --------------------------------------------------------------------\n // providing optional solana context via context module loaders results\n\n for (const loaderResult of loadersResults) {\n switch (loaderResult.type) {\n // always resolve SOLANA_TOKEN first\n case SolanaContextTypes.SOLANA_TOKEN: {\n const tokenMetadataResult = loadersResults.find(\n (res) => res.type === SolanaContextTypes.SOLANA_TOKEN,\n );\n if (tokenMetadataResult) {\n await this.provideTokenMetadataContext(tokenMetadataResult);\n }\n break;\n }\n\n case SolanaContextTypes.SOLANA_LIFI: {\n const lifiDescriptorListResult = loadersResults.find(\n (res) => res.type === SolanaContextTypes.SOLANA_LIFI,\n );\n if (lifiDescriptorListResult) {\n await this.provideSwapContext(\n lifiDescriptorListResult,\n transactionBytes,\n );\n }\n break;\n }\n\n case SolanaContextTypes.ERROR: {\n break;\n }\n\n default: {\n break;\n }\n }\n }\n\n return Nothing;\n }\n\n private async provideTokenMetadataContext(\n tokenMetadataResult: SolanaTokenContextSuccess,\n ): Promise<void> {\n const {\n payload: tokenMetadataPayload,\n certificate: tokenMetadataCertificate,\n } = tokenMetadataResult;\n\n if (tokenMetadataPayload && tokenMetadataCertificate) {\n // send token metadata certificate\n const tokenMetadataCertificateToDeviceResult = await this.api.sendCommand(\n new LoadCertificateCommand({\n certificate: tokenMetadataCertificate.payload,\n keyUsage: tokenMetadataCertificate.keyUsageNumber,\n }),\n );\n if (!isSuccessCommandResult(tokenMetadataCertificateToDeviceResult)) {\n // IMPORTANT, TO BE MAPPED TO LatestFirmwareVersionRequired(\"LatestFirmwareVersionRequired\") ERROR\n throw new Error(\n \"[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required\",\n );\n }\n\n // send token metadata signed descriptor\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"descriptor\",\n dataHex: tokenMetadataPayload.solanaTokenDescriptor.data,\n signatureHex: tokenMetadataPayload.solanaTokenDescriptor.signature,\n // token metadata is a single chunk, so this is always the first message\n isFirstMessage: true,\n swapSignatureTag: false,\n }),\n );\n }\n }\n\n private async provideSwapContext(\n lifiDescriptorListResult: SolanaLifiContextSuccess,\n transactionBytes: Uint8Array,\n ): Promise<void> {\n const lifiDescriptors = lifiDescriptorListResult.payload;\n\n if (lifiDescriptors) {\n const message = await this.normaliser.normaliseMessage(transactionBytes);\n\n for (const [\n index,\n instruction,\n ] of message.compiledInstructions.entries()) {\n const programId = message.allKeys[instruction.programIdIndex];\n const programIdStr = programId?.toBase58();\n const descriptor = programIdStr\n ? lifiDescriptors[programIdStr]\n : undefined;\n\n const sigHex = descriptor && descriptor.signatures[SWAP_MODE];\n\n if (descriptor && sigHex) {\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"descriptor\",\n dataHex: descriptor.data,\n signatureHex: sigHex,\n isFirstMessage: index === 0,\n swapSignatureTag: true,\n }),\n );\n } else {\n await this.api.sendCommand(\n new ProvideTLVTransactionInstructionDescriptorCommand({\n kind: \"empty\",\n isFirstMessage: index === 0,\n swapSignatureTag: true,\n }),\n );\n }\n }\n }\n }\n}\n"],
|
|
5
|
+
"mappings": "yaAAA,IAAAA,EAAA,GAAAC,EAAAD,EAAA,yCAAAE,EAAA,cAAAC,IAAA,eAAAC,EAAAJ,GAAA,IAAAK,EAIO,oCACPC,EAKO,2CACPC,EAAoC,qBAEpCC,EAAkE,2FAClEC,EAA4C,oEAE5CC,EAGO,8EAIA,MAAMP,EAAY,OAOlB,MAAMD,CAAoC,CAC/C,YACmBS,EACAC,EACAC,EAAiD,iCAClE,CAHiB,SAAAF,EACA,aAAAC,EACA,gBAAAC,CAChB,CAEH,MAAM,KAA+D,CACnE,KAAM,CACJ,cAAAC,EACA,0BAAAC,EACA,eAAAC,EACA,iBAAAC,CACF,EAAI,KAAK,QAMT,MAAM,KAAK,IAAI,YACb,IAAI,yBAAuB,CACzB,YAAaF,EAA0B,QACvC,SAAUA,EAA0B,cACtC,CAAC,CACH,EAGA,MAAM,KAAK,IAAI,YACb,IAAI,8BAA4B,CAAE,QAASD,CAAc,CAAC,CAC5D,EAKA,UAAWI,KAAgBF,EACzB,OAAQE,EAAa,KAAM,CAEzB,KAAK,qBAAmB,aAAc,CACpC,MAAMC,EAAsBH,EAAe,KACxCI,GAAQA,EAAI,OAAS,qBAAmB,YAC3C,EACID,GACF,MAAM,KAAK,4BAA4BA,CAAmB,EAE5D,KACF,CAEA,KAAK,qBAAmB,YAAa,CACnC,MAAME,EAA2BL,EAAe,KAC7CI,GAAQA,EAAI,OAAS,qBAAmB,WAC3C,EACIC,GACF,MAAM,KAAK,mBACTA,EACAJ,CACF,EAEF,KACF,CAEA,KAAK,qBAAmB,MACtB,MAGF,QACE,KAEJ,CAGF,OAAO,SACT,CAEA,MAAc,4BACZE,EACe,CACf,KAAM,CACJ,QAASG,EACT,YAAaC,CACf,EAAIJ,EAEJ,GAAIG,GAAwBC,EAA0B,CAEpD,MAAMC,EAAyC,MAAM,KAAK,IAAI,YAC5D,IAAI,yBAAuB,CACzB,YAAaD,EAAyB,QACtC,SAAUA,EAAyB,cACrC,CAAC,CACH,EACA,GAAI,IAAC,0BAAuBC,CAAsC,EAEhE,MAAM,IAAI,MACR,yIACF,EAIF,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,aACN,QAASF,EAAqB,sBAAsB,KACpD,aAAcA,EAAqB,sBAAsB,UAEzD,eAAgB,GAChB,iBAAkB,EACpB,CAAC,CACH,CACF,CACF,CAEA,MAAc,mBACZD,EACAJ,EACe,CACf,MAAMQ,EAAkBJ,EAAyB,QAEjD,GAAII,EAAiB,CACnB,MAAMC,EAAU,MAAM,KAAK,WAAW,iBAAiBT,CAAgB,EAEvE,SAAW,CACTU,EACAC,CACF,IAAKF,EAAQ,qBAAqB,QAAQ,EAAG,CAE3C,MAAMG,EADYH,EAAQ,QAAQE,EAAY,cAAc,GAC5B,SAAS,EACnCE,EAAaD,EACfJ,EAAgBI,CAAY,EAC5B,OAEEE,EAASD,GAAcA,EAAW,WAAW3B,CAAS,EAExD2B,GAAcC,EAChB,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,aACN,QAASD,EAAW,KACpB,aAAcC,EACd,eAAgBJ,IAAU,EAC1B,iBAAkB,EACpB,CAAC,CACH,EAEA,MAAM,KAAK,IAAI,YACb,IAAI,oDAAkD,CACpD,KAAM,QACN,eAAgBA,IAAU,EAC1B,iBAAkB,EACpB,CAAC,CACH,CAEJ,CACF,CACF,CACF",
|
|
6
|
+
"names": ["ProvideTransactionContextTask_exports", "__export", "ProvideSolanaTransactionContextTask", "SWAP_MODE", "__toCommonJS", "import_context_module", "import_device_management_kit", "import_purify_ts", "import_ProvideTLVTransactionInstructionDescriptorCommand", "import_ProvideTLVDescriptorCommand", "import_DefaultSolanaMessageNormaliser", "api", "context", "normaliser", "tlvDescriptor", "trustedNamePKICertificate", "loadersResults", "transactionBytes", "loaderResult", "tokenMetadataResult", "res", "lifiDescriptorListResult", "tokenMetadataPayload", "tokenMetadataCertificate", "tokenMetadataCertificateToDeviceResult", "lifiDescriptors", "message", "index", "instruction", "programIdStr", "descriptor", "sigHex"]
|
|
7
7
|
}
|
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
"use strict";var t=require("@ledgerhq/device-management-kit"),r=require("purify-ts"),e=require("vitest"),k=require("../../app-binder/command/ProvideTLVDescriptorCommand"),p=require("../../app-binder/command/ProvideTrustedNamePKICommand"),m=require("./ProvideTransactionContextTask");(0,e.describe)("ProvideSolanaTransactionContextTask",()=>{let o,s;const d=Uint8Array.from([170,170,170]),l={payload:Uint8Array.from([222,173,190,239,222,173,190,239])},i={_tag:"SomeError",errorCode:0,message:"SomeError"};(0,e.beforeEach)(()=>{e.vi.resetAllMocks(),o={sendCommand:e.vi.fn()},s={descriptor:d,certificate:l}}),(0,e.it)("returns Nothing when both commands succeed",async()=>{const a=(0,t.CommandResultFactory)({data:r.Maybe.of(null)});o.sendCommand.mockResolvedValue(a);const c=await new m.ProvideSolanaTransactionContextTask(o,s).run();(0,e.expect)(o.sendCommand).toHaveBeenCalledTimes(2);const u=o.sendCommand.mock.calls[0];(0,e.expect)(u).toBeDefined();const C=u[0];(0,e.expect)(C).toBeInstanceOf(p.ProvideTrustedNamePKICommand),(0,e.expect)(C.args.pkiBlob).toStrictEqual(l.payload);const f=o.sendCommand.mock.calls[1][0];(0,e.expect)(f).toBeInstanceOf(k.ProvideTLVDescriptorCommand),(0,e.expect)(f.args.payload).toStrictEqual(d),(0,e.expect)(c).toStrictEqual(r.Nothing)}),(0,e.it)("throws error if PKI command fails",async()=>{const a=(0,t.CommandResultFactory)({error:i});o.sendCommand.mockResolvedValueOnce(a);const n=new m.ProvideSolanaTransactionContextTask(o,s);await(0,e.expect)(n.run()).rejects.toBe(a),(0,e.expect)(o.sendCommand).toHaveBeenCalledTimes(1)}),(0,e.it)("throws error if TLV command fails",async()=>{const a=(0,t.CommandResultFactory)({data:r.Maybe.of(null)}),n=(0,t.CommandResultFactory)({error:i});o.sendCommand.mockResolvedValueOnce(a).mockResolvedValueOnce(n);const c=new m.ProvideSolanaTransactionContextTask(o,s);await(0,e.expect)(c.run()).rejects.toBe(n),(0,e.expect)(o.sendCommand).toHaveBeenCalledTimes(2)})});
|
|
1
|
+
"use strict";var G=Object.create;var U=Object.defineProperty;var j=Object.getOwnPropertyDescriptor;var W=Object.getOwnPropertyNames;var Y=Object.getPrototypeOf,X=Object.prototype.hasOwnProperty;var z=(a,s,l,m)=>{if(s&&typeof s=="object"||typeof s=="function")for(let u of W(s))!X.call(a,u)&&u!==l&&U(a,u,{get:()=>s[u],enumerable:!(m=j(s,u))||m.enumerable});return a};var J=(a,s,l)=>(l=a!=null?G(Y(a)):{},z(s||!a||!a.__esModule?U(l,"default",{value:a,enumerable:!0}):l,a));var k=require("@ledgerhq/context-module"),v=require("@ledgerhq/device-management-kit"),f=require("@solana/spl-token"),n=require("@solana/web3.js"),h=J(require("bs58")),H=require("buffer"),I=require("purify-ts"),e=require("vitest"),M=require("../../app-binder/command/ProvideTLVDescriptorCommand"),O=require("../../app-binder/command/ProvideTLVTransactionInstructionDescriptorCommand"),E=require("../../app-binder/services/utils/DefaultSolanaMessageNormaliser"),d=require("./ProvideTransactionContextTask");const q=h.default.encode(new Uint8Array(32).fill(170));function Q(a,s,l){const m=l??s[0]??n.Keypair.generate(),u=new n.Transaction;u.recentBlockhash=q,u.feePayer=m.publicKey,u.add(...a);const B=new Set,i=[m,...s].filter(t=>{const r=t.publicKey.toBase58();return B.has(r)?!1:(B.add(r),!0)});return u.sign(...i),{raw:u.serialize(),payer:m}}function F(a,s,l){const m=l??s[0]??n.Keypair.generate(),u=new n.TransactionMessage({payerKey:m.publicKey,recentBlockhash:q,instructions:a}).compileToV0Message(),B=new n.VersionedTransaction(u);return B.sign([m,...s]),{raw:B.serialize(),payer:m}}const S=a=>({toBase58:()=>a}),D=a=>({normaliseMessage:e.vi.fn(async()=>a)});(0,e.describe)("ProvideSolanaTransactionContextTask (merged)",()=>{let a;const s=(0,v.CommandResultFactory)({data:void 0}),l={payload:new Uint8Array([240,202,204,26]),keyUsageNumber:1},m=new Uint8Array([170,187,204]),u={payload:new Uint8Array([240,202,204,26]),keyUsageNumber:2},B={data:"f0cacc1a",signature:"01020304"},i="f0cacc1a";(0,e.beforeEach)(()=>{e.vi.resetAllMocks(),a={sendCommand:e.vi.fn()}}),(0,e.describe)("basic context",()=>{(0,e.it)("sends PKI certificate then TLV descriptor and returns Nothing (no loaders results)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:[],transactionBytes:new Uint8Array([240])},p=await new d.ProvideSolanaTransactionContextTask(a,t).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2);const c=a.sendCommand.mock.calls[0][0];(0,e.expect)(c).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(c.args.certificate).toStrictEqual(l.payload),(0,e.expect)(c.args.keyUsage).toBe(l.keyUsageNumber);const y=a.sendCommand.mock.calls[1][0];(0,e.expect)(y).toBeInstanceOf(M.ProvideTLVDescriptorCommand),(0,e.expect)(y.args.payload).toStrictEqual(m),(0,e.expect)(p).toStrictEqual(I.Nothing)}),(0,e.it)("propagates a rejection thrown by InternalApi.sendCommand",async()=>{a.sendCommand.mockRejectedValueOnce(new Error("oupsy"));const t={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:[],transactionBytes:new Uint8Array([202])},r=new d.ProvideSolanaTransactionContextTask(a,t);await(0,e.expect)(r.run()).rejects.toThrow("oupsy"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(1)}),(0,e.it)("ignores SolanaContextTypes.ERROR entries (no extra APDUs beyond base context)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.ERROR,error:{message:"err"}}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(c).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(a.sendCommand.mock.calls[0][0]).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(a.sendCommand.mock.calls[1][0]).toBeInstanceOf(M.ProvideTLVDescriptorCommand)})}),(0,e.describe)("basic context + token",()=>{(0,e.it)("when token metadata present, sends token certificate then TLV transaction-instruction descriptor",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(4);const y=a.sendCommand.mock.calls[2][0];(0,e.expect)(y).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(y.args.certificate).toStrictEqual(u.payload),(0,e.expect)(y.args.keyUsage).toBe(u.keyUsageNumber);const g=a.sendCommand.mock.calls[3][0];(0,e.expect)(g).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(g.args.kind).toBe("descriptor"),(0,e.expect)(g.args.dataHex).toBe(B.data),(0,e.expect)(g.args.signatureHex).toBe(B.signature),(0,e.expect)(g.args.isFirstMessage).toBe(!0),(0,e.expect)(g.args.swapSignatureTag).toBe(!1),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("does not send token commands if token payload is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:void 0,certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([240])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("does not send token commands if token certificate is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:void 0}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([202])},c=await new d.ProvideSolanaTransactionContextTask(a,r).run();(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(2),(0,e.expect)(c).toStrictEqual(I.Nothing)}),(0,e.it)("throws a mapped error when sending token certificate returns a CommandErrorResult",async()=>{const t=(0,v.CommandResultFactory)({error:{_tag:"SomeError",errorCode:27264,message:"bad"}});a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(t);const r=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],p={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:r,transactionBytes:new Uint8Array([204])},c=new d.ProvideSolanaTransactionContextTask(a,p);await(0,e.expect)(c.run()).rejects.toThrow("[SignerSolana] ProvideSolanaTransactionContextTask: Failed to send tokenMetadataCertificate to device, latest firmware version required"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(3);const y=a.sendCommand.mock.calls[2][0];(0,e.expect)(y).toBeInstanceOf(v.LoadCertificateCommand)}),(0,e.it)("does not send swap APDUs when SOLANA_LIFI context is missing (token present)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s);const t=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u}],r={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:t,transactionBytes:new Uint8Array([26])},c=await new d.ProvideSolanaTransactionContextTask(a,r,{normaliseMessage:e.vi.fn()}).run();(0,e.expect)(c).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(4),(0,e.expect)(a.sendCommand.mock.calls[0][0]).toBeInstanceOf(v.LoadCertificateCommand),(0,e.expect)(a.sendCommand.mock.calls[1][0]).toBeInstanceOf(M.ProvideTLVDescriptorCommand),(0,e.expect)(a.sendCommand.mock.calls[2][0]).toBeInstanceOf(v.LoadCertificateCommand);const y=a.sendCommand.mock.calls[3][0];(0,e.expect)(y).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(y.args.swapSignatureTag).toBe(!1),(0,e.expect)(y.args.isFirstMessage).toBe(!0)})}),(0,e.describe)("basic context + token + lifi",()=>{(0,e.it)("sends one APDU per instruction in order (descriptor/empty/descriptor) after base + token are sent",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0},{programIdIndex:1},{programIdIndex:2}],allKeys:[S("A_PID"),S("B_PID"),S("C_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{A_PID:{data:i,signatures:{[d.SWAP_MODE]:i}},C_PID:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([240])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("descriptor"),(0,e.expect)(o.args.dataHex).toBe(i),(0,e.expect)(o.args.signatureHex).toBe(i),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0);const T=a.sendCommand.mock.calls[5][0];(0,e.expect)(T).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(T.args.kind).toBe("empty"),(0,e.expect)(T.args.isFirstMessage).toBe(!1),(0,e.expect)(T.args.swapSignatureTag).toBe(!0);const A=a.sendCommand.mock.calls[6][0];(0,e.expect)(A).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(A.args.kind).toBe("descriptor"),(0,e.expect)(A.args.dataHex).toBe(i),(0,e.expect)(A.args.signatureHex).toBe(i),(0,e.expect)(A.args.isFirstMessage).toBe(!1),(0,e.expect)(A.args.swapSignatureTag).toBe(!0),(0,e.expect)(r.normaliseMessage).toHaveBeenCalledOnce()}),(0,e.it)("sends empty when descriptor exists but signatures[SWAP_MODE] is missing",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0}],allKeys:[S("ONLY_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{ONLY_PID:{data:i,signatures:{}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([202])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("sends empty when programId is missing for an instruction",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:5}],allKeys:[S("X")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([204])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("propagates a rejection thrown by InternalApi.sendCommand on the second swap APDU (after base + token succeed)",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockRejectedValueOnce(new Error("err"));const t={compiledInstructions:[{programIdIndex:0},{programIdIndex:1},{programIdIndex:2}],allKeys:[S("A_PID"),S("B_PID"),S("C_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{A_PID:{data:i,signatures:{[d.SWAP_MODE]:i}},C_PID:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([26])},y=new d.ProvideSolanaTransactionContextTask(a,c,r);await(0,e.expect)(y.run()).rejects.toThrow("err"),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(6);const g=a.sendCommand.mock.calls[4][0];(0,e.expect)(g).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(g.args.kind).toBe("descriptor"),(0,e.expect)(g.args.isFirstMessage).toBe(!0),(0,e.expect)(g.args.swapSignatureTag).toBe(!0);const o=a.sendCommand.mock.calls[5][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("empty"),(0,e.expect)(o.args.isFirstMessage).toBe(!1),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("uses signatures[SWAP_MODE] specifically when present",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t={compiledInstructions:[{programIdIndex:0}],allKeys:[S("SIG_PID")]},r=D(t),p=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{SIG_PID:{data:i,signatures:{prod:"deadbeef",[d.SWAP_MODE]:i}}}}],c={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:p,transactionBytes:new Uint8Array([240])},g=await new d.ProvideSolanaTransactionContextTask(a,c,r).run();(0,e.expect)(g).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(5);const o=a.sendCommand.mock.calls[4][0];(0,e.expect)(o).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(o.args.kind).toBe("descriptor"),(0,e.expect)(o.args.dataHex).toBe(i),(0,e.expect)(o.args.signatureHex).toBe(i),(0,e.expect)(o.args.isFirstMessage).toBe(!0),(0,e.expect)(o.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *legacy* tx via DefaultSolanaMessageNormaliser and preserves APDU order (descriptor, empty, descriptor) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:1234}),c=n.Keypair.generate(),y=n.Keypair.generate().publicKey,g=n.Keypair.generate().publicKey,o=(0,f.createTransferInstruction)(y,g,c.publicKey,42n,[],f.TOKEN_PROGRAM_ID),T=new n.PublicKey("MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr"),A=new n.TransactionInstruction({programId:T,keys:[],data:H.Buffer.from("hi")}),{raw:x}=Q([p,o,A],[t,c],t),V=n.SystemProgram.programId.toBase58(),K=T.toBase58(),N=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[V]:{data:i,signatures:{[d.SWAP_MODE]:i}},[K]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],P={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:N,transactionBytes:x},_=await new d.ProvideSolanaTransactionContextTask(a,P,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(_).toStrictEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const R=a.sendCommand.mock.calls[4][0];(0,e.expect)(R.args.kind).toBe("descriptor"),(0,e.expect)(R.args.isFirstMessage).toBe(!0),(0,e.expect)(R.args.swapSignatureTag).toBe(!0);const C=a.sendCommand.mock.calls[5][0];(0,e.expect)(C.args.kind).toBe("empty"),(0,e.expect)(C.args.isFirstMessage).toBe(!1),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[6][0];(0,e.expect)(w.args.kind).toBe("descriptor"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *v0* tx via DefaultSolanaMessageNormaliser (no ALTs) and preserves APDU order (descriptor, descriptor, empty) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:5678}),c=n.Keypair.generate().publicKey,y=n.Keypair.generate().publicKey,g=(0,f.getAssociatedTokenAddressSync)(y,c,!0,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),o=(0,f.createAssociatedTokenAccountInstruction)(t.publicKey,g,c,y,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),T=new n.PublicKey("MemoSq4gqABAXKb96qnH8TysNcWxMyWCqXgDLGmfcHr"),A=new n.TransactionInstruction({programId:T,keys:[],data:H.Buffer.from("hello")}),{raw:x}=F([p,o,A],[],t),V=n.SystemProgram.programId.toBase58(),K=f.ASSOCIATED_TOKEN_PROGRAM_ID.toBase58(),N=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[V]:{data:i,signatures:{[d.SWAP_MODE]:i}},[K]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],P={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:N,transactionBytes:x},_=await new d.ProvideSolanaTransactionContextTask(a,P,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(_).toEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const R=a.sendCommand.mock.calls[4][0];(0,e.expect)(R).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(R.args.kind).toBe("descriptor"),(0,e.expect)(R.args.isFirstMessage).toBe(!0),(0,e.expect)(R.args.swapSignatureTag).toBe(!0);const C=a.sendCommand.mock.calls[5][0];(0,e.expect)(C).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(C.args.kind).toBe("descriptor"),(0,e.expect)(C.args.isFirstMessage).toBe(!1),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[6][0];(0,e.expect)(w).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(w.args.kind).toBe("empty"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0)}),(0,e.it)("parses a real *v0* tx via DefaultSolanaMessageNormaliser and preserves APDU order System, createATA, token transfer (descriptor, descriptor, empty) after base + token",async()=>{a.sendCommand.mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValueOnce(s).mockResolvedValue(s);const t=n.Keypair.generate(),r=n.Keypair.generate().publicKey,p=n.SystemProgram.transfer({fromPubkey:t.publicKey,toPubkey:r,lamports:7777}),c=n.Keypair.generate(),y=n.Keypair.generate().publicKey,g=n.Keypair.generate().publicKey,o=(0,f.getAssociatedTokenAddressSync)(y,g,!0,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),T=(0,f.createAssociatedTokenAccountInstruction)(t.publicKey,o,g,y,f.TOKEN_PROGRAM_ID,f.ASSOCIATED_TOKEN_PROGRAM_ID),A=n.Keypair.generate().publicKey,x=(0,f.createTransferInstruction)(A,o,c.publicKey,9n,[],f.TOKEN_PROGRAM_ID),{raw:V}=F([p,T,x],[c],t),K=n.SystemProgram.programId.toBase58(),N=f.ASSOCIATED_TOKEN_PROGRAM_ID.toBase58(),P=[{type:k.SolanaContextTypes.SOLANA_TOKEN,payload:{solanaTokenDescriptor:B},certificate:u},{type:k.SolanaContextTypes.SOLANA_LIFI,payload:{[K]:{data:i,signatures:{[d.SWAP_MODE]:i}},[N]:{data:i,signatures:{[d.SWAP_MODE]:i}}}}],L={trustedNamePKICertificate:l,tlvDescriptor:m,loadersResults:P,transactionBytes:V},R=await new d.ProvideSolanaTransactionContextTask(a,L,E.DefaultSolanaMessageNormaliser).run();(0,e.expect)(R).toEqual(I.Nothing),(0,e.expect)(a.sendCommand).toHaveBeenCalledTimes(7);const C=a.sendCommand.mock.calls[4][0];(0,e.expect)(C).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(C.args.kind).toBe("descriptor"),(0,e.expect)(C.args.isFirstMessage).toBe(!0),(0,e.expect)(C.args.swapSignatureTag).toBe(!0);const w=a.sendCommand.mock.calls[5][0];(0,e.expect)(w).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(w.args.kind).toBe("descriptor"),(0,e.expect)(w.args.isFirstMessage).toBe(!1),(0,e.expect)(w.args.swapSignatureTag).toBe(!0);const b=a.sendCommand.mock.calls[6][0];(0,e.expect)(b).toBeInstanceOf(O.ProvideTLVTransactionInstructionDescriptorCommand),(0,e.expect)(b.args.kind).toBe("empty"),(0,e.expect)(b.args.isFirstMessage).toBe(!1),(0,e.expect)(b.args.swapSignatureTag).toBe(!0)})})});
|
|
2
2
|
//# sourceMappingURL=ProvideTransactionContextTask.test.js.map
|