@metamask/snaps-controllers 0.34.0-flask.1 → 0.35.0-flask.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +22 -1
- package/dist/cjs/cronjob/CronjobController.js +290 -0
- package/dist/cjs/cronjob/CronjobController.js.map +1 -0
- package/dist/cjs/cronjob/index.js +20 -0
- package/dist/cjs/cronjob/index.js.map +1 -0
- package/dist/cjs/fsm.js +69 -0
- package/dist/cjs/fsm.js.map +1 -0
- package/dist/cjs/index.js +23 -0
- package/dist/cjs/index.js.map +1 -0
- package/dist/cjs/logging.js +15 -0
- package/dist/cjs/logging.js.map +1 -0
- package/dist/cjs/services/AbstractExecutionService.js +404 -0
- package/dist/cjs/services/AbstractExecutionService.js.map +1 -0
- package/dist/cjs/services/ExecutionService.js +7 -0
- package/dist/cjs/services/ExecutionService.js.map +1 -0
- package/dist/cjs/services/ProxyPostMessageStream.js +116 -0
- package/dist/cjs/services/ProxyPostMessageStream.js.map +1 -0
- package/dist/cjs/services/browser.js +32 -0
- package/dist/cjs/services/browser.js.map +1 -0
- package/dist/cjs/services/iframe/IframeExecutionService.js +54 -0
- package/dist/cjs/services/iframe/IframeExecutionService.js.map +1 -0
- package/dist/cjs/services/iframe/index.js +20 -0
- package/dist/cjs/services/iframe/index.js.map +1 -0
- package/dist/cjs/services/index.js +32 -0
- package/dist/cjs/services/index.js.map +1 -0
- package/dist/cjs/services/node/NodeProcessExecutionService.js +30 -0
- package/dist/cjs/services/node/NodeProcessExecutionService.js.map +1 -0
- package/dist/cjs/services/node/NodeThreadExecutionService.js +30 -0
- package/dist/cjs/services/node/NodeThreadExecutionService.js.map +1 -0
- package/dist/cjs/services/node/index.js +21 -0
- package/dist/cjs/services/node/index.js.map +1 -0
- package/dist/cjs/services/offscreen/OffscreenExecutionService.js +159 -0
- package/dist/cjs/services/offscreen/OffscreenExecutionService.js.map +1 -0
- package/dist/cjs/services/offscreen/index.js +20 -0
- package/dist/cjs/services/offscreen/index.js.map +1 -0
- package/dist/cjs/services/webworker/WebWorkerExecutionService.js +148 -0
- package/dist/cjs/services/webworker/WebWorkerExecutionService.js.map +1 -0
- package/dist/cjs/services/webworker/index.js +20 -0
- package/dist/cjs/services/webworker/index.js.map +1 -0
- package/dist/cjs/snaps/RequestQueue.js +63 -0
- package/dist/cjs/snaps/RequestQueue.js.map +1 -0
- package/dist/cjs/snaps/SnapController.js +1708 -0
- package/dist/cjs/snaps/SnapController.js.map +1 -0
- package/dist/cjs/snaps/Timer.js +117 -0
- package/dist/cjs/snaps/Timer.js.map +1 -0
- package/dist/cjs/snaps/endowments/cronjob.js +100 -0
- package/dist/{snaps → cjs/snaps}/endowments/cronjob.js.map +1 -1
- package/dist/cjs/snaps/endowments/enum.js +22 -0
- package/dist/cjs/snaps/endowments/enum.js.map +1 -0
- package/dist/cjs/snaps/endowments/ethereum-provider.js +43 -0
- package/dist/cjs/snaps/endowments/ethereum-provider.js.map +1 -0
- package/dist/cjs/snaps/endowments/index.js +78 -0
- package/dist/cjs/snaps/endowments/index.js.map +1 -0
- package/dist/cjs/snaps/endowments/long-running.js +38 -0
- package/dist/cjs/snaps/endowments/long-running.js.map +1 -0
- package/dist/cjs/snaps/endowments/network-access.js +44 -0
- package/dist/cjs/snaps/endowments/network-access.js.map +1 -0
- package/dist/cjs/snaps/endowments/rpc.js +99 -0
- package/dist/cjs/snaps/endowments/rpc.js.map +1 -0
- package/dist/cjs/snaps/endowments/transaction-insight.js +106 -0
- package/dist/cjs/snaps/endowments/transaction-insight.js.map +1 -0
- package/dist/cjs/snaps/endowments/web-assembly.js +42 -0
- package/dist/cjs/snaps/endowments/web-assembly.js.map +1 -0
- package/dist/cjs/snaps/index.js +25 -0
- package/dist/cjs/snaps/index.js.map +1 -0
- package/dist/cjs/snaps/location/http.js +106 -0
- package/dist/cjs/snaps/location/http.js.map +1 -0
- package/dist/cjs/snaps/location/index.js +23 -0
- package/dist/cjs/snaps/location/index.js.map +1 -0
- package/dist/cjs/snaps/location/local.js +93 -0
- package/dist/cjs/snaps/location/local.js.map +1 -0
- package/dist/cjs/snaps/location/location.js +34 -0
- package/dist/cjs/snaps/location/location.js.map +1 -0
- package/dist/cjs/snaps/location/npm.js +291 -0
- package/dist/cjs/snaps/location/npm.js.map +1 -0
- package/dist/cjs/snaps/permissions.js +61 -0
- package/dist/cjs/snaps/permissions.js.map +1 -0
- package/dist/cjs/snaps/registry/index.js +21 -0
- package/dist/cjs/snaps/registry/index.js.map +1 -0
- package/dist/cjs/snaps/registry/json.js +249 -0
- package/dist/cjs/snaps/registry/json.js.map +1 -0
- package/dist/cjs/snaps/registry/registry.js +18 -0
- package/dist/cjs/snaps/registry/registry.js.map +1 -0
- package/dist/cjs/snaps/selectors.js +13 -0
- package/dist/cjs/snaps/selectors.js.map +1 -0
- package/dist/cjs/utils.js +70 -0
- package/dist/cjs/utils.js.map +1 -0
- package/dist/esm/cronjob/CronjobController.js +275 -0
- package/dist/esm/cronjob/CronjobController.js.map +1 -0
- package/dist/esm/cronjob/index.js +3 -0
- package/dist/esm/cronjob/index.js.map +1 -0
- package/dist/esm/fsm.js +70 -0
- package/dist/esm/fsm.js.map +1 -0
- package/dist/esm/index.js +6 -0
- package/dist/esm/index.js.map +1 -0
- package/dist/esm/logging.js +10 -0
- package/dist/esm/logging.js.map +1 -0
- package/dist/esm/services/AbstractExecutionService.js +387 -0
- package/dist/esm/services/AbstractExecutionService.js.map +1 -0
- package/dist/esm/services/ExecutionService.js +4 -0
- package/dist/esm/services/ExecutionService.js.map +1 -0
- package/dist/esm/services/ProxyPostMessageStream.js +109 -0
- package/dist/esm/services/ProxyPostMessageStream.js.map +1 -0
- package/dist/esm/services/browser.js +9 -0
- package/dist/esm/services/browser.js.map +1 -0
- package/dist/esm/services/iframe/IframeExecutionService.js +44 -0
- package/dist/esm/services/iframe/IframeExecutionService.js.map +1 -0
- package/dist/esm/services/iframe/index.js +3 -0
- package/dist/esm/services/iframe/index.js.map +1 -0
- package/dist/esm/services/index.js +9 -0
- package/dist/esm/services/index.js.map +1 -0
- package/dist/esm/services/node/NodeProcessExecutionService.js +20 -0
- package/dist/esm/services/node/NodeProcessExecutionService.js.map +1 -0
- package/dist/esm/services/node/NodeThreadExecutionService.js +21 -0
- package/dist/esm/services/node/NodeThreadExecutionService.js.map +1 -0
- package/dist/esm/services/node/index.js +4 -0
- package/dist/esm/services/node/index.js.map +1 -0
- package/dist/esm/services/offscreen/OffscreenExecutionService.js +149 -0
- package/dist/esm/services/offscreen/OffscreenExecutionService.js.map +1 -0
- package/dist/esm/services/offscreen/index.js +3 -0
- package/dist/esm/services/offscreen/index.js.map +1 -0
- package/dist/esm/services/webworker/WebWorkerExecutionService.js +130 -0
- package/dist/esm/services/webworker/WebWorkerExecutionService.js.map +1 -0
- package/dist/esm/services/webworker/index.js +3 -0
- package/dist/esm/services/webworker/index.js.map +1 -0
- package/dist/esm/snaps/RequestQueue.js +53 -0
- package/dist/esm/snaps/RequestQueue.js.map +1 -0
- package/dist/esm/snaps/SnapController.js +1687 -0
- package/dist/esm/snaps/SnapController.js.map +1 -0
- package/dist/esm/snaps/Timer.js +107 -0
- package/dist/esm/snaps/Timer.js.map +1 -0
- package/dist/esm/snaps/endowments/cronjob.js +99 -0
- package/dist/esm/snaps/endowments/cronjob.js.map +1 -0
- package/dist/esm/snaps/endowments/enum.js +12 -0
- package/dist/esm/snaps/endowments/enum.js.map +1 -0
- package/dist/esm/snaps/endowments/ethereum-provider.js +33 -0
- package/dist/esm/snaps/endowments/ethereum-provider.js.map +1 -0
- package/dist/esm/snaps/endowments/index.js +37 -0
- package/dist/esm/snaps/endowments/index.js.map +1 -0
- package/dist/esm/snaps/endowments/long-running.js +28 -0
- package/dist/esm/snaps/endowments/long-running.js.map +1 -0
- package/dist/esm/snaps/endowments/network-access.js +34 -0
- package/dist/esm/snaps/endowments/network-access.js.map +1 -0
- package/dist/esm/snaps/endowments/rpc.js +88 -0
- package/dist/esm/snaps/endowments/rpc.js.map +1 -0
- package/dist/esm/snaps/endowments/transaction-insight.js +99 -0
- package/dist/esm/snaps/endowments/transaction-insight.js.map +1 -0
- package/dist/esm/snaps/endowments/web-assembly.js +32 -0
- package/dist/esm/snaps/endowments/web-assembly.js.map +1 -0
- package/dist/esm/snaps/index.js +8 -0
- package/dist/esm/snaps/index.js.map +1 -0
- package/dist/{snaps → esm/snaps}/location/http.js +52 -31
- package/dist/esm/snaps/location/http.js.map +1 -0
- package/dist/esm/snaps/location/index.js +6 -0
- package/dist/esm/snaps/location/index.js.map +1 -0
- package/dist/esm/snaps/location/local.js +83 -0
- package/dist/esm/snaps/location/local.js.map +1 -0
- package/dist/esm/snaps/location/location.js +30 -0
- package/dist/esm/snaps/location/location.js.map +1 -0
- package/dist/{snaps → esm/snaps}/location/npm.js +118 -110
- package/dist/esm/snaps/location/npm.js.map +1 -0
- package/dist/esm/snaps/permissions.js +50 -0
- package/dist/esm/snaps/permissions.js.map +1 -0
- package/dist/esm/snaps/registry/index.js +4 -0
- package/dist/esm/snaps/registry/index.js.map +1 -0
- package/dist/esm/snaps/registry/json.js +239 -0
- package/dist/esm/snaps/registry/json.js.map +1 -0
- package/dist/esm/snaps/registry/registry.js +8 -0
- package/dist/esm/snaps/registry/registry.js.map +1 -0
- package/dist/esm/snaps/selectors.js +3 -0
- package/dist/esm/snaps/selectors.js.map +1 -0
- package/dist/{utils.js → esm/utils.js} +19 -28
- package/dist/esm/utils.js.map +1 -0
- package/dist/{index.d.ts → types/index.d.ts} +0 -1
- package/dist/{snaps → types/snaps}/endowments/enum.d.ts +0 -1
- package/dist/{snaps → types/snaps}/endowments/index.d.ts +1 -12
- package/dist/{snaps → types/snaps}/index.d.ts +1 -0
- package/package.json +66 -18
- package/dist/cronjob/CronjobController.js +0 -248
- package/dist/cronjob/CronjobController.js.map +0 -1
- package/dist/cronjob/index.js +0 -18
- package/dist/cronjob/index.js.map +0 -1
- package/dist/fsm.js +0 -75
- package/dist/fsm.js.map +0 -1
- package/dist/index.js +0 -22
- package/dist/index.js.map +0 -1
- package/dist/logging.js +0 -13
- package/dist/logging.js.map +0 -1
- package/dist/multichain/MultiChainController.d.ts +0 -137
- package/dist/multichain/MultiChainController.js +0 -339
- package/dist/multichain/MultiChainController.js.map +0 -1
- package/dist/multichain/index.d.ts +0 -3
- package/dist/multichain/index.js +0 -20
- package/dist/multichain/index.js.map +0 -1
- package/dist/multichain/matching.d.ts +0 -9
- package/dist/multichain/matching.js +0 -57
- package/dist/multichain/matching.js.map +0 -1
- package/dist/multichain/middleware.d.ts +0 -14
- package/dist/multichain/middleware.js +0 -42
- package/dist/multichain/middleware.js.map +0 -1
- package/dist/services/AbstractExecutionService.js +0 -318
- package/dist/services/AbstractExecutionService.js.map +0 -1
- package/dist/services/ExecutionService.js +0 -4
- package/dist/services/ExecutionService.js.map +0 -1
- package/dist/services/ProxyPostMessageStream.js +0 -62
- package/dist/services/ProxyPostMessageStream.js.map +0 -1
- package/dist/services/browser.js +0 -26
- package/dist/services/browser.js.map +0 -1
- package/dist/services/iframe/IframeExecutionService.js +0 -30
- package/dist/services/iframe/IframeExecutionService.js.map +0 -1
- package/dist/services/iframe/index.js +0 -18
- package/dist/services/iframe/index.js.map +0 -1
- package/dist/services/index.js +0 -26
- package/dist/services/index.js.map +0 -1
- package/dist/services/node/NodeProcessExecutionService.js +0 -18
- package/dist/services/node/NodeProcessExecutionService.js.map +0 -1
- package/dist/services/node/NodeThreadExecutionService.js +0 -19
- package/dist/services/node/NodeThreadExecutionService.js.map +0 -1
- package/dist/services/node/index.js +0 -19
- package/dist/services/node/index.js.map +0 -1
- package/dist/services/offscreen/OffscreenExecutionService.js +0 -105
- package/dist/services/offscreen/OffscreenExecutionService.js.map +0 -1
- package/dist/services/offscreen/index.js +0 -18
- package/dist/services/offscreen/index.js.map +0 -1
- package/dist/services/webworker/WebWorkerExecutionService.js +0 -100
- package/dist/services/webworker/WebWorkerExecutionService.js.map +0 -1
- package/dist/services/webworker/index.js +0 -18
- package/dist/services/webworker/index.js.map +0 -1
- package/dist/snaps/RequestQueue.js +0 -44
- package/dist/snaps/RequestQueue.js.map +0 -1
- package/dist/snaps/SnapController.js +0 -1495
- package/dist/snaps/SnapController.js.map +0 -1
- package/dist/snaps/Timer.js +0 -86
- package/dist/snaps/Timer.js.map +0 -1
- package/dist/snaps/endowments/cronjob.js +0 -105
- package/dist/snaps/endowments/enum.js +0 -15
- package/dist/snaps/endowments/enum.js.map +0 -1
- package/dist/snaps/endowments/ethereum-provider.js +0 -32
- package/dist/snaps/endowments/ethereum-provider.js.map +0 -1
- package/dist/snaps/endowments/index.js +0 -58
- package/dist/snaps/endowments/index.js.map +0 -1
- package/dist/snaps/endowments/keyring.d.ts +0 -40
- package/dist/snaps/endowments/keyring.js +0 -104
- package/dist/snaps/endowments/keyring.js.map +0 -1
- package/dist/snaps/endowments/long-running.js +0 -29
- package/dist/snaps/endowments/long-running.js.map +0 -1
- package/dist/snaps/endowments/network-access.js +0 -30
- package/dist/snaps/endowments/network-access.js.map +0 -1
- package/dist/snaps/endowments/rpc.js +0 -93
- package/dist/snaps/endowments/rpc.js.map +0 -1
- package/dist/snaps/endowments/transaction-insight.js +0 -106
- package/dist/snaps/endowments/transaction-insight.js.map +0 -1
- package/dist/snaps/endowments/web-assembly.js +0 -31
- package/dist/snaps/endowments/web-assembly.js.map +0 -1
- package/dist/snaps/index.js +0 -22
- package/dist/snaps/index.js.map +0 -1
- package/dist/snaps/location/http.js.map +0 -1
- package/dist/snaps/location/index.js +0 -21
- package/dist/snaps/location/index.js.map +0 -1
- package/dist/snaps/location/local.js +0 -51
- package/dist/snaps/location/local.js.map +0 -1
- package/dist/snaps/location/location.js +0 -34
- package/dist/snaps/location/location.js.map +0 -1
- package/dist/snaps/location/npm.js.map +0 -1
- package/dist/snaps/permissions.js +0 -54
- package/dist/snaps/permissions.js.map +0 -1
- package/dist/snaps/registry/index.js +0 -19
- package/dist/snaps/registry/index.js.map +0 -1
- package/dist/snaps/registry/json.js +0 -170
- package/dist/snaps/registry/json.js.map +0 -1
- package/dist/snaps/registry/registry.js +0 -11
- package/dist/snaps/registry/registry.js.map +0 -1
- package/dist/snaps/selectors.js +0 -6
- package/dist/snaps/selectors.js.map +0 -1
- package/dist/utils.js.map +0 -1
- /package/dist/{cronjob → types/cronjob}/CronjobController.d.ts +0 -0
- /package/dist/{cronjob → types/cronjob}/index.d.ts +0 -0
- /package/dist/{fsm.d.ts → types/fsm.d.ts} +0 -0
- /package/dist/{logging.d.ts → types/logging.d.ts} +0 -0
- /package/dist/{services → types/services}/AbstractExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/ExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/ProxyPostMessageStream.d.ts +0 -0
- /package/dist/{services → types/services}/browser.d.ts +0 -0
- /package/dist/{services → types/services}/iframe/IframeExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/iframe/index.d.ts +0 -0
- /package/dist/{services → types/services}/index.d.ts +0 -0
- /package/dist/{services → types/services}/node/NodeProcessExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/node/NodeThreadExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/node/index.d.ts +0 -0
- /package/dist/{services → types/services}/offscreen/OffscreenExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/offscreen/index.d.ts +0 -0
- /package/dist/{services → types/services}/webworker/WebWorkerExecutionService.d.ts +0 -0
- /package/dist/{services → types/services}/webworker/index.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/RequestQueue.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/SnapController.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/Timer.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/cronjob.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/ethereum-provider.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/long-running.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/network-access.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/rpc.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/transaction-insight.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/endowments/web-assembly.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/http.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/index.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/local.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/location.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/npm.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/permissions.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/registry/index.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/registry/json.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/registry/registry.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/selectors.d.ts +0 -0
- /package/dist/{utils.d.ts → types/utils.d.ts} +0 -0
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
import { HandlerType } from '@metamask/snaps-utils';
|
|
2
|
+
import { cronjobCaveatSpecifications, cronjobEndowmentBuilder, getCronjobCaveatMapper } from './cronjob';
|
|
3
|
+
import { ethereumProviderEndowmentBuilder } from './ethereum-provider';
|
|
4
|
+
import { longRunningEndowmentBuilder } from './long-running';
|
|
5
|
+
import { networkAccessEndowmentBuilder } from './network-access';
|
|
6
|
+
import { getRpcCaveatMapper, rpcCaveatSpecifications, rpcEndowmentBuilder } from './rpc';
|
|
7
|
+
import { getTransactionInsightCaveatMapper, transactionInsightCaveatSpecifications, transactionInsightEndowmentBuilder } from './transaction-insight';
|
|
8
|
+
import { webAssemblyEndowmentBuilder } from './web-assembly';
|
|
9
|
+
export const endowmentPermissionBuilders = {
|
|
10
|
+
[networkAccessEndowmentBuilder.targetName]: networkAccessEndowmentBuilder,
|
|
11
|
+
[longRunningEndowmentBuilder.targetName]: longRunningEndowmentBuilder,
|
|
12
|
+
[transactionInsightEndowmentBuilder.targetName]: transactionInsightEndowmentBuilder,
|
|
13
|
+
[cronjobEndowmentBuilder.targetName]: cronjobEndowmentBuilder,
|
|
14
|
+
[ethereumProviderEndowmentBuilder.targetName]: ethereumProviderEndowmentBuilder,
|
|
15
|
+
[rpcEndowmentBuilder.targetName]: rpcEndowmentBuilder,
|
|
16
|
+
[webAssemblyEndowmentBuilder.targetName]: webAssemblyEndowmentBuilder
|
|
17
|
+
};
|
|
18
|
+
export const endowmentCaveatSpecifications = {
|
|
19
|
+
...cronjobCaveatSpecifications,
|
|
20
|
+
...transactionInsightCaveatSpecifications,
|
|
21
|
+
...rpcCaveatSpecifications
|
|
22
|
+
};
|
|
23
|
+
export const endowmentCaveatMappers = {
|
|
24
|
+
[cronjobEndowmentBuilder.targetName]: getCronjobCaveatMapper,
|
|
25
|
+
[transactionInsightEndowmentBuilder.targetName]: getTransactionInsightCaveatMapper,
|
|
26
|
+
[rpcEndowmentBuilder.targetName]: getRpcCaveatMapper
|
|
27
|
+
};
|
|
28
|
+
export const handlerEndowments = {
|
|
29
|
+
[HandlerType.OnRpcRequest]: rpcEndowmentBuilder.targetName,
|
|
30
|
+
[HandlerType.OnTransaction]: transactionInsightEndowmentBuilder.targetName,
|
|
31
|
+
[HandlerType.OnCronjob]: cronjobEndowmentBuilder.targetName
|
|
32
|
+
};
|
|
33
|
+
export * from './enum';
|
|
34
|
+
export { getRpcCaveatOrigins } from './rpc';
|
|
35
|
+
export { getTransactionOriginCaveat } from './transaction-insight';
|
|
36
|
+
|
|
37
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/index.ts"],"sourcesContent":["import { PermissionConstraint } from '@metamask/permission-controller';\nimport { HandlerType } from '@metamask/snaps-utils';\nimport { Json } from '@metamask/utils';\n\nimport {\n cronjobCaveatSpecifications,\n cronjobEndowmentBuilder,\n getCronjobCaveatMapper,\n} from './cronjob';\nimport { ethereumProviderEndowmentBuilder } from './ethereum-provider';\nimport { longRunningEndowmentBuilder } from './long-running';\nimport { networkAccessEndowmentBuilder } from './network-access';\nimport {\n getRpcCaveatMapper,\n rpcCaveatSpecifications,\n rpcEndowmentBuilder,\n} from './rpc';\nimport {\n getTransactionInsightCaveatMapper,\n transactionInsightCaveatSpecifications,\n transactionInsightEndowmentBuilder,\n} from './transaction-insight';\nimport { webAssemblyEndowmentBuilder } from './web-assembly';\n\nexport const endowmentPermissionBuilders = {\n [networkAccessEndowmentBuilder.targetName]: networkAccessEndowmentBuilder,\n [longRunningEndowmentBuilder.targetName]: longRunningEndowmentBuilder,\n [transactionInsightEndowmentBuilder.targetName]:\n transactionInsightEndowmentBuilder,\n [cronjobEndowmentBuilder.targetName]: cronjobEndowmentBuilder,\n [ethereumProviderEndowmentBuilder.targetName]:\n ethereumProviderEndowmentBuilder,\n [rpcEndowmentBuilder.targetName]: rpcEndowmentBuilder,\n [webAssemblyEndowmentBuilder.targetName]: webAssemblyEndowmentBuilder,\n} as const;\n\nexport const endowmentCaveatSpecifications = {\n ...cronjobCaveatSpecifications,\n ...transactionInsightCaveatSpecifications,\n ...rpcCaveatSpecifications,\n};\n\nexport const endowmentCaveatMappers: Record<\n string,\n (value: Json) => Pick<PermissionConstraint, 'caveats'>\n> = {\n [cronjobEndowmentBuilder.targetName]: getCronjobCaveatMapper,\n [transactionInsightEndowmentBuilder.targetName]:\n getTransactionInsightCaveatMapper,\n [rpcEndowmentBuilder.targetName]: getRpcCaveatMapper,\n};\n\nexport const handlerEndowments: Record<HandlerType, string> = {\n [HandlerType.OnRpcRequest]: rpcEndowmentBuilder.targetName,\n [HandlerType.OnTransaction]: transactionInsightEndowmentBuilder.targetName,\n [HandlerType.OnCronjob]: cronjobEndowmentBuilder.targetName,\n};\n\nexport * from './enum';\nexport { getRpcCaveatOrigins } from './rpc';\nexport { getTransactionOriginCaveat } from './transaction-insight';\n"],"names":["HandlerType","cronjobCaveatSpecifications","cronjobEndowmentBuilder","getCronjobCaveatMapper","ethereumProviderEndowmentBuilder","longRunningEndowmentBuilder","networkAccessEndowmentBuilder","getRpcCaveatMapper","rpcCaveatSpecifications","rpcEndowmentBuilder","getTransactionInsightCaveatMapper","transactionInsightCaveatSpecifications","transactionInsightEndowmentBuilder","webAssemblyEndowmentBuilder","endowmentPermissionBuilders","targetName","endowmentCaveatSpecifications","endowmentCaveatMappers","handlerEndowments","OnRpcRequest","OnTransaction","OnCronjob","getRpcCaveatOrigins","getTransactionOriginCaveat"],"mappings":"AACA,SAASA,WAAW,QAAQ,wBAAwB;AAGpD,SACEC,2BAA2B,EAC3BC,uBAAuB,EACvBC,sBAAsB,QACjB,YAAY;AACnB,SAASC,gCAAgC,QAAQ,sBAAsB;AACvE,SAASC,2BAA2B,QAAQ,iBAAiB;AAC7D,SAASC,6BAA6B,QAAQ,mBAAmB;AACjE,SACEC,kBAAkB,EAClBC,uBAAuB,EACvBC,mBAAmB,QACd,QAAQ;AACf,SACEC,iCAAiC,EACjCC,sCAAsC,EACtCC,kCAAkC,QAC7B,wBAAwB;AAC/B,SAASC,2BAA2B,QAAQ,iBAAiB;AAE7D,OAAO,MAAMC,8BAA8B;IACzC,CAACR,8BAA8BS,UAAU,CAAC,EAAET;IAC5C,CAACD,4BAA4BU,UAAU,CAAC,EAAEV;IAC1C,CAACO,mCAAmCG,UAAU,CAAC,EAC7CH;IACF,CAACV,wBAAwBa,UAAU,CAAC,EAAEb;IACtC,CAACE,iCAAiCW,UAAU,CAAC,EAC3CX;IACF,CAACK,oBAAoBM,UAAU,CAAC,EAAEN;IAClC,CAACI,4BAA4BE,UAAU,CAAC,EAAEF;AAC5C,EAAW;AAEX,OAAO,MAAMG,gCAAgC;IAC3C,GAAGf,2BAA2B;IAC9B,GAAGU,sCAAsC;IACzC,GAAGH,uBAAuB;AAC5B,EAAE;AAEF,OAAO,MAAMS,yBAGT;IACF,CAACf,wBAAwBa,UAAU,CAAC,EAAEZ;IACtC,CAACS,mCAAmCG,UAAU,CAAC,EAC7CL;IACF,CAACD,oBAAoBM,UAAU,CAAC,EAAER;AACpC,EAAE;AAEF,OAAO,MAAMW,oBAAiD;IAC5D,CAAClB,YAAYmB,YAAY,CAAC,EAAEV,oBAAoBM,UAAU;IAC1D,CAACf,YAAYoB,aAAa,CAAC,EAAER,mCAAmCG,UAAU;IAC1E,CAACf,YAAYqB,SAAS,CAAC,EAAEnB,wBAAwBa,UAAU;AAC7D,EAAE;AAEF,cAAc,SAAS;AACvB,SAASO,mBAAmB,QAAQ,QAAQ;AAC5C,SAASC,0BAA0B,QAAQ,wBAAwB"}
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
import { PermissionType, SubjectType } from '@metamask/permission-controller';
|
|
2
|
+
import { SnapEndowments } from './enum';
|
|
3
|
+
const permissionName = SnapEndowments.LongRunning;
|
|
4
|
+
/**
|
|
5
|
+
* `endowment:long-running` returns nothing; it is intended to be used as a flag
|
|
6
|
+
* by the `SnapController` to make it ignore the request processing timeout
|
|
7
|
+
* during snap lifecycle management. Essentially, it allows a snap to take an
|
|
8
|
+
* infinite amount of time to process a request.
|
|
9
|
+
*
|
|
10
|
+
* @param _builderOptions - Optional specification builder options.
|
|
11
|
+
* @returns The specification for the long-running endowment.
|
|
12
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
13
|
+
return {
|
|
14
|
+
permissionType: PermissionType.Endowment,
|
|
15
|
+
targetName: permissionName,
|
|
16
|
+
allowedCaveats: null,
|
|
17
|
+
endowmentGetter: (_getterOptions)=>undefined,
|
|
18
|
+
subjectTypes: [
|
|
19
|
+
SubjectType.Snap
|
|
20
|
+
]
|
|
21
|
+
};
|
|
22
|
+
};
|
|
23
|
+
export const longRunningEndowmentBuilder = Object.freeze({
|
|
24
|
+
targetName: permissionName,
|
|
25
|
+
specificationBuilder
|
|
26
|
+
});
|
|
27
|
+
|
|
28
|
+
//# sourceMappingURL=long-running.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/long-running.ts"],"sourcesContent":["import {\n PermissionSpecificationBuilder,\n PermissionType,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.LongRunning;\n\ntype LongRunningEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:long-running` returns nothing; it is intended to be used as a flag\n * by the `SnapController` to make it ignore the request processing timeout\n * during snap lifecycle management. Essentially, it allows a snap to take an\n * infinite amount of time to process a request.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the long-running endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n LongRunningEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const longRunningEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["PermissionType","SubjectType","SnapEndowments","permissionName","LongRunning","specificationBuilder","_builderOptions","permissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","undefined","subjectTypes","Snap","longRunningEndowmentBuilder","Object","freeze"],"mappings":"AAAA,SAEEA,cAAc,EAGdC,WAAW,QACN,kCAAkC;AAEzC,SAASC,cAAc,QAAQ,SAAS;AAExC,MAAMC,iBAAiBD,eAAeE,WAAW;AASjD;;;;;;;;CAQC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBP,eAAeQ,SAAS;QACxCC,YAAYN;QACZO,gBAAgB;QAChBC,iBAAiB,CAACC,iBAA2CC;QAC7DC,cAAc;YAACb,YAAYc,IAAI;SAAC;IAClC;AACF;AAEA,OAAO,MAAMC,8BAA8BC,OAAOC,MAAM,CAAC;IACvDT,YAAYN;IACZE;AACF,GAAY"}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
import { PermissionType, SubjectType } from '@metamask/permission-controller';
|
|
2
|
+
import { SnapEndowments } from './enum';
|
|
3
|
+
const permissionName = SnapEndowments.NetworkAccess;
|
|
4
|
+
/**
|
|
5
|
+
* `endowment:network-access` returns the name of global browser API(s) that
|
|
6
|
+
* enable network access. This is intended to populate the endowments of the
|
|
7
|
+
* SES Compartment in which a Snap executes.
|
|
8
|
+
*
|
|
9
|
+
* @param _builderOptions - Optional specification builder options.
|
|
10
|
+
* @returns The specification for the network endowment.
|
|
11
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
12
|
+
return {
|
|
13
|
+
permissionType: PermissionType.Endowment,
|
|
14
|
+
targetName: permissionName,
|
|
15
|
+
allowedCaveats: null,
|
|
16
|
+
endowmentGetter: (_getterOptions)=>{
|
|
17
|
+
return [
|
|
18
|
+
'fetch',
|
|
19
|
+
'Request',
|
|
20
|
+
'Headers',
|
|
21
|
+
'Response'
|
|
22
|
+
];
|
|
23
|
+
},
|
|
24
|
+
subjectTypes: [
|
|
25
|
+
SubjectType.Snap
|
|
26
|
+
]
|
|
27
|
+
};
|
|
28
|
+
};
|
|
29
|
+
export const networkAccessEndowmentBuilder = Object.freeze({
|
|
30
|
+
targetName: permissionName,
|
|
31
|
+
specificationBuilder
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
//# sourceMappingURL=network-access.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/network-access.ts"],"sourcesContent":["import {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n PermissionType,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.NetworkAccess;\n\ntype NetworkAccessEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (\n _options?: any,\n ) => ['fetch', 'Request', 'Headers', 'Response'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:network-access` returns the name of global browser API(s) that\n * enable network access. This is intended to populate the endowments of the\n * SES Compartment in which a Snap executes.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the network endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n NetworkAccessEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['fetch', 'Request', 'Headers', 'Response'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const networkAccessEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["PermissionType","SubjectType","SnapEndowments","permissionName","NetworkAccess","specificationBuilder","_builderOptions","permissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","subjectTypes","Snap","networkAccessEndowmentBuilder","Object","freeze"],"mappings":"AAAA,SAGEA,cAAc,EAEdC,WAAW,QACN,kCAAkC;AAEzC,SAASC,cAAc,QAAQ,SAAS;AAExC,MAAMC,iBAAiBD,eAAeE,aAAa;AAWnD;;;;;;;CAOC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBP,eAAeQ,SAAS;QACxCC,YAAYN;QACZO,gBAAgB;QAChBC,iBAAiB,CAACC;YAChB,OAAO;gBAAC;gBAAS;gBAAW;gBAAW;aAAW;QACpD;QACAC,cAAc;YAACZ,YAAYa,IAAI;SAAC;IAClC;AACF;AAEA,OAAO,MAAMC,gCAAgCC,OAAOC,MAAM,CAAC;IACzDR,YAAYN;IACZE;AACF,GAAY"}
|
|
@@ -0,0 +1,88 @@
|
|
|
1
|
+
import { PermissionType, SubjectType } from '@metamask/permission-controller';
|
|
2
|
+
import { assertIsRpcOrigins, SnapCaveatType } from '@metamask/snaps-utils';
|
|
3
|
+
import { hasProperty, isPlainObject, assert } from '@metamask/utils';
|
|
4
|
+
import { ethErrors } from 'eth-rpc-errors';
|
|
5
|
+
import { SnapEndowments } from './enum';
|
|
6
|
+
const targetName = SnapEndowments.Rpc;
|
|
7
|
+
/**
|
|
8
|
+
* The specification builder for the JSON-RPC endowment permission.
|
|
9
|
+
*
|
|
10
|
+
* @param _builderOptions - Optional specification builder options.
|
|
11
|
+
* @returns The specification for the JSON-RPC endowment permission.
|
|
12
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
13
|
+
return {
|
|
14
|
+
permissionType: PermissionType.Endowment,
|
|
15
|
+
targetName,
|
|
16
|
+
allowedCaveats: [
|
|
17
|
+
SnapCaveatType.RpcOrigin
|
|
18
|
+
],
|
|
19
|
+
endowmentGetter: (_getterOptions)=>undefined,
|
|
20
|
+
validator: ({ caveats })=>{
|
|
21
|
+
if (caveats?.length !== 1 || caveats[0].type !== SnapCaveatType.RpcOrigin) {
|
|
22
|
+
throw ethErrors.rpc.invalidParams({
|
|
23
|
+
message: `Expected a single "${SnapCaveatType.RpcOrigin}" caveat.`
|
|
24
|
+
});
|
|
25
|
+
}
|
|
26
|
+
},
|
|
27
|
+
subjectTypes: [
|
|
28
|
+
SubjectType.Snap
|
|
29
|
+
]
|
|
30
|
+
};
|
|
31
|
+
};
|
|
32
|
+
export const rpcEndowmentBuilder = Object.freeze({
|
|
33
|
+
targetName,
|
|
34
|
+
specificationBuilder
|
|
35
|
+
});
|
|
36
|
+
/**
|
|
37
|
+
* Validate the value of a caveat. This does not validate the type of the
|
|
38
|
+
* caveat itself, only the value of the caveat.
|
|
39
|
+
*
|
|
40
|
+
* @param caveat - The caveat to validate.
|
|
41
|
+
* @throws If the caveat value is invalid.
|
|
42
|
+
*/ function validateCaveatOrigins(caveat) {
|
|
43
|
+
if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {
|
|
44
|
+
throw ethErrors.rpc.invalidParams({
|
|
45
|
+
message: 'Invalid JSON-RPC origins: Expected a plain object.'
|
|
46
|
+
});
|
|
47
|
+
}
|
|
48
|
+
const { value } = caveat;
|
|
49
|
+
assertIsRpcOrigins(value, ethErrors.rpc.invalidParams);
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
53
|
+
* Note that this function does not do any validation, that's handled by the
|
|
54
|
+
* PermissionsController when the permission is requested.
|
|
55
|
+
*
|
|
56
|
+
* @param value - The raw value from the `initialPermissions`.
|
|
57
|
+
* @returns The caveat specification.
|
|
58
|
+
*/ export function getRpcCaveatMapper(value) {
|
|
59
|
+
return {
|
|
60
|
+
caveats: [
|
|
61
|
+
{
|
|
62
|
+
type: SnapCaveatType.RpcOrigin,
|
|
63
|
+
value
|
|
64
|
+
}
|
|
65
|
+
]
|
|
66
|
+
};
|
|
67
|
+
}
|
|
68
|
+
/**
|
|
69
|
+
* Getter function to get the {@link RpcOrigins} caveat value from a permission.
|
|
70
|
+
*
|
|
71
|
+
* @param permission - The permission to get the caveat value from.
|
|
72
|
+
* @returns The caveat value.
|
|
73
|
+
* @throws If the permission does not have a valid {@link RpcOrigins} caveat.
|
|
74
|
+
*/ export function getRpcCaveatOrigins(permission) {
|
|
75
|
+
assert(permission?.caveats);
|
|
76
|
+
assert(permission.caveats.length === 1);
|
|
77
|
+
assert(permission.caveats[0].type === SnapCaveatType.RpcOrigin);
|
|
78
|
+
const caveat = permission.caveats[0];
|
|
79
|
+
return caveat.value;
|
|
80
|
+
}
|
|
81
|
+
export const rpcCaveatSpecifications = {
|
|
82
|
+
[SnapCaveatType.RpcOrigin]: Object.freeze({
|
|
83
|
+
type: SnapCaveatType.RpcOrigin,
|
|
84
|
+
validator: (caveat)=>validateCaveatOrigins(caveat)
|
|
85
|
+
})
|
|
86
|
+
};
|
|
87
|
+
|
|
88
|
+
//# sourceMappingURL=rpc.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/rpc.ts"],"sourcesContent":["import {\n Caveat,\n CaveatSpecificationConstraint,\n EndowmentGetterParams,\n PermissionConstraint,\n PermissionSpecificationBuilder,\n PermissionType,\n PermissionValidatorConstraint,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\nimport {\n assertIsRpcOrigins,\n RpcOrigins,\n SnapCaveatType,\n} from '@metamask/snaps-utils';\nimport {\n hasProperty,\n isPlainObject,\n Json,\n NonEmptyArray,\n assert,\n} from '@metamask/utils';\nimport { ethErrors } from 'eth-rpc-errors';\n\nimport { SnapEndowments } from './enum';\n\nconst targetName = SnapEndowments.Rpc;\n\ntype RpcSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof targetName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n validator: PermissionValidatorConstraint;\n subjectTypes: readonly SubjectType[];\n}>;\n\ntype RpcSpecificationBuilderOptions = {\n // Empty for now.\n};\n\n/**\n * The specification builder for the JSON-RPC endowment permission.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the JSON-RPC endowment permission.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n RpcSpecificationBuilderOptions,\n RpcSpecification\n> = (_builderOptions?: any): RpcSpecification => {\n return {\n permissionType: PermissionType.Endowment,\n targetName,\n allowedCaveats: [SnapCaveatType.RpcOrigin],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n validator: ({ caveats }) => {\n if (\n caveats?.length !== 1 ||\n caveats[0].type !== SnapCaveatType.RpcOrigin\n ) {\n throw ethErrors.rpc.invalidParams({\n message: `Expected a single \"${SnapCaveatType.RpcOrigin}\" caveat.`,\n });\n }\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const rpcEndowmentBuilder = Object.freeze({\n targetName,\n specificationBuilder,\n} as const);\n\n/**\n * Validate the value of a caveat. This does not validate the type of the\n * caveat itself, only the value of the caveat.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateCaveatOrigins(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Invalid JSON-RPC origins: Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n assertIsRpcOrigins(value, ethErrors.rpc.invalidParams);\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getRpcCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n return {\n caveats: [\n {\n type: SnapCaveatType.RpcOrigin,\n value,\n },\n ],\n };\n}\n\n/**\n * Getter function to get the {@link RpcOrigins} caveat value from a permission.\n *\n * @param permission - The permission to get the caveat value from.\n * @returns The caveat value.\n * @throws If the permission does not have a valid {@link RpcOrigins} caveat.\n */\nexport function getRpcCaveatOrigins(\n permission?: PermissionConstraint,\n): RpcOrigins | null {\n assert(permission?.caveats);\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.RpcOrigin);\n\n const caveat = permission.caveats[0] as Caveat<string, RpcOrigins>;\n return caveat.value;\n}\n\nexport const rpcCaveatSpecifications: Record<\n SnapCaveatType.RpcOrigin,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.RpcOrigin]: Object.freeze({\n type: SnapCaveatType.RpcOrigin,\n validator: (caveat: Caveat<string, any>) => validateCaveatOrigins(caveat),\n }),\n};\n"],"names":["PermissionType","SubjectType","assertIsRpcOrigins","SnapCaveatType","hasProperty","isPlainObject","assert","ethErrors","SnapEndowments","targetName","Rpc","specificationBuilder","_builderOptions","permissionType","Endowment","allowedCaveats","RpcOrigin","endowmentGetter","_getterOptions","undefined","validator","caveats","length","type","rpc","invalidParams","message","subjectTypes","Snap","rpcEndowmentBuilder","Object","freeze","validateCaveatOrigins","caveat","value","getRpcCaveatMapper","getRpcCaveatOrigins","permission","rpcCaveatSpecifications"],"mappings":"AAAA,SAMEA,cAAc,EAGdC,WAAW,QACN,kCAAkC;AACzC,SACEC,kBAAkB,EAElBC,cAAc,QACT,wBAAwB;AAC/B,SACEC,WAAW,EACXC,aAAa,EAGbC,MAAM,QACD,kBAAkB;AACzB,SAASC,SAAS,QAAQ,iBAAiB;AAE3C,SAASC,cAAc,QAAQ,SAAS;AAExC,MAAMC,aAAaD,eAAeE,GAAG;AAerC;;;;;CAKC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBb,eAAec,SAAS;QACxCL;QACAM,gBAAgB;YAACZ,eAAea,SAAS;SAAC;QAC1CC,iBAAiB,CAACC,iBAA2CC;QAC7DC,WAAW,CAAC,EAAEC,OAAO,EAAE;YACrB,IACEA,SAASC,WAAW,KACpBD,OAAO,CAAC,EAAE,CAACE,IAAI,KAAKpB,eAAea,SAAS,EAC5C;gBACA,MAAMT,UAAUiB,GAAG,CAACC,aAAa,CAAC;oBAChCC,SAAS,CAAC,mBAAmB,EAAEvB,eAAea,SAAS,CAAC,SAAS,CAAC;gBACpE;YACF;QACF;QACAW,cAAc;YAAC1B,YAAY2B,IAAI;SAAC;IAClC;AACF;AAEA,OAAO,MAAMC,sBAAsBC,OAAOC,MAAM,CAAC;IAC/CtB;IACAE;AACF,GAAY;AAEZ;;;;;;CAMC,GACD,SAASqB,sBAAsBC,MAA2B;IACxD,IAAI,CAAC7B,YAAY6B,QAAQ,YAAY,CAAC5B,cAAc4B,OAAOC,KAAK,GAAG;QACjE,MAAM3B,UAAUiB,GAAG,CAACC,aAAa,CAAC;YAChCC,SAAS;QACX;IACF;IAEA,MAAM,EAAEQ,KAAK,EAAE,GAAGD;IAClB/B,mBAAmBgC,OAAO3B,UAAUiB,GAAG,CAACC,aAAa;AACvD;AAEA;;;;;;;CAOC,GACD,OAAO,SAASU,mBACdD,KAAW;IAEX,OAAO;QACLb,SAAS;YACP;gBACEE,MAAMpB,eAAea,SAAS;gBAC9BkB;YACF;SACD;IACH;AACF;AAEA;;;;;;CAMC,GACD,OAAO,SAASE,oBACdC,UAAiC;IAEjC/B,OAAO+B,YAAYhB;IACnBf,OAAO+B,WAAWhB,OAAO,CAACC,MAAM,KAAK;IACrChB,OAAO+B,WAAWhB,OAAO,CAAC,EAAE,CAACE,IAAI,KAAKpB,eAAea,SAAS;IAE9D,MAAMiB,SAASI,WAAWhB,OAAO,CAAC,EAAE;IACpC,OAAOY,OAAOC,KAAK;AACrB;AAEA,OAAO,MAAMI,0BAGT;IACF,CAACnC,eAAea,SAAS,CAAC,EAAEc,OAAOC,MAAM,CAAC;QACxCR,MAAMpB,eAAea,SAAS;QAC9BI,WAAW,CAACa,SAAgCD,sBAAsBC;IACpE;AACF,EAAE"}
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
import { PermissionType, SubjectType } from '@metamask/permission-controller';
|
|
2
|
+
import { SnapCaveatType } from '@metamask/snaps-utils';
|
|
3
|
+
import { assert, hasProperty, isObject, isPlainObject } from '@metamask/utils';
|
|
4
|
+
import { ethErrors } from 'eth-rpc-errors';
|
|
5
|
+
import { SnapEndowments } from './enum';
|
|
6
|
+
const permissionName = SnapEndowments.TransactionInsight;
|
|
7
|
+
/**
|
|
8
|
+
* `endowment:transaction-insight` returns nothing; it is intended to be used as a flag
|
|
9
|
+
* by the extension to detect whether the snap has the capability to show information on the transaction confirmation screen.
|
|
10
|
+
*
|
|
11
|
+
* @param _builderOptions - Optional specification builder options.
|
|
12
|
+
* @returns The specification for the transaction-insight endowment.
|
|
13
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
14
|
+
return {
|
|
15
|
+
permissionType: PermissionType.Endowment,
|
|
16
|
+
targetName: permissionName,
|
|
17
|
+
allowedCaveats: [
|
|
18
|
+
SnapCaveatType.TransactionOrigin
|
|
19
|
+
],
|
|
20
|
+
endowmentGetter: (_getterOptions)=>undefined,
|
|
21
|
+
validator: ({ caveats })=>{
|
|
22
|
+
if (caveats !== null && caveats?.length > 1 || caveats?.length === 1 && caveats[0].type !== SnapCaveatType.TransactionOrigin) {
|
|
23
|
+
throw ethErrors.rpc.invalidParams({
|
|
24
|
+
message: `Expected a single "${SnapCaveatType.TransactionOrigin}" caveat.`
|
|
25
|
+
});
|
|
26
|
+
}
|
|
27
|
+
},
|
|
28
|
+
subjectTypes: [
|
|
29
|
+
SubjectType.Snap
|
|
30
|
+
]
|
|
31
|
+
};
|
|
32
|
+
};
|
|
33
|
+
export const transactionInsightEndowmentBuilder = Object.freeze({
|
|
34
|
+
targetName: permissionName,
|
|
35
|
+
specificationBuilder
|
|
36
|
+
});
|
|
37
|
+
/**
|
|
38
|
+
* Validates the type of the caveat value.
|
|
39
|
+
*
|
|
40
|
+
* @param caveat - The caveat to validate.
|
|
41
|
+
* @throws If the caveat value is invalid.
|
|
42
|
+
*/ function validateCaveat(caveat) {
|
|
43
|
+
if (!hasProperty(caveat, 'value') || !isPlainObject(caveat)) {
|
|
44
|
+
throw ethErrors.rpc.invalidParams({
|
|
45
|
+
message: 'Expected a plain object.'
|
|
46
|
+
});
|
|
47
|
+
}
|
|
48
|
+
const { value } = caveat;
|
|
49
|
+
assert(typeof value === 'boolean', 'Expected caveat value to have type "boolean"');
|
|
50
|
+
}
|
|
51
|
+
/**
|
|
52
|
+
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
53
|
+
* Note that this function does not do any validation, that's handled by the
|
|
54
|
+
* PermissionsController when the permission is requested.
|
|
55
|
+
*
|
|
56
|
+
* @param value - The raw value from the `initialPermissions`.
|
|
57
|
+
* @returns The caveat specification.
|
|
58
|
+
*/ export function getTransactionInsightCaveatMapper(value) {
|
|
59
|
+
if (!value || !isObject(value) || isObject(value) && Object.keys(value).length === 0) {
|
|
60
|
+
return {
|
|
61
|
+
caveats: null
|
|
62
|
+
};
|
|
63
|
+
}
|
|
64
|
+
return {
|
|
65
|
+
caveats: [
|
|
66
|
+
{
|
|
67
|
+
type: SnapCaveatType.TransactionOrigin,
|
|
68
|
+
value: hasProperty(value, 'allowTransactionOrigin') && value.allowTransactionOrigin
|
|
69
|
+
}
|
|
70
|
+
]
|
|
71
|
+
};
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Getter function to get the transaction origin caveat from a permission.
|
|
75
|
+
*
|
|
76
|
+
* This does basic validation of the caveat, but does not validate the type or
|
|
77
|
+
* value of the namespaces object itself, as this is handled by the
|
|
78
|
+
* `PermissionsController` when the permission is requested.
|
|
79
|
+
*
|
|
80
|
+
* @param permission - The permission to get the transaction origin caveat from.
|
|
81
|
+
* @returns The transaction origin, or `null` if the permission does not have a
|
|
82
|
+
* transaction origin caveat.
|
|
83
|
+
*/ export function getTransactionOriginCaveat(permission) {
|
|
84
|
+
if (!permission?.caveats) {
|
|
85
|
+
return null;
|
|
86
|
+
}
|
|
87
|
+
assert(permission.caveats.length === 1);
|
|
88
|
+
assert(permission.caveats[0].type === SnapCaveatType.TransactionOrigin);
|
|
89
|
+
const caveat = permission.caveats[0];
|
|
90
|
+
return caveat.value ?? null;
|
|
91
|
+
}
|
|
92
|
+
export const transactionInsightCaveatSpecifications = {
|
|
93
|
+
[SnapCaveatType.TransactionOrigin]: Object.freeze({
|
|
94
|
+
type: SnapCaveatType.TransactionOrigin,
|
|
95
|
+
validator: (caveat)=>validateCaveat(caveat)
|
|
96
|
+
})
|
|
97
|
+
};
|
|
98
|
+
|
|
99
|
+
//# sourceMappingURL=transaction-insight.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/transaction-insight.ts"],"sourcesContent":["import {\n PermissionSpecificationBuilder,\n PermissionType,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n PermissionValidatorConstraint,\n PermissionConstraint,\n CaveatSpecificationConstraint,\n Caveat,\n SubjectType,\n} from '@metamask/permission-controller';\nimport { SnapCaveatType } from '@metamask/snaps-utils';\nimport {\n assert,\n hasProperty,\n isObject,\n isPlainObject,\n Json,\n NonEmptyArray,\n} from '@metamask/utils';\nimport { ethErrors } from 'eth-rpc-errors';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.TransactionInsight;\n\ntype TransactionInsightEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: EndowmentGetterParams) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n validator: PermissionValidatorConstraint;\n}>;\n\n/**\n * `endowment:transaction-insight` returns nothing; it is intended to be used as a flag\n * by the extension to detect whether the snap has the capability to show information on the transaction confirmation screen.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the transaction-insight endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n TransactionInsightEndowmentSpecification\n> = (_builderOptions?: unknown) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: [SnapCaveatType.TransactionOrigin],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n validator: ({ caveats }) => {\n if (\n (caveats !== null && caveats?.length > 1) ||\n (caveats?.length === 1 &&\n caveats[0].type !== SnapCaveatType.TransactionOrigin)\n ) {\n throw ethErrors.rpc.invalidParams({\n message: `Expected a single \"${SnapCaveatType.TransactionOrigin}\" caveat.`,\n });\n }\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const transactionInsightEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n\n/**\n * Validates the type of the caveat value.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateCaveat(caveat: Caveat<string, any>): void {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n\n assert(\n typeof value === 'boolean',\n 'Expected caveat value to have type \"boolean\"',\n );\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getTransactionInsightCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n if (\n !value ||\n !isObject(value) ||\n (isObject(value) && Object.keys(value).length === 0)\n ) {\n return { caveats: null };\n }\n return {\n caveats: [\n {\n type: SnapCaveatType.TransactionOrigin,\n value:\n hasProperty(value, 'allowTransactionOrigin') &&\n (value.allowTransactionOrigin as boolean),\n },\n ],\n };\n}\n\n/**\n * Getter function to get the transaction origin caveat from a permission.\n *\n * This does basic validation of the caveat, but does not validate the type or\n * value of the namespaces object itself, as this is handled by the\n * `PermissionsController` when the permission is requested.\n *\n * @param permission - The permission to get the transaction origin caveat from.\n * @returns The transaction origin, or `null` if the permission does not have a\n * transaction origin caveat.\n */\nexport function getTransactionOriginCaveat(\n permission?: PermissionConstraint,\n): boolean | null {\n if (!permission?.caveats) {\n return null;\n }\n\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.TransactionOrigin);\n\n const caveat = permission.caveats[0] as Caveat<string, boolean>;\n\n return caveat.value ?? null;\n}\n\nexport const transactionInsightCaveatSpecifications: Record<\n SnapCaveatType.TransactionOrigin,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.TransactionOrigin]: Object.freeze({\n type: SnapCaveatType.TransactionOrigin,\n validator: (caveat: Caveat<string, any>) => validateCaveat(caveat),\n }),\n};\n"],"names":["PermissionType","SubjectType","SnapCaveatType","assert","hasProperty","isObject","isPlainObject","ethErrors","SnapEndowments","permissionName","TransactionInsight","specificationBuilder","_builderOptions","permissionType","Endowment","targetName","allowedCaveats","TransactionOrigin","endowmentGetter","_getterOptions","undefined","validator","caveats","length","type","rpc","invalidParams","message","subjectTypes","Snap","transactionInsightEndowmentBuilder","Object","freeze","validateCaveat","caveat","value","getTransactionInsightCaveatMapper","keys","allowTransactionOrigin","getTransactionOriginCaveat","permission","transactionInsightCaveatSpecifications"],"mappings":"AAAA,SAEEA,cAAc,EAOdC,WAAW,QACN,kCAAkC;AACzC,SAASC,cAAc,QAAQ,wBAAwB;AACvD,SACEC,MAAM,EACNC,WAAW,EACXC,QAAQ,EACRC,aAAa,QAGR,kBAAkB;AACzB,SAASC,SAAS,QAAQ,iBAAiB;AAE3C,SAASC,cAAc,QAAQ,SAAS;AAExC,MAAMC,iBAAiBD,eAAeE,kBAAkB;AAUxD;;;;;;CAMC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBb,eAAec,SAAS;QACxCC,YAAYN;QACZO,gBAAgB;YAACd,eAAee,iBAAiB;SAAC;QAClDC,iBAAiB,CAACC,iBAA2CC;QAC7DC,WAAW,CAAC,EAAEC,OAAO,EAAE;YACrB,IACE,AAACA,YAAY,QAAQA,SAASC,SAAS,KACtCD,SAASC,WAAW,KACnBD,OAAO,CAAC,EAAE,CAACE,IAAI,KAAKtB,eAAee,iBAAiB,EACtD;gBACA,MAAMV,UAAUkB,GAAG,CAACC,aAAa,CAAC;oBAChCC,SAAS,CAAC,mBAAmB,EAAEzB,eAAee,iBAAiB,CAAC,SAAS,CAAC;gBAC5E;YACF;QACF;QACAW,cAAc;YAAC3B,YAAY4B,IAAI;SAAC;IAClC;AACF;AAEA,OAAO,MAAMC,qCAAqCC,OAAOC,MAAM,CAAC;IAC9DjB,YAAYN;IACZE;AACF,GAAY;AAEZ;;;;;CAKC,GACD,SAASsB,eAAeC,MAA2B;IACjD,IAAI,CAAC9B,YAAY8B,QAAQ,YAAY,CAAC5B,cAAc4B,SAAS;QAC3D,MAAM3B,UAAUkB,GAAG,CAACC,aAAa,CAAC;YAChCC,SAAS;QACX;IACF;IAEA,MAAM,EAAEQ,KAAK,EAAE,GAAGD;IAElB/B,OACE,OAAOgC,UAAU,WACjB;AAEJ;AAEA;;;;;;;CAOC,GACD,OAAO,SAASC,kCACdD,KAAW;IAEX,IACE,CAACA,SACD,CAAC9B,SAAS8B,UACT9B,SAAS8B,UAAUJ,OAAOM,IAAI,CAACF,OAAOZ,MAAM,KAAK,GAClD;QACA,OAAO;YAAED,SAAS;QAAK;IACzB;IACA,OAAO;QACLA,SAAS;YACP;gBACEE,MAAMtB,eAAee,iBAAiB;gBACtCkB,OACE/B,YAAY+B,OAAO,6BAClBA,MAAMG,sBAAsB;YACjC;SACD;IACH;AACF;AAEA;;;;;;;;;;CAUC,GACD,OAAO,SAASC,2BACdC,UAAiC;IAEjC,IAAI,CAACA,YAAYlB,SAAS;QACxB,OAAO;IACT;IAEAnB,OAAOqC,WAAWlB,OAAO,CAACC,MAAM,KAAK;IACrCpB,OAAOqC,WAAWlB,OAAO,CAAC,EAAE,CAACE,IAAI,KAAKtB,eAAee,iBAAiB;IAEtE,MAAMiB,SAASM,WAAWlB,OAAO,CAAC,EAAE;IAEpC,OAAOY,OAAOC,KAAK,IAAI;AACzB;AAEA,OAAO,MAAMM,yCAGT;IACF,CAACvC,eAAee,iBAAiB,CAAC,EAAEc,OAAOC,MAAM,CAAC;QAChDR,MAAMtB,eAAee,iBAAiB;QACtCI,WAAW,CAACa,SAAgCD,eAAeC;IAC7D;AACF,EAAE"}
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
import { PermissionType, SubjectType } from '@metamask/permission-controller';
|
|
2
|
+
import { SnapEndowments } from './enum';
|
|
3
|
+
const permissionName = SnapEndowments.WebAssemblyAccess;
|
|
4
|
+
/**
|
|
5
|
+
* `endowment:webassembly` returns the name of global browser API(s) that
|
|
6
|
+
* enable access to the WebAssembly API.
|
|
7
|
+
* This is intended to populate the endowments of the SES Compartment
|
|
8
|
+
* in which a Snap executes.
|
|
9
|
+
*
|
|
10
|
+
* @param _builderOptions - Optional specification builder options.
|
|
11
|
+
* @returns The specification for the WebAssembly endowment.
|
|
12
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
13
|
+
return {
|
|
14
|
+
permissionType: PermissionType.Endowment,
|
|
15
|
+
targetName: permissionName,
|
|
16
|
+
allowedCaveats: null,
|
|
17
|
+
endowmentGetter: (_getterOptions)=>{
|
|
18
|
+
return [
|
|
19
|
+
'WebAssembly'
|
|
20
|
+
];
|
|
21
|
+
},
|
|
22
|
+
subjectTypes: [
|
|
23
|
+
SubjectType.Snap
|
|
24
|
+
]
|
|
25
|
+
};
|
|
26
|
+
};
|
|
27
|
+
export const webAssemblyEndowmentBuilder = Object.freeze({
|
|
28
|
+
targetName: permissionName,
|
|
29
|
+
specificationBuilder
|
|
30
|
+
});
|
|
31
|
+
|
|
32
|
+
//# sourceMappingURL=web-assembly.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/endowments/web-assembly.ts"],"sourcesContent":["import {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n PermissionType,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.WebAssemblyAccess;\n\ntype WebAssemblyEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => ['WebAssembly'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:webassembly` returns the name of global browser API(s) that\n * enable access to the WebAssembly API.\n * This is intended to populate the endowments of the SES Compartment\n * in which a Snap executes.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the WebAssembly endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n WebAssemblyEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['WebAssembly'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const webAssemblyEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["PermissionType","SubjectType","SnapEndowments","permissionName","WebAssemblyAccess","specificationBuilder","_builderOptions","permissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","subjectTypes","Snap","webAssemblyEndowmentBuilder","Object","freeze"],"mappings":"AAAA,SAGEA,cAAc,EAEdC,WAAW,QACN,kCAAkC;AAEzC,SAASC,cAAc,QAAQ,SAAS;AAExC,MAAMC,iBAAiBD,eAAeE,iBAAiB;AASvD;;;;;;;;CAQC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBP,eAAeQ,SAAS;QACxCC,YAAYN;QACZO,gBAAgB;QAChBC,iBAAiB,CAACC;YAChB,OAAO;gBAAC;aAAc;QACxB;QACAC,cAAc;YAACZ,YAAYa,IAAI;SAAC;IAClC;AACF;AAEA,OAAO,MAAMC,8BAA8BC,OAAOC,MAAM,CAAC;IACvDR,YAAYN;IACZE;AACF,GAAY"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/snaps/index.ts"],"sourcesContent":["export * from './location';\nexport * from './SnapController';\nexport * from './endowments';\nexport * from './selectors';\nexport * from './registry';\nexport * from './permissions';\n"],"names":[],"mappings":"AAAA,cAAc,aAAa;AAC3B,cAAc,mBAAmB;AACjC,cAAc,eAAe;AAC7B,cAAc,cAAc;AAC5B,cAAc,aAAa;AAC3B,cAAc,gBAAgB"}
|
|
@@ -1,45 +1,44 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
// That avoids deepCloning file contents.
|
|
12
|
-
// I imagine ArrayBuffers are copy-on-write optimized, meaning
|
|
13
|
-
// in most often case we'll only have one file contents in common case.
|
|
14
|
-
this.cache = new Map();
|
|
15
|
-
(0, utils_1.assertStruct)(url.toString(), snaps_utils_1.HttpSnapIdStruct, 'Invalid Snap Id: ');
|
|
16
|
-
this.fetchFn = opts.fetch ?? globalThis.fetch.bind(globalThis);
|
|
17
|
-
this.fetchOptions = opts.fetchOptions;
|
|
18
|
-
this.url = url;
|
|
1
|
+
function _define_property(obj, key, value) {
|
|
2
|
+
if (key in obj) {
|
|
3
|
+
Object.defineProperty(obj, key, {
|
|
4
|
+
value: value,
|
|
5
|
+
enumerable: true,
|
|
6
|
+
configurable: true,
|
|
7
|
+
writable: true
|
|
8
|
+
});
|
|
9
|
+
} else {
|
|
10
|
+
obj[key] = value;
|
|
19
11
|
}
|
|
12
|
+
return obj;
|
|
13
|
+
}
|
|
14
|
+
import { VirtualFile, HttpSnapIdStruct, NpmSnapFileNames, createSnapManifest, normalizeRelative, parseJson } from '@metamask/snaps-utils';
|
|
15
|
+
import { assert, assertStruct } from '@metamask/utils';
|
|
16
|
+
export class HttpLocation {
|
|
20
17
|
async manifest() {
|
|
21
18
|
if (this.validatedManifest) {
|
|
22
19
|
return this.validatedManifest.clone();
|
|
23
20
|
}
|
|
24
21
|
// jest-fetch-mock doesn't handle new URL(), we need to convert .toString()
|
|
25
|
-
const canonicalPath = new URL(
|
|
22
|
+
const canonicalPath = new URL(NpmSnapFileNames.Manifest, this.url).toString();
|
|
26
23
|
const response = await this.fetchFn(canonicalPath, this.fetchOptions);
|
|
27
24
|
if (!response.ok) {
|
|
28
25
|
throw new Error(`Failed to fetch "${canonicalPath}". Status code: ${response.status}.`);
|
|
29
26
|
}
|
|
30
27
|
const contents = await response.text();
|
|
31
|
-
const manifest =
|
|
32
|
-
const vfile = new
|
|
28
|
+
const manifest = parseJson(contents);
|
|
29
|
+
const vfile = new VirtualFile({
|
|
33
30
|
value: contents,
|
|
34
|
-
result:
|
|
35
|
-
path:
|
|
36
|
-
data: {
|
|
31
|
+
result: createSnapManifest(manifest),
|
|
32
|
+
path: NpmSnapFileNames.Manifest,
|
|
33
|
+
data: {
|
|
34
|
+
canonicalPath
|
|
35
|
+
}
|
|
37
36
|
});
|
|
38
37
|
this.validatedManifest = vfile;
|
|
39
38
|
return this.manifest();
|
|
40
39
|
}
|
|
41
40
|
async fetch(path) {
|
|
42
|
-
const relativePath =
|
|
41
|
+
const relativePath = normalizeRelative(path);
|
|
43
42
|
const cached = this.cache.get(relativePath);
|
|
44
43
|
if (cached !== undefined) {
|
|
45
44
|
const { file, contents } = cached;
|
|
@@ -53,23 +52,45 @@ class HttpLocation {
|
|
|
53
52
|
if (!response.ok) {
|
|
54
53
|
throw new Error(`Failed to fetch "${canonicalPath}". Status code: ${response.status}.`);
|
|
55
54
|
}
|
|
56
|
-
const vfile = new
|
|
55
|
+
const vfile = new VirtualFile({
|
|
57
56
|
value: '',
|
|
58
57
|
path: relativePath,
|
|
59
|
-
data: {
|
|
58
|
+
data: {
|
|
59
|
+
canonicalPath
|
|
60
|
+
}
|
|
60
61
|
});
|
|
61
62
|
const blob = await response.blob();
|
|
62
|
-
|
|
63
|
-
this.cache.set(relativePath, {
|
|
63
|
+
assert(!this.cache.has(relativePath), 'Corrupted cache, multiple files with same path.');
|
|
64
|
+
this.cache.set(relativePath, {
|
|
65
|
+
file: vfile,
|
|
66
|
+
contents: blob
|
|
67
|
+
});
|
|
64
68
|
return this.fetch(relativePath);
|
|
65
69
|
}
|
|
66
70
|
get root() {
|
|
67
71
|
return new URL(this.url);
|
|
68
72
|
}
|
|
69
73
|
toCanonical(path) {
|
|
70
|
-
|
|
74
|
+
assert(!path.startsWith('/'), 'Tried to parse absolute path.');
|
|
71
75
|
return new URL(path, this.url);
|
|
72
76
|
}
|
|
77
|
+
constructor(url, opts = {}){
|
|
78
|
+
// We keep contents separate because then we can use only one Blob in cache,
|
|
79
|
+
// which we convert to Uint8Array when actually returning the file.
|
|
80
|
+
//
|
|
81
|
+
// That avoids deepCloning file contents.
|
|
82
|
+
// I imagine ArrayBuffers are copy-on-write optimized, meaning
|
|
83
|
+
// in most often case we'll only have one file contents in common case.
|
|
84
|
+
_define_property(this, "cache", new Map());
|
|
85
|
+
_define_property(this, "validatedManifest", void 0);
|
|
86
|
+
_define_property(this, "url", void 0);
|
|
87
|
+
_define_property(this, "fetchFn", void 0);
|
|
88
|
+
_define_property(this, "fetchOptions", void 0);
|
|
89
|
+
assertStruct(url.toString(), HttpSnapIdStruct, 'Invalid Snap Id: ');
|
|
90
|
+
this.fetchFn = opts.fetch ?? globalThis.fetch.bind(globalThis);
|
|
91
|
+
this.fetchOptions = opts.fetchOptions;
|
|
92
|
+
this.url = url;
|
|
93
|
+
}
|
|
73
94
|
}
|
|
74
|
-
|
|
95
|
+
|
|
75
96
|
//# sourceMappingURL=http.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/location/http.ts"],"sourcesContent":["import {\n SnapManifest,\n VirtualFile,\n HttpSnapIdStruct,\n NpmSnapFileNames,\n createSnapManifest,\n normalizeRelative,\n parseJson,\n} from '@metamask/snaps-utils';\nimport { assert, assertStruct } from '@metamask/utils';\n\nimport { SnapLocation } from './location';\n\nexport interface HttpOptions {\n /**\n * @default fetch\n */\n fetch?: typeof fetch;\n fetchOptions?: RequestInit;\n}\n\nexport class HttpLocation implements SnapLocation {\n // We keep contents separate because then we can use only one Blob in cache,\n // which we convert to Uint8Array when actually returning the file.\n //\n // That avoids deepCloning file contents.\n // I imagine ArrayBuffers are copy-on-write optimized, meaning\n // in most often case we'll only have one file contents in common case.\n private readonly cache = new Map<\n string,\n { file: VirtualFile; contents: Blob }\n >();\n\n private validatedManifest?: VirtualFile<SnapManifest>;\n\n private readonly url: URL;\n\n private readonly fetchFn: typeof fetch;\n\n private readonly fetchOptions?: RequestInit;\n\n constructor(url: URL, opts: HttpOptions = {}) {\n assertStruct(url.toString(), HttpSnapIdStruct, 'Invalid Snap Id: ');\n this.fetchFn = opts.fetch ?? globalThis.fetch.bind(globalThis);\n this.fetchOptions = opts.fetchOptions;\n this.url = url;\n }\n\n async manifest(): Promise<VirtualFile<SnapManifest>> {\n if (this.validatedManifest) {\n return this.validatedManifest.clone();\n }\n\n // jest-fetch-mock doesn't handle new URL(), we need to convert .toString()\n const canonicalPath = new URL(\n NpmSnapFileNames.Manifest,\n this.url,\n ).toString();\n\n const response = await this.fetchFn(canonicalPath, this.fetchOptions);\n if (!response.ok) {\n throw new Error(\n `Failed to fetch \"${canonicalPath}\". Status code: ${response.status}.`,\n );\n }\n const contents = await response.text();\n const manifest = parseJson(contents);\n const vfile = new VirtualFile<SnapManifest>({\n value: contents,\n result: createSnapManifest(manifest),\n path: NpmSnapFileNames.Manifest,\n data: { canonicalPath },\n });\n this.validatedManifest = vfile;\n\n return this.manifest();\n }\n\n async fetch(path: string): Promise<VirtualFile> {\n const relativePath = normalizeRelative(path);\n const cached = this.cache.get(relativePath);\n if (cached !== undefined) {\n const { file, contents } = cached;\n const value = new Uint8Array(await contents.arrayBuffer());\n const vfile = file.clone();\n vfile.value = value;\n return vfile;\n }\n\n const canonicalPath = this.toCanonical(relativePath).toString();\n const response = await this.fetchFn(canonicalPath, this.fetchOptions);\n if (!response.ok) {\n throw new Error(\n `Failed to fetch \"${canonicalPath}\". Status code: ${response.status}.`,\n );\n }\n const vfile = new VirtualFile({\n value: '',\n path: relativePath,\n data: { canonicalPath },\n });\n const blob = await response.blob();\n assert(\n !this.cache.has(relativePath),\n 'Corrupted cache, multiple files with same path.',\n );\n this.cache.set(relativePath, { file: vfile, contents: blob });\n\n return this.fetch(relativePath);\n }\n\n get root(): URL {\n return new URL(this.url);\n }\n\n private toCanonical(path: string): URL {\n assert(!path.startsWith('/'), 'Tried to parse absolute path.');\n return new URL(path, this.url);\n }\n}\n"],"names":["VirtualFile","HttpSnapIdStruct","NpmSnapFileNames","createSnapManifest","normalizeRelative","parseJson","assert","assertStruct","HttpLocation","manifest","validatedManifest","clone","canonicalPath","URL","Manifest","url","toString","response","fetchFn","fetchOptions","ok","Error","status","contents","text","vfile","value","result","path","data","fetch","relativePath","cached","cache","get","undefined","file","Uint8Array","arrayBuffer","toCanonical","blob","has","set","root","startsWith","constructor","opts","Map","globalThis","bind"],"mappings":";;;;;;;;;;;;;AAAA,SAEEA,WAAW,EACXC,gBAAgB,EAChBC,gBAAgB,EAChBC,kBAAkB,EAClBC,iBAAiB,EACjBC,SAAS,QACJ,wBAAwB;AAC/B,SAASC,MAAM,EAAEC,YAAY,QAAQ,kBAAkB;AAYvD,OAAO,MAAMC;IA2BX,MAAMC,WAA+C;QACnD,IAAI,IAAI,CAACC,iBAAiB,EAAE;YAC1B,OAAO,IAAI,CAACA,iBAAiB,CAACC,KAAK;QACrC;QAEA,2EAA2E;QAC3E,MAAMC,gBAAgB,IAAIC,IACxBX,iBAAiBY,QAAQ,EACzB,IAAI,CAACC,GAAG,EACRC,QAAQ;QAEV,MAAMC,WAAW,MAAM,IAAI,CAACC,OAAO,CAACN,eAAe,IAAI,CAACO,YAAY;QACpE,IAAI,CAACF,SAASG,EAAE,EAAE;YAChB,MAAM,IAAIC,MACR,CAAC,iBAAiB,EAAET,cAAc,gBAAgB,EAAEK,SAASK,MAAM,CAAC,CAAC,CAAC;QAE1E;QACA,MAAMC,WAAW,MAAMN,SAASO,IAAI;QACpC,MAAMf,WAAWJ,UAAUkB;QAC3B,MAAME,QAAQ,IAAIzB,YAA0B;YAC1C0B,OAAOH;YACPI,QAAQxB,mBAAmBM;YAC3BmB,MAAM1B,iBAAiBY,QAAQ;YAC/Be,MAAM;gBAAEjB;YAAc;QACxB;QACA,IAAI,CAACF,iBAAiB,GAAGe;QAEzB,OAAO,IAAI,CAAChB,QAAQ;IACtB;IAEA,MAAMqB,MAAMF,IAAY,EAAwB;QAC9C,MAAMG,eAAe3B,kBAAkBwB;QACvC,MAAMI,SAAS,IAAI,CAACC,KAAK,CAACC,GAAG,CAACH;QAC9B,IAAIC,WAAWG,WAAW;YACxB,MAAM,EAAEC,IAAI,EAAEb,QAAQ,EAAE,GAAGS;YAC3B,MAAMN,QAAQ,IAAIW,WAAW,MAAMd,SAASe,WAAW;YACvD,MAAMb,QAAQW,KAAKzB,KAAK;YACxBc,MAAMC,KAAK,GAAGA;YACd,OAAOD;QACT;QAEA,MAAMb,gBAAgB,IAAI,CAAC2B,WAAW,CAACR,cAAcf,QAAQ;QAC7D,MAAMC,WAAW,MAAM,IAAI,CAACC,OAAO,CAACN,eAAe,IAAI,CAACO,YAAY;QACpE,IAAI,CAACF,SAASG,EAAE,EAAE;YAChB,MAAM,IAAIC,MACR,CAAC,iBAAiB,EAAET,cAAc,gBAAgB,EAAEK,SAASK,MAAM,CAAC,CAAC,CAAC;QAE1E;QACA,MAAMG,QAAQ,IAAIzB,YAAY;YAC5B0B,OAAO;YACPE,MAAMG;YACNF,MAAM;gBAAEjB;YAAc;QACxB;QACA,MAAM4B,OAAO,MAAMvB,SAASuB,IAAI;QAChClC,OACE,CAAC,IAAI,CAAC2B,KAAK,CAACQ,GAAG,CAACV,eAChB;QAEF,IAAI,CAACE,KAAK,CAACS,GAAG,CAACX,cAAc;YAAEK,MAAMX;YAAOF,UAAUiB;QAAK;QAE3D,OAAO,IAAI,CAACV,KAAK,CAACC;IACpB;IAEA,IAAIY,OAAY;QACd,OAAO,IAAI9B,IAAI,IAAI,CAACE,GAAG;IACzB;IAEQwB,YAAYX,IAAY,EAAO;QACrCtB,OAAO,CAACsB,KAAKgB,UAAU,CAAC,MAAM;QAC9B,OAAO,IAAI/B,IAAIe,MAAM,IAAI,CAACb,GAAG;IAC/B;IA7EA8B,YAAY9B,GAAQ,EAAE+B,OAAoB,CAAC,CAAC,CAAE;QAnB9C,4EAA4E;QAC5E,mEAAmE;QACnE,EAAE;QACF,yCAAyC;QACzC,8DAA8D;QAC9D,uEAAuE;QACvE,uBAAiBb,SAAQ,IAAIc;QAK7B,uBAAQrC,qBAAR,KAAA;QAEA,uBAAiBK,OAAjB,KAAA;QAEA,uBAAiBG,WAAjB,KAAA;QAEA,uBAAiBC,gBAAjB,KAAA;QAGEZ,aAAaQ,IAAIC,QAAQ,IAAIf,kBAAkB;QAC/C,IAAI,CAACiB,OAAO,GAAG4B,KAAKhB,KAAK,IAAIkB,WAAWlB,KAAK,CAACmB,IAAI,CAACD;QACnD,IAAI,CAAC7B,YAAY,GAAG2B,KAAK3B,YAAY;QACrC,IAAI,CAACJ,GAAG,GAAGA;IACb;AAyEF"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/snaps/location/index.ts"],"sourcesContent":["export * from './location';\nexport * from './npm';\nexport * from './local';\nexport * from './http';\n"],"names":[],"mappings":"AAAA,cAAc,aAAa;AAC3B,cAAc,QAAQ;AACtB,cAAc,UAAU;AACxB,cAAc,SAAS"}
|
|
@@ -0,0 +1,83 @@
|
|
|
1
|
+
function _check_private_redeclaration(obj, privateCollection) {
|
|
2
|
+
if (privateCollection.has(obj)) {
|
|
3
|
+
throw new TypeError("Cannot initialize the same private elements twice on an object");
|
|
4
|
+
}
|
|
5
|
+
}
|
|
6
|
+
function _class_apply_descriptor_get(receiver, descriptor) {
|
|
7
|
+
if (descriptor.get) {
|
|
8
|
+
return descriptor.get.call(receiver);
|
|
9
|
+
}
|
|
10
|
+
return descriptor.value;
|
|
11
|
+
}
|
|
12
|
+
function _class_apply_descriptor_set(receiver, descriptor, value) {
|
|
13
|
+
if (descriptor.set) {
|
|
14
|
+
descriptor.set.call(receiver, value);
|
|
15
|
+
} else {
|
|
16
|
+
if (!descriptor.writable) {
|
|
17
|
+
throw new TypeError("attempted to set read only private field");
|
|
18
|
+
}
|
|
19
|
+
descriptor.value = value;
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
function _class_extract_field_descriptor(receiver, privateMap, action) {
|
|
23
|
+
if (!privateMap.has(receiver)) {
|
|
24
|
+
throw new TypeError("attempted to " + action + " private field on non-instance");
|
|
25
|
+
}
|
|
26
|
+
return privateMap.get(receiver);
|
|
27
|
+
}
|
|
28
|
+
function _class_private_field_get(receiver, privateMap) {
|
|
29
|
+
var descriptor = _class_extract_field_descriptor(receiver, privateMap, "get");
|
|
30
|
+
return _class_apply_descriptor_get(receiver, descriptor);
|
|
31
|
+
}
|
|
32
|
+
function _class_private_field_init(obj, privateMap, value) {
|
|
33
|
+
_check_private_redeclaration(obj, privateMap);
|
|
34
|
+
privateMap.set(obj, value);
|
|
35
|
+
}
|
|
36
|
+
function _class_private_field_set(receiver, privateMap, value) {
|
|
37
|
+
var descriptor = _class_extract_field_descriptor(receiver, privateMap, "set");
|
|
38
|
+
_class_apply_descriptor_set(receiver, descriptor, value);
|
|
39
|
+
return value;
|
|
40
|
+
}
|
|
41
|
+
import { LocalSnapIdStruct, SnapIdPrefixes } from '@metamask/snaps-utils';
|
|
42
|
+
import { assert, assertStruct } from '@metamask/utils';
|
|
43
|
+
import { HttpLocation } from './http';
|
|
44
|
+
var _http = /*#__PURE__*/ new WeakMap();
|
|
45
|
+
export class LocalLocation {
|
|
46
|
+
async manifest() {
|
|
47
|
+
const vfile = await _class_private_field_get(this, _http).manifest();
|
|
48
|
+
return convertCanonical(vfile);
|
|
49
|
+
}
|
|
50
|
+
async fetch(path) {
|
|
51
|
+
return convertCanonical(await _class_private_field_get(this, _http).fetch(path));
|
|
52
|
+
}
|
|
53
|
+
get shouldAlwaysReload() {
|
|
54
|
+
return true;
|
|
55
|
+
}
|
|
56
|
+
constructor(url, opts = {}){
|
|
57
|
+
_class_private_field_init(this, _http, {
|
|
58
|
+
writable: true,
|
|
59
|
+
value: void 0
|
|
60
|
+
});
|
|
61
|
+
assertStruct(url.toString(), LocalSnapIdStruct, 'Invalid Snap Id');
|
|
62
|
+
// TODO(ritave): Write deepMerge() which merges fetchOptions.
|
|
63
|
+
assert(opts.fetchOptions === undefined, 'Currently adding fetch options to local: is unsupported.');
|
|
64
|
+
_class_private_field_set(this, _http, new HttpLocation(new URL(url.toString().slice(SnapIdPrefixes.local.length)), {
|
|
65
|
+
...opts,
|
|
66
|
+
fetchOptions: {
|
|
67
|
+
cache: 'no-cache'
|
|
68
|
+
}
|
|
69
|
+
}));
|
|
70
|
+
}
|
|
71
|
+
}
|
|
72
|
+
/**
|
|
73
|
+
* Converts vfiles with canonical `http:` paths into `local:` paths.
|
|
74
|
+
*
|
|
75
|
+
* @param vfile - The {@link VirtualFile} to convert.
|
|
76
|
+
* @returns The same object with updated `.data.canonicalPath`.
|
|
77
|
+
*/ function convertCanonical(vfile) {
|
|
78
|
+
assert(vfile.data.canonicalPath !== undefined);
|
|
79
|
+
vfile.data.canonicalPath = `local:${vfile.data.canonicalPath}`;
|
|
80
|
+
return vfile;
|
|
81
|
+
}
|
|
82
|
+
|
|
83
|
+
//# sourceMappingURL=local.js.map
|