@metamask-previews/gator-permissions-controller 0.0.0-preview-541d905c

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/CHANGELOG.md +14 -0
  2. package/LICENSE +20 -0
  3. package/README.md +38 -0
  4. package/dist/GatorPermissionsController.cjs +238 -0
  5. package/dist/GatorPermissionsController.cjs.map +1 -0
  6. package/dist/GatorPermissionsController.d.cts +139 -0
  7. package/dist/GatorPermissionsController.d.cts.map +1 -0
  8. package/dist/GatorPermissionsController.d.mts +139 -0
  9. package/dist/GatorPermissionsController.d.mts.map +1 -0
  10. package/dist/GatorPermissionsController.mjs +234 -0
  11. package/dist/GatorPermissionsController.mjs.map +1 -0
  12. package/dist/errors.cjs +54 -0
  13. package/dist/errors.cjs.map +1 -0
  14. package/dist/errors.d.cts +40 -0
  15. package/dist/errors.d.cts.map +1 -0
  16. package/dist/errors.d.mts +40 -0
  17. package/dist/errors.d.mts.map +1 -0
  18. package/dist/errors.mjs +46 -0
  19. package/dist/errors.mjs.map +1 -0
  20. package/dist/index.cjs +12 -0
  21. package/dist/index.cjs.map +1 -0
  22. package/dist/index.d.cts +5 -0
  23. package/dist/index.d.cts.map +1 -0
  24. package/dist/index.d.mts +5 -0
  25. package/dist/index.d.mts.map +1 -0
  26. package/dist/index.mjs +3 -0
  27. package/dist/index.mjs.map +1 -0
  28. package/dist/logger.cjs +10 -0
  29. package/dist/logger.cjs.map +1 -0
  30. package/dist/logger.d.cts +7 -0
  31. package/dist/logger.d.cts.map +1 -0
  32. package/dist/logger.d.mts +7 -0
  33. package/dist/logger.d.mts.map +1 -0
  34. package/dist/logger.mjs +7 -0
  35. package/dist/logger.mjs.map +1 -0
  36. package/dist/test/mocks.cjs +224 -0
  37. package/dist/test/mocks.cjs.map +1 -0
  38. package/dist/test/mocks.d.cts +33 -0
  39. package/dist/test/mocks.d.cts.map +1 -0
  40. package/dist/test/mocks.d.mts +33 -0
  41. package/dist/test/mocks.d.mts.map +1 -0
  42. package/dist/test/mocks.mjs +215 -0
  43. package/dist/test/mocks.mjs.map +1 -0
  44. package/dist/types.cjs +24 -0
  45. package/dist/types.cjs.map +1 -0
  46. package/dist/types.d.cts +224 -0
  47. package/dist/types.d.cts.map +1 -0
  48. package/dist/types.d.mts +224 -0
  49. package/dist/types.d.mts.map +1 -0
  50. package/dist/types.mjs +21 -0
  51. package/dist/types.mjs.map +1 -0
  52. package/dist/utils.cjs +46 -0
  53. package/dist/utils.cjs.map +1 -0
  54. package/dist/utils.d.cts +16 -0
  55. package/dist/utils.d.cts.map +1 -0
  56. package/dist/utils.d.mts +16 -0
  57. package/dist/utils.d.mts.map +1 -0
  58. package/dist/utils.mjs +41 -0
  59. package/dist/utils.mjs.map +1 -0
  60. package/package.json +79 -0
package/CHANGELOG.md ADDED
@@ -0,0 +1,14 @@
1
+ # Changelog
2
+
3
+ All notable changes to this project will be documented in this file.
4
+
5
+ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
6
+ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
+
8
+ ## [Unreleased]
9
+
10
+ ### Added
11
+
12
+ - Initial release ([#6033](https://github.com/MetaMask/core/pull/6033))
13
+
14
+ [Unreleased]: https://github.com/MetaMask/core/
package/LICENSE ADDED
@@ -0,0 +1,20 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2025 MetaMask
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
package/README.md ADDED
@@ -0,0 +1,38 @@
1
+ # `@metamask/gator-permissions-controller`
2
+
3
+ A dedicated controller for reading gator permissions from profile sync storage. This controller fetches data from the encrypted user storage database and caches it locally, providing fast access to permissions across devices while maintaining privacy through client-side encryption.
4
+
5
+ ## Installation
6
+
7
+ `yarn add @metamask/gator-permissions-controller`
8
+
9
+ or
10
+
11
+ `npm install @metamask/gator-permissions-controller`
12
+
13
+ ## Usage
14
+
15
+ ### Basic Setup
16
+
17
+ ```typescript
18
+ import { GatorPermissionsController } from '@metamask/gator-permissions-controller';
19
+
20
+ // Create the controller
21
+ const gatorPermissionsController = new GatorPermissionsController({
22
+ messenger: yourMessenger,
23
+ });
24
+
25
+ // Enable the feature (requires authentication)
26
+ gatorPermissionsController.enableGatorPermissions();
27
+ ```
28
+
29
+ ### Fetch from Profile Sync
30
+
31
+ ```typescript
32
+ const permissions =
33
+ await gatorPermissionsController.fetchAndUpdateGatorPermissions();
34
+ ```
35
+
36
+ ## Contributing
37
+
38
+ This package is part of a monorepo. Instructions for contributing can be found in the [monorepo README](https://github.com/MetaMask/core#readme).
@@ -0,0 +1,238 @@
1
+ "use strict";
2
+ var __classPrivateFieldGet = (this && this.__classPrivateFieldGet) || function (receiver, state, kind, f) {
3
+ if (kind === "a" && !f) throw new TypeError("Private accessor was defined without a getter");
4
+ if (typeof state === "function" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError("Cannot read private member from an object whose class did not declare it");
5
+ return kind === "m" ? f : kind === "a" ? f.call(receiver) : f ? f.value : state.get(receiver);
6
+ };
7
+ var _GatorPermissionsController_instances, _GatorPermissionsController_setIsFetchingGatorPermissions, _GatorPermissionsController_setIsGatorPermissionsEnabled, _GatorPermissionsController_registerMessageHandlers, _GatorPermissionsController_assertGatorPermissionsEnabled, _GatorPermissionsController_handleSnapRequestToGatorPermissionsProvider, _GatorPermissionsController_sanitizeStoredGatorPermission, _GatorPermissionsController_categorizePermissionsDataByTypeAndChainId;
8
+ Object.defineProperty(exports, "__esModule", { value: true });
9
+ exports.getDefaultGatorPermissionsControllerState = void 0;
10
+ const base_controller_1 = require("@metamask/base-controller");
11
+ const snaps_utils_1 = require("@metamask/snaps-utils");
12
+ const errors_1 = require("./errors.cjs");
13
+ const logger_1 = require("./logger.cjs");
14
+ const types_1 = require("./types.cjs");
15
+ const utils_1 = require("./utils.cjs");
16
+ // === GENERAL ===
17
+ // Unique name for the controller
18
+ const controllerName = 'GatorPermissionsController';
19
+ // Default value for the gator permissions provider snap id
20
+ const defaultGatorPermissionsProviderSnapId = '@metamask/gator-permissions-snap';
21
+ const defaultGatorPermissionsMap = {
22
+ 'native-token-stream': {},
23
+ 'native-token-periodic': {},
24
+ 'erc20-token-stream': {},
25
+ 'erc20-token-periodic': {},
26
+ other: {},
27
+ };
28
+ const gatorPermissionsControllerMetadata = {
29
+ isGatorPermissionsEnabled: {
30
+ persist: true,
31
+ anonymous: false,
32
+ },
33
+ gatorPermissionsMapSerialized: {
34
+ persist: true,
35
+ anonymous: false,
36
+ },
37
+ isFetchingGatorPermissions: {
38
+ persist: false,
39
+ anonymous: false,
40
+ },
41
+ gatorPermissionsProviderSnapId: {
42
+ persist: false,
43
+ anonymous: false,
44
+ },
45
+ };
46
+ /**
47
+ * Constructs the default {@link GatorPermissionsController} state. This allows
48
+ * consumers to provide a partial state object when initializing the controller
49
+ * and also helps in constructing complete state objects for this controller in
50
+ * tests.
51
+ *
52
+ * @returns The default {@link GatorPermissionsController} state.
53
+ */
54
+ function getDefaultGatorPermissionsControllerState() {
55
+ return {
56
+ isGatorPermissionsEnabled: false,
57
+ gatorPermissionsMapSerialized: (0, utils_1.serializeGatorPermissionsMap)(defaultGatorPermissionsMap),
58
+ isFetchingGatorPermissions: false,
59
+ gatorPermissionsProviderSnapId: defaultGatorPermissionsProviderSnapId,
60
+ };
61
+ }
62
+ exports.getDefaultGatorPermissionsControllerState = getDefaultGatorPermissionsControllerState;
63
+ /**
64
+ * Controller that manages gator permissions by reading from profile sync
65
+ */
66
+ class GatorPermissionsController extends base_controller_1.BaseController {
67
+ /**
68
+ * Creates a GatorPermissionsController instance.
69
+ *
70
+ * @param args - The arguments to this function.
71
+ * @param args.messenger - Messenger used to communicate with BaseV2 controller.
72
+ * @param args.state - Initial state to set on this controller.
73
+ */
74
+ constructor({ messenger, state, }) {
75
+ super({
76
+ name: controllerName,
77
+ metadata: gatorPermissionsControllerMetadata,
78
+ messenger,
79
+ state: {
80
+ ...getDefaultGatorPermissionsControllerState(),
81
+ ...state,
82
+ isFetchingGatorPermissions: false,
83
+ },
84
+ });
85
+ _GatorPermissionsController_instances.add(this);
86
+ __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_registerMessageHandlers).call(this);
87
+ }
88
+ /**
89
+ * Gets the gator permissions map from the state.
90
+ *
91
+ * @returns The gator permissions map.
92
+ */
93
+ get gatorPermissionsMap() {
94
+ return (0, utils_1.deserializeGatorPermissionsMap)(this.state.gatorPermissionsMapSerialized);
95
+ }
96
+ /**
97
+ * Gets the gator permissions provider snap id that is used to fetch gator permissions.
98
+ *
99
+ * @returns The gator permissions provider snap id.
100
+ */
101
+ get permissionsProviderSnapId() {
102
+ return this.state.gatorPermissionsProviderSnapId;
103
+ }
104
+ /**
105
+ * Enables gator permissions for the user.
106
+ */
107
+ async enableGatorPermissions() {
108
+ __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_setIsGatorPermissionsEnabled).call(this, true);
109
+ }
110
+ /**
111
+ * Clears the gator permissions map and disables the feature.
112
+ */
113
+ async disableGatorPermissions() {
114
+ this.update((state) => {
115
+ state.isGatorPermissionsEnabled = false;
116
+ state.gatorPermissionsMapSerialized = (0, utils_1.serializeGatorPermissionsMap)(defaultGatorPermissionsMap);
117
+ });
118
+ }
119
+ /**
120
+ * Fetches the gator permissions from profile sync and updates the state.
121
+ *
122
+ * @returns A promise that resolves to the gator permissions map.
123
+ * @throws {GatorPermissionsFetchError} If the gator permissions fetch fails.
124
+ */
125
+ async fetchAndUpdateGatorPermissions() {
126
+ try {
127
+ __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_setIsFetchingGatorPermissions).call(this, true);
128
+ __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_assertGatorPermissionsEnabled).call(this);
129
+ const permissionsData = await __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_handleSnapRequestToGatorPermissionsProvider).call(this, {
130
+ snapId: this.state.gatorPermissionsProviderSnapId,
131
+ });
132
+ const gatorPermissionsMap = __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_categorizePermissionsDataByTypeAndChainId).call(this, permissionsData);
133
+ this.update((state) => {
134
+ state.gatorPermissionsMapSerialized =
135
+ (0, utils_1.serializeGatorPermissionsMap)(gatorPermissionsMap);
136
+ });
137
+ return gatorPermissionsMap;
138
+ }
139
+ catch (error) {
140
+ (0, logger_1.controllerLog)('Failed to fetch gator permissions', error);
141
+ throw new errors_1.GatorPermissionsFetchError({
142
+ message: 'Failed to fetch gator permissions',
143
+ cause: error,
144
+ });
145
+ }
146
+ finally {
147
+ __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_setIsFetchingGatorPermissions).call(this, false);
148
+ }
149
+ }
150
+ }
151
+ _GatorPermissionsController_instances = new WeakSet(), _GatorPermissionsController_setIsFetchingGatorPermissions = function _GatorPermissionsController_setIsFetchingGatorPermissions(isFetchingGatorPermissions) {
152
+ this.update((state) => {
153
+ state.isFetchingGatorPermissions = isFetchingGatorPermissions;
154
+ });
155
+ }, _GatorPermissionsController_setIsGatorPermissionsEnabled = function _GatorPermissionsController_setIsGatorPermissionsEnabled(isGatorPermissionsEnabled) {
156
+ this.update((state) => {
157
+ state.isGatorPermissionsEnabled = isGatorPermissionsEnabled;
158
+ });
159
+ }, _GatorPermissionsController_registerMessageHandlers = function _GatorPermissionsController_registerMessageHandlers() {
160
+ this.messagingSystem.registerActionHandler(`${controllerName}:fetchAndUpdateGatorPermissions`, this.fetchAndUpdateGatorPermissions.bind(this));
161
+ this.messagingSystem.registerActionHandler(`${controllerName}:enableGatorPermissions`, this.enableGatorPermissions.bind(this));
162
+ this.messagingSystem.registerActionHandler(`${controllerName}:disableGatorPermissions`, this.disableGatorPermissions.bind(this));
163
+ }, _GatorPermissionsController_assertGatorPermissionsEnabled = function _GatorPermissionsController_assertGatorPermissionsEnabled() {
164
+ if (!this.state.isGatorPermissionsEnabled) {
165
+ throw new errors_1.GatorPermissionsNotEnabledError();
166
+ }
167
+ }, _GatorPermissionsController_handleSnapRequestToGatorPermissionsProvider =
168
+ /**
169
+ * Forwards a Snap request to the SnapController.
170
+ *
171
+ * @param args - The request parameters.
172
+ * @param args.snapId - The ID of the Snap of the gator permissions provider snap.
173
+ * @returns A promise that resolves with the gator permissions.
174
+ */
175
+ async function _GatorPermissionsController_handleSnapRequestToGatorPermissionsProvider({ snapId, }) {
176
+ try {
177
+ const response = (await this.messagingSystem.call('SnapController:handleRequest', {
178
+ snapId,
179
+ origin: 'metamask',
180
+ handler: snaps_utils_1.HandlerType.OnRpcRequest,
181
+ request: {
182
+ jsonrpc: '2.0',
183
+ method: types_1.GatorPermissionsSnapRpcMethod.PermissionProviderGetGrantedPermissions,
184
+ },
185
+ }));
186
+ return response;
187
+ }
188
+ catch (error) {
189
+ (0, logger_1.controllerLog)('Failed to handle snap request to gator permissions provider', error);
190
+ throw new errors_1.GatorPermissionsProviderError({
191
+ method: types_1.GatorPermissionsSnapRpcMethod.PermissionProviderGetGrantedPermissions,
192
+ cause: error,
193
+ });
194
+ }
195
+ }, _GatorPermissionsController_sanitizeStoredGatorPermission = function _GatorPermissionsController_sanitizeStoredGatorPermission(storedGatorPermission) {
196
+ const { permissionResponse } = storedGatorPermission;
197
+ const { isAdjustmentAllowed, accountMeta, signer, ...rest } = permissionResponse;
198
+ return {
199
+ ...storedGatorPermission,
200
+ permissionResponse: { ...rest },
201
+ };
202
+ }, _GatorPermissionsController_categorizePermissionsDataByTypeAndChainId = function _GatorPermissionsController_categorizePermissionsDataByTypeAndChainId(storedGatorPermissions) {
203
+ if (!storedGatorPermissions) {
204
+ return defaultGatorPermissionsMap;
205
+ }
206
+ return storedGatorPermissions.reduce((gatorPermissionsMap, storedGatorPermission) => {
207
+ const { permissionResponse } = storedGatorPermission;
208
+ const permissionType = permissionResponse.permission.type;
209
+ const { chainId } = permissionResponse;
210
+ const sanitizedStoredGatorPermission = __classPrivateFieldGet(this, _GatorPermissionsController_instances, "m", _GatorPermissionsController_sanitizeStoredGatorPermission).call(this, storedGatorPermission);
211
+ switch (permissionType) {
212
+ case 'native-token-stream':
213
+ case 'native-token-periodic':
214
+ case 'erc20-token-stream':
215
+ case 'erc20-token-periodic':
216
+ if (!gatorPermissionsMap[permissionType][chainId]) {
217
+ gatorPermissionsMap[permissionType][chainId] = [];
218
+ }
219
+ gatorPermissionsMap[permissionType][chainId].push(sanitizedStoredGatorPermission);
220
+ break;
221
+ default:
222
+ if (!gatorPermissionsMap.other[chainId]) {
223
+ gatorPermissionsMap.other[chainId] = [];
224
+ }
225
+ gatorPermissionsMap.other[chainId].push(sanitizedStoredGatorPermission);
226
+ break;
227
+ }
228
+ return gatorPermissionsMap;
229
+ }, {
230
+ 'native-token-stream': {},
231
+ 'native-token-periodic': {},
232
+ 'erc20-token-stream': {},
233
+ 'erc20-token-periodic': {},
234
+ other: {},
235
+ });
236
+ };
237
+ exports.default = GatorPermissionsController;
238
+ //# sourceMappingURL=GatorPermissionsController.cjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"GatorPermissionsController.cjs","sourceRoot":"","sources":["../src/GatorPermissionsController.ts"],"names":[],"mappings":";;;;;;;;;AAMA,+DAA2D;AAG3D,uDAAoD;AAEpD,yCAIkB;AAClB,yCAAyC;AAEzC,uCAMiB;AACjB,uCAGiB;AAEjB,kBAAkB;AAElB,iCAAiC;AACjC,MAAM,cAAc,GAAG,4BAA4B,CAAC;AAEpD,2DAA2D;AAC3D,MAAM,qCAAqC,GACzC,kCAA4C,CAAC;AAE/C,MAAM,0BAA0B,GAAwB;IACtD,qBAAqB,EAAE,EAAE;IACzB,uBAAuB,EAAE,EAAE;IAC3B,oBAAoB,EAAE,EAAE;IACxB,sBAAsB,EAAE,EAAE;IAC1B,KAAK,EAAE,EAAE;CACV,CAAC;AA+BF,MAAM,kCAAkC,GAAG;IACzC,yBAAyB,EAAE;QACzB,OAAO,EAAE,IAAI;QACb,SAAS,EAAE,KAAK;KACjB;IACD,6BAA6B,EAAE;QAC7B,OAAO,EAAE,IAAI;QACb,SAAS,EAAE,KAAK;KACjB;IACD,0BAA0B,EAAE;QAC1B,OAAO,EAAE,KAAK;QACd,SAAS,EAAE,KAAK;KACjB;IACD,8BAA8B,EAAE;QAC9B,OAAO,EAAE,KAAK;QACd,SAAS,EAAE,KAAK;KACjB;CACuD,CAAC;AAE3D;;;;;;;GAOG;AACH,SAAgB,yCAAyC;IACvD,OAAO;QACL,yBAAyB,EAAE,KAAK;QAChC,6BAA6B,EAAE,IAAA,oCAA4B,EACzD,0BAA0B,CAC3B;QACD,0BAA0B,EAAE,KAAK;QACjC,8BAA8B,EAAE,qCAAqC;KACtE,CAAC;AACJ,CAAC;AATD,8FASC;AAuFD;;GAEG;AACH,MAAqB,0BAA2B,SAAQ,gCAIvD;IACC;;;;;;OAMG;IACH,YAAY,EACV,SAAS,EACT,KAAK,GAIN;QACC,KAAK,CAAC;YACJ,IAAI,EAAE,cAAc;YACpB,QAAQ,EAAE,kCAAkC;YAC5C,SAAS;YACT,KAAK,EAAE;gBACL,GAAG,yCAAyC,EAAE;gBAC9C,GAAG,KAAK;gBACR,0BAA0B,EAAE,KAAK;aAClC;SACF,CAAC,CAAC;;QAEH,uBAAA,IAAI,kGAAyB,MAA7B,IAAI,CAA2B,CAAC;IAClC,CAAC;IA2KD;;;;OAIG;IACH,IAAI,mBAAmB;QACrB,OAAO,IAAA,sCAA8B,EACnC,IAAI,CAAC,KAAK,CAAC,6BAA6B,CACzC,CAAC;IACJ,CAAC;IAED;;;;OAIG;IACH,IAAI,yBAAyB;QAC3B,OAAO,IAAI,CAAC,KAAK,CAAC,8BAA8B,CAAC;IACnD,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,sBAAsB;QACjC,uBAAA,IAAI,uGAA8B,MAAlC,IAAI,EAA+B,IAAI,CAAC,CAAC;IAC3C,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,uBAAuB;QAClC,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,EAAE,EAAE;YACpB,KAAK,CAAC,yBAAyB,GAAG,KAAK,CAAC;YACxC,KAAK,CAAC,6BAA6B,GAAG,IAAA,oCAA4B,EAChE,0BAA0B,CAC3B,CAAC;QACJ,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;;;;OAKG;IACI,KAAK,CAAC,8BAA8B;QACzC,IAAI;YACF,uBAAA,IAAI,wGAA+B,MAAnC,IAAI,EAAgC,IAAI,CAAC,CAAC;YAC1C,uBAAA,IAAI,wGAA+B,MAAnC,IAAI,CAAiC,CAAC;YAEtC,MAAM,eAAe,GACnB,MAAM,uBAAA,IAAI,sHAA6C,MAAjD,IAAI,EAA8C;gBACtD,MAAM,EAAE,IAAI,CAAC,KAAK,CAAC,8BAA8B;aAClD,CAAC,CAAC;YAEL,MAAM,mBAAmB,GACvB,uBAAA,IAAI,oHAA2C,MAA/C,IAAI,EAA4C,eAAe,CAAC,CAAC;YAEnE,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,EAAE,EAAE;gBACpB,KAAK,CAAC,6BAA6B;oBACjC,IAAA,oCAA4B,EAAC,mBAAmB,CAAC,CAAC;YACtD,CAAC,CAAC,CAAC;YAEH,OAAO,mBAAmB,CAAC;SAC5B;QAAC,OAAO,KAAK,EAAE;YACd,IAAA,sBAAa,EAAC,mCAAmC,EAAE,KAAK,CAAC,CAAC;YAC1D,MAAM,IAAI,mCAA0B,CAAC;gBACnC,OAAO,EAAE,mCAAmC;gBAC5C,KAAK,EAAE,KAAc;aACtB,CAAC,CAAC;SACJ;gBAAS;YACR,uBAAA,IAAI,wGAA+B,MAAnC,IAAI,EAAgC,KAAK,CAAC,CAAC;SAC5C;IACH,CAAC;CACF;sLAnPgC,0BAAmC;IAChE,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,EAAE,EAAE;QACpB,KAAK,CAAC,0BAA0B,GAAG,0BAA0B,CAAC;IAChE,CAAC,CAAC,CAAC;AACL,CAAC,+HAE6B,yBAAkC;IAC9D,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,EAAE,EAAE;QACpB,KAAK,CAAC,yBAAyB,GAAG,yBAAyB,CAAC;IAC9D,CAAC,CAAC,CAAC;AACL,CAAC;IAGC,IAAI,CAAC,eAAe,CAAC,qBAAqB,CACxC,GAAG,cAAc,iCAAiC,EAClD,IAAI,CAAC,8BAA8B,CAAC,IAAI,CAAC,IAAI,CAAC,CAC/C,CAAC;IAEF,IAAI,CAAC,eAAe,CAAC,qBAAqB,CACxC,GAAG,cAAc,yBAAyB,EAC1C,IAAI,CAAC,sBAAsB,CAAC,IAAI,CAAC,IAAI,CAAC,CACvC,CAAC;IAEF,IAAI,CAAC,eAAe,CAAC,qBAAqB,CACxC,GAAG,cAAc,0BAA0B,EAC3C,IAAI,CAAC,uBAAuB,CAAC,IAAI,CAAC,IAAI,CAAC,CACxC,CAAC;AACJ,CAAC;IAQC,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,yBAAyB,EAAE;QACzC,MAAM,IAAI,wCAA+B,EAAE,CAAC;KAC7C;AACH,CAAC;AAED;;;;;;GAMG;AACH,KAAK,kFAA8C,EACjD,MAAM,GAGP;IACC,IAAI;QACF,MAAM,QAAQ,GAAG,CAAC,MAAM,IAAI,CAAC,eAAe,CAAC,IAAI,CAC/C,8BAA8B,EAC9B;YACE,MAAM;YACN,MAAM,EAAE,UAAU;YAClB,OAAO,EAAE,yBAAW,CAAC,YAAY;YACjC,OAAO,EAAE;gBACP,OAAO,EAAE,KAAK;gBACd,MAAM,EACJ,qCAA6B,CAAC,uCAAuC;aACxE;SACF,CACF,CAAiE,CAAC;QAEnE,OAAO,QAAQ,CAAC;KACjB;IAAC,OAAO,KAAK,EAAE;QACd,IAAA,sBAAa,EACX,6DAA6D,EAC7D,KAAK,CACN,CAAC;QACF,MAAM,IAAI,sCAA6B,CAAC;YACtC,MAAM,EACJ,qCAA6B,CAAC,uCAAuC;YACvE,KAAK,EAAE,KAAc;SACtB,CAAC,CAAC;KACJ;AACH,CAAC,iIASC,qBAA0E;IAE1E,MAAM,EAAE,kBAAkB,EAAE,GAAG,qBAAqB,CAAC;IACrD,MAAM,EAAE,mBAAmB,EAAE,WAAW,EAAE,MAAM,EAAE,GAAG,IAAI,EAAE,GACzD,kBAAkB,CAAC;IACrB,OAAO;QACL,GAAG,qBAAqB;QACxB,kBAAkB,EAAE,EAAE,GAAG,IAAI,EAAE;KAChC,CAAC;AACJ,CAAC,yJASC,sBAEQ;IAER,IAAI,CAAC,sBAAsB,EAAE;QAC3B,OAAO,0BAA0B,CAAC;KACnC;IAED,OAAO,sBAAsB,CAAC,MAAM,CAClC,CAAC,mBAAmB,EAAE,qBAAqB,EAAE,EAAE;QAC7C,MAAM,EAAE,kBAAkB,EAAE,GAAG,qBAAqB,CAAC;QACrD,MAAM,cAAc,GAAG,kBAAkB,CAAC,UAAU,CAAC,IAAI,CAAC;QAC1D,MAAM,EAAE,OAAO,EAAE,GAAG,kBAAkB,CAAC;QAEvC,MAAM,8BAA8B,GAClC,uBAAA,IAAI,wGAA+B,MAAnC,IAAI,EAAgC,qBAAqB,CAAC,CAAC;QAE7D,QAAQ,cAAc,EAAE;YACtB,KAAK,qBAAqB,CAAC;YAC3B,KAAK,uBAAuB,CAAC;YAC7B,KAAK,oBAAoB,CAAC;YAC1B,KAAK,sBAAsB;gBACzB,IAAI,CAAC,mBAAmB,CAAC,cAAc,CAAC,CAAC,OAAO,CAAC,EAAE;oBACjD,mBAAmB,CAAC,cAAc,CAAC,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC;iBACnD;gBAGC,mBAAmB,CAAC,cAAc,CAAC,CACjC,OAAO,CAKV,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC;gBACvC,MAAM;YACR;gBACE,IAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,OAAO,CAAC,EAAE;oBACvC,mBAAmB,CAAC,KAAK,CAAC,OAAO,CAAC,GAAG,EAAE,CAAC;iBACzC;gBAGC,mBAAmB,CAAC,KAAK,CACvB,OAAO,CAKV,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC;gBACvC,MAAM;SACT;QAED,OAAO,mBAAmB,CAAC;IAC7B,CAAC,EACD;QACE,qBAAqB,EAAE,EAAE;QACzB,uBAAuB,EAAE,EAAE;QAC3B,oBAAoB,EAAE,EAAE;QACxB,sBAAsB,EAAE,EAAE;QAC1B,KAAK,EAAE,EAAE;KACa,CACzB,CAAC;AACJ,CAAC;kBAxMkB,0BAA0B","sourcesContent":["import type {\n RestrictedMessenger,\n ControllerGetStateAction,\n ControllerStateChangeEvent,\n StateMetadata,\n} from '@metamask/base-controller';\nimport { BaseController } from '@metamask/base-controller';\nimport type { HandleSnapRequest, HasSnap } from '@metamask/snaps-controllers';\nimport type { SnapId } from '@metamask/snaps-sdk';\nimport { HandlerType } from '@metamask/snaps-utils';\n\nimport {\n GatorPermissionsFetchError,\n GatorPermissionsNotEnabledError,\n GatorPermissionsProviderError,\n} from './errors';\nimport { controllerLog } from './logger';\nimport type { StoredGatorPermissionSanitized } from './types';\nimport {\n GatorPermissionsSnapRpcMethod,\n type GatorPermissionsMap,\n type PermissionTypes,\n type SignerParam,\n type StoredGatorPermission,\n} from './types';\nimport {\n deserializeGatorPermissionsMap,\n serializeGatorPermissionsMap,\n} from './utils';\n\n// === GENERAL ===\n\n// Unique name for the controller\nconst controllerName = 'GatorPermissionsController';\n\n// Default value for the gator permissions provider snap id\nconst defaultGatorPermissionsProviderSnapId =\n '@metamask/gator-permissions-snap' as SnapId;\n\nconst defaultGatorPermissionsMap: GatorPermissionsMap = {\n 'native-token-stream': {},\n 'native-token-periodic': {},\n 'erc20-token-stream': {},\n 'erc20-token-periodic': {},\n other: {},\n};\n\n// === STATE ===\n\n/**\n * State shape for GatorPermissionsController\n */\nexport type GatorPermissionsControllerState = {\n /**\n * Flag that indicates if the gator permissions feature is enabled\n */\n isGatorPermissionsEnabled: boolean;\n\n /**\n * JSON serialized object containing gator permissions fetched from profile sync\n */\n gatorPermissionsMapSerialized: string;\n\n /**\n * Flag that indicates that fetching permissions is in progress\n * This is used to show a loading spinner in the UI\n */\n isFetchingGatorPermissions: boolean;\n\n /**\n * The ID of the Snap of the gator permissions provider snap\n * Default value is `@metamask/gator-permissions-snap`\n */\n gatorPermissionsProviderSnapId: SnapId;\n};\n\nconst gatorPermissionsControllerMetadata = {\n isGatorPermissionsEnabled: {\n persist: true,\n anonymous: false,\n },\n gatorPermissionsMapSerialized: {\n persist: true,\n anonymous: false,\n },\n isFetchingGatorPermissions: {\n persist: false,\n anonymous: false,\n },\n gatorPermissionsProviderSnapId: {\n persist: false,\n anonymous: false,\n },\n} satisfies StateMetadata<GatorPermissionsControllerState>;\n\n/**\n * Constructs the default {@link GatorPermissionsController} state. This allows\n * consumers to provide a partial state object when initializing the controller\n * and also helps in constructing complete state objects for this controller in\n * tests.\n *\n * @returns The default {@link GatorPermissionsController} state.\n */\nexport function getDefaultGatorPermissionsControllerState(): GatorPermissionsControllerState {\n return {\n isGatorPermissionsEnabled: false,\n gatorPermissionsMapSerialized: serializeGatorPermissionsMap(\n defaultGatorPermissionsMap,\n ),\n isFetchingGatorPermissions: false,\n gatorPermissionsProviderSnapId: defaultGatorPermissionsProviderSnapId,\n };\n}\n\n// === MESSENGER ===\n\n/**\n * The action which can be used to retrieve the state of the\n * {@link GatorPermissionsController}.\n */\nexport type GatorPermissionsControllerGetStateAction = ControllerGetStateAction<\n typeof controllerName,\n GatorPermissionsControllerState\n>;\n\n/**\n * The action which can be used to fetch and update gator permissions.\n */\nexport type GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction = {\n type: `${typeof controllerName}:fetchAndUpdateGatorPermissions`;\n handler: GatorPermissionsController['fetchAndUpdateGatorPermissions'];\n};\n\n/**\n * The action which can be used to enable gator permissions.\n */\nexport type GatorPermissionsControllerEnableGatorPermissionsAction = {\n type: `${typeof controllerName}:enableGatorPermissions`;\n handler: GatorPermissionsController['enableGatorPermissions'];\n};\n\n/**\n * The action which can be used to disable gator permissions.\n */\nexport type GatorPermissionsControllerDisableGatorPermissionsAction = {\n type: `${typeof controllerName}:disableGatorPermissions`;\n handler: GatorPermissionsController['disableGatorPermissions'];\n};\n\n/**\n * All actions that {@link GatorPermissionsController} registers, to be called\n * externally.\n */\nexport type GatorPermissionsControllerActions =\n | GatorPermissionsControllerGetStateAction\n | GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction\n | GatorPermissionsControllerEnableGatorPermissionsAction\n | GatorPermissionsControllerDisableGatorPermissionsAction;\n\n/**\n * All actions that {@link GatorPermissionsController} calls internally.\n *\n * SnapsController:handleRequest and SnapsController:has are allowed to be called\n * internally because they are used to fetch gator permissions from the Snap.\n */\ntype AllowedActions = HandleSnapRequest | HasSnap;\n\n/**\n * The event that {@link GatorPermissionsController} publishes when updating state.\n */\nexport type GatorPermissionsControllerStateChangeEvent =\n ControllerStateChangeEvent<\n typeof controllerName,\n GatorPermissionsControllerState\n >;\n\n/**\n * All events that {@link GatorPermissionsController} publishes, to be subscribed to\n * externally.\n */\nexport type GatorPermissionsControllerEvents =\n GatorPermissionsControllerStateChangeEvent;\n\n/**\n * Events that {@link GatorPermissionsController} is allowed to subscribe to internally.\n */\ntype AllowedEvents = GatorPermissionsControllerStateChangeEvent;\n\n/**\n * Messenger type for the GatorPermissionsController.\n */\nexport type GatorPermissionsControllerMessenger = RestrictedMessenger<\n typeof controllerName,\n GatorPermissionsControllerActions | AllowedActions,\n GatorPermissionsControllerEvents | AllowedEvents,\n AllowedActions['type'],\n AllowedEvents['type']\n>;\n\n/**\n * Controller that manages gator permissions by reading from profile sync\n */\nexport default class GatorPermissionsController extends BaseController<\n typeof controllerName,\n GatorPermissionsControllerState,\n GatorPermissionsControllerMessenger\n> {\n /**\n * Creates a GatorPermissionsController instance.\n *\n * @param args - The arguments to this function.\n * @param args.messenger - Messenger used to communicate with BaseV2 controller.\n * @param args.state - Initial state to set on this controller.\n */\n constructor({\n messenger,\n state,\n }: {\n messenger: GatorPermissionsControllerMessenger;\n state?: Partial<GatorPermissionsControllerState>;\n }) {\n super({\n name: controllerName,\n metadata: gatorPermissionsControllerMetadata,\n messenger,\n state: {\n ...getDefaultGatorPermissionsControllerState(),\n ...state,\n isFetchingGatorPermissions: false,\n },\n });\n\n this.#registerMessageHandlers();\n }\n\n #setIsFetchingGatorPermissions(isFetchingGatorPermissions: boolean) {\n this.update((state) => {\n state.isFetchingGatorPermissions = isFetchingGatorPermissions;\n });\n }\n\n #setIsGatorPermissionsEnabled(isGatorPermissionsEnabled: boolean) {\n this.update((state) => {\n state.isGatorPermissionsEnabled = isGatorPermissionsEnabled;\n });\n }\n\n #registerMessageHandlers(): void {\n this.messagingSystem.registerActionHandler(\n `${controllerName}:fetchAndUpdateGatorPermissions`,\n this.fetchAndUpdateGatorPermissions.bind(this),\n );\n\n this.messagingSystem.registerActionHandler(\n `${controllerName}:enableGatorPermissions`,\n this.enableGatorPermissions.bind(this),\n );\n\n this.messagingSystem.registerActionHandler(\n `${controllerName}:disableGatorPermissions`,\n this.disableGatorPermissions.bind(this),\n );\n }\n\n /**\n * Asserts that the gator permissions are enabled.\n *\n * @throws {GatorPermissionsNotEnabledError} If the gator permissions are not enabled.\n */\n #assertGatorPermissionsEnabled() {\n if (!this.state.isGatorPermissionsEnabled) {\n throw new GatorPermissionsNotEnabledError();\n }\n }\n\n /**\n * Forwards a Snap request to the SnapController.\n *\n * @param args - The request parameters.\n * @param args.snapId - The ID of the Snap of the gator permissions provider snap.\n * @returns A promise that resolves with the gator permissions.\n */\n async #handleSnapRequestToGatorPermissionsProvider({\n snapId,\n }: {\n snapId: SnapId;\n }): Promise<StoredGatorPermission<SignerParam, PermissionTypes>[] | null> {\n try {\n const response = (await this.messagingSystem.call(\n 'SnapController:handleRequest',\n {\n snapId,\n origin: 'metamask',\n handler: HandlerType.OnRpcRequest,\n request: {\n jsonrpc: '2.0',\n method:\n GatorPermissionsSnapRpcMethod.PermissionProviderGetGrantedPermissions,\n },\n },\n )) as StoredGatorPermission<SignerParam, PermissionTypes>[] | null;\n\n return response;\n } catch (error) {\n controllerLog(\n 'Failed to handle snap request to gator permissions provider',\n error,\n );\n throw new GatorPermissionsProviderError({\n method:\n GatorPermissionsSnapRpcMethod.PermissionProviderGetGrantedPermissions,\n cause: error as Error,\n });\n }\n }\n\n /**\n * Sanitizes a stored gator permission by removing the fields that are not expose to MetaMask client.\n *\n * @param storedGatorPermission - The stored gator permission to sanitize.\n * @returns The sanitized stored gator permission.\n */\n #sanitizeStoredGatorPermission(\n storedGatorPermission: StoredGatorPermission<SignerParam, PermissionTypes>,\n ): StoredGatorPermissionSanitized<SignerParam, PermissionTypes> {\n const { permissionResponse } = storedGatorPermission;\n const { isAdjustmentAllowed, accountMeta, signer, ...rest } =\n permissionResponse;\n return {\n ...storedGatorPermission,\n permissionResponse: { ...rest },\n };\n }\n\n /**\n * Categorizes stored gator permissions by type and chainId.\n *\n * @param storedGatorPermissions - An array of stored gator permissions.\n * @returns The gator permissions map.\n */\n #categorizePermissionsDataByTypeAndChainId(\n storedGatorPermissions:\n | StoredGatorPermission<SignerParam, PermissionTypes>[]\n | null,\n ): GatorPermissionsMap {\n if (!storedGatorPermissions) {\n return defaultGatorPermissionsMap;\n }\n\n return storedGatorPermissions.reduce(\n (gatorPermissionsMap, storedGatorPermission) => {\n const { permissionResponse } = storedGatorPermission;\n const permissionType = permissionResponse.permission.type;\n const { chainId } = permissionResponse;\n\n const sanitizedStoredGatorPermission =\n this.#sanitizeStoredGatorPermission(storedGatorPermission);\n\n switch (permissionType) {\n case 'native-token-stream':\n case 'native-token-periodic':\n case 'erc20-token-stream':\n case 'erc20-token-periodic':\n if (!gatorPermissionsMap[permissionType][chainId]) {\n gatorPermissionsMap[permissionType][chainId] = [];\n }\n\n (\n gatorPermissionsMap[permissionType][\n chainId\n ] as StoredGatorPermissionSanitized<\n SignerParam,\n PermissionTypes\n >[]\n ).push(sanitizedStoredGatorPermission);\n break;\n default:\n if (!gatorPermissionsMap.other[chainId]) {\n gatorPermissionsMap.other[chainId] = [];\n }\n\n (\n gatorPermissionsMap.other[\n chainId\n ] as StoredGatorPermissionSanitized<\n SignerParam,\n PermissionTypes\n >[]\n ).push(sanitizedStoredGatorPermission);\n break;\n }\n\n return gatorPermissionsMap;\n },\n {\n 'native-token-stream': {},\n 'native-token-periodic': {},\n 'erc20-token-stream': {},\n 'erc20-token-periodic': {},\n other: {},\n } as GatorPermissionsMap,\n );\n }\n\n /**\n * Gets the gator permissions map from the state.\n *\n * @returns The gator permissions map.\n */\n get gatorPermissionsMap(): GatorPermissionsMap {\n return deserializeGatorPermissionsMap(\n this.state.gatorPermissionsMapSerialized,\n );\n }\n\n /**\n * Gets the gator permissions provider snap id that is used to fetch gator permissions.\n *\n * @returns The gator permissions provider snap id.\n */\n get permissionsProviderSnapId(): SnapId {\n return this.state.gatorPermissionsProviderSnapId;\n }\n\n /**\n * Enables gator permissions for the user.\n */\n public async enableGatorPermissions() {\n this.#setIsGatorPermissionsEnabled(true);\n }\n\n /**\n * Clears the gator permissions map and disables the feature.\n */\n public async disableGatorPermissions() {\n this.update((state) => {\n state.isGatorPermissionsEnabled = false;\n state.gatorPermissionsMapSerialized = serializeGatorPermissionsMap(\n defaultGatorPermissionsMap,\n );\n });\n }\n\n /**\n * Fetches the gator permissions from profile sync and updates the state.\n *\n * @returns A promise that resolves to the gator permissions map.\n * @throws {GatorPermissionsFetchError} If the gator permissions fetch fails.\n */\n public async fetchAndUpdateGatorPermissions(): Promise<GatorPermissionsMap> {\n try {\n this.#setIsFetchingGatorPermissions(true);\n this.#assertGatorPermissionsEnabled();\n\n const permissionsData =\n await this.#handleSnapRequestToGatorPermissionsProvider({\n snapId: this.state.gatorPermissionsProviderSnapId,\n });\n\n const gatorPermissionsMap =\n this.#categorizePermissionsDataByTypeAndChainId(permissionsData);\n\n this.update((state) => {\n state.gatorPermissionsMapSerialized =\n serializeGatorPermissionsMap(gatorPermissionsMap);\n });\n\n return gatorPermissionsMap;\n } catch (error) {\n controllerLog('Failed to fetch gator permissions', error);\n throw new GatorPermissionsFetchError({\n message: 'Failed to fetch gator permissions',\n cause: error as Error,\n });\n } finally {\n this.#setIsFetchingGatorPermissions(false);\n }\n }\n}\n"]}
@@ -0,0 +1,139 @@
1
+ import type { RestrictedMessenger, ControllerGetStateAction, ControllerStateChangeEvent } from "@metamask/base-controller";
2
+ import { BaseController } from "@metamask/base-controller";
3
+ import type { HandleSnapRequest, HasSnap } from "@metamask/snaps-controllers";
4
+ import type { SnapId } from "@metamask/snaps-sdk";
5
+ import { type GatorPermissionsMap } from "./types.cjs";
6
+ declare const controllerName = "GatorPermissionsController";
7
+ /**
8
+ * State shape for GatorPermissionsController
9
+ */
10
+ export type GatorPermissionsControllerState = {
11
+ /**
12
+ * Flag that indicates if the gator permissions feature is enabled
13
+ */
14
+ isGatorPermissionsEnabled: boolean;
15
+ /**
16
+ * JSON serialized object containing gator permissions fetched from profile sync
17
+ */
18
+ gatorPermissionsMapSerialized: string;
19
+ /**
20
+ * Flag that indicates that fetching permissions is in progress
21
+ * This is used to show a loading spinner in the UI
22
+ */
23
+ isFetchingGatorPermissions: boolean;
24
+ /**
25
+ * The ID of the Snap of the gator permissions provider snap
26
+ * Default value is `@metamask/gator-permissions-snap`
27
+ */
28
+ gatorPermissionsProviderSnapId: SnapId;
29
+ };
30
+ /**
31
+ * Constructs the default {@link GatorPermissionsController} state. This allows
32
+ * consumers to provide a partial state object when initializing the controller
33
+ * and also helps in constructing complete state objects for this controller in
34
+ * tests.
35
+ *
36
+ * @returns The default {@link GatorPermissionsController} state.
37
+ */
38
+ export declare function getDefaultGatorPermissionsControllerState(): GatorPermissionsControllerState;
39
+ /**
40
+ * The action which can be used to retrieve the state of the
41
+ * {@link GatorPermissionsController}.
42
+ */
43
+ export type GatorPermissionsControllerGetStateAction = ControllerGetStateAction<typeof controllerName, GatorPermissionsControllerState>;
44
+ /**
45
+ * The action which can be used to fetch and update gator permissions.
46
+ */
47
+ export type GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction = {
48
+ type: `${typeof controllerName}:fetchAndUpdateGatorPermissions`;
49
+ handler: GatorPermissionsController['fetchAndUpdateGatorPermissions'];
50
+ };
51
+ /**
52
+ * The action which can be used to enable gator permissions.
53
+ */
54
+ export type GatorPermissionsControllerEnableGatorPermissionsAction = {
55
+ type: `${typeof controllerName}:enableGatorPermissions`;
56
+ handler: GatorPermissionsController['enableGatorPermissions'];
57
+ };
58
+ /**
59
+ * The action which can be used to disable gator permissions.
60
+ */
61
+ export type GatorPermissionsControllerDisableGatorPermissionsAction = {
62
+ type: `${typeof controllerName}:disableGatorPermissions`;
63
+ handler: GatorPermissionsController['disableGatorPermissions'];
64
+ };
65
+ /**
66
+ * All actions that {@link GatorPermissionsController} registers, to be called
67
+ * externally.
68
+ */
69
+ export type GatorPermissionsControllerActions = GatorPermissionsControllerGetStateAction | GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction | GatorPermissionsControllerEnableGatorPermissionsAction | GatorPermissionsControllerDisableGatorPermissionsAction;
70
+ /**
71
+ * All actions that {@link GatorPermissionsController} calls internally.
72
+ *
73
+ * SnapsController:handleRequest and SnapsController:has are allowed to be called
74
+ * internally because they are used to fetch gator permissions from the Snap.
75
+ */
76
+ type AllowedActions = HandleSnapRequest | HasSnap;
77
+ /**
78
+ * The event that {@link GatorPermissionsController} publishes when updating state.
79
+ */
80
+ export type GatorPermissionsControllerStateChangeEvent = ControllerStateChangeEvent<typeof controllerName, GatorPermissionsControllerState>;
81
+ /**
82
+ * All events that {@link GatorPermissionsController} publishes, to be subscribed to
83
+ * externally.
84
+ */
85
+ export type GatorPermissionsControllerEvents = GatorPermissionsControllerStateChangeEvent;
86
+ /**
87
+ * Events that {@link GatorPermissionsController} is allowed to subscribe to internally.
88
+ */
89
+ type AllowedEvents = GatorPermissionsControllerStateChangeEvent;
90
+ /**
91
+ * Messenger type for the GatorPermissionsController.
92
+ */
93
+ export type GatorPermissionsControllerMessenger = RestrictedMessenger<typeof controllerName, GatorPermissionsControllerActions | AllowedActions, GatorPermissionsControllerEvents | AllowedEvents, AllowedActions['type'], AllowedEvents['type']>;
94
+ /**
95
+ * Controller that manages gator permissions by reading from profile sync
96
+ */
97
+ export default class GatorPermissionsController extends BaseController<typeof controllerName, GatorPermissionsControllerState, GatorPermissionsControllerMessenger> {
98
+ #private;
99
+ /**
100
+ * Creates a GatorPermissionsController instance.
101
+ *
102
+ * @param args - The arguments to this function.
103
+ * @param args.messenger - Messenger used to communicate with BaseV2 controller.
104
+ * @param args.state - Initial state to set on this controller.
105
+ */
106
+ constructor({ messenger, state, }: {
107
+ messenger: GatorPermissionsControllerMessenger;
108
+ state?: Partial<GatorPermissionsControllerState>;
109
+ });
110
+ /**
111
+ * Gets the gator permissions map from the state.
112
+ *
113
+ * @returns The gator permissions map.
114
+ */
115
+ get gatorPermissionsMap(): GatorPermissionsMap;
116
+ /**
117
+ * Gets the gator permissions provider snap id that is used to fetch gator permissions.
118
+ *
119
+ * @returns The gator permissions provider snap id.
120
+ */
121
+ get permissionsProviderSnapId(): SnapId;
122
+ /**
123
+ * Enables gator permissions for the user.
124
+ */
125
+ enableGatorPermissions(): Promise<void>;
126
+ /**
127
+ * Clears the gator permissions map and disables the feature.
128
+ */
129
+ disableGatorPermissions(): Promise<void>;
130
+ /**
131
+ * Fetches the gator permissions from profile sync and updates the state.
132
+ *
133
+ * @returns A promise that resolves to the gator permissions map.
134
+ * @throws {GatorPermissionsFetchError} If the gator permissions fetch fails.
135
+ */
136
+ fetchAndUpdateGatorPermissions(): Promise<GatorPermissionsMap>;
137
+ }
138
+ export {};
139
+ //# sourceMappingURL=GatorPermissionsController.d.cts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"GatorPermissionsController.d.cts","sourceRoot":"","sources":["../src/GatorPermissionsController.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,mBAAmB,EACnB,wBAAwB,EACxB,0BAA0B,EAE3B,kCAAkC;AACnC,OAAO,EAAE,cAAc,EAAE,kCAAkC;AAC3D,OAAO,KAAK,EAAE,iBAAiB,EAAE,OAAO,EAAE,oCAAoC;AAC9E,OAAO,KAAK,EAAE,MAAM,EAAE,4BAA4B;AAUlD,OAAO,EAEL,KAAK,mBAAmB,EAIzB,oBAAgB;AASjB,QAAA,MAAM,cAAc,+BAA+B,CAAC;AAgBpD;;GAEG;AACH,MAAM,MAAM,+BAA+B,GAAG;IAC5C;;OAEG;IACH,yBAAyB,EAAE,OAAO,CAAC;IAEnC;;OAEG;IACH,6BAA6B,EAAE,MAAM,CAAC;IAEtC;;;OAGG;IACH,0BAA0B,EAAE,OAAO,CAAC;IAEpC;;;OAGG;IACH,8BAA8B,EAAE,MAAM,CAAC;CACxC,CAAC;AAqBF;;;;;;;GAOG;AACH,wBAAgB,yCAAyC,IAAI,+BAA+B,CAS3F;AAID;;;GAGG;AACH,MAAM,MAAM,wCAAwC,GAAG,wBAAwB,CAC7E,OAAO,cAAc,EACrB,+BAA+B,CAChC,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,8DAA8D,GAAG;IAC3E,IAAI,EAAE,GAAG,OAAO,cAAc,iCAAiC,CAAC;IAChE,OAAO,EAAE,0BAA0B,CAAC,gCAAgC,CAAC,CAAC;CACvE,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,sDAAsD,GAAG;IACnE,IAAI,EAAE,GAAG,OAAO,cAAc,yBAAyB,CAAC;IACxD,OAAO,EAAE,0BAA0B,CAAC,wBAAwB,CAAC,CAAC;CAC/D,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,uDAAuD,GAAG;IACpE,IAAI,EAAE,GAAG,OAAO,cAAc,0BAA0B,CAAC;IACzD,OAAO,EAAE,0BAA0B,CAAC,yBAAyB,CAAC,CAAC;CAChE,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iCAAiC,GACzC,wCAAwC,GACxC,8DAA8D,GAC9D,sDAAsD,GACtD,uDAAuD,CAAC;AAE5D;;;;;GAKG;AACH,KAAK,cAAc,GAAG,iBAAiB,GAAG,OAAO,CAAC;AAElD;;GAEG;AACH,MAAM,MAAM,0CAA0C,GACpD,0BAA0B,CACxB,OAAO,cAAc,EACrB,+BAA+B,CAChC,CAAC;AAEJ;;;GAGG;AACH,MAAM,MAAM,gCAAgC,GAC1C,0CAA0C,CAAC;AAE7C;;GAEG;AACH,KAAK,aAAa,GAAG,0CAA0C,CAAC;AAEhE;;GAEG;AACH,MAAM,MAAM,mCAAmC,GAAG,mBAAmB,CACnE,OAAO,cAAc,EACrB,iCAAiC,GAAG,cAAc,EAClD,gCAAgC,GAAG,aAAa,EAChD,cAAc,CAAC,MAAM,CAAC,EACtB,aAAa,CAAC,MAAM,CAAC,CACtB,CAAC;AAEF;;GAEG;AACH,MAAM,CAAC,OAAO,OAAO,0BAA2B,SAAQ,cAAc,CACpE,OAAO,cAAc,EACrB,+BAA+B,EAC/B,mCAAmC,CACpC;;IACC;;;;;;OAMG;gBACS,EACV,SAAS,EACT,KAAK,GACN,EAAE;QACD,SAAS,EAAE,mCAAmC,CAAC;QAC/C,KAAK,CAAC,EAAE,OAAO,CAAC,+BAA+B,CAAC,CAAC;KAClD;IAwLD;;;;OAIG;IACH,IAAI,mBAAmB,IAAI,mBAAmB,CAI7C;IAED;;;;OAIG;IACH,IAAI,yBAAyB,IAAI,MAAM,CAEtC;IAED;;OAEG;IACU,sBAAsB;IAInC;;OAEG;IACU,uBAAuB;IASpC;;;;;OAKG;IACU,8BAA8B,IAAI,OAAO,CAAC,mBAAmB,CAAC;CA6B5E"}
@@ -0,0 +1,139 @@
1
+ import type { RestrictedMessenger, ControllerGetStateAction, ControllerStateChangeEvent } from "@metamask/base-controller";
2
+ import { BaseController } from "@metamask/base-controller";
3
+ import type { HandleSnapRequest, HasSnap } from "@metamask/snaps-controllers";
4
+ import type { SnapId } from "@metamask/snaps-sdk";
5
+ import { type GatorPermissionsMap } from "./types.mjs";
6
+ declare const controllerName = "GatorPermissionsController";
7
+ /**
8
+ * State shape for GatorPermissionsController
9
+ */
10
+ export type GatorPermissionsControllerState = {
11
+ /**
12
+ * Flag that indicates if the gator permissions feature is enabled
13
+ */
14
+ isGatorPermissionsEnabled: boolean;
15
+ /**
16
+ * JSON serialized object containing gator permissions fetched from profile sync
17
+ */
18
+ gatorPermissionsMapSerialized: string;
19
+ /**
20
+ * Flag that indicates that fetching permissions is in progress
21
+ * This is used to show a loading spinner in the UI
22
+ */
23
+ isFetchingGatorPermissions: boolean;
24
+ /**
25
+ * The ID of the Snap of the gator permissions provider snap
26
+ * Default value is `@metamask/gator-permissions-snap`
27
+ */
28
+ gatorPermissionsProviderSnapId: SnapId;
29
+ };
30
+ /**
31
+ * Constructs the default {@link GatorPermissionsController} state. This allows
32
+ * consumers to provide a partial state object when initializing the controller
33
+ * and also helps in constructing complete state objects for this controller in
34
+ * tests.
35
+ *
36
+ * @returns The default {@link GatorPermissionsController} state.
37
+ */
38
+ export declare function getDefaultGatorPermissionsControllerState(): GatorPermissionsControllerState;
39
+ /**
40
+ * The action which can be used to retrieve the state of the
41
+ * {@link GatorPermissionsController}.
42
+ */
43
+ export type GatorPermissionsControllerGetStateAction = ControllerGetStateAction<typeof controllerName, GatorPermissionsControllerState>;
44
+ /**
45
+ * The action which can be used to fetch and update gator permissions.
46
+ */
47
+ export type GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction = {
48
+ type: `${typeof controllerName}:fetchAndUpdateGatorPermissions`;
49
+ handler: GatorPermissionsController['fetchAndUpdateGatorPermissions'];
50
+ };
51
+ /**
52
+ * The action which can be used to enable gator permissions.
53
+ */
54
+ export type GatorPermissionsControllerEnableGatorPermissionsAction = {
55
+ type: `${typeof controllerName}:enableGatorPermissions`;
56
+ handler: GatorPermissionsController['enableGatorPermissions'];
57
+ };
58
+ /**
59
+ * The action which can be used to disable gator permissions.
60
+ */
61
+ export type GatorPermissionsControllerDisableGatorPermissionsAction = {
62
+ type: `${typeof controllerName}:disableGatorPermissions`;
63
+ handler: GatorPermissionsController['disableGatorPermissions'];
64
+ };
65
+ /**
66
+ * All actions that {@link GatorPermissionsController} registers, to be called
67
+ * externally.
68
+ */
69
+ export type GatorPermissionsControllerActions = GatorPermissionsControllerGetStateAction | GatorPermissionsControllerFetchAndUpdateGatorPermissionsAction | GatorPermissionsControllerEnableGatorPermissionsAction | GatorPermissionsControllerDisableGatorPermissionsAction;
70
+ /**
71
+ * All actions that {@link GatorPermissionsController} calls internally.
72
+ *
73
+ * SnapsController:handleRequest and SnapsController:has are allowed to be called
74
+ * internally because they are used to fetch gator permissions from the Snap.
75
+ */
76
+ type AllowedActions = HandleSnapRequest | HasSnap;
77
+ /**
78
+ * The event that {@link GatorPermissionsController} publishes when updating state.
79
+ */
80
+ export type GatorPermissionsControllerStateChangeEvent = ControllerStateChangeEvent<typeof controllerName, GatorPermissionsControllerState>;
81
+ /**
82
+ * All events that {@link GatorPermissionsController} publishes, to be subscribed to
83
+ * externally.
84
+ */
85
+ export type GatorPermissionsControllerEvents = GatorPermissionsControllerStateChangeEvent;
86
+ /**
87
+ * Events that {@link GatorPermissionsController} is allowed to subscribe to internally.
88
+ */
89
+ type AllowedEvents = GatorPermissionsControllerStateChangeEvent;
90
+ /**
91
+ * Messenger type for the GatorPermissionsController.
92
+ */
93
+ export type GatorPermissionsControllerMessenger = RestrictedMessenger<typeof controllerName, GatorPermissionsControllerActions | AllowedActions, GatorPermissionsControllerEvents | AllowedEvents, AllowedActions['type'], AllowedEvents['type']>;
94
+ /**
95
+ * Controller that manages gator permissions by reading from profile sync
96
+ */
97
+ export default class GatorPermissionsController extends BaseController<typeof controllerName, GatorPermissionsControllerState, GatorPermissionsControllerMessenger> {
98
+ #private;
99
+ /**
100
+ * Creates a GatorPermissionsController instance.
101
+ *
102
+ * @param args - The arguments to this function.
103
+ * @param args.messenger - Messenger used to communicate with BaseV2 controller.
104
+ * @param args.state - Initial state to set on this controller.
105
+ */
106
+ constructor({ messenger, state, }: {
107
+ messenger: GatorPermissionsControllerMessenger;
108
+ state?: Partial<GatorPermissionsControllerState>;
109
+ });
110
+ /**
111
+ * Gets the gator permissions map from the state.
112
+ *
113
+ * @returns The gator permissions map.
114
+ */
115
+ get gatorPermissionsMap(): GatorPermissionsMap;
116
+ /**
117
+ * Gets the gator permissions provider snap id that is used to fetch gator permissions.
118
+ *
119
+ * @returns The gator permissions provider snap id.
120
+ */
121
+ get permissionsProviderSnapId(): SnapId;
122
+ /**
123
+ * Enables gator permissions for the user.
124
+ */
125
+ enableGatorPermissions(): Promise<void>;
126
+ /**
127
+ * Clears the gator permissions map and disables the feature.
128
+ */
129
+ disableGatorPermissions(): Promise<void>;
130
+ /**
131
+ * Fetches the gator permissions from profile sync and updates the state.
132
+ *
133
+ * @returns A promise that resolves to the gator permissions map.
134
+ * @throws {GatorPermissionsFetchError} If the gator permissions fetch fails.
135
+ */
136
+ fetchAndUpdateGatorPermissions(): Promise<GatorPermissionsMap>;
137
+ }
138
+ export {};
139
+ //# sourceMappingURL=GatorPermissionsController.d.mts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"GatorPermissionsController.d.mts","sourceRoot":"","sources":["../src/GatorPermissionsController.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EACV,mBAAmB,EACnB,wBAAwB,EACxB,0BAA0B,EAE3B,kCAAkC;AACnC,OAAO,EAAE,cAAc,EAAE,kCAAkC;AAC3D,OAAO,KAAK,EAAE,iBAAiB,EAAE,OAAO,EAAE,oCAAoC;AAC9E,OAAO,KAAK,EAAE,MAAM,EAAE,4BAA4B;AAUlD,OAAO,EAEL,KAAK,mBAAmB,EAIzB,oBAAgB;AASjB,QAAA,MAAM,cAAc,+BAA+B,CAAC;AAgBpD;;GAEG;AACH,MAAM,MAAM,+BAA+B,GAAG;IAC5C;;OAEG;IACH,yBAAyB,EAAE,OAAO,CAAC;IAEnC;;OAEG;IACH,6BAA6B,EAAE,MAAM,CAAC;IAEtC;;;OAGG;IACH,0BAA0B,EAAE,OAAO,CAAC;IAEpC;;;OAGG;IACH,8BAA8B,EAAE,MAAM,CAAC;CACxC,CAAC;AAqBF;;;;;;;GAOG;AACH,wBAAgB,yCAAyC,IAAI,+BAA+B,CAS3F;AAID;;;GAGG;AACH,MAAM,MAAM,wCAAwC,GAAG,wBAAwB,CAC7E,OAAO,cAAc,EACrB,+BAA+B,CAChC,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,8DAA8D,GAAG;IAC3E,IAAI,EAAE,GAAG,OAAO,cAAc,iCAAiC,CAAC;IAChE,OAAO,EAAE,0BAA0B,CAAC,gCAAgC,CAAC,CAAC;CACvE,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,sDAAsD,GAAG;IACnE,IAAI,EAAE,GAAG,OAAO,cAAc,yBAAyB,CAAC;IACxD,OAAO,EAAE,0BAA0B,CAAC,wBAAwB,CAAC,CAAC;CAC/D,CAAC;AAEF;;GAEG;AACH,MAAM,MAAM,uDAAuD,GAAG;IACpE,IAAI,EAAE,GAAG,OAAO,cAAc,0BAA0B,CAAC;IACzD,OAAO,EAAE,0BAA0B,CAAC,yBAAyB,CAAC,CAAC;CAChE,CAAC;AAEF;;;GAGG;AACH,MAAM,MAAM,iCAAiC,GACzC,wCAAwC,GACxC,8DAA8D,GAC9D,sDAAsD,GACtD,uDAAuD,CAAC;AAE5D;;;;;GAKG;AACH,KAAK,cAAc,GAAG,iBAAiB,GAAG,OAAO,CAAC;AAElD;;GAEG;AACH,MAAM,MAAM,0CAA0C,GACpD,0BAA0B,CACxB,OAAO,cAAc,EACrB,+BAA+B,CAChC,CAAC;AAEJ;;;GAGG;AACH,MAAM,MAAM,gCAAgC,GAC1C,0CAA0C,CAAC;AAE7C;;GAEG;AACH,KAAK,aAAa,GAAG,0CAA0C,CAAC;AAEhE;;GAEG;AACH,MAAM,MAAM,mCAAmC,GAAG,mBAAmB,CACnE,OAAO,cAAc,EACrB,iCAAiC,GAAG,cAAc,EAClD,gCAAgC,GAAG,aAAa,EAChD,cAAc,CAAC,MAAM,CAAC,EACtB,aAAa,CAAC,MAAM,CAAC,CACtB,CAAC;AAEF;;GAEG;AACH,MAAM,CAAC,OAAO,OAAO,0BAA2B,SAAQ,cAAc,CACpE,OAAO,cAAc,EACrB,+BAA+B,EAC/B,mCAAmC,CACpC;;IACC;;;;;;OAMG;gBACS,EACV,SAAS,EACT,KAAK,GACN,EAAE;QACD,SAAS,EAAE,mCAAmC,CAAC;QAC/C,KAAK,CAAC,EAAE,OAAO,CAAC,+BAA+B,CAAC,CAAC;KAClD;IAwLD;;;;OAIG;IACH,IAAI,mBAAmB,IAAI,mBAAmB,CAI7C;IAED;;;;OAIG;IACH,IAAI,yBAAyB,IAAI,MAAM,CAEtC;IAED;;OAEG;IACU,sBAAsB;IAInC;;OAEG;IACU,uBAAuB;IASpC;;;;;OAKG;IACU,8BAA8B,IAAI,OAAO,CAAC,mBAAmB,CAAC;CA6B5E"}