@magicblock-labs/ephemeral-rollups-sdk 0.6.0 → 0.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/__test__/access-control.test.d.ts +2 -0
- package/lib/__test__/access-control.test.d.ts.map +1 -0
- package/lib/__test__/access-control.test.js +148 -0
- package/lib/__test__/access-control.test.js.map +1 -0
- package/lib/__test__/permission-program.test.d.ts +2 -0
- package/lib/__test__/permission-program.test.d.ts.map +1 -0
- package/lib/__test__/permission-program.test.js +282 -0
- package/lib/__test__/permission-program.test.js.map +1 -0
- package/lib/{privacy → access-control}/auth.d.ts +4 -1
- package/lib/access-control/auth.d.ts.map +1 -0
- package/lib/{privacy → access-control}/auth.js +3 -1
- package/lib/access-control/auth.js.map +1 -0
- package/lib/access-control/index.d.ts +4 -0
- package/lib/access-control/index.d.ts.map +1 -0
- package/lib/{privacy → access-control}/index.js +1 -2
- package/lib/access-control/index.js.map +1 -0
- package/lib/access-control/permission.d.ts +7 -0
- package/lib/access-control/permission.d.ts.map +1 -0
- package/lib/access-control/permission.js +84 -0
- package/lib/access-control/permission.js.map +1 -0
- package/lib/access-control/verify.d.ts.map +1 -0
- package/lib/access-control/verify.js.map +1 -0
- package/lib/constants.d.ts +1 -0
- package/lib/constants.d.ts.map +1 -1
- package/lib/constants.js +2 -1
- package/lib/constants.js.map +1 -1
- package/lib/index.d.ts +2 -1
- package/lib/index.d.ts.map +1 -1
- package/lib/index.js +2 -1
- package/lib/index.js.map +1 -1
- package/lib/instructions/index.d.ts +1 -0
- package/lib/instructions/index.d.ts.map +1 -1
- package/lib/instructions/index.js +1 -0
- package/lib/instructions/index.js.map +1 -1
- package/lib/instructions/permission-program/createGroup.d.ts +11 -0
- package/lib/instructions/permission-program/createGroup.d.ts.map +1 -0
- package/lib/instructions/permission-program/createGroup.js +35 -0
- package/lib/instructions/permission-program/createGroup.js.map +1 -0
- package/lib/instructions/permission-program/createPermission.d.ts +11 -0
- package/lib/instructions/permission-program/createPermission.d.ts.map +1 -0
- package/lib/instructions/permission-program/createPermission.js +29 -0
- package/lib/instructions/permission-program/createPermission.js.map +1 -0
- package/lib/instructions/permission-program/index.d.ts +4 -0
- package/lib/instructions/permission-program/index.d.ts.map +1 -0
- package/lib/instructions/permission-program/index.js +10 -0
- package/lib/instructions/permission-program/index.js.map +1 -0
- package/lib/instructions/permission-program/updatePermission.d.ts +10 -0
- package/lib/instructions/permission-program/updatePermission.d.ts.map +1 -0
- package/lib/instructions/permission-program/updatePermission.js +27 -0
- package/lib/instructions/permission-program/updatePermission.js.map +1 -0
- package/lib/pda.d.ts +4 -2
- package/lib/pda.d.ts.map +1 -1
- package/lib/pda.js +18 -8
- package/lib/pda.js.map +1 -1
- package/package.json +2 -3
- package/lib/privacy/auth.d.ts.map +0 -1
- package/lib/privacy/auth.js.map +0 -1
- package/lib/privacy/constants.d.ts +0 -4
- package/lib/privacy/constants.d.ts.map +0 -1
- package/lib/privacy/constants.js +0 -7
- package/lib/privacy/constants.js.map +0 -1
- package/lib/privacy/index.d.ts +0 -5
- package/lib/privacy/index.d.ts.map +0 -1
- package/lib/privacy/index.js.map +0 -1
- package/lib/privacy/pda.d.ts +0 -4
- package/lib/privacy/pda.d.ts.map +0 -1
- package/lib/privacy/pda.js +0 -15
- package/lib/privacy/pda.js.map +0 -1
- package/lib/privacy/verify.d.ts.map +0 -1
- package/lib/privacy/verify.js.map +0 -1
- /package/lib/{privacy → access-control}/verify.d.ts +0 -0
- /package/lib/{privacy → access-control}/verify.js +0 -0
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"access-control.test.d.ts","sourceRoot":"","sources":["../../src/__test__/access-control.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,148 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const vitest_1 = require("vitest");
|
|
4
|
+
const web3_js_1 = require("@solana/web3.js");
|
|
5
|
+
const auth_1 = require("../access-control/auth");
|
|
6
|
+
(0, vitest_1.describe)("Access Control (web3.js)", () => {
|
|
7
|
+
const mockRpcUrl = "http://localhost:8899";
|
|
8
|
+
const mockPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111111");
|
|
9
|
+
(0, vitest_1.beforeEach)(() => {
|
|
10
|
+
vitest_1.vi.clearAllMocks();
|
|
11
|
+
});
|
|
12
|
+
(0, vitest_1.describe)("getAuthToken", () => {
|
|
13
|
+
(0, vitest_1.it)("should request a challenge and return token with expiration", async () => {
|
|
14
|
+
const mockChallenge = "test-challenge";
|
|
15
|
+
const mockToken = "test-token";
|
|
16
|
+
const mockSignature = new Uint8Array([1, 2, 3]);
|
|
17
|
+
global.fetch = vitest_1.vi
|
|
18
|
+
.fn()
|
|
19
|
+
.mockResolvedValueOnce({
|
|
20
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
21
|
+
})
|
|
22
|
+
.mockResolvedValueOnce({
|
|
23
|
+
status: 200,
|
|
24
|
+
json: async () => ({ token: mockToken }),
|
|
25
|
+
});
|
|
26
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
|
|
27
|
+
const result = await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
28
|
+
(0, vitest_1.expect)(result).toHaveProperty("token");
|
|
29
|
+
(0, vitest_1.expect)(result).toHaveProperty("expiresAt");
|
|
30
|
+
(0, vitest_1.expect)(result.token).toBe(mockToken);
|
|
31
|
+
(0, vitest_1.expect)(typeof result.expiresAt).toBe("number");
|
|
32
|
+
(0, vitest_1.expect)(result.expiresAt).toBeGreaterThan(Date.now());
|
|
33
|
+
});
|
|
34
|
+
(0, vitest_1.it)("should use expiresAt from server response if provided", async () => {
|
|
35
|
+
const mockChallenge = "test-challenge";
|
|
36
|
+
const mockToken = "test-token";
|
|
37
|
+
const mockServerExpiresAt = Date.now() + 7200000;
|
|
38
|
+
const mockSignature = new Uint8Array([1, 2, 3]);
|
|
39
|
+
global.fetch = vitest_1.vi
|
|
40
|
+
.fn()
|
|
41
|
+
.mockResolvedValueOnce({
|
|
42
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
43
|
+
})
|
|
44
|
+
.mockResolvedValueOnce({
|
|
45
|
+
status: 200,
|
|
46
|
+
json: async () => ({
|
|
47
|
+
token: mockToken,
|
|
48
|
+
expiresAt: mockServerExpiresAt,
|
|
49
|
+
}),
|
|
50
|
+
});
|
|
51
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
|
|
52
|
+
const result = await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
53
|
+
(0, vitest_1.expect)(result.expiresAt).toBe(mockServerExpiresAt);
|
|
54
|
+
});
|
|
55
|
+
(0, vitest_1.it)("should throw error on authentication failure", async () => {
|
|
56
|
+
const mockChallenge = "test-challenge";
|
|
57
|
+
const mockError = "Invalid signature";
|
|
58
|
+
global.fetch = vitest_1.vi
|
|
59
|
+
.fn()
|
|
60
|
+
.mockResolvedValueOnce({
|
|
61
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
62
|
+
})
|
|
63
|
+
.mockResolvedValueOnce({
|
|
64
|
+
status: 401,
|
|
65
|
+
json: async () => ({ error: mockError }),
|
|
66
|
+
});
|
|
67
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
|
|
68
|
+
await (0, vitest_1.expect)((0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage)).rejects.toThrow("Failed to authenticate");
|
|
69
|
+
});
|
|
70
|
+
(0, vitest_1.it)("should call signMessage with the challenge", async () => {
|
|
71
|
+
const mockChallenge = "test-challenge";
|
|
72
|
+
const mockToken = "test-token";
|
|
73
|
+
const mockSignature = new Uint8Array([1, 2, 3]);
|
|
74
|
+
global.fetch = vitest_1.vi
|
|
75
|
+
.fn()
|
|
76
|
+
.mockResolvedValueOnce({
|
|
77
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
78
|
+
})
|
|
79
|
+
.mockResolvedValueOnce({
|
|
80
|
+
status: 200,
|
|
81
|
+
json: async () => ({ token: mockToken }),
|
|
82
|
+
});
|
|
83
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
|
|
84
|
+
await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
85
|
+
(0, vitest_1.expect)(signMessage).toHaveBeenCalledWith(new Uint8Array(Buffer.from(mockChallenge, "utf-8")));
|
|
86
|
+
});
|
|
87
|
+
(0, vitest_1.it)("should send correct request to auth/challenge endpoint", async () => {
|
|
88
|
+
const mockChallenge = "test-challenge";
|
|
89
|
+
const mockToken = "test-token";
|
|
90
|
+
global.fetch = vitest_1.vi
|
|
91
|
+
.fn()
|
|
92
|
+
.mockResolvedValueOnce({
|
|
93
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
94
|
+
})
|
|
95
|
+
.mockResolvedValueOnce({
|
|
96
|
+
status: 200,
|
|
97
|
+
json: async () => ({ token: mockToken }),
|
|
98
|
+
});
|
|
99
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
|
|
100
|
+
await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
101
|
+
const firstCall = global.fetch.mock.calls[0];
|
|
102
|
+
(0, vitest_1.expect)(firstCall[0]).toContain(`${mockRpcUrl}/auth/challenge`);
|
|
103
|
+
(0, vitest_1.expect)(firstCall[0]).toContain(`pubkey=${mockPublicKey.toString()}`);
|
|
104
|
+
});
|
|
105
|
+
(0, vitest_1.it)("should send POST request to auth/login with signature", async () => {
|
|
106
|
+
const mockChallenge = "test-challenge";
|
|
107
|
+
const mockToken = "test-token";
|
|
108
|
+
global.fetch = vitest_1.vi
|
|
109
|
+
.fn()
|
|
110
|
+
.mockResolvedValueOnce({
|
|
111
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
112
|
+
})
|
|
113
|
+
.mockResolvedValueOnce({
|
|
114
|
+
status: 200,
|
|
115
|
+
json: async () => ({ token: mockToken }),
|
|
116
|
+
});
|
|
117
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
|
|
118
|
+
await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
119
|
+
const secondCall = global.fetch.mock.calls[1];
|
|
120
|
+
(0, vitest_1.expect)(secondCall[0]).toContain(`${mockRpcUrl}/auth/login`);
|
|
121
|
+
(0, vitest_1.expect)(secondCall[1].method).toBe("POST");
|
|
122
|
+
(0, vitest_1.expect)(secondCall[1].headers["Content-Type"]).toBe("application/json");
|
|
123
|
+
});
|
|
124
|
+
(0, vitest_1.it)("should include pubkey, challenge, and signature in login request", async () => {
|
|
125
|
+
const mockChallenge = "test-challenge";
|
|
126
|
+
const mockToken = "test-token";
|
|
127
|
+
global.fetch = vitest_1.vi
|
|
128
|
+
.fn()
|
|
129
|
+
.mockResolvedValueOnce({
|
|
130
|
+
json: async () => ({ challenge: mockChallenge }),
|
|
131
|
+
})
|
|
132
|
+
.mockResolvedValueOnce({
|
|
133
|
+
status: 200,
|
|
134
|
+
json: async () => ({ token: mockToken }),
|
|
135
|
+
});
|
|
136
|
+
const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
|
|
137
|
+
await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
|
|
138
|
+
const secondCall = global.fetch.mock.calls[1];
|
|
139
|
+
const body = JSON.parse(secondCall[1].body);
|
|
140
|
+
(0, vitest_1.expect)(body).toHaveProperty("pubkey");
|
|
141
|
+
(0, vitest_1.expect)(body).toHaveProperty("challenge");
|
|
142
|
+
(0, vitest_1.expect)(body).toHaveProperty("signature");
|
|
143
|
+
(0, vitest_1.expect)(body.pubkey).toBe(mockPublicKey.toString());
|
|
144
|
+
(0, vitest_1.expect)(body.challenge).toBe(mockChallenge);
|
|
145
|
+
});
|
|
146
|
+
});
|
|
147
|
+
});
|
|
148
|
+
//# sourceMappingURL=access-control.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"access-control.test.js","sourceRoot":"","sources":["../../src/__test__/access-control.test.ts"],"names":[],"mappings":";;AAAA,mCAA8D;AAC9D,6CAA4C;AAC5C,iDAAsD;AAEtD,IAAA,iBAAQ,EAAC,0BAA0B,EAAE,GAAG,EAAE;IACxC,MAAM,UAAU,GAAG,uBAAuB,CAAC;IAC3C,MAAM,aAAa,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IAExE,IAAA,mBAAU,EAAC,GAAG,EAAE;QACd,WAAE,CAAC,aAAa,EAAE,CAAC;IACrB,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,cAAc,EAAE,GAAG,EAAE;QAC5B,IAAA,WAAE,EAAC,6DAA6D,EAAE,KAAK,IAAI,EAAE;YAC3E,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,MAAM,GAAG,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE1E,IAAA,eAAM,EAAC,MAAM,CAAC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;YACvC,IAAA,eAAM,EAAC,MAAM,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YAC3C,IAAA,eAAM,EAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrC,IAAA,eAAM,EAAC,OAAO,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAC/C,IAAA,eAAM,EAAC,MAAM,CAAC,SAAS,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,mBAAmB,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,OAAO,CAAC;YACjD,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC;oBACjB,KAAK,EAAE,SAAS;oBAChB,SAAS,EAAE,mBAAmB;iBAC/B,CAAC;aACH,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,MAAM,GAAG,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE1E,IAAA,eAAM,EAAC,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;QACrD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,mBAAmB,CAAC;YAEtC,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,eAAM,EACV,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CACrD,CAAC,OAAO,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4CAA4C,EAAE,KAAK,IAAI,EAAE;YAC1D,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,IAAA,eAAM,EAAC,WAAW,CAAC,CAAC,oBAAoB,CACtC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC,CACpD,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;YACtE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,SAAS,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACtD,IAAA,eAAM,EAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,GAAG,UAAU,iBAAiB,CAAC,CAAC;YAC/D,IAAA,eAAM,EAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,UAAU,aAAa,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QACvE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,UAAU,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACvD,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,GAAG,UAAU,aAAa,CAAC,CAAC;YAC5D,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAC1C,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kEAAkE,EAAE,KAAK,IAAI,EAAE;YAChF,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,UAAU,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAEvD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC;YAE5C,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACtC,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAC;YACnD,IAAA,eAAM,EAAC,IAAI,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permission-program.test.d.ts","sourceRoot":"","sources":["../../src/__test__/permission-program.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,282 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const vitest_1 = require("vitest");
|
|
4
|
+
const web3_js_1 = require("@solana/web3.js");
|
|
5
|
+
const permission_program_1 = require("../instructions/permission-program");
|
|
6
|
+
const constants_1 = require("../constants");
|
|
7
|
+
(0, vitest_1.describe)("Permission Program Instructions (web3.js)", () => {
|
|
8
|
+
const mockPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111111");
|
|
9
|
+
const differentPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111112");
|
|
10
|
+
(0, vitest_1.describe)("createGroup instruction", () => {
|
|
11
|
+
(0, vitest_1.it)("should create a createGroup instruction with valid parameters", () => {
|
|
12
|
+
const id = mockPublicKey;
|
|
13
|
+
const members = [mockPublicKey, differentPublicKey];
|
|
14
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
15
|
+
group: mockPublicKey,
|
|
16
|
+
payer: mockPublicKey,
|
|
17
|
+
}, {
|
|
18
|
+
id,
|
|
19
|
+
members,
|
|
20
|
+
});
|
|
21
|
+
(0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
22
|
+
(0, vitest_1.expect)(instruction.keys).toHaveLength(3);
|
|
23
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
24
|
+
(0, vitest_1.expect)(instruction.data.length).toBeGreaterThan(0);
|
|
25
|
+
});
|
|
26
|
+
(0, vitest_1.it)("should serialize group ID correctly", () => {
|
|
27
|
+
const id = mockPublicKey;
|
|
28
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
29
|
+
group: mockPublicKey,
|
|
30
|
+
payer: mockPublicKey,
|
|
31
|
+
}, {
|
|
32
|
+
id,
|
|
33
|
+
members: [],
|
|
34
|
+
});
|
|
35
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
36
|
+
(0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(1 + 32);
|
|
37
|
+
});
|
|
38
|
+
(0, vitest_1.it)("should include group account as writable", () => {
|
|
39
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
40
|
+
group: mockPublicKey,
|
|
41
|
+
payer: differentPublicKey,
|
|
42
|
+
}, {
|
|
43
|
+
id: mockPublicKey,
|
|
44
|
+
members: [],
|
|
45
|
+
});
|
|
46
|
+
const groupAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
|
|
47
|
+
(0, vitest_1.expect)(groupAccount).toBeDefined();
|
|
48
|
+
(0, vitest_1.expect)(groupAccount?.isWritable).toBe(true);
|
|
49
|
+
});
|
|
50
|
+
(0, vitest_1.it)("should include payer as writable signer", () => {
|
|
51
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
52
|
+
group: mockPublicKey,
|
|
53
|
+
payer: differentPublicKey,
|
|
54
|
+
}, {
|
|
55
|
+
id: mockPublicKey,
|
|
56
|
+
members: [],
|
|
57
|
+
});
|
|
58
|
+
const payerAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
|
|
59
|
+
(0, vitest_1.expect)(payerAccount).toBeDefined();
|
|
60
|
+
(0, vitest_1.expect)(payerAccount?.isWritable).toBe(true);
|
|
61
|
+
(0, vitest_1.expect)(payerAccount?.isSigner).toBe(true);
|
|
62
|
+
});
|
|
63
|
+
(0, vitest_1.it)("should handle empty members list", () => {
|
|
64
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
65
|
+
group: mockPublicKey,
|
|
66
|
+
payer: mockPublicKey,
|
|
67
|
+
}, {
|
|
68
|
+
id: mockPublicKey,
|
|
69
|
+
members: [],
|
|
70
|
+
});
|
|
71
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
72
|
+
(0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(37);
|
|
73
|
+
});
|
|
74
|
+
(0, vitest_1.it)("should handle multiple members", () => {
|
|
75
|
+
const members = [
|
|
76
|
+
mockPublicKey,
|
|
77
|
+
differentPublicKey,
|
|
78
|
+
new web3_js_1.PublicKey("11111111111111111111111111111113"),
|
|
79
|
+
];
|
|
80
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
81
|
+
group: mockPublicKey,
|
|
82
|
+
payer: mockPublicKey,
|
|
83
|
+
}, {
|
|
84
|
+
id: mockPublicKey,
|
|
85
|
+
members,
|
|
86
|
+
});
|
|
87
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
88
|
+
const expectedSize = 1 + 32 + 4 + members.length * 32;
|
|
89
|
+
(0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(expectedSize);
|
|
90
|
+
});
|
|
91
|
+
(0, vitest_1.it)("should use discriminator 0", () => {
|
|
92
|
+
const instruction = (0, permission_program_1.createCreateGroupInstruction)({
|
|
93
|
+
group: mockPublicKey,
|
|
94
|
+
payer: mockPublicKey,
|
|
95
|
+
}, {
|
|
96
|
+
id: mockPublicKey,
|
|
97
|
+
members: [],
|
|
98
|
+
});
|
|
99
|
+
(0, vitest_1.expect)(instruction.data[0]).toBe(0);
|
|
100
|
+
});
|
|
101
|
+
});
|
|
102
|
+
(0, vitest_1.describe)("createPermission instruction", () => {
|
|
103
|
+
(0, vitest_1.it)("should create a createPermission instruction with valid parameters", () => {
|
|
104
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
105
|
+
permission: mockPublicKey,
|
|
106
|
+
delegatedAccount: mockPublicKey,
|
|
107
|
+
group: differentPublicKey,
|
|
108
|
+
payer: mockPublicKey,
|
|
109
|
+
});
|
|
110
|
+
(0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
111
|
+
(0, vitest_1.expect)(instruction.keys).toHaveLength(5);
|
|
112
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
113
|
+
});
|
|
114
|
+
(0, vitest_1.it)("should include permission account as writable", () => {
|
|
115
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
116
|
+
permission: mockPublicKey,
|
|
117
|
+
delegatedAccount: differentPublicKey,
|
|
118
|
+
group: new web3_js_1.PublicKey("11111111111111111111111111111113"),
|
|
119
|
+
payer: new web3_js_1.PublicKey("11111111111111111111111111111114"),
|
|
120
|
+
});
|
|
121
|
+
const permissionAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
|
|
122
|
+
(0, vitest_1.expect)(permissionAccount).toBeDefined();
|
|
123
|
+
(0, vitest_1.expect)(permissionAccount?.isWritable).toBe(true);
|
|
124
|
+
});
|
|
125
|
+
(0, vitest_1.it)("should include delegatedAccount as readonly signer", () => {
|
|
126
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
127
|
+
permission: mockPublicKey,
|
|
128
|
+
delegatedAccount: differentPublicKey,
|
|
129
|
+
group: mockPublicKey,
|
|
130
|
+
payer: mockPublicKey,
|
|
131
|
+
});
|
|
132
|
+
const delegatedAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
|
|
133
|
+
(0, vitest_1.expect)(delegatedAccount).toBeDefined();
|
|
134
|
+
(0, vitest_1.expect)(delegatedAccount?.isSigner).toBe(true);
|
|
135
|
+
(0, vitest_1.expect)(delegatedAccount?.isWritable).toBe(false);
|
|
136
|
+
});
|
|
137
|
+
(0, vitest_1.it)("should include payer as writable signer", () => {
|
|
138
|
+
const payerAddress = new web3_js_1.PublicKey("11111111111111111111111111111115");
|
|
139
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
140
|
+
permission: mockPublicKey,
|
|
141
|
+
delegatedAccount: mockPublicKey,
|
|
142
|
+
group: mockPublicKey,
|
|
143
|
+
payer: payerAddress,
|
|
144
|
+
});
|
|
145
|
+
const payerAccount = instruction.keys.find((key) => key.pubkey.equals(payerAddress));
|
|
146
|
+
(0, vitest_1.expect)(payerAccount).toBeDefined();
|
|
147
|
+
(0, vitest_1.expect)(payerAccount?.isWritable).toBe(true);
|
|
148
|
+
(0, vitest_1.expect)(payerAccount?.isSigner).toBe(true);
|
|
149
|
+
});
|
|
150
|
+
(0, vitest_1.it)("should use discriminator 1", () => {
|
|
151
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
152
|
+
permission: mockPublicKey,
|
|
153
|
+
delegatedAccount: mockPublicKey,
|
|
154
|
+
group: mockPublicKey,
|
|
155
|
+
payer: mockPublicKey,
|
|
156
|
+
});
|
|
157
|
+
(0, vitest_1.expect)(instruction.data[0]).toBe(1);
|
|
158
|
+
});
|
|
159
|
+
(0, vitest_1.it)("should have minimal data (just discriminator)", () => {
|
|
160
|
+
const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
161
|
+
permission: mockPublicKey,
|
|
162
|
+
delegatedAccount: mockPublicKey,
|
|
163
|
+
group: mockPublicKey,
|
|
164
|
+
payer: mockPublicKey,
|
|
165
|
+
});
|
|
166
|
+
(0, vitest_1.expect)(instruction.data.length).toBe(1);
|
|
167
|
+
});
|
|
168
|
+
});
|
|
169
|
+
(0, vitest_1.describe)("updatePermission instruction", () => {
|
|
170
|
+
(0, vitest_1.it)("should create an updatePermission instruction with valid parameters", () => {
|
|
171
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
172
|
+
permission: mockPublicKey,
|
|
173
|
+
delegatedAccount: mockPublicKey,
|
|
174
|
+
group: differentPublicKey,
|
|
175
|
+
});
|
|
176
|
+
(0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
177
|
+
(0, vitest_1.expect)(instruction.keys).toHaveLength(3);
|
|
178
|
+
(0, vitest_1.expect)(instruction.data).toBeDefined();
|
|
179
|
+
});
|
|
180
|
+
(0, vitest_1.it)("should include permission account as writable", () => {
|
|
181
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
182
|
+
permission: mockPublicKey,
|
|
183
|
+
delegatedAccount: differentPublicKey,
|
|
184
|
+
group: new web3_js_1.PublicKey("11111111111111111111111111111113"),
|
|
185
|
+
});
|
|
186
|
+
const permissionAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
|
|
187
|
+
(0, vitest_1.expect)(permissionAccount).toBeDefined();
|
|
188
|
+
(0, vitest_1.expect)(permissionAccount?.isWritable).toBe(true);
|
|
189
|
+
});
|
|
190
|
+
(0, vitest_1.it)("should include delegatedAccount as readonly signer", () => {
|
|
191
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
192
|
+
permission: mockPublicKey,
|
|
193
|
+
delegatedAccount: differentPublicKey,
|
|
194
|
+
group: mockPublicKey,
|
|
195
|
+
});
|
|
196
|
+
const delegatedAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
|
|
197
|
+
(0, vitest_1.expect)(delegatedAccount).toBeDefined();
|
|
198
|
+
(0, vitest_1.expect)(delegatedAccount?.isSigner).toBe(true);
|
|
199
|
+
(0, vitest_1.expect)(delegatedAccount?.isWritable).toBe(false);
|
|
200
|
+
});
|
|
201
|
+
(0, vitest_1.it)("should include group as readonly", () => {
|
|
202
|
+
const groupAddress = new web3_js_1.PublicKey("11111111111111111111111111111114");
|
|
203
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
204
|
+
permission: mockPublicKey,
|
|
205
|
+
delegatedAccount: mockPublicKey,
|
|
206
|
+
group: groupAddress,
|
|
207
|
+
});
|
|
208
|
+
const groupAccount = instruction.keys.find((key) => key.pubkey.equals(groupAddress));
|
|
209
|
+
(0, vitest_1.expect)(groupAccount).toBeDefined();
|
|
210
|
+
(0, vitest_1.expect)(groupAccount?.isWritable).toBe(false);
|
|
211
|
+
(0, vitest_1.expect)(groupAccount?.isSigner).toBe(false);
|
|
212
|
+
});
|
|
213
|
+
(0, vitest_1.it)("should use discriminator 2", () => {
|
|
214
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
215
|
+
permission: mockPublicKey,
|
|
216
|
+
delegatedAccount: mockPublicKey,
|
|
217
|
+
group: mockPublicKey,
|
|
218
|
+
});
|
|
219
|
+
(0, vitest_1.expect)(instruction.data[0]).toBe(2);
|
|
220
|
+
});
|
|
221
|
+
(0, vitest_1.it)("should have minimal data (just discriminator)", () => {
|
|
222
|
+
const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
223
|
+
permission: mockPublicKey,
|
|
224
|
+
delegatedAccount: mockPublicKey,
|
|
225
|
+
group: mockPublicKey,
|
|
226
|
+
});
|
|
227
|
+
(0, vitest_1.expect)(instruction.data.length).toBe(1);
|
|
228
|
+
});
|
|
229
|
+
});
|
|
230
|
+
(0, vitest_1.describe)("Cross-instruction consistency", () => {
|
|
231
|
+
(0, vitest_1.it)("should all target the same permission program", () => {
|
|
232
|
+
const createGroupInstr = (0, permission_program_1.createCreateGroupInstruction)({
|
|
233
|
+
group: mockPublicKey,
|
|
234
|
+
payer: mockPublicKey,
|
|
235
|
+
}, {
|
|
236
|
+
id: mockPublicKey,
|
|
237
|
+
members: [],
|
|
238
|
+
});
|
|
239
|
+
const createPermissionInstr = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
240
|
+
permission: mockPublicKey,
|
|
241
|
+
delegatedAccount: mockPublicKey,
|
|
242
|
+
group: mockPublicKey,
|
|
243
|
+
payer: mockPublicKey,
|
|
244
|
+
});
|
|
245
|
+
const updatePermissionInstr = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
246
|
+
permission: mockPublicKey,
|
|
247
|
+
delegatedAccount: mockPublicKey,
|
|
248
|
+
group: mockPublicKey,
|
|
249
|
+
});
|
|
250
|
+
(0, vitest_1.expect)(createGroupInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
251
|
+
(0, vitest_1.expect)(createPermissionInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
252
|
+
(0, vitest_1.expect)(updatePermissionInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
|
|
253
|
+
});
|
|
254
|
+
(0, vitest_1.it)("should have unique discriminators", () => {
|
|
255
|
+
const createGroupInstr = (0, permission_program_1.createCreateGroupInstruction)({
|
|
256
|
+
group: mockPublicKey,
|
|
257
|
+
payer: mockPublicKey,
|
|
258
|
+
}, {
|
|
259
|
+
id: mockPublicKey,
|
|
260
|
+
members: [],
|
|
261
|
+
});
|
|
262
|
+
const createPermissionInstr = (0, permission_program_1.createCreatePermissionInstruction)({
|
|
263
|
+
permission: mockPublicKey,
|
|
264
|
+
delegatedAccount: mockPublicKey,
|
|
265
|
+
group: mockPublicKey,
|
|
266
|
+
payer: mockPublicKey,
|
|
267
|
+
});
|
|
268
|
+
const updatePermissionInstr = (0, permission_program_1.createUpdatePermissionInstruction)({
|
|
269
|
+
permission: mockPublicKey,
|
|
270
|
+
delegatedAccount: mockPublicKey,
|
|
271
|
+
group: mockPublicKey,
|
|
272
|
+
});
|
|
273
|
+
const disc1 = createGroupInstr.data[0];
|
|
274
|
+
const disc2 = createPermissionInstr.data[0];
|
|
275
|
+
const disc3 = updatePermissionInstr.data[0];
|
|
276
|
+
(0, vitest_1.expect)(disc1).not.toBe(disc2);
|
|
277
|
+
(0, vitest_1.expect)(disc2).not.toBe(disc3);
|
|
278
|
+
(0, vitest_1.expect)(disc1).not.toBe(disc3);
|
|
279
|
+
});
|
|
280
|
+
});
|
|
281
|
+
});
|
|
282
|
+
//# sourceMappingURL=permission-program.test.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permission-program.test.js","sourceRoot":"","sources":["../../src/__test__/permission-program.test.ts"],"names":[],"mappings":";;AAAA,mCAA8C;AAC9C,6CAA4C;AAC5C,2EAI4C;AAC5C,4CAAqD;AAErD,IAAA,iBAAQ,EAAC,2CAA2C,EAAE,GAAG,EAAE;IACzD,MAAM,aAAa,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IACxE,MAAM,kBAAkB,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IAE7E,IAAA,iBAAQ,EAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,IAAA,WAAE,EAAC,+DAA+D,EAAE,GAAG,EAAE;YACvE,MAAM,EAAE,GAAG,aAAa,CAAC;YACzB,MAAM,OAAO,GAAG,CAAC,aAAa,EAAE,kBAAkB,CAAC,CAAC;YAEpD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE;gBACF,OAAO;aACR,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;QACrD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,qCAAqC,EAAE,GAAG,EAAE;YAC7C,MAAM,EAAE,GAAG,aAAa,CAAC;YACzB,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE;gBACF,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,CAAC,GAAG,EAAE,CAAC,CAAC;QACjE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,0CAA0C,EAAE,GAAG,EAAE;YAClD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,kBAAkB;aAC1B,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,yCAAyC,EAAE,GAAG,EAAE;YACjD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,kBAAkB;aAC1B,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC5C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC5C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;YAC1C,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,EAAE,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,gCAAgC,EAAE,GAAG,EAAE;YACxC,MAAM,OAAO,GAAG;gBACd,aAAa;gBACb,kBAAkB;gBAClB,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aAClD,CAAC;YAEF,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO;aACR,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,MAAM,YAAY,GAAG,CAAC,GAAG,EAAE,GAAG,CAAC,GAAG,OAAO,CAAC,MAAM,GAAG,EAAE,CAAC;YACtD,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC;QACvE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAGF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,8BAA8B,EAAE,GAAG,EAAE;QAC5C,IAAA,WAAE,EAAC,oEAAoE,EAAE,GAAG,EAAE;YAC5E,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,kBAAkB;gBACzB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;gBACxD,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aACzD,CAAC,CAAC;YAEH,MAAM,iBAAiB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACtD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,iBAAiB,CAAC,CAAC,WAAW,EAAE,CAAC;YACxC,IAAA,eAAM,EAAC,iBAAiB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,oDAAoD,EAAE,GAAG,EAAE;YAC5D,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,gBAAgB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACrD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,gBAAgB,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,gBAAgB,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAA,eAAM,EAAC,gBAAgB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,yCAAyC,EAAE,GAAG,EAAE;YACjD,MAAM,YAAY,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;YACvE,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,YAAY;aACpB,CAAC,CAAC;YAEH,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAChC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC5C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC5C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,8BAA8B,EAAE,GAAG,EAAE;QAC5C,IAAA,WAAE,EAAC,qEAAqE,EAAE,GAAG,EAAE;YAC7E,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,kBAAkB;aAC1B,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aACzD,CAAC,CAAC;YAEH,MAAM,iBAAiB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACtD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,iBAAiB,CAAC,CAAC,WAAW,EAAE,CAAC;YACxC,IAAA,eAAM,EAAC,iBAAiB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,oDAAoD,EAAE,GAAG,EAAE;YAC5D,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,gBAAgB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACrD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,gBAAgB,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,gBAAgB,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAA,eAAM,EAAC,gBAAgB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;YAC1C,MAAM,YAAY,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;YACvE,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,YAAY;aACpB,CAAC,CAAC;YAEH,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAChC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC7C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,+BAA+B,EAAE,GAAG,EAAE;QAC7C,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,gBAAgB,GAAG,IAAA,iDAA4B,EACnD;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,gBAAgB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CACnE,IAAI,CACL,CAAC;YACF,IAAA,eAAM,EACJ,qBAAqB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAC9D,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACb,IAAA,eAAM,EACJ,qBAAqB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAC9D,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACf,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,mCAAmC,EAAE,GAAG,EAAE;YAC3C,MAAM,gBAAgB,GAAG,IAAA,iDAA4B,EACnD;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,KAAK,GAAG,gBAAgB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACvC,MAAM,KAAK,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC5C,MAAM,KAAK,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAE5C,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC9B,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC9B,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
|
|
@@ -1,3 +1,6 @@
|
|
|
1
1
|
import { PublicKey } from "@solana/web3.js";
|
|
2
|
-
export declare function getAuthToken(rpcUrl: string, publicKey: PublicKey, signMessage: (message: Uint8Array) => Promise<Uint8Array>): Promise<
|
|
2
|
+
export declare function getAuthToken(rpcUrl: string, publicKey: PublicKey, signMessage: (message: Uint8Array) => Promise<Uint8Array>): Promise<{
|
|
3
|
+
token: string;
|
|
4
|
+
expiresAt: number;
|
|
5
|
+
}>;
|
|
3
6
|
//# sourceMappingURL=auth.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../src/access-control/auth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAqB5C,wBAAsB,YAAY,CAChC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,WAAW,EAAE,CAAC,OAAO,EAAE,UAAU,KAAK,OAAO,CAAC,UAAU,CAAC,GACxD,OAAO,CAAC;IAAE,KAAK,EAAE,MAAM,CAAC;IAAC,SAAS,EAAE,MAAM,CAAA;CAAE,CAAC,CAkC/C"}
|
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.getAuthToken = getAuthToken;
|
|
4
|
+
const SESSION_DURATION = 1000 * 60 * 60 * 24 * 30;
|
|
4
5
|
async function getAuthToken(rpcUrl, publicKey, signMessage) {
|
|
5
6
|
const bs58 = (await import("bs58")).default;
|
|
6
7
|
const challengeResponse = await fetch(`${rpcUrl}/auth/challenge?pubkey=${publicKey.toString()}`);
|
|
@@ -20,6 +21,7 @@ async function getAuthToken(rpcUrl, publicKey, signMessage) {
|
|
|
20
21
|
if (authResponse.status !== 200) {
|
|
21
22
|
throw new Error(`Failed to authenticate: ${authJson.error}`);
|
|
22
23
|
}
|
|
23
|
-
|
|
24
|
+
const expiresAt = authJson.expiresAt ?? Date.now() + SESSION_DURATION;
|
|
25
|
+
return { token: authJson.token, expiresAt };
|
|
24
26
|
}
|
|
25
27
|
//# sourceMappingURL=auth.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"auth.js","sourceRoot":"","sources":["../../src/access-control/auth.ts"],"names":[],"mappings":";;AAqBA,oCAsCC;AAzDD,MAAM,gBAAgB,GAAG,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC;AAmB3C,KAAK,UAAU,YAAY,CAChC,MAAc,EACd,SAAoB,EACpB,WAAyD;IAGzD,MAAM,IAAI,GAAG,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC;IAG5C,MAAM,iBAAiB,GAAG,MAAM,KAAK,CACnC,GAAG,MAAM,0BAA0B,SAAS,CAAC,QAAQ,EAAE,EAAE,CAC1D,CAAC;IACF,MAAM,EAAE,SAAS,EAAE,GAA0B,MAAM,iBAAiB,CAAC,IAAI,EAAE,CAAC;IAG5E,MAAM,SAAS,GAAG,MAAM,WAAW,CACjC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAChD,CAAC;IACF,MAAM,eAAe,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAG/C,MAAM,YAAY,GAAG,MAAM,KAAK,CAAC,GAAG,MAAM,aAAa,EAAE;QACvD,MAAM,EAAE,MAAM;QACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;QAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;YACnB,MAAM,EAAE,SAAS,CAAC,QAAQ,EAAE;YAC5B,SAAS;YACT,SAAS,EAAE,eAAe;SAC3B,CAAC;KACH,CAAC,CAAC;IACH,MAAM,QAAQ,GAAsB,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;IAE9D,IAAI,YAAY,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CAAC,2BAA2B,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,MAAM,SAAS,GAAG,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,gBAAgB,CAAC;IACtE,OAAO,EAAE,KAAK,EAAE,QAAQ,CAAC,KAAK,EAAE,SAAS,EAAE,CAAC;AAC9C,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/access-control/index.ts"],"names":[],"mappings":"AAAA,cAAc,QAAQ,CAAC;AACvB,cAAc,UAAU,CAAC;AACzB,cAAc,cAAc,CAAC"}
|
|
@@ -14,8 +14,7 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
14
14
|
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
15
|
};
|
|
16
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
__exportStar(require("./pda"), exports);
|
|
18
17
|
__exportStar(require("./auth"), exports);
|
|
19
18
|
__exportStar(require("./verify"), exports);
|
|
20
|
-
__exportStar(require("./
|
|
19
|
+
__exportStar(require("./permission"), exports);
|
|
21
20
|
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/access-control/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,yCAAuB;AACvB,2CAAyB;AACzB,+CAA6B"}
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
import { PublicKey } from "@solana/web3.js";
|
|
2
|
+
export interface PermissionStatusResponse {
|
|
3
|
+
authorizedUsers?: string[];
|
|
4
|
+
}
|
|
5
|
+
export declare function getPermissionStatus(rpcUrl: string, publicKey: PublicKey): Promise<PermissionStatusResponse>;
|
|
6
|
+
export declare function waitUntilPermissionActive(rpcUrl: string, publicKey: PublicKey, timeout?: number): Promise<boolean>;
|
|
7
|
+
//# sourceMappingURL=permission.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../src/access-control/permission.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,MAAM,WAAW,wBAAwB;IACvC,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;CAC5B;AAQD,wBAAsB,mBAAmB,CACvC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,GACnB,OAAO,CAAC,wBAAwB,CAAC,CA0BnC;AA6CD,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,OAAO,CAAC,EAAE,MAAM,GACf,OAAO,CAAC,OAAO,CAAC,CA6ClB"}
|
|
@@ -0,0 +1,84 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.getPermissionStatus = getPermissionStatus;
|
|
4
|
+
exports.waitUntilPermissionActive = waitUntilPermissionActive;
|
|
5
|
+
async function getPermissionStatus(rpcUrl, publicKey) {
|
|
6
|
+
const [baseUrl, token] = rpcUrl.replace("/?", "?").split("?");
|
|
7
|
+
let url;
|
|
8
|
+
if (token) {
|
|
9
|
+
url = `${baseUrl}/permission?${token}&pubkey=${publicKey.toString()}`;
|
|
10
|
+
}
|
|
11
|
+
else {
|
|
12
|
+
url = `${baseUrl}/permission?pubkey=${publicKey.toString()}`;
|
|
13
|
+
}
|
|
14
|
+
try {
|
|
15
|
+
const permissionStatusResponse = await fetch(url);
|
|
16
|
+
if (!permissionStatusResponse.ok) {
|
|
17
|
+
throw new Error(`Permission status request failed: ${permissionStatusResponse.statusText}`);
|
|
18
|
+
}
|
|
19
|
+
const response = await permissionStatusResponse.json();
|
|
20
|
+
return response;
|
|
21
|
+
}
|
|
22
|
+
catch (error) {
|
|
23
|
+
throw new Error(`Failed to get permission status: ${error instanceof Error ? error.message : String(error)}`);
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
async function forcePermissionUpdate(rpcUrl, publicKey) {
|
|
27
|
+
const [baseUrl, token] = rpcUrl.replace("/?", "?").split("?");
|
|
28
|
+
let url;
|
|
29
|
+
if (token) {
|
|
30
|
+
url = `${baseUrl}/permission/force-update?${token}&pubkey=${publicKey.toString()}`;
|
|
31
|
+
}
|
|
32
|
+
else {
|
|
33
|
+
url = `${baseUrl}/permission/force-update?pubkey=${publicKey.toString()}`;
|
|
34
|
+
}
|
|
35
|
+
try {
|
|
36
|
+
const forceUpdateResponse = await fetch(url);
|
|
37
|
+
if (!forceUpdateResponse.ok) {
|
|
38
|
+
throw new Error(`Force permission update request failed: ${forceUpdateResponse.statusText}`);
|
|
39
|
+
}
|
|
40
|
+
return true;
|
|
41
|
+
}
|
|
42
|
+
catch (error) {
|
|
43
|
+
console.error(`Failed to force permission update: ${error instanceof Error ? error.message : String(error)}`);
|
|
44
|
+
return false;
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
async function waitUntilPermissionActive(rpcUrl, publicKey, timeout) {
|
|
48
|
+
const timeoutMs = timeout ?? 5000;
|
|
49
|
+
let startTime = Date.now();
|
|
50
|
+
while (Date.now() - startTime < timeoutMs) {
|
|
51
|
+
try {
|
|
52
|
+
const { authorizedUsers } = await getPermissionStatus(rpcUrl, publicKey);
|
|
53
|
+
if (authorizedUsers && authorizedUsers.length > 0) {
|
|
54
|
+
return true;
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
catch (error) {
|
|
58
|
+
console.error(error);
|
|
59
|
+
}
|
|
60
|
+
await new Promise((resolve) => {
|
|
61
|
+
setTimeout(resolve, 400);
|
|
62
|
+
});
|
|
63
|
+
}
|
|
64
|
+
const forceUpdateSuccess = await forcePermissionUpdate(rpcUrl, publicKey);
|
|
65
|
+
if (forceUpdateSuccess) {
|
|
66
|
+
startTime = Date.now();
|
|
67
|
+
while (Date.now() - startTime < timeoutMs) {
|
|
68
|
+
try {
|
|
69
|
+
const { authorizedUsers } = await getPermissionStatus(rpcUrl, publicKey);
|
|
70
|
+
if (authorizedUsers && authorizedUsers.length > 0) {
|
|
71
|
+
return true;
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
catch (error) {
|
|
75
|
+
console.error(error);
|
|
76
|
+
}
|
|
77
|
+
await new Promise((resolve) => {
|
|
78
|
+
setTimeout(resolve, 400);
|
|
79
|
+
});
|
|
80
|
+
}
|
|
81
|
+
}
|
|
82
|
+
return false;
|
|
83
|
+
}
|
|
84
|
+
//# sourceMappingURL=permission.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"permission.js","sourceRoot":"","sources":["../../src/access-control/permission.ts"],"names":[],"mappings":";;AAYA,kDA6BC;AA6CD,8DAiDC;AA3HM,KAAK,UAAU,mBAAmB,CACvC,MAAc,EACd,SAAoB;IAIpB,MAAM,CAAC,OAAO,EAAE,KAAK,CAAC,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAC9D,IAAI,GAAG,CAAC;IACR,IAAI,KAAK,EAAE,CAAC;QACV,GAAG,GAAG,GAAG,OAAO,eAAe,KAAK,WAAW,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IACxE,CAAC;SAAM,CAAC;QACN,GAAG,GAAG,GAAG,OAAO,sBAAsB,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC/D,CAAC;IAED,IAAI,CAAC;QACH,MAAM,wBAAwB,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;QAClD,IAAI,CAAC,wBAAwB,CAAC,EAAE,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,qCAAqC,wBAAwB,CAAC,UAAU,EAAE,CAC3E,CAAC;QACJ,CAAC;QACD,MAAM,QAAQ,GACZ,MAAM,wBAAwB,CAAC,IAAI,EAAE,CAAC;QACxC,OAAO,QAAQ,CAAC;IAClB,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,MAAM,IAAI,KAAK,CACb,oCAAoC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAC7F,CAAC;IACJ,CAAC;AACH,CAAC;AAQD,KAAK,UAAU,qBAAqB,CAClC,MAAc,EACd,SAAoB;IAIpB,MAAM,CAAC,OAAO,EAAE,KAAK,CAAC,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAC9D,IAAI,GAAG,CAAC;IACR,IAAI,KAAK,EAAE,CAAC;QACV,GAAG,GAAG,GAAG,OAAO,4BAA4B,KAAK,WAAW,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IACrF,CAAC;SAAM,CAAC;QACN,GAAG,GAAG,GAAG,OAAO,mCAAmC,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC5E,CAAC;IAED,IAAI,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;QAC7C,IAAI,CAAC,mBAAmB,CAAC,EAAE,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CACb,2CAA2C,mBAAmB,CAAC,UAAU,EAAE,CAC5E,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,KAAK,CACX,sCAAsC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAC/F,CAAC;QACF,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AASM,KAAK,UAAU,yBAAyB,CAC7C,MAAc,EACd,SAAoB,EACpB,OAAgB;IAEhB,MAAM,SAAS,GAAG,OAAO,IAAI,IAAI,CAAC;IAGlC,IAAI,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;IAC3B,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,GAAG,SAAS,EAAE,CAAC;QAC1C,IAAI,CAAC;YACH,MAAM,EAAE,eAAe,EAAE,GAAG,MAAM,mBAAmB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;YACzE,IAAI,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClD,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACvB,CAAC;QAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC5B,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QAC3B,CAAC,CAAC,CAAC;IACL,CAAC;IAGD,MAAM,kBAAkB,GAAG,MAAM,qBAAqB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IAC1E,IAAI,kBAAkB,EAAE,CAAC;QAEvB,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,GAAG,SAAS,EAAE,CAAC;YAC1C,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,MAAM,mBAAmB,CACnD,MAAM,EACN,SAAS,CACV,CAAC;gBACF,IAAI,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAClD,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YACvB,CAAC;YAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;gBAC5B,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC3B,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,OAAO,KAAK,CAAC;AACf,CAAC"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../src/access-control/verify.ts"],"names":[],"mappings":"AAcA,wBAAsB,qBAAqB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CA4C5E"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"verify.js","sourceRoot":"","sources":["../../src/access-control/verify.ts"],"names":[],"mappings":";;AAcA,sDA4CC;AA5CM,KAAK,UAAU,qBAAqB,CAAC,MAAc;IAExD,MAAM,EACJ,OAAO,EAAE,IAAI,EACb,iBAAiB,EAAE,eAAe,EAClC,SAAS,EAAE,QAAQ,GACpB,GAAG,MAAM,MAAM,CAAC,qBAAqB,CAAC,CAAC;IAExC,MAAM,cAAc,GAAG,MAAM,CAAC,IAAI,CAChC,UAAU,CAAC,IAAI,CACb,KAAK,CAAC,EAAE,CAAC;SACN,IAAI,CAAC,CAAC,CAAC;SACP,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,GAAG,CAAC,CAAC,CAC9C,CACF,CAAC;IACF,MAAM,SAAS,GAAG,cAAc,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACpD,MAAM,GAAG,GAAG,GAAG,MAAM,oBAAoB,kBAAkB,CAAC,SAAS,CAAC,EAAE,CAAC;IAEzE,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,MAAM,YAAY,GAAkC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IAE1E,IAAI,QAAQ,CAAC,MAAM,KAAK,GAAG,IAAI,CAAC,CAAC,OAAO,IAAI,YAAY,CAAC,EAAE,CAAC;QAC1D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,IAAI,qBAAqB,CAAC,CAAC;IAC/D,CAAC;IAGD,MAAM,IAAI,EAAE,CAAC;IAEb,MAAM,QAAQ,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC,CAAC;IAG5E,MAAM,OAAO,GAAG,iDAAiD,CAAC;IAClE,MAAM,eAAe,GAAG,MAAM,eAAe,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAGjE,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;IAGlD,IAAI,CAAC;QACH,QAAQ,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC"}
|
package/lib/constants.d.ts
CHANGED
|
@@ -2,4 +2,5 @@ import { PublicKey } from "@solana/web3.js";
|
|
|
2
2
|
export declare const DELEGATION_PROGRAM_ID: PublicKey;
|
|
3
3
|
export declare const MAGIC_PROGRAM_ID: PublicKey;
|
|
4
4
|
export declare const MAGIC_CONTEXT_ID: PublicKey;
|
|
5
|
+
export declare const PERMISSION_PROGRAM_ID: PublicKey;
|
|
5
6
|
//# sourceMappingURL=constants.d.ts.map
|
package/lib/constants.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,qBAAqB,WAEjC,CAAC;AAEF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AACF,eAAO,MAAM,gBAAgB,WAE5B,CAAC"}
|
|
1
|
+
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,qBAAqB,WAEjC,CAAC;AAEF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AACF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AAEF,eAAO,MAAM,qBAAqB,WAEjC,CAAC"}
|
package/lib/constants.js
CHANGED
|
@@ -1,8 +1,9 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.MAGIC_CONTEXT_ID = exports.MAGIC_PROGRAM_ID = exports.DELEGATION_PROGRAM_ID = void 0;
|
|
3
|
+
exports.PERMISSION_PROGRAM_ID = exports.MAGIC_CONTEXT_ID = exports.MAGIC_PROGRAM_ID = exports.DELEGATION_PROGRAM_ID = void 0;
|
|
4
4
|
const web3_js_1 = require("@solana/web3.js");
|
|
5
5
|
exports.DELEGATION_PROGRAM_ID = new web3_js_1.PublicKey("DELeGGvXpWV2fqJUhqcF5ZSYMS4JTLjteaAMARRSaeSh");
|
|
6
6
|
exports.MAGIC_PROGRAM_ID = new web3_js_1.PublicKey("Magic11111111111111111111111111111111111111");
|
|
7
7
|
exports.MAGIC_CONTEXT_ID = new web3_js_1.PublicKey("MagicContext1111111111111111111111111111111");
|
|
8
|
+
exports.PERMISSION_PROGRAM_ID = new web3_js_1.PublicKey("BTWAqWNBmF2TboMh3fxMJfgR16xGHYD7Kgr2dPwbRPBi");
|
|
8
9
|
//# sourceMappingURL=constants.js.map
|
package/lib/constants.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constants.js","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC;AAEW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AACW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC"}
|
|
1
|
+
{"version":3,"file":"constants.js","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC;AAEW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AACW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AAEW,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC"}
|
package/lib/index.d.ts
CHANGED
|
@@ -1,7 +1,8 @@
|
|
|
1
1
|
export * from "./constants.js";
|
|
2
|
-
export * from "./instructions/index.js";
|
|
3
2
|
export * from "./pda.js";
|
|
4
3
|
export * from "./utils.js";
|
|
5
4
|
export * from "./resolver.js";
|
|
6
5
|
export * from "./magic-router.js";
|
|
6
|
+
export * from "./instructions/index.js";
|
|
7
|
+
export * from "./access-control/index.js";
|
|
7
8
|
//# sourceMappingURL=index.d.ts.map
|
package/lib/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,UAAU,CAAC;AACzB,cAAc,YAAY,CAAC;AAC3B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,yBAAyB,CAAC;AACxC,cAAc,2BAA2B,CAAC"}
|
package/lib/index.js
CHANGED
|
@@ -15,9 +15,10 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
15
15
|
};
|
|
16
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
17
|
__exportStar(require("./constants.js"), exports);
|
|
18
|
-
__exportStar(require("./instructions/index.js"), exports);
|
|
19
18
|
__exportStar(require("./pda.js"), exports);
|
|
20
19
|
__exportStar(require("./utils.js"), exports);
|
|
21
20
|
__exportStar(require("./resolver.js"), exports);
|
|
22
21
|
__exportStar(require("./magic-router.js"), exports);
|
|
22
|
+
__exportStar(require("./instructions/index.js"), exports);
|
|
23
|
+
__exportStar(require("./access-control/index.js"), exports);
|
|
23
24
|
//# sourceMappingURL=index.js.map
|
package/lib/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,iDAA+B;AAC/B,
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,iDAA+B;AAC/B,2CAAyB;AACzB,6CAA2B;AAC3B,gDAA8B;AAC9B,oDAAkC;AAClC,0DAAwC;AACxC,4DAA0C"}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":"AAAA,cAAc,sBAAsB,CAAC;AACrC,cAAc,iBAAiB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":"AAAA,cAAc,sBAAsB,CAAC;AACrC,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC"}
|
|
@@ -16,4 +16,5 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
16
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
17
|
__exportStar(require("./delegation-program"), exports);
|
|
18
18
|
__exportStar(require("./magic-program"), exports);
|
|
19
|
+
__exportStar(require("./permission-program"), exports);
|
|
19
20
|
//# sourceMappingURL=index.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,uDAAqC;AACrC,kDAAgC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,uDAAqC;AACrC,kDAAgC;AAChC,uDAAqC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { PublicKey, TransactionInstruction } from "@solana/web3.js";
|
|
2
|
+
export interface CreateGroupInstructionArgs {
|
|
3
|
+
id: PublicKey;
|
|
4
|
+
members: PublicKey[];
|
|
5
|
+
}
|
|
6
|
+
export declare function createCreateGroupInstruction(accounts: {
|
|
7
|
+
group: PublicKey;
|
|
8
|
+
payer: PublicKey;
|
|
9
|
+
}, args: CreateGroupInstructionArgs): TransactionInstruction;
|
|
10
|
+
export declare function serializeCreateGroupInstructionData(args: CreateGroupInstructionArgs): Buffer;
|
|
11
|
+
//# sourceMappingURL=createGroup.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"createGroup.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/createGroup.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAGvB,MAAM,iBAAiB,CAAC;AAMzB,MAAM,WAAW,0BAA0B;IACzC,EAAE,EAAE,SAAS,CAAC;IACd,OAAO,EAAE,SAAS,EAAE,CAAC;CACtB;AAMD,wBAAgB,4BAA4B,CAC1C,QAAQ,EAAE;IACR,KAAK,EAAE,SAAS,CAAC;IACjB,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,EAAE,0BAA0B,GAC/B,sBAAsB,CAcxB;AAED,wBAAgB,mCAAmC,CACjD,IAAI,EAAE,0BAA0B,GAC/B,MAAM,CAuBR"}
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.createCreateGroupInstruction = createCreateGroupInstruction;
|
|
4
|
+
exports.serializeCreateGroupInstructionData = serializeCreateGroupInstructionData;
|
|
5
|
+
const web3_js_1 = require("@solana/web3.js");
|
|
6
|
+
const constants_1 = require("../../constants");
|
|
7
|
+
function createCreateGroupInstruction(accounts, args) {
|
|
8
|
+
const keys = [
|
|
9
|
+
{ pubkey: accounts.group, isWritable: true, isSigner: false },
|
|
10
|
+
{ pubkey: accounts.payer, isWritable: true, isSigner: true },
|
|
11
|
+
{ pubkey: web3_js_1.SystemProgram.programId, isWritable: false, isSigner: false },
|
|
12
|
+
];
|
|
13
|
+
const instructionData = serializeCreateGroupInstructionData(args);
|
|
14
|
+
return new web3_js_1.TransactionInstruction({
|
|
15
|
+
programId: constants_1.PERMISSION_PROGRAM_ID,
|
|
16
|
+
keys,
|
|
17
|
+
data: instructionData,
|
|
18
|
+
});
|
|
19
|
+
}
|
|
20
|
+
function serializeCreateGroupInstructionData(args) {
|
|
21
|
+
const discriminator = 0;
|
|
22
|
+
const buffer = Buffer.alloc(10000);
|
|
23
|
+
let offset = 0;
|
|
24
|
+
buffer[offset++] = discriminator;
|
|
25
|
+
buffer.set(args.id.toBuffer(), offset);
|
|
26
|
+
offset += 32;
|
|
27
|
+
buffer.writeUInt32LE(args.members.length, offset);
|
|
28
|
+
offset += 4;
|
|
29
|
+
for (const member of args.members) {
|
|
30
|
+
buffer.set(member.toBuffer(), offset);
|
|
31
|
+
offset += 32;
|
|
32
|
+
}
|
|
33
|
+
return buffer.subarray(0, offset);
|
|
34
|
+
}
|
|
35
|
+
//# sourceMappingURL=createGroup.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"createGroup.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/createGroup.ts"],"names":[],"mappings":";;AAoBA,oEAoBC;AAED,kFAyBC;AAnED,6CAKyB;AACzB,+CAAwD;AAcxD,SAAgB,4BAA4B,CAC1C,QAGC,EACD,IAAgC;IAEhC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAC7D,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE;QAC5D,EAAE,MAAM,EAAE,uBAAa,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KACxE,CAAC;IAEF,MAAM,eAAe,GAAG,mCAAmC,CAAC,IAAI,CAAC,CAAC;IAElE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,mCAAmC,CACjD,IAAgC;IAEhC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;IACnC,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAGjC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;IACvC,MAAM,IAAI,EAAE,CAAC;IAGb,MAAM,CAAC,aAAa,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAClD,MAAM,IAAI,CAAC,CAAC;IAGZ,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;QACtC,MAAM,IAAI,EAAE,CAAC;IACf,CAAC;IAED,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
import { PublicKey, TransactionInstruction } from "@solana/web3.js";
|
|
2
|
+
export interface CreatePermissionInstructionArgs {
|
|
3
|
+
}
|
|
4
|
+
export declare function createCreatePermissionInstruction(accounts: {
|
|
5
|
+
permission: PublicKey;
|
|
6
|
+
delegatedAccount: PublicKey;
|
|
7
|
+
group: PublicKey;
|
|
8
|
+
payer: PublicKey;
|
|
9
|
+
}, args?: CreatePermissionInstructionArgs): TransactionInstruction;
|
|
10
|
+
export declare function serializeCreatePermissionInstructionData(args?: CreatePermissionInstructionArgs): Buffer;
|
|
11
|
+
//# sourceMappingURL=createPermission.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"createPermission.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/createPermission.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAGvB,MAAM,iBAAiB,CAAC;AAOzB,MAAM,WAAW,+BAA+B;CAAG;AAMnD,wBAAgB,iCAAiC,CAC/C,QAAQ,EAAE;IACR,UAAU,EAAE,SAAS,CAAC;IACtB,gBAAgB,EAAE,SAAS,CAAC;IAC5B,KAAK,EAAE,SAAS,CAAC;IACjB,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,CAAC,EAAE,+BAA+B,GACrC,sBAAsB,CAgBxB;AAED,wBAAgB,wCAAwC,CACtD,IAAI,CAAC,EAAE,+BAA+B,GACrC,MAAM,CASR"}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.createCreatePermissionInstruction = createCreatePermissionInstruction;
|
|
4
|
+
exports.serializeCreatePermissionInstructionData = serializeCreatePermissionInstructionData;
|
|
5
|
+
const web3_js_1 = require("@solana/web3.js");
|
|
6
|
+
const constants_1 = require("../../constants");
|
|
7
|
+
function createCreatePermissionInstruction(accounts, args) {
|
|
8
|
+
const keys = [
|
|
9
|
+
{ pubkey: accounts.permission, isWritable: true, isSigner: false },
|
|
10
|
+
{ pubkey: accounts.delegatedAccount, isWritable: false, isSigner: true },
|
|
11
|
+
{ pubkey: accounts.group, isWritable: false, isSigner: false },
|
|
12
|
+
{ pubkey: accounts.payer, isWritable: true, isSigner: true },
|
|
13
|
+
{ pubkey: web3_js_1.SystemProgram.programId, isWritable: false, isSigner: false },
|
|
14
|
+
];
|
|
15
|
+
const instructionData = serializeCreatePermissionInstructionData(args);
|
|
16
|
+
return new web3_js_1.TransactionInstruction({
|
|
17
|
+
programId: constants_1.PERMISSION_PROGRAM_ID,
|
|
18
|
+
keys,
|
|
19
|
+
data: instructionData,
|
|
20
|
+
});
|
|
21
|
+
}
|
|
22
|
+
function serializeCreatePermissionInstructionData(args) {
|
|
23
|
+
const discriminator = 1;
|
|
24
|
+
const buffer = Buffer.alloc(1);
|
|
25
|
+
let offset = 0;
|
|
26
|
+
buffer[offset++] = discriminator;
|
|
27
|
+
return buffer.subarray(0, offset);
|
|
28
|
+
}
|
|
29
|
+
//# sourceMappingURL=createPermission.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"createPermission.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/createPermission.ts"],"names":[],"mappings":";;AAkBA,8EAwBC;AAED,4FAWC;AAvDD,6CAKyB;AACzB,+CAAwD;AAYxD,SAAgB,iCAAiC,CAC/C,QAKC,EACD,IAAsC;IAEtC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAClE,EAAE,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE;QACxE,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;QAC9D,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE;QAC5D,EAAE,MAAM,EAAE,uBAAa,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KACxE,CAAC;IAEF,MAAM,eAAe,GAAG,wCAAwC,CAAC,IAAI,CAAC,CAAC;IAEvE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,wCAAwC,CACtD,IAAsC;IAEtC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IAC/B,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAEjC,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
|
|
@@ -0,0 +1,4 @@
|
|
|
1
|
+
export { createCreateGroupInstruction, type CreateGroupInstructionArgs, } from "./createGroup";
|
|
2
|
+
export { createCreatePermissionInstruction, type CreatePermissionInstructionArgs, } from "./createPermission";
|
|
3
|
+
export { createUpdatePermissionInstruction, type UpdatePermissionInstructionArgs, } from "./updatePermission";
|
|
4
|
+
//# sourceMappingURL=index.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,4BAA4B,EAC5B,KAAK,0BAA0B,GAChC,MAAM,eAAe,CAAC;AACvB,OAAO,EACL,iCAAiC,EACjC,KAAK,+BAA+B,GACrC,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,iCAAiC,EACjC,KAAK,+BAA+B,GACrC,MAAM,oBAAoB,CAAC"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.createUpdatePermissionInstruction = exports.createCreatePermissionInstruction = exports.createCreateGroupInstruction = void 0;
|
|
4
|
+
var createGroup_1 = require("./createGroup");
|
|
5
|
+
Object.defineProperty(exports, "createCreateGroupInstruction", { enumerable: true, get: function () { return createGroup_1.createCreateGroupInstruction; } });
|
|
6
|
+
var createPermission_1 = require("./createPermission");
|
|
7
|
+
Object.defineProperty(exports, "createCreatePermissionInstruction", { enumerable: true, get: function () { return createPermission_1.createCreatePermissionInstruction; } });
|
|
8
|
+
var updatePermission_1 = require("./updatePermission");
|
|
9
|
+
Object.defineProperty(exports, "createUpdatePermissionInstruction", { enumerable: true, get: function () { return updatePermission_1.createUpdatePermissionInstruction; } });
|
|
10
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/index.ts"],"names":[],"mappings":";;;AAAA,6CAGuB;AAFrB,2HAAA,4BAA4B,OAAA;AAG9B,uDAG4B;AAF1B,qIAAA,iCAAiC,OAAA;AAGnC,uDAG4B;AAF1B,qIAAA,iCAAiC,OAAA"}
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
import { PublicKey, TransactionInstruction } from "@solana/web3.js";
|
|
2
|
+
export interface UpdatePermissionInstructionArgs {
|
|
3
|
+
}
|
|
4
|
+
export declare function createUpdatePermissionInstruction(accounts: {
|
|
5
|
+
permission: PublicKey;
|
|
6
|
+
delegatedAccount: PublicKey;
|
|
7
|
+
group: PublicKey;
|
|
8
|
+
}, args?: UpdatePermissionInstructionArgs): TransactionInstruction;
|
|
9
|
+
export declare function serializeUpdatePermissionInstructionData(args?: UpdatePermissionInstructionArgs): Buffer;
|
|
10
|
+
//# sourceMappingURL=updatePermission.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"updatePermission.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/updatePermission.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAEvB,MAAM,iBAAiB,CAAC;AAOzB,MAAM,WAAW,+BAA+B;CAAG;AAMnD,wBAAgB,iCAAiC,CAC/C,QAAQ,EAAE;IACR,UAAU,EAAE,SAAS,CAAC;IACtB,gBAAgB,EAAE,SAAS,CAAC;IAC5B,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,CAAC,EAAE,+BAA+B,GACrC,sBAAsB,CAcxB;AAED,wBAAgB,wCAAwC,CACtD,IAAI,CAAC,EAAE,+BAA+B,GACrC,MAAM,CASR"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.createUpdatePermissionInstruction = createUpdatePermissionInstruction;
|
|
4
|
+
exports.serializeUpdatePermissionInstructionData = serializeUpdatePermissionInstructionData;
|
|
5
|
+
const web3_js_1 = require("@solana/web3.js");
|
|
6
|
+
const constants_1 = require("../../constants");
|
|
7
|
+
function createUpdatePermissionInstruction(accounts, args) {
|
|
8
|
+
const keys = [
|
|
9
|
+
{ pubkey: accounts.permission, isWritable: true, isSigner: false },
|
|
10
|
+
{ pubkey: accounts.delegatedAccount, isWritable: false, isSigner: true },
|
|
11
|
+
{ pubkey: accounts.group, isWritable: false, isSigner: false },
|
|
12
|
+
];
|
|
13
|
+
const instructionData = serializeUpdatePermissionInstructionData(args);
|
|
14
|
+
return new web3_js_1.TransactionInstruction({
|
|
15
|
+
programId: constants_1.PERMISSION_PROGRAM_ID,
|
|
16
|
+
keys,
|
|
17
|
+
data: instructionData,
|
|
18
|
+
});
|
|
19
|
+
}
|
|
20
|
+
function serializeUpdatePermissionInstructionData(args) {
|
|
21
|
+
const discriminator = 2;
|
|
22
|
+
const buffer = Buffer.alloc(1);
|
|
23
|
+
let offset = 0;
|
|
24
|
+
buffer[offset++] = discriminator;
|
|
25
|
+
return buffer.subarray(0, offset);
|
|
26
|
+
}
|
|
27
|
+
//# sourceMappingURL=updatePermission.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"updatePermission.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/updatePermission.ts"],"names":[],"mappings":";;AAiBA,8EAqBC;AAED,4FAWC;AAnDD,6CAIyB;AACzB,+CAAwD;AAYxD,SAAgB,iCAAiC,CAC/C,QAIC,EACD,IAAsC;IAEtC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAClE,EAAE,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE;QACxE,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KAC/D,CAAC;IAEF,MAAM,eAAe,GAAG,wCAAwC,CAAC,IAAI,CAAC,CAAC;IAEvE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,wCAAwC,CACtD,IAAsC;IAEtC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IAC/B,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAEjC,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
|
package/lib/pda.d.ts
CHANGED
|
@@ -3,9 +3,11 @@ export declare function delegationRecordPdaFromDelegatedAccount(delegatedAccount
|
|
|
3
3
|
export declare function delegationMetadataPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
4
4
|
export declare function delegateBufferPdaFromDelegatedAccountAndOwnerProgram(delegatedAccount: PublicKey, ownerProgramId: PublicKey): PublicKey;
|
|
5
5
|
export declare function escrowPdaFromEscrowAuthority(escrowAuthority: PublicKey, index?: number): PublicKey;
|
|
6
|
-
export declare function commitStatePdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
7
|
-
export declare function commitRecordPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
8
6
|
export declare function undelegateBufferPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
9
7
|
export declare function feesVaultPda(): PublicKey;
|
|
10
8
|
export declare function validatorFeesVaultPdaFromValidator(validator: PublicKey): PublicKey;
|
|
9
|
+
export declare function commitStatePdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
10
|
+
export declare function commitRecordPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
|
|
11
|
+
export declare function permissionPdaFromAccount(account: PublicKey): PublicKey;
|
|
12
|
+
export declare function groupPdaFromId(id: PublicKey): PublicKey;
|
|
11
13
|
//# sourceMappingURL=pda.d.ts.map
|
package/lib/pda.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;
|
|
1
|
+
{"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAa5C,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAOD,wBAAgB,yCAAyC,CACvD,gBAAgB,EAAE,SAAS,aAM5B;AAQD,wBAAgB,oDAAoD,CAClE,gBAAgB,EAAE,SAAS,EAC3B,cAAc,EAAE,SAAS,aAM1B;AAQD,wBAAgB,4BAA4B,CAC1C,eAAe,EAAE,SAAS,EAC1B,KAAK,GAAE,MAAY,aASpB;AAOD,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAMD,wBAAgB,YAAY,cAK3B;AAOD,wBAAgB,kCAAkC,CAAC,SAAS,EAAE,SAAS,aAKtE;AAOD,wBAAgB,kCAAkC,CAChD,gBAAgB,EAAE,SAAS,aAM5B;AAOD,wBAAgB,mCAAmC,CACjD,gBAAgB,EAAE,SAAS,aAM5B;AAcD,wBAAgB,wBAAwB,CAAC,OAAO,EAAE,SAAS,aAK1D;AAOD,wBAAgB,cAAc,CAAC,EAAE,EAAE,SAAS,aAK3C"}
|
package/lib/pda.js
CHANGED
|
@@ -4,11 +4,13 @@ exports.delegationRecordPdaFromDelegatedAccount = delegationRecordPdaFromDelegat
|
|
|
4
4
|
exports.delegationMetadataPdaFromDelegatedAccount = delegationMetadataPdaFromDelegatedAccount;
|
|
5
5
|
exports.delegateBufferPdaFromDelegatedAccountAndOwnerProgram = delegateBufferPdaFromDelegatedAccountAndOwnerProgram;
|
|
6
6
|
exports.escrowPdaFromEscrowAuthority = escrowPdaFromEscrowAuthority;
|
|
7
|
-
exports.commitStatePdaFromDelegatedAccount = commitStatePdaFromDelegatedAccount;
|
|
8
|
-
exports.commitRecordPdaFromDelegatedAccount = commitRecordPdaFromDelegatedAccount;
|
|
9
7
|
exports.undelegateBufferPdaFromDelegatedAccount = undelegateBufferPdaFromDelegatedAccount;
|
|
10
8
|
exports.feesVaultPda = feesVaultPda;
|
|
11
9
|
exports.validatorFeesVaultPdaFromValidator = validatorFeesVaultPdaFromValidator;
|
|
10
|
+
exports.commitStatePdaFromDelegatedAccount = commitStatePdaFromDelegatedAccount;
|
|
11
|
+
exports.commitRecordPdaFromDelegatedAccount = commitRecordPdaFromDelegatedAccount;
|
|
12
|
+
exports.permissionPdaFromAccount = permissionPdaFromAccount;
|
|
13
|
+
exports.groupPdaFromId = groupPdaFromId;
|
|
12
14
|
const web3_js_1 = require("@solana/web3.js");
|
|
13
15
|
const constants_js_1 = require("./constants.js");
|
|
14
16
|
function delegationRecordPdaFromDelegatedAccount(delegatedAccount) {
|
|
@@ -26,12 +28,6 @@ function escrowPdaFromEscrowAuthority(escrowAuthority, index = 255) {
|
|
|
26
28
|
}
|
|
27
29
|
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("balance"), escrowAuthority.toBytes(), Buffer.from([index])], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
28
30
|
}
|
|
29
|
-
function commitStatePdaFromDelegatedAccount(delegatedAccount) {
|
|
30
|
-
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("state-diff"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
31
|
-
}
|
|
32
|
-
function commitRecordPdaFromDelegatedAccount(delegatedAccount) {
|
|
33
|
-
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("commit-state-record"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
34
|
-
}
|
|
35
31
|
function undelegateBufferPdaFromDelegatedAccount(delegatedAccount) {
|
|
36
32
|
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("undelegate-buffer"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
37
33
|
}
|
|
@@ -41,4 +37,18 @@ function feesVaultPda() {
|
|
|
41
37
|
function validatorFeesVaultPdaFromValidator(validator) {
|
|
42
38
|
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("v-fees-vault"), validator.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
43
39
|
}
|
|
40
|
+
function commitStatePdaFromDelegatedAccount(delegatedAccount) {
|
|
41
|
+
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("state-diff"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
42
|
+
}
|
|
43
|
+
function commitRecordPdaFromDelegatedAccount(delegatedAccount) {
|
|
44
|
+
return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("commit-state-record"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
|
|
45
|
+
}
|
|
46
|
+
const PERMISSION_SEED = Buffer.from("permission:");
|
|
47
|
+
const GROUP_SEED = Buffer.from("group:");
|
|
48
|
+
function permissionPdaFromAccount(account) {
|
|
49
|
+
return web3_js_1.PublicKey.findProgramAddressSync([PERMISSION_SEED, account.toBuffer()], constants_js_1.PERMISSION_PROGRAM_ID)[0];
|
|
50
|
+
}
|
|
51
|
+
function groupPdaFromId(id) {
|
|
52
|
+
return web3_js_1.PublicKey.findProgramAddressSync([GROUP_SEED, id.toBuffer()], constants_js_1.PERMISSION_PROGRAM_ID)[0];
|
|
53
|
+
}
|
|
44
54
|
//# sourceMappingURL=pda.js.map
|
package/lib/pda.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"pda.js","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":";;
|
|
1
|
+
{"version":3,"file":"pda.js","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":";;AAaA,0FAOC;AAOD,8FAOC;AAQD,oHAQC;AAQD,oEAWC;AAOD,0FAOC;AAMD,oCAKC;AAOD,gFAKC;AAOD,gFAOC;AAOD,kFAOC;AAcD,4DAKC;AAOD,wCAKC;AArKD,6CAA4C;AAE5C,iDAA8E;AAW9E,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,yCAAyC,CACvD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAQD,SAAgB,oDAAoD,CAClE,gBAA2B,EAC3B,cAAyB;IAEzB,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACnD,cAAc,CACf,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAQD,SAAgB,4BAA4B,CAC1C,eAA0B,EAC1B,QAAgB,GAAG;IAEnB,IAAI,KAAK,GAAG,CAAC,IAAI,KAAK,GAAG,GAAG,EAAE,CAAC;QAC7B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IACD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,eAAe,CAAC,OAAO,EAAE,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EACzE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAC9D,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAMD,SAAgB,YAAY;IAC1B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,EAC3B,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,kCAAkC,CAAC,SAAoB;IACrE,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,SAAS,CAAC,OAAO,EAAE,CAAC,EAClD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,kCAAkC,CAChD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,mCAAmC,CACjD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAMD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;AACnD,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;AAOzC,SAAgB,wBAAwB,CAAC,OAAkB;IACzD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,EACrC,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,cAAc,CAAC,EAAa;IAC1C,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,UAAU,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,EAC3B,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@magicblock-labs/ephemeral-rollups-sdk",
|
|
3
|
-
"version": "0.6.
|
|
3
|
+
"version": "0.6.3",
|
|
4
4
|
"author": "MagicBlock Labs",
|
|
5
5
|
"license": "MIT",
|
|
6
6
|
"publishConfig": {
|
|
@@ -9,8 +9,7 @@
|
|
|
9
9
|
},
|
|
10
10
|
"main": "lib/index.js",
|
|
11
11
|
"exports": {
|
|
12
|
-
".": "./lib/index.js"
|
|
13
|
-
"./privacy": "./lib/privacy/index.js"
|
|
12
|
+
".": "./lib/index.js"
|
|
14
13
|
},
|
|
15
14
|
"scripts": {
|
|
16
15
|
"clean": "rimraf lib",
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../src/privacy/auth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAkB5C,wBAAsB,YAAY,CAChC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,WAAW,EAAE,CAAC,OAAO,EAAE,UAAU,KAAK,OAAO,CAAC,UAAU,CAAC,mBAkC1D"}
|
package/lib/privacy/auth.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"auth.js","sourceRoot":"","sources":["../../src/privacy/auth.ts"],"names":[],"mappings":";;AAkBA,oCAqCC;AArCM,KAAK,UAAU,YAAY,CAChC,MAAc,EACd,SAAoB,EACpB,WAAyD;IAGzD,MAAM,IAAI,GAAG,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC;IAG5C,MAAM,iBAAiB,GAAG,MAAM,KAAK,CACnC,GAAG,MAAM,0BAA0B,SAAS,CAAC,QAAQ,EAAE,EAAE,CAC1D,CAAC;IACF,MAAM,EAAE,SAAS,EAAE,GAA0B,MAAM,iBAAiB,CAAC,IAAI,EAAE,CAAC;IAG5E,MAAM,SAAS,GAAG,MAAM,WAAW,CACjC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAChD,CAAC;IACF,MAAM,eAAe,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAG/C,MAAM,YAAY,GAAG,MAAM,KAAK,CAAC,GAAG,MAAM,aAAa,EAAE;QACvD,MAAM,EAAE,MAAM;QACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;QAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;YACnB,MAAM,EAAE,SAAS,CAAC,QAAQ,EAAE;YAC5B,SAAS;YACT,SAAS,EAAE,eAAe;SAC3B,CAAC;KACH,CAAC,CAAC;IACH,MAAM,QAAQ,GAAsB,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;IAE9D,IAAI,YAAY,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CAAC,2BAA2B,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,OAAO,QAAQ,CAAC,KAAK,CAAC;AACxB,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/privacy/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,gBAAgB,QAA2B,CAAC;AAEzD,eAAO,MAAM,qBAAqB,EAAE,SAEnC,CAAC"}
|
package/lib/privacy/constants.js
DELETED
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.PERMISSION_PROGRAM_ID = exports.SESSION_DURATION = void 0;
|
|
4
|
-
const web3_js_1 = require("@solana/web3.js");
|
|
5
|
-
exports.SESSION_DURATION = 1000 * 60 * 60 * 24 * 30;
|
|
6
|
-
exports.PERMISSION_PROGRAM_ID = new web3_js_1.PublicKey("BTWAqWNBmF2TboMh3fxMJfgR16xGHYD7Kgr2dPwbRPBi");
|
|
7
|
-
//# sourceMappingURL=constants.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"constants.js","sourceRoot":"","sources":["../../src/privacy/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,gBAAgB,GAAG,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC;AAE5C,QAAA,qBAAqB,GAAc,IAAI,mBAAS,CAC3D,8CAA8C,CAC/C,CAAC"}
|
package/lib/privacy/index.d.ts
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/privacy/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAC;AACtB,cAAc,QAAQ,CAAC;AACvB,cAAc,UAAU,CAAC;AACzB,cAAc,aAAa,CAAC"}
|
package/lib/privacy/index.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/privacy/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,wCAAsB;AACtB,yCAAuB;AACvB,2CAAyB;AACzB,8CAA4B"}
|
package/lib/privacy/pda.d.ts
DELETED
package/lib/privacy/pda.d.ts.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../../src/privacy/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAW5C,wBAAgB,wBAAwB,CAAC,OAAO,EAAE,SAAS,aAK1D;AAOD,wBAAgB,cAAc,CAAC,EAAE,EAAE,SAAS,aAK3C"}
|
package/lib/privacy/pda.js
DELETED
|
@@ -1,15 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.permissionPdaFromAccount = permissionPdaFromAccount;
|
|
4
|
-
exports.groupPdaFromId = groupPdaFromId;
|
|
5
|
-
const web3_js_1 = require("@solana/web3.js");
|
|
6
|
-
const constants_1 = require("./constants");
|
|
7
|
-
const PERMISSION_SEED = Buffer.from("permission:");
|
|
8
|
-
const GROUP_SEED = Buffer.from("group:");
|
|
9
|
-
function permissionPdaFromAccount(account) {
|
|
10
|
-
return web3_js_1.PublicKey.findProgramAddressSync([PERMISSION_SEED, account.toBuffer()], constants_1.PERMISSION_PROGRAM_ID)[0];
|
|
11
|
-
}
|
|
12
|
-
function groupPdaFromId(id) {
|
|
13
|
-
return web3_js_1.PublicKey.findProgramAddressSync([GROUP_SEED, id.toBuffer()], constants_1.PERMISSION_PROGRAM_ID)[0];
|
|
14
|
-
}
|
|
15
|
-
//# sourceMappingURL=pda.js.map
|
package/lib/privacy/pda.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"pda.js","sourceRoot":"","sources":["../../src/privacy/pda.ts"],"names":[],"mappings":";;AAWA,4DAKC;AAOD,wCAKC;AA5BD,6CAA4C;AAC5C,2CAAoD;AAEpD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;AACnD,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;AAOzC,SAAgB,wBAAwB,CAAC,OAAkB;IACzD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,EACrC,iCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,cAAc,CAAC,EAAa;IAC1C,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,UAAU,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,EAC3B,iCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../src/privacy/verify.ts"],"names":[],"mappings":"AAcA,wBAAsB,qBAAqB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CA4C5E"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"verify.js","sourceRoot":"","sources":["../../src/privacy/verify.ts"],"names":[],"mappings":";;AAcA,sDA4CC;AA5CM,KAAK,UAAU,qBAAqB,CAAC,MAAc;IAExD,MAAM,EACJ,OAAO,EAAE,IAAI,EACb,iBAAiB,EAAE,eAAe,EAClC,SAAS,EAAE,QAAQ,GACpB,GAAG,MAAM,MAAM,CAAC,qBAAqB,CAAC,CAAC;IAExC,MAAM,cAAc,GAAG,MAAM,CAAC,IAAI,CAChC,UAAU,CAAC,IAAI,CACb,KAAK,CAAC,EAAE,CAAC;SACN,IAAI,CAAC,CAAC,CAAC;SACP,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,GAAG,CAAC,CAAC,CAC9C,CACF,CAAC;IACF,MAAM,SAAS,GAAG,cAAc,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACpD,MAAM,GAAG,GAAG,GAAG,MAAM,oBAAoB,kBAAkB,CAAC,SAAS,CAAC,EAAE,CAAC;IAEzE,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,MAAM,YAAY,GAAkC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IAE1E,IAAI,QAAQ,CAAC,MAAM,KAAK,GAAG,IAAI,CAAC,CAAC,OAAO,IAAI,YAAY,CAAC,EAAE,CAAC;QAC1D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,IAAI,qBAAqB,CAAC,CAAC;IAC/D,CAAC;IAGD,MAAM,IAAI,EAAE,CAAC;IAEb,MAAM,QAAQ,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC,CAAC;IAG5E,MAAM,OAAO,GAAG,iDAAiD,CAAC;IAClE,MAAM,eAAe,GAAG,MAAM,eAAe,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAGjE,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;IAGlD,IAAI,CAAC;QACH,QAAQ,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC"}
|
|
File without changes
|
|
File without changes
|