@magicblock-labs/ephemeral-rollups-sdk 0.6.0 → 0.6.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/lib/__test__/access-control.test.d.ts +2 -0
  2. package/lib/__test__/access-control.test.d.ts.map +1 -0
  3. package/lib/__test__/access-control.test.js +148 -0
  4. package/lib/__test__/access-control.test.js.map +1 -0
  5. package/lib/__test__/permission-program.test.d.ts +2 -0
  6. package/lib/__test__/permission-program.test.d.ts.map +1 -0
  7. package/lib/__test__/permission-program.test.js +282 -0
  8. package/lib/__test__/permission-program.test.js.map +1 -0
  9. package/lib/{privacy → access-control}/auth.d.ts +5 -1
  10. package/lib/access-control/auth.d.ts.map +1 -0
  11. package/lib/{privacy → access-control}/auth.js +4 -1
  12. package/lib/access-control/auth.js.map +1 -0
  13. package/lib/access-control/index.d.ts +4 -0
  14. package/lib/access-control/index.d.ts.map +1 -0
  15. package/lib/{privacy → access-control}/index.js +1 -2
  16. package/lib/access-control/index.js.map +1 -0
  17. package/lib/access-control/permission.d.ts +7 -0
  18. package/lib/access-control/permission.d.ts.map +1 -0
  19. package/lib/access-control/permission.js +84 -0
  20. package/lib/access-control/permission.js.map +1 -0
  21. package/lib/access-control/verify.d.ts.map +1 -0
  22. package/lib/access-control/verify.js.map +1 -0
  23. package/lib/constants.d.ts +1 -0
  24. package/lib/constants.d.ts.map +1 -1
  25. package/lib/constants.js +2 -1
  26. package/lib/constants.js.map +1 -1
  27. package/lib/index.d.ts +2 -1
  28. package/lib/index.d.ts.map +1 -1
  29. package/lib/index.js +2 -1
  30. package/lib/index.js.map +1 -1
  31. package/lib/instructions/index.d.ts +1 -0
  32. package/lib/instructions/index.d.ts.map +1 -1
  33. package/lib/instructions/index.js +1 -0
  34. package/lib/instructions/index.js.map +1 -1
  35. package/lib/instructions/permission-program/createGroup.d.ts +11 -0
  36. package/lib/instructions/permission-program/createGroup.d.ts.map +1 -0
  37. package/lib/instructions/permission-program/createGroup.js +35 -0
  38. package/lib/instructions/permission-program/createGroup.js.map +1 -0
  39. package/lib/instructions/permission-program/createPermission.d.ts +11 -0
  40. package/lib/instructions/permission-program/createPermission.d.ts.map +1 -0
  41. package/lib/instructions/permission-program/createPermission.js +29 -0
  42. package/lib/instructions/permission-program/createPermission.js.map +1 -0
  43. package/lib/instructions/permission-program/index.d.ts +4 -0
  44. package/lib/instructions/permission-program/index.d.ts.map +1 -0
  45. package/lib/instructions/permission-program/index.js +10 -0
  46. package/lib/instructions/permission-program/index.js.map +1 -0
  47. package/lib/instructions/permission-program/updatePermission.d.ts +10 -0
  48. package/lib/instructions/permission-program/updatePermission.d.ts.map +1 -0
  49. package/lib/instructions/permission-program/updatePermission.js +27 -0
  50. package/lib/instructions/permission-program/updatePermission.js.map +1 -0
  51. package/lib/pda.d.ts +4 -2
  52. package/lib/pda.d.ts.map +1 -1
  53. package/lib/pda.js +18 -8
  54. package/lib/pda.js.map +1 -1
  55. package/package.json +2 -3
  56. package/lib/privacy/auth.d.ts.map +0 -1
  57. package/lib/privacy/auth.js.map +0 -1
  58. package/lib/privacy/constants.d.ts +0 -4
  59. package/lib/privacy/constants.d.ts.map +0 -1
  60. package/lib/privacy/constants.js +0 -7
  61. package/lib/privacy/constants.js.map +0 -1
  62. package/lib/privacy/index.d.ts +0 -5
  63. package/lib/privacy/index.d.ts.map +0 -1
  64. package/lib/privacy/index.js.map +0 -1
  65. package/lib/privacy/pda.d.ts +0 -4
  66. package/lib/privacy/pda.d.ts.map +0 -1
  67. package/lib/privacy/pda.js +0 -15
  68. package/lib/privacy/pda.js.map +0 -1
  69. package/lib/privacy/verify.d.ts.map +0 -1
  70. package/lib/privacy/verify.js.map +0 -1
  71. /package/lib/{privacy → access-control}/verify.d.ts +0 -0
  72. /package/lib/{privacy → access-control}/verify.js +0 -0
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=access-control.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"access-control.test.d.ts","sourceRoot":"","sources":["../../src/__test__/access-control.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,148 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const vitest_1 = require("vitest");
4
+ const web3_js_1 = require("@solana/web3.js");
5
+ const auth_1 = require("../access-control/auth");
6
+ (0, vitest_1.describe)("Access Control (web3.js)", () => {
7
+ const mockRpcUrl = "http://localhost:8899";
8
+ const mockPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111111");
9
+ (0, vitest_1.beforeEach)(() => {
10
+ vitest_1.vi.clearAllMocks();
11
+ });
12
+ (0, vitest_1.describe)("getAuthToken", () => {
13
+ (0, vitest_1.it)("should request a challenge and return token with expiration", async () => {
14
+ const mockChallenge = "test-challenge";
15
+ const mockToken = "test-token";
16
+ const mockSignature = new Uint8Array([1, 2, 3]);
17
+ global.fetch = vitest_1.vi
18
+ .fn()
19
+ .mockResolvedValueOnce({
20
+ json: async () => ({ challenge: mockChallenge }),
21
+ })
22
+ .mockResolvedValueOnce({
23
+ status: 200,
24
+ json: async () => ({ token: mockToken }),
25
+ });
26
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
27
+ const result = await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
28
+ (0, vitest_1.expect)(result).toHaveProperty("token");
29
+ (0, vitest_1.expect)(result).toHaveProperty("expiresAt");
30
+ (0, vitest_1.expect)(result.token).toBe(mockToken);
31
+ (0, vitest_1.expect)(typeof result.expiresAt).toBe("number");
32
+ (0, vitest_1.expect)(result.expiresAt).toBeGreaterThan(Date.now());
33
+ });
34
+ (0, vitest_1.it)("should use expiresAt from server response if provided", async () => {
35
+ const mockChallenge = "test-challenge";
36
+ const mockToken = "test-token";
37
+ const mockServerExpiresAt = Date.now() + 7200000;
38
+ const mockSignature = new Uint8Array([1, 2, 3]);
39
+ global.fetch = vitest_1.vi
40
+ .fn()
41
+ .mockResolvedValueOnce({
42
+ json: async () => ({ challenge: mockChallenge }),
43
+ })
44
+ .mockResolvedValueOnce({
45
+ status: 200,
46
+ json: async () => ({
47
+ token: mockToken,
48
+ expiresAt: mockServerExpiresAt,
49
+ }),
50
+ });
51
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
52
+ const result = await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
53
+ (0, vitest_1.expect)(result.expiresAt).toBe(mockServerExpiresAt);
54
+ });
55
+ (0, vitest_1.it)("should throw error on authentication failure", async () => {
56
+ const mockChallenge = "test-challenge";
57
+ const mockError = "Invalid signature";
58
+ global.fetch = vitest_1.vi
59
+ .fn()
60
+ .mockResolvedValueOnce({
61
+ json: async () => ({ challenge: mockChallenge }),
62
+ })
63
+ .mockResolvedValueOnce({
64
+ status: 401,
65
+ json: async () => ({ error: mockError }),
66
+ });
67
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
68
+ await (0, vitest_1.expect)((0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage)).rejects.toThrow("Failed to authenticate");
69
+ });
70
+ (0, vitest_1.it)("should call signMessage with the challenge", async () => {
71
+ const mockChallenge = "test-challenge";
72
+ const mockToken = "test-token";
73
+ const mockSignature = new Uint8Array([1, 2, 3]);
74
+ global.fetch = vitest_1.vi
75
+ .fn()
76
+ .mockResolvedValueOnce({
77
+ json: async () => ({ challenge: mockChallenge }),
78
+ })
79
+ .mockResolvedValueOnce({
80
+ status: 200,
81
+ json: async () => ({ token: mockToken }),
82
+ });
83
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(mockSignature);
84
+ await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
85
+ (0, vitest_1.expect)(signMessage).toHaveBeenCalledWith(new Uint8Array(Buffer.from(mockChallenge, "utf-8")));
86
+ });
87
+ (0, vitest_1.it)("should send correct request to auth/challenge endpoint", async () => {
88
+ const mockChallenge = "test-challenge";
89
+ const mockToken = "test-token";
90
+ global.fetch = vitest_1.vi
91
+ .fn()
92
+ .mockResolvedValueOnce({
93
+ json: async () => ({ challenge: mockChallenge }),
94
+ })
95
+ .mockResolvedValueOnce({
96
+ status: 200,
97
+ json: async () => ({ token: mockToken }),
98
+ });
99
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
100
+ await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
101
+ const firstCall = global.fetch.mock.calls[0];
102
+ (0, vitest_1.expect)(firstCall[0]).toContain(`${mockRpcUrl}/auth/challenge`);
103
+ (0, vitest_1.expect)(firstCall[0]).toContain(`pubkey=${mockPublicKey.toString()}`);
104
+ });
105
+ (0, vitest_1.it)("should send POST request to auth/login with signature", async () => {
106
+ const mockChallenge = "test-challenge";
107
+ const mockToken = "test-token";
108
+ global.fetch = vitest_1.vi
109
+ .fn()
110
+ .mockResolvedValueOnce({
111
+ json: async () => ({ challenge: mockChallenge }),
112
+ })
113
+ .mockResolvedValueOnce({
114
+ status: 200,
115
+ json: async () => ({ token: mockToken }),
116
+ });
117
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
118
+ await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
119
+ const secondCall = global.fetch.mock.calls[1];
120
+ (0, vitest_1.expect)(secondCall[0]).toContain(`${mockRpcUrl}/auth/login`);
121
+ (0, vitest_1.expect)(secondCall[1].method).toBe("POST");
122
+ (0, vitest_1.expect)(secondCall[1].headers["Content-Type"]).toBe("application/json");
123
+ });
124
+ (0, vitest_1.it)("should include pubkey, challenge, and signature in login request", async () => {
125
+ const mockChallenge = "test-challenge";
126
+ const mockToken = "test-token";
127
+ global.fetch = vitest_1.vi
128
+ .fn()
129
+ .mockResolvedValueOnce({
130
+ json: async () => ({ challenge: mockChallenge }),
131
+ })
132
+ .mockResolvedValueOnce({
133
+ status: 200,
134
+ json: async () => ({ token: mockToken }),
135
+ });
136
+ const signMessage = vitest_1.vi.fn().mockResolvedValue(new Uint8Array([1, 2, 3]));
137
+ await (0, auth_1.getAuthToken)(mockRpcUrl, mockPublicKey, signMessage);
138
+ const secondCall = global.fetch.mock.calls[1];
139
+ const body = JSON.parse(secondCall[1].body);
140
+ (0, vitest_1.expect)(body).toHaveProperty("pubkey");
141
+ (0, vitest_1.expect)(body).toHaveProperty("challenge");
142
+ (0, vitest_1.expect)(body).toHaveProperty("signature");
143
+ (0, vitest_1.expect)(body.pubkey).toBe(mockPublicKey.toString());
144
+ (0, vitest_1.expect)(body.challenge).toBe(mockChallenge);
145
+ });
146
+ });
147
+ });
148
+ //# sourceMappingURL=access-control.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"access-control.test.js","sourceRoot":"","sources":["../../src/__test__/access-control.test.ts"],"names":[],"mappings":";;AAAA,mCAA8D;AAC9D,6CAA4C;AAC5C,iDAAsD;AAEtD,IAAA,iBAAQ,EAAC,0BAA0B,EAAE,GAAG,EAAE;IACxC,MAAM,UAAU,GAAG,uBAAuB,CAAC;IAC3C,MAAM,aAAa,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IAExE,IAAA,mBAAU,EAAC,GAAG,EAAE;QACd,WAAE,CAAC,aAAa,EAAE,CAAC;IACrB,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,cAAc,EAAE,GAAG,EAAE;QAC5B,IAAA,WAAE,EAAC,6DAA6D,EAAE,KAAK,IAAI,EAAE;YAC3E,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,MAAM,GAAG,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE1E,IAAA,eAAM,EAAC,MAAM,CAAC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;YACvC,IAAA,eAAM,EAAC,MAAM,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YAC3C,IAAA,eAAM,EAAC,MAAM,CAAC,KAAK,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrC,IAAA,eAAM,EAAC,OAAO,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;YAC/C,IAAA,eAAM,EAAC,MAAM,CAAC,SAAS,CAAC,CAAC,eAAe,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,mBAAmB,GAAG,IAAI,CAAC,GAAG,EAAE,GAAG,OAAO,CAAC;YACjD,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC;oBACjB,KAAK,EAAE,SAAS;oBAChB,SAAS,EAAE,mBAAmB;iBAC/B,CAAC;aACH,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,MAAM,GAAG,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE1E,IAAA,eAAM,EAAC,MAAM,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC;QACrD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;YAC5D,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,mBAAmB,CAAC;YAEtC,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,eAAM,EACV,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CACrD,CAAC,OAAO,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4CAA4C,EAAE,KAAK,IAAI,EAAE;YAC1D,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAC/B,MAAM,aAAa,GAAG,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC;YAEhD,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,aAAa,CAAC,CAAC;YAE7D,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,IAAA,eAAM,EAAC,WAAW,CAAC,CAAC,oBAAoB,CACtC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,EAAE,OAAO,CAAC,CAAC,CACpD,CAAC;QACJ,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,wDAAwD,EAAE,KAAK,IAAI,EAAE;YACtE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,SAAS,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACtD,IAAA,eAAM,EAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,GAAG,UAAU,iBAAiB,CAAC,CAAC;YAC/D,IAAA,eAAM,EAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,UAAU,aAAa,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QACvE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,uDAAuD,EAAE,KAAK,IAAI,EAAE;YACrE,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,UAAU,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YACvD,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,GAAG,UAAU,aAAa,CAAC,CAAC;YAC5D,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAC1C,IAAA,eAAM,EAAC,UAAU,CAAC,CAAC,CAAC,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC;QACzE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kEAAkE,EAAE,KAAK,IAAI,EAAE;YAChF,MAAM,aAAa,GAAG,gBAAgB,CAAC;YACvC,MAAM,SAAS,GAAG,YAAY,CAAC;YAE/B,MAAM,CAAC,KAAK,GAAG,WAAE;iBACd,EAAE,EAAE;iBACJ,qBAAqB,CAAC;gBACrB,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,aAAa,EAAE,CAAC;aACjD,CAAC;iBACD,qBAAqB,CAAC;gBACrB,MAAM,EAAE,GAAG;gBACX,IAAI,EAAE,KAAK,IAAI,EAAE,CAAC,CAAC,EAAE,KAAK,EAAE,SAAS,EAAE,CAAC;aACzC,CAAC,CAAC;YAEL,MAAM,WAAW,GAAG,WAAE,CAAC,EAAE,EAAE,CAAC,iBAAiB,CAAC,IAAI,UAAU,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC,CAAC,CAAC;YAEzE,MAAM,IAAA,mBAAY,EAAC,UAAU,EAAE,aAAa,EAAE,WAAW,CAAC,CAAC;YAE3D,MAAM,UAAU,GAAI,MAAM,CAAC,KAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;YAEvD,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC;YAE5C,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,QAAQ,CAAC,CAAC;YACtC,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,IAAI,CAAC,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC,CAAC;YACnD,IAAA,eAAM,EAAC,IAAI,CAAC,SAAS,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=permission-program.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permission-program.test.d.ts","sourceRoot":"","sources":["../../src/__test__/permission-program.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,282 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const vitest_1 = require("vitest");
4
+ const web3_js_1 = require("@solana/web3.js");
5
+ const permission_program_1 = require("../instructions/permission-program");
6
+ const constants_1 = require("../constants");
7
+ (0, vitest_1.describe)("Permission Program Instructions (web3.js)", () => {
8
+ const mockPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111111");
9
+ const differentPublicKey = new web3_js_1.PublicKey("11111111111111111111111111111112");
10
+ (0, vitest_1.describe)("createGroup instruction", () => {
11
+ (0, vitest_1.it)("should create a createGroup instruction with valid parameters", () => {
12
+ const id = mockPublicKey;
13
+ const members = [mockPublicKey, differentPublicKey];
14
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
15
+ group: mockPublicKey,
16
+ payer: mockPublicKey,
17
+ }, {
18
+ id,
19
+ members,
20
+ });
21
+ (0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
22
+ (0, vitest_1.expect)(instruction.keys).toHaveLength(3);
23
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
24
+ (0, vitest_1.expect)(instruction.data.length).toBeGreaterThan(0);
25
+ });
26
+ (0, vitest_1.it)("should serialize group ID correctly", () => {
27
+ const id = mockPublicKey;
28
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
29
+ group: mockPublicKey,
30
+ payer: mockPublicKey,
31
+ }, {
32
+ id,
33
+ members: [],
34
+ });
35
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
36
+ (0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(1 + 32);
37
+ });
38
+ (0, vitest_1.it)("should include group account as writable", () => {
39
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
40
+ group: mockPublicKey,
41
+ payer: differentPublicKey,
42
+ }, {
43
+ id: mockPublicKey,
44
+ members: [],
45
+ });
46
+ const groupAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
47
+ (0, vitest_1.expect)(groupAccount).toBeDefined();
48
+ (0, vitest_1.expect)(groupAccount?.isWritable).toBe(true);
49
+ });
50
+ (0, vitest_1.it)("should include payer as writable signer", () => {
51
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
52
+ group: mockPublicKey,
53
+ payer: differentPublicKey,
54
+ }, {
55
+ id: mockPublicKey,
56
+ members: [],
57
+ });
58
+ const payerAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
59
+ (0, vitest_1.expect)(payerAccount).toBeDefined();
60
+ (0, vitest_1.expect)(payerAccount?.isWritable).toBe(true);
61
+ (0, vitest_1.expect)(payerAccount?.isSigner).toBe(true);
62
+ });
63
+ (0, vitest_1.it)("should handle empty members list", () => {
64
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
65
+ group: mockPublicKey,
66
+ payer: mockPublicKey,
67
+ }, {
68
+ id: mockPublicKey,
69
+ members: [],
70
+ });
71
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
72
+ (0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(37);
73
+ });
74
+ (0, vitest_1.it)("should handle multiple members", () => {
75
+ const members = [
76
+ mockPublicKey,
77
+ differentPublicKey,
78
+ new web3_js_1.PublicKey("11111111111111111111111111111113"),
79
+ ];
80
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
81
+ group: mockPublicKey,
82
+ payer: mockPublicKey,
83
+ }, {
84
+ id: mockPublicKey,
85
+ members,
86
+ });
87
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
88
+ const expectedSize = 1 + 32 + 4 + members.length * 32;
89
+ (0, vitest_1.expect)(instruction.data.length).toBeGreaterThanOrEqual(expectedSize);
90
+ });
91
+ (0, vitest_1.it)("should use discriminator 0", () => {
92
+ const instruction = (0, permission_program_1.createCreateGroupInstruction)({
93
+ group: mockPublicKey,
94
+ payer: mockPublicKey,
95
+ }, {
96
+ id: mockPublicKey,
97
+ members: [],
98
+ });
99
+ (0, vitest_1.expect)(instruction.data[0]).toBe(0);
100
+ });
101
+ });
102
+ (0, vitest_1.describe)("createPermission instruction", () => {
103
+ (0, vitest_1.it)("should create a createPermission instruction with valid parameters", () => {
104
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
105
+ permission: mockPublicKey,
106
+ delegatedAccount: mockPublicKey,
107
+ group: differentPublicKey,
108
+ payer: mockPublicKey,
109
+ });
110
+ (0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
111
+ (0, vitest_1.expect)(instruction.keys).toHaveLength(5);
112
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
113
+ });
114
+ (0, vitest_1.it)("should include permission account as writable", () => {
115
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
116
+ permission: mockPublicKey,
117
+ delegatedAccount: differentPublicKey,
118
+ group: new web3_js_1.PublicKey("11111111111111111111111111111113"),
119
+ payer: new web3_js_1.PublicKey("11111111111111111111111111111114"),
120
+ });
121
+ const permissionAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
122
+ (0, vitest_1.expect)(permissionAccount).toBeDefined();
123
+ (0, vitest_1.expect)(permissionAccount?.isWritable).toBe(true);
124
+ });
125
+ (0, vitest_1.it)("should include delegatedAccount as readonly signer", () => {
126
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
127
+ permission: mockPublicKey,
128
+ delegatedAccount: differentPublicKey,
129
+ group: mockPublicKey,
130
+ payer: mockPublicKey,
131
+ });
132
+ const delegatedAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
133
+ (0, vitest_1.expect)(delegatedAccount).toBeDefined();
134
+ (0, vitest_1.expect)(delegatedAccount?.isSigner).toBe(true);
135
+ (0, vitest_1.expect)(delegatedAccount?.isWritable).toBe(false);
136
+ });
137
+ (0, vitest_1.it)("should include payer as writable signer", () => {
138
+ const payerAddress = new web3_js_1.PublicKey("11111111111111111111111111111115");
139
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
140
+ permission: mockPublicKey,
141
+ delegatedAccount: mockPublicKey,
142
+ group: mockPublicKey,
143
+ payer: payerAddress,
144
+ });
145
+ const payerAccount = instruction.keys.find((key) => key.pubkey.equals(payerAddress));
146
+ (0, vitest_1.expect)(payerAccount).toBeDefined();
147
+ (0, vitest_1.expect)(payerAccount?.isWritable).toBe(true);
148
+ (0, vitest_1.expect)(payerAccount?.isSigner).toBe(true);
149
+ });
150
+ (0, vitest_1.it)("should use discriminator 1", () => {
151
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
152
+ permission: mockPublicKey,
153
+ delegatedAccount: mockPublicKey,
154
+ group: mockPublicKey,
155
+ payer: mockPublicKey,
156
+ });
157
+ (0, vitest_1.expect)(instruction.data[0]).toBe(1);
158
+ });
159
+ (0, vitest_1.it)("should have minimal data (just discriminator)", () => {
160
+ const instruction = (0, permission_program_1.createCreatePermissionInstruction)({
161
+ permission: mockPublicKey,
162
+ delegatedAccount: mockPublicKey,
163
+ group: mockPublicKey,
164
+ payer: mockPublicKey,
165
+ });
166
+ (0, vitest_1.expect)(instruction.data.length).toBe(1);
167
+ });
168
+ });
169
+ (0, vitest_1.describe)("updatePermission instruction", () => {
170
+ (0, vitest_1.it)("should create an updatePermission instruction with valid parameters", () => {
171
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
172
+ permission: mockPublicKey,
173
+ delegatedAccount: mockPublicKey,
174
+ group: differentPublicKey,
175
+ });
176
+ (0, vitest_1.expect)(instruction.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
177
+ (0, vitest_1.expect)(instruction.keys).toHaveLength(3);
178
+ (0, vitest_1.expect)(instruction.data).toBeDefined();
179
+ });
180
+ (0, vitest_1.it)("should include permission account as writable", () => {
181
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
182
+ permission: mockPublicKey,
183
+ delegatedAccount: differentPublicKey,
184
+ group: new web3_js_1.PublicKey("11111111111111111111111111111113"),
185
+ });
186
+ const permissionAccount = instruction.keys.find((key) => key.pubkey.equals(mockPublicKey));
187
+ (0, vitest_1.expect)(permissionAccount).toBeDefined();
188
+ (0, vitest_1.expect)(permissionAccount?.isWritable).toBe(true);
189
+ });
190
+ (0, vitest_1.it)("should include delegatedAccount as readonly signer", () => {
191
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
192
+ permission: mockPublicKey,
193
+ delegatedAccount: differentPublicKey,
194
+ group: mockPublicKey,
195
+ });
196
+ const delegatedAccount = instruction.keys.find((key) => key.pubkey.equals(differentPublicKey));
197
+ (0, vitest_1.expect)(delegatedAccount).toBeDefined();
198
+ (0, vitest_1.expect)(delegatedAccount?.isSigner).toBe(true);
199
+ (0, vitest_1.expect)(delegatedAccount?.isWritable).toBe(false);
200
+ });
201
+ (0, vitest_1.it)("should include group as readonly", () => {
202
+ const groupAddress = new web3_js_1.PublicKey("11111111111111111111111111111114");
203
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
204
+ permission: mockPublicKey,
205
+ delegatedAccount: mockPublicKey,
206
+ group: groupAddress,
207
+ });
208
+ const groupAccount = instruction.keys.find((key) => key.pubkey.equals(groupAddress));
209
+ (0, vitest_1.expect)(groupAccount).toBeDefined();
210
+ (0, vitest_1.expect)(groupAccount?.isWritable).toBe(false);
211
+ (0, vitest_1.expect)(groupAccount?.isSigner).toBe(false);
212
+ });
213
+ (0, vitest_1.it)("should use discriminator 2", () => {
214
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
215
+ permission: mockPublicKey,
216
+ delegatedAccount: mockPublicKey,
217
+ group: mockPublicKey,
218
+ });
219
+ (0, vitest_1.expect)(instruction.data[0]).toBe(2);
220
+ });
221
+ (0, vitest_1.it)("should have minimal data (just discriminator)", () => {
222
+ const instruction = (0, permission_program_1.createUpdatePermissionInstruction)({
223
+ permission: mockPublicKey,
224
+ delegatedAccount: mockPublicKey,
225
+ group: mockPublicKey,
226
+ });
227
+ (0, vitest_1.expect)(instruction.data.length).toBe(1);
228
+ });
229
+ });
230
+ (0, vitest_1.describe)("Cross-instruction consistency", () => {
231
+ (0, vitest_1.it)("should all target the same permission program", () => {
232
+ const createGroupInstr = (0, permission_program_1.createCreateGroupInstruction)({
233
+ group: mockPublicKey,
234
+ payer: mockPublicKey,
235
+ }, {
236
+ id: mockPublicKey,
237
+ members: [],
238
+ });
239
+ const createPermissionInstr = (0, permission_program_1.createCreatePermissionInstruction)({
240
+ permission: mockPublicKey,
241
+ delegatedAccount: mockPublicKey,
242
+ group: mockPublicKey,
243
+ payer: mockPublicKey,
244
+ });
245
+ const updatePermissionInstr = (0, permission_program_1.createUpdatePermissionInstruction)({
246
+ permission: mockPublicKey,
247
+ delegatedAccount: mockPublicKey,
248
+ group: mockPublicKey,
249
+ });
250
+ (0, vitest_1.expect)(createGroupInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
251
+ (0, vitest_1.expect)(createPermissionInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
252
+ (0, vitest_1.expect)(updatePermissionInstr.programId.equals(constants_1.PERMISSION_PROGRAM_ID)).toBe(true);
253
+ });
254
+ (0, vitest_1.it)("should have unique discriminators", () => {
255
+ const createGroupInstr = (0, permission_program_1.createCreateGroupInstruction)({
256
+ group: mockPublicKey,
257
+ payer: mockPublicKey,
258
+ }, {
259
+ id: mockPublicKey,
260
+ members: [],
261
+ });
262
+ const createPermissionInstr = (0, permission_program_1.createCreatePermissionInstruction)({
263
+ permission: mockPublicKey,
264
+ delegatedAccount: mockPublicKey,
265
+ group: mockPublicKey,
266
+ payer: mockPublicKey,
267
+ });
268
+ const updatePermissionInstr = (0, permission_program_1.createUpdatePermissionInstruction)({
269
+ permission: mockPublicKey,
270
+ delegatedAccount: mockPublicKey,
271
+ group: mockPublicKey,
272
+ });
273
+ const disc1 = createGroupInstr.data[0];
274
+ const disc2 = createPermissionInstr.data[0];
275
+ const disc3 = updatePermissionInstr.data[0];
276
+ (0, vitest_1.expect)(disc1).not.toBe(disc2);
277
+ (0, vitest_1.expect)(disc2).not.toBe(disc3);
278
+ (0, vitest_1.expect)(disc1).not.toBe(disc3);
279
+ });
280
+ });
281
+ });
282
+ //# sourceMappingURL=permission-program.test.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permission-program.test.js","sourceRoot":"","sources":["../../src/__test__/permission-program.test.ts"],"names":[],"mappings":";;AAAA,mCAA8C;AAC9C,6CAA4C;AAC5C,2EAI4C;AAC5C,4CAAqD;AAErD,IAAA,iBAAQ,EAAC,2CAA2C,EAAE,GAAG,EAAE;IACzD,MAAM,aAAa,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IACxE,MAAM,kBAAkB,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;IAE7E,IAAA,iBAAQ,EAAC,yBAAyB,EAAE,GAAG,EAAE;QACvC,IAAA,WAAE,EAAC,+DAA+D,EAAE,GAAG,EAAE;YACvE,MAAM,EAAE,GAAG,aAAa,CAAC;YACzB,MAAM,OAAO,GAAG,CAAC,aAAa,EAAE,kBAAkB,CAAC,CAAC;YAEpD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE;gBACF,OAAO;aACR,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC;QACrD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,qCAAqC,EAAE,GAAG,EAAE;YAC7C,MAAM,EAAE,GAAG,aAAa,CAAC;YACzB,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE;gBACF,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,CAAC,GAAG,EAAE,CAAC,CAAC;QACjE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,0CAA0C,EAAE,GAAG,EAAE;YAClD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,kBAAkB;aAC1B,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC9C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,yCAAyC,EAAE,GAAG,EAAE;YACjD,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,kBAAkB;aAC1B,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC5C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC5C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;YAC1C,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,EAAE,CAAC,CAAC;QAC7D,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,gCAAgC,EAAE,GAAG,EAAE;YACxC,MAAM,OAAO,GAAG;gBACd,aAAa;gBACb,kBAAkB;gBAClB,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aAClD,CAAC;YAEF,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO;aACR,CACF,CAAC;YAEF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;YAEvC,MAAM,YAAY,GAAG,CAAC,GAAG,EAAE,GAAG,CAAC,GAAG,OAAO,CAAC,MAAM,GAAG,EAAE,CAAC;YACtD,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,sBAAsB,CAAC,YAAY,CAAC,CAAC;QACvE,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,iDAA4B,EAC9C;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAGF,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,8BAA8B,EAAE,GAAG,EAAE;QAC5C,IAAA,WAAE,EAAC,oEAAoE,EAAE,GAAG,EAAE;YAC5E,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,kBAAkB;gBACzB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;gBACxD,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aACzD,CAAC,CAAC;YAEH,MAAM,iBAAiB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACtD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,iBAAiB,CAAC,CAAC,WAAW,EAAE,CAAC;YACxC,IAAA,eAAM,EAAC,iBAAiB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,oDAAoD,EAAE,GAAG,EAAE;YAC5D,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,gBAAgB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACrD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,gBAAgB,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,gBAAgB,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAA,eAAM,EAAC,gBAAgB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,yCAAyC,EAAE,GAAG,EAAE;YACjD,MAAM,YAAY,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;YACvE,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,YAAY;aACpB,CAAC,CAAC;YAEH,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAChC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC5C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC5C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,8BAA8B,EAAE,GAAG,EAAE;QAC5C,IAAA,WAAE,EAAC,qEAAqE,EAAE,GAAG,EAAE;YAC7E,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,kBAAkB;aAC1B,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,WAAW,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACvE,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC;YACzC,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,WAAW,EAAE,CAAC;QACzC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,IAAI,mBAAS,CAAC,kCAAkC,CAAC;aACzD,CAAC,CAAC;YAEH,MAAM,iBAAiB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACtD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,aAAa,CAAC,CACjC,CAAC;YACF,IAAA,eAAM,EAAC,iBAAiB,CAAC,CAAC,WAAW,EAAE,CAAC;YACxC,IAAA,eAAM,EAAC,iBAAiB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,oDAAoD,EAAE,GAAG,EAAE;YAC5D,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,kBAAkB;gBACpC,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,gBAAgB,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACrD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,kBAAkB,CAAC,CACtC,CAAC;YACF,IAAA,eAAM,EAAC,gBAAgB,CAAC,CAAC,WAAW,EAAE,CAAC;YACvC,IAAA,eAAM,EAAC,gBAAgB,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YAC9C,IAAA,eAAM,EAAC,gBAAgB,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACnD,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,kCAAkC,EAAE,GAAG,EAAE;YAC1C,MAAM,YAAY,GAAG,IAAI,mBAAS,CAAC,kCAAkC,CAAC,CAAC;YACvE,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,YAAY;aACpB,CAAC,CAAC;YAEH,MAAM,YAAY,GAAG,WAAW,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CACjD,GAAG,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,CAAC,CAChC,CAAC;YACF,IAAA,eAAM,EAAC,YAAY,CAAC,CAAC,WAAW,EAAE,CAAC;YACnC,IAAA,eAAM,EAAC,YAAY,EAAE,UAAU,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC7C,IAAA,eAAM,EAAC,YAAY,EAAE,QAAQ,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7C,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,4BAA4B,EAAE,GAAG,EAAE;YACpC,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QACtC,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,WAAW,GAAG,IAAA,sDAAiC,EAAC;gBACpD,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAGH,IAAA,eAAM,EAAC,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAC1C,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;IAEH,IAAA,iBAAQ,EAAC,+BAA+B,EAAE,GAAG,EAAE;QAC7C,IAAA,WAAE,EAAC,+CAA+C,EAAE,GAAG,EAAE;YACvD,MAAM,gBAAgB,GAAG,IAAA,iDAA4B,EACnD;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,IAAA,eAAM,EAAC,gBAAgB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAAC,CAAC,IAAI,CACnE,IAAI,CACL,CAAC;YACF,IAAA,eAAM,EACJ,qBAAqB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAC9D,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;YACb,IAAA,eAAM,EACJ,qBAAqB,CAAC,SAAS,CAAC,MAAM,CAAC,iCAAqB,CAAC,CAC9D,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QACf,CAAC,CAAC,CAAC;QAEH,IAAA,WAAE,EAAC,mCAAmC,EAAE,GAAG,EAAE;YAC3C,MAAM,gBAAgB,GAAG,IAAA,iDAA4B,EACnD;gBACE,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,EACD;gBACE,EAAE,EAAE,aAAa;gBACjB,OAAO,EAAE,EAAE;aACZ,CACF,CAAC;YAEF,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;gBACpB,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,qBAAqB,GAAG,IAAA,sDAAiC,EAAC;gBAC9D,UAAU,EAAE,aAAa;gBACzB,gBAAgB,EAAE,aAAa;gBAC/B,KAAK,EAAE,aAAa;aACrB,CAAC,CAAC;YAEH,MAAM,KAAK,GAAG,gBAAgB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YACvC,MAAM,KAAK,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAC5C,MAAM,KAAK,GAAG,qBAAqB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;YAE5C,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC9B,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAC9B,IAAA,eAAM,EAAC,KAAK,CAAC,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAChC,CAAC,CAAC,CAAC;IACL,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -1,3 +1,7 @@
1
1
  import { PublicKey } from "@solana/web3.js";
2
- export declare function getAuthToken(rpcUrl: string, publicKey: PublicKey, signMessage: (message: Uint8Array) => Promise<Uint8Array>): Promise<string>;
2
+ export declare const SESSION_DURATION: number;
3
+ export declare function getAuthToken(rpcUrl: string, publicKey: PublicKey, signMessage: (message: Uint8Array) => Promise<Uint8Array>): Promise<{
4
+ token: string;
5
+ expiresAt: number;
6
+ }>;
3
7
  //# sourceMappingURL=auth.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../src/access-control/auth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,gBAAgB,QAA2B,CAAC;AAmBzD,wBAAsB,YAAY,CAChC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,WAAW,EAAE,CAAC,OAAO,EAAE,UAAU,KAAK,OAAO,CAAC,UAAU,CAAC,GACxD,OAAO,CAAC;IAAE,KAAK,EAAE,MAAM,CAAC;IAAC,SAAS,EAAE,MAAM,CAAA;CAAE,CAAC,CAkC/C"}
@@ -1,6 +1,8 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.SESSION_DURATION = void 0;
3
4
  exports.getAuthToken = getAuthToken;
5
+ exports.SESSION_DURATION = 1000 * 60 * 60 * 24 * 30;
4
6
  async function getAuthToken(rpcUrl, publicKey, signMessage) {
5
7
  const bs58 = (await import("bs58")).default;
6
8
  const challengeResponse = await fetch(`${rpcUrl}/auth/challenge?pubkey=${publicKey.toString()}`);
@@ -20,6 +22,7 @@ async function getAuthToken(rpcUrl, publicKey, signMessage) {
20
22
  if (authResponse.status !== 200) {
21
23
  throw new Error(`Failed to authenticate: ${authJson.error}`);
22
24
  }
23
- return authJson.token;
25
+ const expiresAt = authJson.expiresAt ?? Date.now() + exports.SESSION_DURATION;
26
+ return { token: authJson.token, expiresAt };
24
27
  }
25
28
  //# sourceMappingURL=auth.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"auth.js","sourceRoot":"","sources":["../../src/access-control/auth.ts"],"names":[],"mappings":";;;AAqBA,oCAsCC;AAzDY,QAAA,gBAAgB,GAAG,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC;AAmBlD,KAAK,UAAU,YAAY,CAChC,MAAc,EACd,SAAoB,EACpB,WAAyD;IAGzD,MAAM,IAAI,GAAG,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC;IAG5C,MAAM,iBAAiB,GAAG,MAAM,KAAK,CACnC,GAAG,MAAM,0BAA0B,SAAS,CAAC,QAAQ,EAAE,EAAE,CAC1D,CAAC;IACF,MAAM,EAAE,SAAS,EAAE,GAA0B,MAAM,iBAAiB,CAAC,IAAI,EAAE,CAAC;IAG5E,MAAM,SAAS,GAAG,MAAM,WAAW,CACjC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAChD,CAAC;IACF,MAAM,eAAe,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAG/C,MAAM,YAAY,GAAG,MAAM,KAAK,CAAC,GAAG,MAAM,aAAa,EAAE;QACvD,MAAM,EAAE,MAAM;QACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;QAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;YACnB,MAAM,EAAE,SAAS,CAAC,QAAQ,EAAE;YAC5B,SAAS;YACT,SAAS,EAAE,eAAe;SAC3B,CAAC;KACH,CAAC,CAAC;IACH,MAAM,QAAQ,GAAsB,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;IAE9D,IAAI,YAAY,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CAAC,2BAA2B,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,MAAM,SAAS,GAAG,QAAQ,CAAC,SAAS,IAAI,IAAI,CAAC,GAAG,EAAE,GAAG,wBAAgB,CAAC;IACtE,OAAO,EAAE,KAAK,EAAE,QAAQ,CAAC,KAAK,EAAE,SAAS,EAAE,CAAC;AAC9C,CAAC"}
@@ -0,0 +1,4 @@
1
+ export * from "./auth";
2
+ export * from "./verify";
3
+ export * from "./permission";
4
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/access-control/index.ts"],"names":[],"mappings":"AAAA,cAAc,QAAQ,CAAC;AACvB,cAAc,UAAU,CAAC;AACzB,cAAc,cAAc,CAAC"}
@@ -14,8 +14,7 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
14
14
  for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
15
15
  };
16
16
  Object.defineProperty(exports, "__esModule", { value: true });
17
- __exportStar(require("./pda"), exports);
18
17
  __exportStar(require("./auth"), exports);
19
18
  __exportStar(require("./verify"), exports);
20
- __exportStar(require("./constants"), exports);
19
+ __exportStar(require("./permission"), exports);
21
20
  //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/access-control/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,yCAAuB;AACvB,2CAAyB;AACzB,+CAA6B"}
@@ -0,0 +1,7 @@
1
+ import { PublicKey } from "@solana/web3.js";
2
+ export interface PermissionStatusResponse {
3
+ authorizedUsers?: string[];
4
+ }
5
+ export declare function getPermissionStatus(rpcUrl: string, publicKey: PublicKey): Promise<PermissionStatusResponse>;
6
+ export declare function waitUntilPermissionActive(rpcUrl: string, publicKey: PublicKey, timeout?: number): Promise<boolean>;
7
+ //# sourceMappingURL=permission.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permission.d.ts","sourceRoot":"","sources":["../../src/access-control/permission.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,MAAM,WAAW,wBAAwB;IACvC,eAAe,CAAC,EAAE,MAAM,EAAE,CAAC;CAC5B;AAQD,wBAAsB,mBAAmB,CACvC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,GACnB,OAAO,CAAC,wBAAwB,CAAC,CA0BnC;AA6CD,wBAAsB,yBAAyB,CAC7C,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,OAAO,CAAC,EAAE,MAAM,GACf,OAAO,CAAC,OAAO,CAAC,CA6ClB"}
@@ -0,0 +1,84 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.getPermissionStatus = getPermissionStatus;
4
+ exports.waitUntilPermissionActive = waitUntilPermissionActive;
5
+ async function getPermissionStatus(rpcUrl, publicKey) {
6
+ const [baseUrl, token] = rpcUrl.replace("/?", "?").split("?");
7
+ let url;
8
+ if (token) {
9
+ url = `${baseUrl}/permission?${token}&pubkey=${publicKey.toString()}`;
10
+ }
11
+ else {
12
+ url = `${baseUrl}/permission?pubkey=${publicKey.toString()}`;
13
+ }
14
+ try {
15
+ const permissionStatusResponse = await fetch(url);
16
+ if (!permissionStatusResponse.ok) {
17
+ throw new Error(`Permission status request failed: ${permissionStatusResponse.statusText}`);
18
+ }
19
+ const response = await permissionStatusResponse.json();
20
+ return response;
21
+ }
22
+ catch (error) {
23
+ throw new Error(`Failed to get permission status: ${error instanceof Error ? error.message : String(error)}`);
24
+ }
25
+ }
26
+ async function forcePermissionUpdate(rpcUrl, publicKey) {
27
+ const [baseUrl, token] = rpcUrl.replace("/?", "?").split("?");
28
+ let url;
29
+ if (token) {
30
+ url = `${baseUrl}/permission/force-update?${token}&pubkey=${publicKey.toString()}`;
31
+ }
32
+ else {
33
+ url = `${baseUrl}/permission/force-update?pubkey=${publicKey.toString()}`;
34
+ }
35
+ try {
36
+ const forceUpdateResponse = await fetch(url);
37
+ if (!forceUpdateResponse.ok) {
38
+ throw new Error(`Force permission update request failed: ${forceUpdateResponse.statusText}`);
39
+ }
40
+ return true;
41
+ }
42
+ catch (error) {
43
+ console.error(`Failed to force permission update: ${error instanceof Error ? error.message : String(error)}`);
44
+ return false;
45
+ }
46
+ }
47
+ async function waitUntilPermissionActive(rpcUrl, publicKey, timeout) {
48
+ const timeoutMs = timeout ?? 5000;
49
+ let startTime = Date.now();
50
+ while (Date.now() - startTime < timeoutMs) {
51
+ try {
52
+ const { authorizedUsers } = await getPermissionStatus(rpcUrl, publicKey);
53
+ if (authorizedUsers && authorizedUsers.length > 0) {
54
+ return true;
55
+ }
56
+ }
57
+ catch (error) {
58
+ console.error(error);
59
+ }
60
+ await new Promise((resolve) => {
61
+ setTimeout(resolve, 400);
62
+ });
63
+ }
64
+ const forceUpdateSuccess = await forcePermissionUpdate(rpcUrl, publicKey);
65
+ if (forceUpdateSuccess) {
66
+ startTime = Date.now();
67
+ while (Date.now() - startTime < timeoutMs) {
68
+ try {
69
+ const { authorizedUsers } = await getPermissionStatus(rpcUrl, publicKey);
70
+ if (authorizedUsers && authorizedUsers.length > 0) {
71
+ return true;
72
+ }
73
+ }
74
+ catch (error) {
75
+ console.error(error);
76
+ }
77
+ await new Promise((resolve) => {
78
+ setTimeout(resolve, 400);
79
+ });
80
+ }
81
+ }
82
+ return false;
83
+ }
84
+ //# sourceMappingURL=permission.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"permission.js","sourceRoot":"","sources":["../../src/access-control/permission.ts"],"names":[],"mappings":";;AAYA,kDA6BC;AA6CD,8DAiDC;AA3HM,KAAK,UAAU,mBAAmB,CACvC,MAAc,EACd,SAAoB;IAIpB,MAAM,CAAC,OAAO,EAAE,KAAK,CAAC,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAC9D,IAAI,GAAG,CAAC;IACR,IAAI,KAAK,EAAE,CAAC;QACV,GAAG,GAAG,GAAG,OAAO,eAAe,KAAK,WAAW,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IACxE,CAAC;SAAM,CAAC;QACN,GAAG,GAAG,GAAG,OAAO,sBAAsB,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC/D,CAAC;IAED,IAAI,CAAC;QACH,MAAM,wBAAwB,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;QAClD,IAAI,CAAC,wBAAwB,CAAC,EAAE,EAAE,CAAC;YACjC,MAAM,IAAI,KAAK,CACb,qCAAqC,wBAAwB,CAAC,UAAU,EAAE,CAC3E,CAAC;QACJ,CAAC;QACD,MAAM,QAAQ,GACZ,MAAM,wBAAwB,CAAC,IAAI,EAAE,CAAC;QACxC,OAAO,QAAQ,CAAC;IAClB,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,MAAM,IAAI,KAAK,CACb,oCAAoC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAC7F,CAAC;IACJ,CAAC;AACH,CAAC;AAQD,KAAK,UAAU,qBAAqB,CAClC,MAAc,EACd,SAAoB;IAIpB,MAAM,CAAC,OAAO,EAAE,KAAK,CAAC,GAAG,MAAM,CAAC,OAAO,CAAC,IAAI,EAAE,GAAG,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;IAC9D,IAAI,GAAG,CAAC;IACR,IAAI,KAAK,EAAE,CAAC;QACV,GAAG,GAAG,GAAG,OAAO,4BAA4B,KAAK,WAAW,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IACrF,CAAC;SAAM,CAAC;QACN,GAAG,GAAG,GAAG,OAAO,mCAAmC,SAAS,CAAC,QAAQ,EAAE,EAAE,CAAC;IAC5E,CAAC;IAED,IAAI,CAAC;QACH,MAAM,mBAAmB,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;QAC7C,IAAI,CAAC,mBAAmB,CAAC,EAAE,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CACb,2CAA2C,mBAAmB,CAAC,UAAU,EAAE,CAC5E,CAAC;QACJ,CAAC;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,CAAC,KAAK,CACX,sCAAsC,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAC/F,CAAC;QACF,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC;AASM,KAAK,UAAU,yBAAyB,CAC7C,MAAc,EACd,SAAoB,EACpB,OAAgB;IAEhB,MAAM,SAAS,GAAG,OAAO,IAAI,IAAI,CAAC;IAGlC,IAAI,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;IAC3B,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,GAAG,SAAS,EAAE,CAAC;QAC1C,IAAI,CAAC;YACH,MAAM,EAAE,eAAe,EAAE,GAAG,MAAM,mBAAmB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;YACzE,IAAI,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClD,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;QACvB,CAAC;QAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;YAC5B,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;QAC3B,CAAC,CAAC,CAAC;IACL,CAAC;IAGD,MAAM,kBAAkB,GAAG,MAAM,qBAAqB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;IAC1E,IAAI,kBAAkB,EAAE,CAAC;QAEvB,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,OAAO,IAAI,CAAC,GAAG,EAAE,GAAG,SAAS,GAAG,SAAS,EAAE,CAAC;YAC1C,IAAI,CAAC;gBACH,MAAM,EAAE,eAAe,EAAE,GAAG,MAAM,mBAAmB,CACnD,MAAM,EACN,SAAS,CACV,CAAC;gBACF,IAAI,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBAClD,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;YAAC,OAAO,KAAK,EAAE,CAAC;gBACf,OAAO,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;YACvB,CAAC;YAED,MAAM,IAAI,OAAO,CAAC,CAAC,OAAO,EAAE,EAAE;gBAC5B,UAAU,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC3B,CAAC,CAAC,CAAC;QACL,CAAC;IACH,CAAC;IAED,OAAO,KAAK,CAAC;AACf,CAAC"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../src/access-control/verify.ts"],"names":[],"mappings":"AAcA,wBAAsB,qBAAqB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CA4C5E"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"verify.js","sourceRoot":"","sources":["../../src/access-control/verify.ts"],"names":[],"mappings":";;AAcA,sDA4CC;AA5CM,KAAK,UAAU,qBAAqB,CAAC,MAAc;IAExD,MAAM,EACJ,OAAO,EAAE,IAAI,EACb,iBAAiB,EAAE,eAAe,EAClC,SAAS,EAAE,QAAQ,GACpB,GAAG,MAAM,MAAM,CAAC,qBAAqB,CAAC,CAAC;IAExC,MAAM,cAAc,GAAG,MAAM,CAAC,IAAI,CAChC,UAAU,CAAC,IAAI,CACb,KAAK,CAAC,EAAE,CAAC;SACN,IAAI,CAAC,CAAC,CAAC;SACP,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,GAAG,CAAC,CAAC,CAC9C,CACF,CAAC;IACF,MAAM,SAAS,GAAG,cAAc,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACpD,MAAM,GAAG,GAAG,GAAG,MAAM,oBAAoB,kBAAkB,CAAC,SAAS,CAAC,EAAE,CAAC;IAEzE,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,MAAM,YAAY,GAAkC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IAE1E,IAAI,QAAQ,CAAC,MAAM,KAAK,GAAG,IAAI,CAAC,CAAC,OAAO,IAAI,YAAY,CAAC,EAAE,CAAC;QAC1D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,IAAI,qBAAqB,CAAC,CAAC;IAC/D,CAAC;IAGD,MAAM,IAAI,EAAE,CAAC;IAEb,MAAM,QAAQ,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC,CAAC;IAG5E,MAAM,OAAO,GAAG,iDAAiD,CAAC;IAClE,MAAM,eAAe,GAAG,MAAM,eAAe,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAGjE,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;IAGlD,IAAI,CAAC;QACH,QAAQ,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC"}
@@ -2,4 +2,5 @@ import { PublicKey } from "@solana/web3.js";
2
2
  export declare const DELEGATION_PROGRAM_ID: PublicKey;
3
3
  export declare const MAGIC_PROGRAM_ID: PublicKey;
4
4
  export declare const MAGIC_CONTEXT_ID: PublicKey;
5
+ export declare const PERMISSION_PROGRAM_ID: PublicKey;
5
6
  //# sourceMappingURL=constants.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,qBAAqB,WAEjC,CAAC;AAEF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AACF,eAAO,MAAM,gBAAgB,WAE5B,CAAC"}
1
+ {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,qBAAqB,WAEjC,CAAC;AAEF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AACF,eAAO,MAAM,gBAAgB,WAE5B,CAAC;AAEF,eAAO,MAAM,qBAAqB,WAEjC,CAAC"}
package/lib/constants.js CHANGED
@@ -1,8 +1,9 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.MAGIC_CONTEXT_ID = exports.MAGIC_PROGRAM_ID = exports.DELEGATION_PROGRAM_ID = void 0;
3
+ exports.PERMISSION_PROGRAM_ID = exports.MAGIC_CONTEXT_ID = exports.MAGIC_PROGRAM_ID = exports.DELEGATION_PROGRAM_ID = void 0;
4
4
  const web3_js_1 = require("@solana/web3.js");
5
5
  exports.DELEGATION_PROGRAM_ID = new web3_js_1.PublicKey("DELeGGvXpWV2fqJUhqcF5ZSYMS4JTLjteaAMARRSaeSh");
6
6
  exports.MAGIC_PROGRAM_ID = new web3_js_1.PublicKey("Magic11111111111111111111111111111111111111");
7
7
  exports.MAGIC_CONTEXT_ID = new web3_js_1.PublicKey("MagicContext1111111111111111111111111111111");
8
+ exports.PERMISSION_PROGRAM_ID = new web3_js_1.PublicKey("BTWAqWNBmF2TboMh3fxMJfgR16xGHYD7Kgr2dPwbRPBi");
8
9
  //# sourceMappingURL=constants.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"constants.js","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC;AAEW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AACW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC"}
1
+ {"version":3,"file":"constants.js","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC;AAEW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AACW,QAAA,gBAAgB,GAAG,IAAI,mBAAS,CAC3C,6CAA6C,CAC9C,CAAC;AAEW,QAAA,qBAAqB,GAAG,IAAI,mBAAS,CAChD,8CAA8C,CAC/C,CAAC"}
package/lib/index.d.ts CHANGED
@@ -1,7 +1,8 @@
1
1
  export * from "./constants.js";
2
- export * from "./instructions/index.js";
3
2
  export * from "./pda.js";
4
3
  export * from "./utils.js";
5
4
  export * from "./resolver.js";
6
5
  export * from "./magic-router.js";
6
+ export * from "./instructions/index.js";
7
+ export * from "./access-control/index.js";
7
8
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,yBAAyB,CAAC;AACxC,cAAc,UAAU,CAAC;AACzB,cAAc,YAAY,CAAC;AAC3B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,UAAU,CAAC;AACzB,cAAc,YAAY,CAAC;AAC3B,cAAc,eAAe,CAAC;AAC9B,cAAc,mBAAmB,CAAC;AAClC,cAAc,yBAAyB,CAAC;AACxC,cAAc,2BAA2B,CAAC"}
package/lib/index.js CHANGED
@@ -15,9 +15,10 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
15
15
  };
16
16
  Object.defineProperty(exports, "__esModule", { value: true });
17
17
  __exportStar(require("./constants.js"), exports);
18
- __exportStar(require("./instructions/index.js"), exports);
19
18
  __exportStar(require("./pda.js"), exports);
20
19
  __exportStar(require("./utils.js"), exports);
21
20
  __exportStar(require("./resolver.js"), exports);
22
21
  __exportStar(require("./magic-router.js"), exports);
22
+ __exportStar(require("./instructions/index.js"), exports);
23
+ __exportStar(require("./access-control/index.js"), exports);
23
24
  //# sourceMappingURL=index.js.map
package/lib/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,iDAA+B;AAC/B,0DAAwC;AACxC,2CAAyB;AACzB,6CAA2B;AAC3B,gDAA8B;AAC9B,oDAAkC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,iDAA+B;AAC/B,2CAAyB;AACzB,6CAA2B;AAC3B,gDAA8B;AAC9B,oDAAkC;AAClC,0DAAwC;AACxC,4DAA0C"}
@@ -1,3 +1,4 @@
1
1
  export * from "./delegation-program";
2
2
  export * from "./magic-program";
3
+ export * from "./permission-program";
3
4
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":"AAAA,cAAc,sBAAsB,CAAC;AACrC,cAAc,iBAAiB,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":"AAAA,cAAc,sBAAsB,CAAC;AACrC,cAAc,iBAAiB,CAAC;AAChC,cAAc,sBAAsB,CAAC"}
@@ -16,4 +16,5 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
16
16
  Object.defineProperty(exports, "__esModule", { value: true });
17
17
  __exportStar(require("./delegation-program"), exports);
18
18
  __exportStar(require("./magic-program"), exports);
19
+ __exportStar(require("./permission-program"), exports);
19
20
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,uDAAqC;AACrC,kDAAgC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/instructions/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,uDAAqC;AACrC,kDAAgC;AAChC,uDAAqC"}
@@ -0,0 +1,11 @@
1
+ import { PublicKey, TransactionInstruction } from "@solana/web3.js";
2
+ export interface CreateGroupInstructionArgs {
3
+ id: PublicKey;
4
+ members: PublicKey[];
5
+ }
6
+ export declare function createCreateGroupInstruction(accounts: {
7
+ group: PublicKey;
8
+ payer: PublicKey;
9
+ }, args: CreateGroupInstructionArgs): TransactionInstruction;
10
+ export declare function serializeCreateGroupInstructionData(args: CreateGroupInstructionArgs): Buffer;
11
+ //# sourceMappingURL=createGroup.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"createGroup.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/createGroup.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAGvB,MAAM,iBAAiB,CAAC;AAMzB,MAAM,WAAW,0BAA0B;IACzC,EAAE,EAAE,SAAS,CAAC;IACd,OAAO,EAAE,SAAS,EAAE,CAAC;CACtB;AAMD,wBAAgB,4BAA4B,CAC1C,QAAQ,EAAE;IACR,KAAK,EAAE,SAAS,CAAC;IACjB,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,EAAE,0BAA0B,GAC/B,sBAAsB,CAcxB;AAED,wBAAgB,mCAAmC,CACjD,IAAI,EAAE,0BAA0B,GAC/B,MAAM,CAuBR"}
@@ -0,0 +1,35 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createCreateGroupInstruction = createCreateGroupInstruction;
4
+ exports.serializeCreateGroupInstructionData = serializeCreateGroupInstructionData;
5
+ const web3_js_1 = require("@solana/web3.js");
6
+ const constants_1 = require("../../constants");
7
+ function createCreateGroupInstruction(accounts, args) {
8
+ const keys = [
9
+ { pubkey: accounts.group, isWritable: true, isSigner: false },
10
+ { pubkey: accounts.payer, isWritable: true, isSigner: true },
11
+ { pubkey: web3_js_1.SystemProgram.programId, isWritable: false, isSigner: false },
12
+ ];
13
+ const instructionData = serializeCreateGroupInstructionData(args);
14
+ return new web3_js_1.TransactionInstruction({
15
+ programId: constants_1.PERMISSION_PROGRAM_ID,
16
+ keys,
17
+ data: instructionData,
18
+ });
19
+ }
20
+ function serializeCreateGroupInstructionData(args) {
21
+ const discriminator = 0;
22
+ const buffer = Buffer.alloc(10000);
23
+ let offset = 0;
24
+ buffer[offset++] = discriminator;
25
+ buffer.set(args.id.toBuffer(), offset);
26
+ offset += 32;
27
+ buffer.writeUInt32LE(args.members.length, offset);
28
+ offset += 4;
29
+ for (const member of args.members) {
30
+ buffer.set(member.toBuffer(), offset);
31
+ offset += 32;
32
+ }
33
+ return buffer.subarray(0, offset);
34
+ }
35
+ //# sourceMappingURL=createGroup.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"createGroup.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/createGroup.ts"],"names":[],"mappings":";;AAoBA,oEAoBC;AAED,kFAyBC;AAnED,6CAKyB;AACzB,+CAAwD;AAcxD,SAAgB,4BAA4B,CAC1C,QAGC,EACD,IAAgC;IAEhC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAC7D,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE;QAC5D,EAAE,MAAM,EAAE,uBAAa,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KACxE,CAAC;IAEF,MAAM,eAAe,GAAG,mCAAmC,CAAC,IAAI,CAAC,CAAC;IAElE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,mCAAmC,CACjD,IAAgC;IAEhC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC;IACnC,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAGjC,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;IACvC,MAAM,IAAI,EAAE,CAAC;IAGb,MAAM,CAAC,aAAa,CAAC,IAAI,CAAC,OAAO,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAClD,MAAM,IAAI,CAAC,CAAC;IAGZ,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;QAClC,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,QAAQ,EAAE,EAAE,MAAM,CAAC,CAAC;QACtC,MAAM,IAAI,EAAE,CAAC;IACf,CAAC;IAED,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
@@ -0,0 +1,11 @@
1
+ import { PublicKey, TransactionInstruction } from "@solana/web3.js";
2
+ export interface CreatePermissionInstructionArgs {
3
+ }
4
+ export declare function createCreatePermissionInstruction(accounts: {
5
+ permission: PublicKey;
6
+ delegatedAccount: PublicKey;
7
+ group: PublicKey;
8
+ payer: PublicKey;
9
+ }, args?: CreatePermissionInstructionArgs): TransactionInstruction;
10
+ export declare function serializeCreatePermissionInstructionData(args?: CreatePermissionInstructionArgs): Buffer;
11
+ //# sourceMappingURL=createPermission.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"createPermission.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/createPermission.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAGvB,MAAM,iBAAiB,CAAC;AAOzB,MAAM,WAAW,+BAA+B;CAAG;AAMnD,wBAAgB,iCAAiC,CAC/C,QAAQ,EAAE;IACR,UAAU,EAAE,SAAS,CAAC;IACtB,gBAAgB,EAAE,SAAS,CAAC;IAC5B,KAAK,EAAE,SAAS,CAAC;IACjB,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,CAAC,EAAE,+BAA+B,GACrC,sBAAsB,CAgBxB;AAED,wBAAgB,wCAAwC,CACtD,IAAI,CAAC,EAAE,+BAA+B,GACrC,MAAM,CASR"}
@@ -0,0 +1,29 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createCreatePermissionInstruction = createCreatePermissionInstruction;
4
+ exports.serializeCreatePermissionInstructionData = serializeCreatePermissionInstructionData;
5
+ const web3_js_1 = require("@solana/web3.js");
6
+ const constants_1 = require("../../constants");
7
+ function createCreatePermissionInstruction(accounts, args) {
8
+ const keys = [
9
+ { pubkey: accounts.permission, isWritable: true, isSigner: false },
10
+ { pubkey: accounts.delegatedAccount, isWritable: false, isSigner: true },
11
+ { pubkey: accounts.group, isWritable: false, isSigner: false },
12
+ { pubkey: accounts.payer, isWritable: true, isSigner: true },
13
+ { pubkey: web3_js_1.SystemProgram.programId, isWritable: false, isSigner: false },
14
+ ];
15
+ const instructionData = serializeCreatePermissionInstructionData(args);
16
+ return new web3_js_1.TransactionInstruction({
17
+ programId: constants_1.PERMISSION_PROGRAM_ID,
18
+ keys,
19
+ data: instructionData,
20
+ });
21
+ }
22
+ function serializeCreatePermissionInstructionData(args) {
23
+ const discriminator = 1;
24
+ const buffer = Buffer.alloc(1);
25
+ let offset = 0;
26
+ buffer[offset++] = discriminator;
27
+ return buffer.subarray(0, offset);
28
+ }
29
+ //# sourceMappingURL=createPermission.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"createPermission.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/createPermission.ts"],"names":[],"mappings":";;AAkBA,8EAwBC;AAED,4FAWC;AAvDD,6CAKyB;AACzB,+CAAwD;AAYxD,SAAgB,iCAAiC,CAC/C,QAKC,EACD,IAAsC;IAEtC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAClE,EAAE,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE;QACxE,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;QAC9D,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE;QAC5D,EAAE,MAAM,EAAE,uBAAa,CAAC,SAAS,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KACxE,CAAC;IAEF,MAAM,eAAe,GAAG,wCAAwC,CAAC,IAAI,CAAC,CAAC;IAEvE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,wCAAwC,CACtD,IAAsC;IAEtC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IAC/B,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAEjC,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
@@ -0,0 +1,4 @@
1
+ export { createCreateGroupInstruction, type CreateGroupInstructionArgs, } from "./createGroup";
2
+ export { createCreatePermissionInstruction, type CreatePermissionInstructionArgs, } from "./createPermission";
3
+ export { createUpdatePermissionInstruction, type UpdatePermissionInstructionArgs, } from "./updatePermission";
4
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/index.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,4BAA4B,EAC5B,KAAK,0BAA0B,GAChC,MAAM,eAAe,CAAC;AACvB,OAAO,EACL,iCAAiC,EACjC,KAAK,+BAA+B,GACrC,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EACL,iCAAiC,EACjC,KAAK,+BAA+B,GACrC,MAAM,oBAAoB,CAAC"}
@@ -0,0 +1,10 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createUpdatePermissionInstruction = exports.createCreatePermissionInstruction = exports.createCreateGroupInstruction = void 0;
4
+ var createGroup_1 = require("./createGroup");
5
+ Object.defineProperty(exports, "createCreateGroupInstruction", { enumerable: true, get: function () { return createGroup_1.createCreateGroupInstruction; } });
6
+ var createPermission_1 = require("./createPermission");
7
+ Object.defineProperty(exports, "createCreatePermissionInstruction", { enumerable: true, get: function () { return createPermission_1.createCreatePermissionInstruction; } });
8
+ var updatePermission_1 = require("./updatePermission");
9
+ Object.defineProperty(exports, "createUpdatePermissionInstruction", { enumerable: true, get: function () { return updatePermission_1.createUpdatePermissionInstruction; } });
10
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/index.ts"],"names":[],"mappings":";;;AAAA,6CAGuB;AAFrB,2HAAA,4BAA4B,OAAA;AAG9B,uDAG4B;AAF1B,qIAAA,iCAAiC,OAAA;AAGnC,uDAG4B;AAF1B,qIAAA,iCAAiC,OAAA"}
@@ -0,0 +1,10 @@
1
+ import { PublicKey, TransactionInstruction } from "@solana/web3.js";
2
+ export interface UpdatePermissionInstructionArgs {
3
+ }
4
+ export declare function createUpdatePermissionInstruction(accounts: {
5
+ permission: PublicKey;
6
+ delegatedAccount: PublicKey;
7
+ group: PublicKey;
8
+ }, args?: UpdatePermissionInstructionArgs): TransactionInstruction;
9
+ export declare function serializeUpdatePermissionInstructionData(args?: UpdatePermissionInstructionArgs): Buffer;
10
+ //# sourceMappingURL=updatePermission.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"updatePermission.d.ts","sourceRoot":"","sources":["../../../src/instructions/permission-program/updatePermission.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,SAAS,EACT,sBAAsB,EAEvB,MAAM,iBAAiB,CAAC;AAOzB,MAAM,WAAW,+BAA+B;CAAG;AAMnD,wBAAgB,iCAAiC,CAC/C,QAAQ,EAAE;IACR,UAAU,EAAE,SAAS,CAAC;IACtB,gBAAgB,EAAE,SAAS,CAAC;IAC5B,KAAK,EAAE,SAAS,CAAC;CAClB,EACD,IAAI,CAAC,EAAE,+BAA+B,GACrC,sBAAsB,CAcxB;AAED,wBAAgB,wCAAwC,CACtD,IAAI,CAAC,EAAE,+BAA+B,GACrC,MAAM,CASR"}
@@ -0,0 +1,27 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.createUpdatePermissionInstruction = createUpdatePermissionInstruction;
4
+ exports.serializeUpdatePermissionInstructionData = serializeUpdatePermissionInstructionData;
5
+ const web3_js_1 = require("@solana/web3.js");
6
+ const constants_1 = require("../../constants");
7
+ function createUpdatePermissionInstruction(accounts, args) {
8
+ const keys = [
9
+ { pubkey: accounts.permission, isWritable: true, isSigner: false },
10
+ { pubkey: accounts.delegatedAccount, isWritable: false, isSigner: true },
11
+ { pubkey: accounts.group, isWritable: false, isSigner: false },
12
+ ];
13
+ const instructionData = serializeUpdatePermissionInstructionData(args);
14
+ return new web3_js_1.TransactionInstruction({
15
+ programId: constants_1.PERMISSION_PROGRAM_ID,
16
+ keys,
17
+ data: instructionData,
18
+ });
19
+ }
20
+ function serializeUpdatePermissionInstructionData(args) {
21
+ const discriminator = 2;
22
+ const buffer = Buffer.alloc(1);
23
+ let offset = 0;
24
+ buffer[offset++] = discriminator;
25
+ return buffer.subarray(0, offset);
26
+ }
27
+ //# sourceMappingURL=updatePermission.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"updatePermission.js","sourceRoot":"","sources":["../../../src/instructions/permission-program/updatePermission.ts"],"names":[],"mappings":";;AAiBA,8EAqBC;AAED,4FAWC;AAnDD,6CAIyB;AACzB,+CAAwD;AAYxD,SAAgB,iCAAiC,CAC/C,QAIC,EACD,IAAsC;IAEtC,MAAM,IAAI,GAAkB;QAC1B,EAAE,MAAM,EAAE,QAAQ,CAAC,UAAU,EAAE,UAAU,EAAE,IAAI,EAAE,QAAQ,EAAE,KAAK,EAAE;QAClE,EAAE,MAAM,EAAE,QAAQ,CAAC,gBAAgB,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE;QACxE,EAAE,MAAM,EAAE,QAAQ,CAAC,KAAK,EAAE,UAAU,EAAE,KAAK,EAAE,QAAQ,EAAE,KAAK,EAAE;KAC/D,CAAC;IAEF,MAAM,eAAe,GAAG,wCAAwC,CAAC,IAAI,CAAC,CAAC;IAEvE,OAAO,IAAI,gCAAsB,CAAC;QAChC,SAAS,EAAE,iCAAqB;QAChC,IAAI;QACJ,IAAI,EAAE,eAAe;KACtB,CAAC,CAAC;AACL,CAAC;AAED,SAAgB,wCAAwC,CACtD,IAAsC;IAEtC,MAAM,aAAa,GAAG,CAAC,CAAC;IACxB,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IAC/B,IAAI,MAAM,GAAG,CAAC,CAAC;IAGf,MAAM,CAAC,MAAM,EAAE,CAAC,GAAG,aAAa,CAAC;IAEjC,OAAO,MAAM,CAAC,QAAQ,CAAC,CAAC,EAAE,MAAM,CAAC,CAAC;AACpC,CAAC"}
package/lib/pda.d.ts CHANGED
@@ -3,9 +3,11 @@ export declare function delegationRecordPdaFromDelegatedAccount(delegatedAccount
3
3
  export declare function delegationMetadataPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
4
4
  export declare function delegateBufferPdaFromDelegatedAccountAndOwnerProgram(delegatedAccount: PublicKey, ownerProgramId: PublicKey): PublicKey;
5
5
  export declare function escrowPdaFromEscrowAuthority(escrowAuthority: PublicKey, index?: number): PublicKey;
6
- export declare function commitStatePdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
7
- export declare function commitRecordPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
8
6
  export declare function undelegateBufferPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
9
7
  export declare function feesVaultPda(): PublicKey;
10
8
  export declare function validatorFeesVaultPdaFromValidator(validator: PublicKey): PublicKey;
9
+ export declare function commitStatePdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
10
+ export declare function commitRecordPdaFromDelegatedAccount(delegatedAccount: PublicKey): PublicKey;
11
+ export declare function permissionPdaFromAccount(account: PublicKey): PublicKey;
12
+ export declare function groupPdaFromId(id: PublicKey): PublicKey;
11
13
  //# sourceMappingURL=pda.d.ts.map
package/lib/pda.d.ts.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAI5C,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAED,wBAAgB,yCAAyC,CACvD,gBAAgB,EAAE,SAAS,aAM5B;AAED,wBAAgB,oDAAoD,CAClE,gBAAgB,EAAE,SAAS,EAC3B,cAAc,EAAE,SAAS,aAM1B;AAED,wBAAgB,4BAA4B,CAC1C,eAAe,EAAE,SAAS,EAC1B,KAAK,GAAE,MAAY,aASpB;AAED,wBAAgB,kCAAkC,CAChD,gBAAgB,EAAE,SAAS,aAM5B;AAED,wBAAgB,mCAAmC,CACjD,gBAAgB,EAAE,SAAS,aAM5B;AAED,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAED,wBAAgB,YAAY,cAK3B;AAED,wBAAgB,kCAAkC,CAAC,SAAS,EAAE,SAAS,aAKtE"}
1
+ {"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAa5C,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAOD,wBAAgB,yCAAyC,CACvD,gBAAgB,EAAE,SAAS,aAM5B;AAQD,wBAAgB,oDAAoD,CAClE,gBAAgB,EAAE,SAAS,EAC3B,cAAc,EAAE,SAAS,aAM1B;AAQD,wBAAgB,4BAA4B,CAC1C,eAAe,EAAE,SAAS,EAC1B,KAAK,GAAE,MAAY,aASpB;AAOD,wBAAgB,uCAAuC,CACrD,gBAAgB,EAAE,SAAS,aAM5B;AAMD,wBAAgB,YAAY,cAK3B;AAOD,wBAAgB,kCAAkC,CAAC,SAAS,EAAE,SAAS,aAKtE;AAOD,wBAAgB,kCAAkC,CAChD,gBAAgB,EAAE,SAAS,aAM5B;AAOD,wBAAgB,mCAAmC,CACjD,gBAAgB,EAAE,SAAS,aAM5B;AAcD,wBAAgB,wBAAwB,CAAC,OAAO,EAAE,SAAS,aAK1D;AAOD,wBAAgB,cAAc,CAAC,EAAE,EAAE,SAAS,aAK3C"}
package/lib/pda.js CHANGED
@@ -4,11 +4,13 @@ exports.delegationRecordPdaFromDelegatedAccount = delegationRecordPdaFromDelegat
4
4
  exports.delegationMetadataPdaFromDelegatedAccount = delegationMetadataPdaFromDelegatedAccount;
5
5
  exports.delegateBufferPdaFromDelegatedAccountAndOwnerProgram = delegateBufferPdaFromDelegatedAccountAndOwnerProgram;
6
6
  exports.escrowPdaFromEscrowAuthority = escrowPdaFromEscrowAuthority;
7
- exports.commitStatePdaFromDelegatedAccount = commitStatePdaFromDelegatedAccount;
8
- exports.commitRecordPdaFromDelegatedAccount = commitRecordPdaFromDelegatedAccount;
9
7
  exports.undelegateBufferPdaFromDelegatedAccount = undelegateBufferPdaFromDelegatedAccount;
10
8
  exports.feesVaultPda = feesVaultPda;
11
9
  exports.validatorFeesVaultPdaFromValidator = validatorFeesVaultPdaFromValidator;
10
+ exports.commitStatePdaFromDelegatedAccount = commitStatePdaFromDelegatedAccount;
11
+ exports.commitRecordPdaFromDelegatedAccount = commitRecordPdaFromDelegatedAccount;
12
+ exports.permissionPdaFromAccount = permissionPdaFromAccount;
13
+ exports.groupPdaFromId = groupPdaFromId;
12
14
  const web3_js_1 = require("@solana/web3.js");
13
15
  const constants_js_1 = require("./constants.js");
14
16
  function delegationRecordPdaFromDelegatedAccount(delegatedAccount) {
@@ -26,12 +28,6 @@ function escrowPdaFromEscrowAuthority(escrowAuthority, index = 255) {
26
28
  }
27
29
  return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("balance"), escrowAuthority.toBytes(), Buffer.from([index])], constants_js_1.DELEGATION_PROGRAM_ID)[0];
28
30
  }
29
- function commitStatePdaFromDelegatedAccount(delegatedAccount) {
30
- return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("state-diff"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
31
- }
32
- function commitRecordPdaFromDelegatedAccount(delegatedAccount) {
33
- return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("commit-state-record"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
34
- }
35
31
  function undelegateBufferPdaFromDelegatedAccount(delegatedAccount) {
36
32
  return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("undelegate-buffer"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
37
33
  }
@@ -41,4 +37,18 @@ function feesVaultPda() {
41
37
  function validatorFeesVaultPdaFromValidator(validator) {
42
38
  return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("v-fees-vault"), validator.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
43
39
  }
40
+ function commitStatePdaFromDelegatedAccount(delegatedAccount) {
41
+ return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("state-diff"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
42
+ }
43
+ function commitRecordPdaFromDelegatedAccount(delegatedAccount) {
44
+ return web3_js_1.PublicKey.findProgramAddressSync([Buffer.from("commit-state-record"), delegatedAccount.toBytes()], constants_js_1.DELEGATION_PROGRAM_ID)[0];
45
+ }
46
+ const PERMISSION_SEED = Buffer.from("permission:");
47
+ const GROUP_SEED = Buffer.from("group:");
48
+ function permissionPdaFromAccount(account) {
49
+ return web3_js_1.PublicKey.findProgramAddressSync([PERMISSION_SEED, account.toBuffer()], constants_js_1.PERMISSION_PROGRAM_ID)[0];
50
+ }
51
+ function groupPdaFromId(id) {
52
+ return web3_js_1.PublicKey.findProgramAddressSync([GROUP_SEED, id.toBuffer()], constants_js_1.PERMISSION_PROGRAM_ID)[0];
53
+ }
44
54
  //# sourceMappingURL=pda.js.map
package/lib/pda.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"pda.js","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":";;AAIA,0FAOC;AAED,8FAOC;AAED,oHAQC;AAED,oEAWC;AAED,gFAOC;AAED,kFAOC;AAED,0FAOC;AAED,oCAKC;AAED,gFAKC;AApFD,6CAA4C;AAE5C,iDAAuD;AAEvD,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,yCAAyC,CACvD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,oDAAoD,CAClE,gBAA2B,EAC3B,cAAyB;IAEzB,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACnD,cAAc,CACf,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,4BAA4B,CAC1C,eAA0B,EAC1B,QAAgB,GAAG;IAEnB,IAAI,KAAK,GAAG,CAAC,IAAI,KAAK,GAAG,GAAG,EAAE,CAAC;QAC7B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IACD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,eAAe,CAAC,OAAO,EAAE,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EACzE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,kCAAkC,CAChD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,mCAAmC,CACjD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAC9D,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,YAAY;IAC1B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,EAC3B,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAED,SAAgB,kCAAkC,CAAC,SAAoB;IACrE,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,SAAS,CAAC,OAAO,EAAE,CAAC,EAClD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC"}
1
+ {"version":3,"file":"pda.js","sourceRoot":"","sources":["../src/pda.ts"],"names":[],"mappings":";;AAaA,0FAOC;AAOD,8FAOC;AAQD,oHAQC;AAQD,oEAWC;AAOD,0FAOC;AAMD,oCAKC;AAOD,gFAKC;AAOD,gFAOC;AAOD,kFAOC;AAcD,4DAKC;AAOD,wCAKC;AArKD,6CAA4C;AAE5C,iDAA8E;AAW9E,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,yCAAyC,CACvD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAQD,SAAgB,oDAAoD,CAClE,gBAA2B,EAC3B,cAAyB;IAEzB,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACnD,cAAc,CACf,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAQD,SAAgB,4BAA4B,CAC1C,eAA0B,EAC1B,QAAgB,GAAG;IAEnB,IAAI,KAAK,GAAG,CAAC,IAAI,KAAK,GAAG,GAAG,EAAE,CAAC;QAC7B,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;IACrD,CAAC;IACD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,eAAe,CAAC,OAAO,EAAE,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EACzE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,uCAAuC,CACrD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,mBAAmB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAC9D,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAMD,SAAgB,YAAY;IAC1B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,EAC3B,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,kCAAkC,CAAC,SAAoB;IACrE,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,SAAS,CAAC,OAAO,EAAE,CAAC,EAClD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,kCAAkC,CAChD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EACvD,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,mCAAmC,CACjD,gBAA2B;IAE3B,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,CAAC,EAAE,gBAAgB,CAAC,OAAO,EAAE,CAAC,EAChE,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAMD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;AACnD,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;AAOzC,SAAgB,wBAAwB,CAAC,OAAkB;IACzD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,EACrC,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,cAAc,CAAC,EAAa;IAC1C,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,UAAU,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,EAC3B,oCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@magicblock-labs/ephemeral-rollups-sdk",
3
- "version": "0.6.0",
3
+ "version": "0.6.4",
4
4
  "author": "MagicBlock Labs",
5
5
  "license": "MIT",
6
6
  "publishConfig": {
@@ -9,8 +9,7 @@
9
9
  },
10
10
  "main": "lib/index.js",
11
11
  "exports": {
12
- ".": "./lib/index.js",
13
- "./privacy": "./lib/privacy/index.js"
12
+ ".": "./lib/index.js"
14
13
  },
15
14
  "scripts": {
16
15
  "clean": "rimraf lib",
@@ -1 +0,0 @@
1
- {"version":3,"file":"auth.d.ts","sourceRoot":"","sources":["../../src/privacy/auth.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAkB5C,wBAAsB,YAAY,CAChC,MAAM,EAAE,MAAM,EACd,SAAS,EAAE,SAAS,EACpB,WAAW,EAAE,CAAC,OAAO,EAAE,UAAU,KAAK,OAAO,CAAC,UAAU,CAAC,mBAkC1D"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"auth.js","sourceRoot":"","sources":["../../src/privacy/auth.ts"],"names":[],"mappings":";;AAkBA,oCAqCC;AArCM,KAAK,UAAU,YAAY,CAChC,MAAc,EACd,SAAoB,EACpB,WAAyD;IAGzD,MAAM,IAAI,GAAG,CAAC,MAAM,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,OAAO,CAAC;IAG5C,MAAM,iBAAiB,GAAG,MAAM,KAAK,CACnC,GAAG,MAAM,0BAA0B,SAAS,CAAC,QAAQ,EAAE,EAAE,CAC1D,CAAC;IACF,MAAM,EAAE,SAAS,EAAE,GAA0B,MAAM,iBAAiB,CAAC,IAAI,EAAE,CAAC;IAG5E,MAAM,SAAS,GAAG,MAAM,WAAW,CACjC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,EAAE,OAAO,CAAC,CAAC,CAChD,CAAC;IACF,MAAM,eAAe,GAAG,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC;IAG/C,MAAM,YAAY,GAAG,MAAM,KAAK,CAAC,GAAG,MAAM,aAAa,EAAE;QACvD,MAAM,EAAE,MAAM;QACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;QAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;YACnB,MAAM,EAAE,SAAS,CAAC,QAAQ,EAAE;YAC5B,SAAS;YACT,SAAS,EAAE,eAAe;SAC3B,CAAC;KACH,CAAC,CAAC;IACH,MAAM,QAAQ,GAAsB,MAAM,YAAY,CAAC,IAAI,EAAE,CAAC;IAE9D,IAAI,YAAY,CAAC,MAAM,KAAK,GAAG,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CAAC,2BAA2B,QAAQ,CAAC,KAAK,EAAE,CAAC,CAAC;IAC/D,CAAC;IAED,OAAO,QAAQ,CAAC,KAAK,CAAC;AACxB,CAAC"}
@@ -1,4 +0,0 @@
1
- import { PublicKey } from "@solana/web3.js";
2
- export declare const SESSION_DURATION: number;
3
- export declare const PERMISSION_PROGRAM_ID: PublicKey;
4
- //# sourceMappingURL=constants.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../../src/privacy/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAE5C,eAAO,MAAM,gBAAgB,QAA2B,CAAC;AAEzD,eAAO,MAAM,qBAAqB,EAAE,SAEnC,CAAC"}
@@ -1,7 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.PERMISSION_PROGRAM_ID = exports.SESSION_DURATION = void 0;
4
- const web3_js_1 = require("@solana/web3.js");
5
- exports.SESSION_DURATION = 1000 * 60 * 60 * 24 * 30;
6
- exports.PERMISSION_PROGRAM_ID = new web3_js_1.PublicKey("BTWAqWNBmF2TboMh3fxMJfgR16xGHYD7Kgr2dPwbRPBi");
7
- //# sourceMappingURL=constants.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"constants.js","sourceRoot":"","sources":["../../src/privacy/constants.ts"],"names":[],"mappings":";;;AAAA,6CAA4C;AAE/B,QAAA,gBAAgB,GAAG,IAAI,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC;AAE5C,QAAA,qBAAqB,GAAc,IAAI,mBAAS,CAC3D,8CAA8C,CAC/C,CAAC"}
@@ -1,5 +0,0 @@
1
- export * from "./pda";
2
- export * from "./auth";
3
- export * from "./verify";
4
- export * from "./constants";
5
- //# sourceMappingURL=index.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/privacy/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAC;AACtB,cAAc,QAAQ,CAAC;AACvB,cAAc,UAAU,CAAC;AACzB,cAAc,aAAa,CAAC"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/privacy/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,wCAAsB;AACtB,yCAAuB;AACvB,2CAAyB;AACzB,8CAA4B"}
@@ -1,4 +0,0 @@
1
- import { PublicKey } from "@solana/web3.js";
2
- export declare function permissionPdaFromAccount(account: PublicKey): PublicKey;
3
- export declare function groupPdaFromId(id: PublicKey): PublicKey;
4
- //# sourceMappingURL=pda.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"pda.d.ts","sourceRoot":"","sources":["../../src/privacy/pda.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,SAAS,EAAE,MAAM,iBAAiB,CAAC;AAW5C,wBAAgB,wBAAwB,CAAC,OAAO,EAAE,SAAS,aAK1D;AAOD,wBAAgB,cAAc,CAAC,EAAE,EAAE,SAAS,aAK3C"}
@@ -1,15 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.permissionPdaFromAccount = permissionPdaFromAccount;
4
- exports.groupPdaFromId = groupPdaFromId;
5
- const web3_js_1 = require("@solana/web3.js");
6
- const constants_1 = require("./constants");
7
- const PERMISSION_SEED = Buffer.from("permission:");
8
- const GROUP_SEED = Buffer.from("group:");
9
- function permissionPdaFromAccount(account) {
10
- return web3_js_1.PublicKey.findProgramAddressSync([PERMISSION_SEED, account.toBuffer()], constants_1.PERMISSION_PROGRAM_ID)[0];
11
- }
12
- function groupPdaFromId(id) {
13
- return web3_js_1.PublicKey.findProgramAddressSync([GROUP_SEED, id.toBuffer()], constants_1.PERMISSION_PROGRAM_ID)[0];
14
- }
15
- //# sourceMappingURL=pda.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"pda.js","sourceRoot":"","sources":["../../src/privacy/pda.ts"],"names":[],"mappings":";;AAWA,4DAKC;AAOD,wCAKC;AA5BD,6CAA4C;AAC5C,2CAAoD;AAEpD,MAAM,eAAe,GAAG,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;AACnD,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;AAOzC,SAAgB,wBAAwB,CAAC,OAAkB;IACzD,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,eAAe,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,EACrC,iCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC;AAOD,SAAgB,cAAc,CAAC,EAAa;IAC1C,OAAO,mBAAS,CAAC,sBAAsB,CACrC,CAAC,UAAU,EAAE,EAAE,CAAC,QAAQ,EAAE,CAAC,EAC3B,iCAAqB,CACtB,CAAC,CAAC,CAAC,CAAC;AACP,CAAC"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"verify.d.ts","sourceRoot":"","sources":["../../src/privacy/verify.ts"],"names":[],"mappings":"AAcA,wBAAsB,qBAAqB,CAAC,MAAM,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CA4C5E"}
@@ -1 +0,0 @@
1
- {"version":3,"file":"verify.js","sourceRoot":"","sources":["../../src/privacy/verify.ts"],"names":[],"mappings":";;AAcA,sDA4CC;AA5CM,KAAK,UAAU,qBAAqB,CAAC,MAAc;IAExD,MAAM,EACJ,OAAO,EAAE,IAAI,EACb,iBAAiB,EAAE,eAAe,EAClC,SAAS,EAAE,QAAQ,GACpB,GAAG,MAAM,MAAM,CAAC,qBAAqB,CAAC,CAAC;IAExC,MAAM,cAAc,GAAG,MAAM,CAAC,IAAI,CAChC,UAAU,CAAC,IAAI,CACb,KAAK,CAAC,EAAE,CAAC;SACN,IAAI,CAAC,CAAC,CAAC;SACP,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,GAAG,CAAC,CAAC,CAC9C,CACF,CAAC;IACF,MAAM,SAAS,GAAG,cAAc,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACpD,MAAM,GAAG,GAAG,GAAG,MAAM,oBAAoB,kBAAkB,CAAC,SAAS,CAAC,EAAE,CAAC;IAEzE,MAAM,QAAQ,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,CAAC;IAClC,MAAM,YAAY,GAAkC,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;IAE1E,IAAI,QAAQ,CAAC,MAAM,KAAK,GAAG,IAAI,CAAC,CAAC,OAAO,IAAI,YAAY,CAAC,EAAE,CAAC;QAC1D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,KAAK,IAAI,qBAAqB,CAAC,CAAC;IAC/D,CAAC;IAGD,MAAM,IAAI,EAAE,CAAC;IAEb,MAAM,QAAQ,GAAG,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,CAAC,CAAC,CAAC;IAG5E,MAAM,OAAO,GAAG,iDAAiD,CAAC;IAClE,MAAM,eAAe,GAAG,MAAM,eAAe,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;IAGjE,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC,CAAC;IAGlD,IAAI,CAAC;QACH,QAAQ,CAAC,QAAQ,EAAE,eAAe,EAAE,GAAG,CAAC,CAAC;QACzC,OAAO,IAAI,CAAC;IACd,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,OAAO,KAAK,CAAC;IACf,CAAC;AACH,CAAC"}
File without changes
File without changes