@metamask/snaps-controllers 1.0.1 → 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -557
- package/dist/cjs/cronjob/CronjobController.js +294 -0
- package/dist/cjs/cronjob/CronjobController.js.map +1 -0
- package/dist/cjs/cronjob/index.js +20 -0
- package/dist/cjs/cronjob/index.js.map +1 -0
- package/dist/cjs/fsm.js +69 -0
- package/dist/cjs/fsm.js.map +1 -0
- package/dist/cjs/index.js +23 -0
- package/dist/cjs/index.js.map +1 -0
- package/dist/cjs/logging.js +15 -0
- package/dist/cjs/logging.js.map +1 -0
- package/dist/cjs/services/AbstractExecutionService.js +390 -0
- package/dist/cjs/services/AbstractExecutionService.js.map +1 -0
- package/dist/cjs/services/ExecutionService.js +7 -0
- package/dist/cjs/services/ExecutionService.js.map +1 -0
- package/dist/cjs/services/ProxyPostMessageStream.js +116 -0
- package/dist/cjs/services/ProxyPostMessageStream.js.map +1 -0
- package/dist/cjs/services/browser.js +32 -0
- package/dist/cjs/services/browser.js.map +1 -0
- package/dist/cjs/services/iframe/IframeExecutionService.js +54 -0
- package/dist/cjs/services/iframe/IframeExecutionService.js.map +1 -0
- package/dist/cjs/services/iframe/index.js +20 -0
- package/dist/cjs/services/iframe/index.js.map +1 -0
- package/dist/cjs/services/index.js +32 -0
- package/dist/cjs/services/index.js.map +1 -0
- package/dist/cjs/services/node/NodeProcessExecutionService.js +30 -0
- package/dist/cjs/services/node/NodeProcessExecutionService.js.map +1 -0
- package/dist/cjs/services/node/NodeThreadExecutionService.js +30 -0
- package/dist/cjs/services/node/NodeThreadExecutionService.js.map +1 -0
- package/dist/cjs/services/node/index.js +21 -0
- package/dist/cjs/services/node/index.js.map +1 -0
- package/dist/cjs/services/offscreen/OffscreenExecutionService.js +159 -0
- package/dist/cjs/services/offscreen/OffscreenExecutionService.js.map +1 -0
- package/dist/cjs/services/offscreen/index.js +20 -0
- package/dist/cjs/services/offscreen/index.js.map +1 -0
- package/dist/cjs/services/webworker/WebWorkerExecutionService.js +148 -0
- package/dist/cjs/services/webworker/WebWorkerExecutionService.js.map +1 -0
- package/dist/cjs/services/webworker/index.js +20 -0
- package/dist/cjs/services/webworker/index.js.map +1 -0
- package/dist/cjs/snaps/RequestQueue.js +63 -0
- package/dist/cjs/snaps/RequestQueue.js.map +1 -0
- package/dist/cjs/snaps/SnapController.js +1736 -0
- package/dist/cjs/snaps/SnapController.js.map +1 -0
- package/dist/cjs/snaps/Timer.js +117 -0
- package/dist/cjs/snaps/Timer.js.map +1 -0
- package/dist/cjs/snaps/endowments/cronjob.js +100 -0
- package/dist/cjs/snaps/endowments/cronjob.js.map +1 -0
- package/dist/cjs/snaps/endowments/enum.js +24 -0
- package/dist/cjs/snaps/endowments/enum.js.map +1 -0
- package/dist/cjs/snaps/endowments/ethereum-provider.js +43 -0
- package/dist/cjs/snaps/endowments/ethereum-provider.js.map +1 -0
- package/dist/cjs/snaps/endowments/index.js +90 -0
- package/dist/cjs/snaps/endowments/index.js.map +1 -0
- package/dist/cjs/snaps/endowments/lifecycle-hooks.js +37 -0
- package/dist/cjs/snaps/endowments/lifecycle-hooks.js.map +1 -0
- package/dist/cjs/snaps/endowments/long-running.js +38 -0
- package/dist/cjs/snaps/endowments/long-running.js.map +1 -0
- package/dist/cjs/snaps/endowments/name-lookup.js +106 -0
- package/dist/cjs/snaps/endowments/name-lookup.js.map +1 -0
- package/dist/cjs/snaps/endowments/network-access.js +44 -0
- package/dist/cjs/snaps/endowments/network-access.js.map +1 -0
- package/dist/cjs/snaps/endowments/rpc.js +99 -0
- package/dist/cjs/snaps/endowments/rpc.js.map +1 -0
- package/dist/cjs/snaps/endowments/transaction-insight.js +106 -0
- package/dist/cjs/snaps/endowments/transaction-insight.js.map +1 -0
- package/dist/cjs/snaps/endowments/web-assembly.js +42 -0
- package/dist/cjs/snaps/endowments/web-assembly.js.map +1 -0
- package/dist/cjs/snaps/index.js +25 -0
- package/dist/cjs/snaps/index.js.map +1 -0
- package/dist/cjs/snaps/location/http.js +106 -0
- package/dist/cjs/snaps/location/http.js.map +1 -0
- package/dist/cjs/snaps/location/index.js +23 -0
- package/dist/cjs/snaps/location/index.js.map +1 -0
- package/dist/cjs/snaps/location/local.js +93 -0
- package/dist/cjs/snaps/location/local.js.map +1 -0
- package/dist/cjs/snaps/location/location.js +34 -0
- package/dist/cjs/snaps/location/location.js.map +1 -0
- package/dist/cjs/snaps/location/npm.js +293 -0
- package/dist/cjs/snaps/location/npm.js.map +1 -0
- package/dist/cjs/snaps/permissions.js +61 -0
- package/dist/cjs/snaps/permissions.js.map +1 -0
- package/dist/cjs/snaps/registry/index.js +21 -0
- package/dist/cjs/snaps/registry/index.js.map +1 -0
- package/dist/cjs/snaps/registry/json.js +277 -0
- package/dist/cjs/snaps/registry/json.js.map +1 -0
- package/dist/cjs/snaps/registry/registry.js +18 -0
- package/dist/cjs/snaps/registry/registry.js.map +1 -0
- package/dist/cjs/snaps/selectors.js +13 -0
- package/dist/cjs/snaps/selectors.js.map +1 -0
- package/dist/cjs/utils.js +70 -0
- package/dist/cjs/utils.js.map +1 -0
- package/dist/esm/cronjob/CronjobController.js +279 -0
- package/dist/esm/cronjob/CronjobController.js.map +1 -0
- package/dist/esm/cronjob/index.js +3 -0
- package/dist/esm/cronjob/index.js.map +1 -0
- package/dist/esm/fsm.js +70 -0
- package/dist/esm/fsm.js.map +1 -0
- package/dist/esm/index.js +6 -0
- package/dist/esm/index.js.map +1 -0
- package/dist/esm/logging.js +10 -0
- package/dist/esm/logging.js.map +1 -0
- package/dist/esm/services/AbstractExecutionService.js +373 -0
- package/dist/esm/services/AbstractExecutionService.js.map +1 -0
- package/dist/esm/services/ExecutionService.js +4 -0
- package/dist/esm/services/ExecutionService.js.map +1 -0
- package/dist/esm/services/ProxyPostMessageStream.js +109 -0
- package/dist/esm/services/ProxyPostMessageStream.js.map +1 -0
- package/dist/esm/services/browser.js +9 -0
- package/dist/esm/services/browser.js.map +1 -0
- package/dist/esm/services/iframe/IframeExecutionService.js +44 -0
- package/dist/esm/services/iframe/IframeExecutionService.js.map +1 -0
- package/dist/esm/services/iframe/index.js +3 -0
- package/dist/esm/services/iframe/index.js.map +1 -0
- package/dist/esm/services/index.js +9 -0
- package/dist/esm/services/index.js.map +1 -0
- package/dist/esm/services/node/NodeProcessExecutionService.js +20 -0
- package/dist/esm/services/node/NodeProcessExecutionService.js.map +1 -0
- package/dist/esm/services/node/NodeThreadExecutionService.js +21 -0
- package/dist/esm/services/node/NodeThreadExecutionService.js.map +1 -0
- package/dist/esm/services/node/index.js +4 -0
- package/dist/esm/services/node/index.js.map +1 -0
- package/dist/esm/services/offscreen/OffscreenExecutionService.js +149 -0
- package/dist/esm/services/offscreen/OffscreenExecutionService.js.map +1 -0
- package/dist/esm/services/offscreen/index.js +3 -0
- package/dist/esm/services/offscreen/index.js.map +1 -0
- package/dist/esm/services/webworker/WebWorkerExecutionService.js +130 -0
- package/dist/esm/services/webworker/WebWorkerExecutionService.js.map +1 -0
- package/dist/esm/services/webworker/index.js +3 -0
- package/dist/esm/services/webworker/index.js.map +1 -0
- package/dist/esm/snaps/RequestQueue.js +53 -0
- package/dist/esm/snaps/RequestQueue.js.map +1 -0
- package/dist/esm/snaps/SnapController.js +1715 -0
- package/dist/esm/snaps/SnapController.js.map +1 -0
- package/dist/esm/snaps/Timer.js +107 -0
- package/dist/esm/snaps/Timer.js.map +1 -0
- package/dist/esm/snaps/endowments/cronjob.js +99 -0
- package/dist/esm/snaps/endowments/cronjob.js.map +1 -0
- package/dist/esm/snaps/endowments/enum.js +14 -0
- package/dist/esm/snaps/endowments/enum.js.map +1 -0
- package/dist/esm/snaps/endowments/ethereum-provider.js +33 -0
- package/dist/esm/snaps/endowments/ethereum-provider.js.map +1 -0
- package/dist/esm/snaps/endowments/index.js +47 -0
- package/dist/esm/snaps/endowments/index.js.map +1 -0
- package/dist/esm/snaps/endowments/lifecycle-hooks.js +27 -0
- package/dist/esm/snaps/endowments/lifecycle-hooks.js.map +1 -0
- package/dist/esm/snaps/endowments/long-running.js +28 -0
- package/dist/esm/snaps/endowments/long-running.js.map +1 -0
- package/dist/esm/snaps/endowments/name-lookup.js +98 -0
- package/dist/esm/snaps/endowments/name-lookup.js.map +1 -0
- package/dist/esm/snaps/endowments/network-access.js +34 -0
- package/dist/esm/snaps/endowments/network-access.js.map +1 -0
- package/dist/esm/snaps/endowments/rpc.js +88 -0
- package/dist/esm/snaps/endowments/rpc.js.map +1 -0
- package/dist/esm/snaps/endowments/transaction-insight.js +99 -0
- package/dist/esm/snaps/endowments/transaction-insight.js.map +1 -0
- package/dist/esm/snaps/endowments/web-assembly.js +32 -0
- package/dist/esm/snaps/endowments/web-assembly.js.map +1 -0
- package/dist/esm/snaps/index.js +8 -0
- package/dist/esm/snaps/index.js.map +1 -0
- package/dist/{snaps → esm/snaps}/location/http.js +52 -31
- package/dist/esm/snaps/location/http.js.map +1 -0
- package/dist/esm/snaps/location/index.js +6 -0
- package/dist/esm/snaps/location/index.js.map +1 -0
- package/dist/esm/snaps/location/local.js +83 -0
- package/dist/esm/snaps/location/local.js.map +1 -0
- package/dist/esm/snaps/location/location.js +30 -0
- package/dist/esm/snaps/location/location.js.map +1 -0
- package/dist/{snaps → esm/snaps}/location/npm.js +143 -117
- package/dist/esm/snaps/location/npm.js.map +1 -0
- package/dist/esm/snaps/permissions.js +50 -0
- package/dist/esm/snaps/permissions.js.map +1 -0
- package/dist/esm/snaps/registry/index.js +4 -0
- package/dist/esm/snaps/registry/index.js.map +1 -0
- package/dist/esm/snaps/registry/json.js +267 -0
- package/dist/esm/snaps/registry/json.js.map +1 -0
- package/dist/esm/snaps/registry/registry.js +8 -0
- package/dist/esm/snaps/registry/registry.js.map +1 -0
- package/dist/esm/snaps/selectors.js +3 -0
- package/dist/esm/snaps/selectors.js.map +1 -0
- package/dist/{utils.js → esm/utils.js} +21 -30
- package/dist/esm/utils.js.map +1 -0
- package/dist/{cronjob → types/cronjob}/CronjobController.d.ts +12 -11
- package/dist/{fsm.d.ts → types/fsm.d.ts} +1 -1
- package/dist/{index.d.ts → types/index.d.ts} +0 -1
- package/dist/{services → types/services}/AbstractExecutionService.d.ts +4 -4
- package/dist/{services → types/services}/ExecutionService.d.ts +3 -3
- package/dist/{services/offscreen/OffscreenPostMessageStream.d.ts → types/services/ProxyPostMessageStream.d.ts} +10 -10
- package/dist/{services → types/services}/browser.d.ts +2 -0
- package/dist/{services → types/services}/iframe/IframeExecutionService.d.ts +3 -2
- package/dist/{services → types/services}/index.d.ts +2 -0
- package/dist/{services → types/services}/node/NodeProcessExecutionService.d.ts +4 -3
- package/dist/{services → types/services}/node/NodeThreadExecutionService.d.ts +3 -2
- package/dist/{services → types/services}/offscreen/OffscreenExecutionService.d.ts +4 -3
- package/dist/types/services/offscreen/index.d.ts +1 -0
- package/dist/types/services/webworker/WebWorkerExecutionService.d.ts +45 -0
- package/dist/types/services/webworker/index.d.ts +1 -0
- package/dist/{snaps → types/snaps}/SnapController.d.ts +78 -39
- package/dist/{snaps → types/snaps}/endowments/cronjob.d.ts +5 -3
- package/dist/{snaps → types/snaps}/endowments/enum.d.ts +3 -2
- package/dist/{snaps → types/snaps}/endowments/ethereum-provider.d.ts +2 -1
- package/dist/{snaps → types/snaps}/endowments/index.d.ts +23 -14
- package/dist/types/snaps/endowments/lifecycle-hooks.d.ts +15 -0
- package/dist/{snaps → types/snaps}/endowments/long-running.d.ts +2 -1
- package/dist/types/snaps/endowments/name-lookup.d.ts +38 -0
- package/dist/{snaps → types/snaps}/endowments/network-access.d.ts +2 -1
- package/dist/{snaps → types/snaps}/endowments/rpc.d.ts +5 -3
- package/dist/{snaps → types/snaps}/endowments/transaction-insight.d.ts +3 -2
- package/dist/{snaps → types/snaps}/endowments/web-assembly.d.ts +2 -1
- package/dist/{snaps → types/snaps}/index.d.ts +2 -0
- package/dist/{snaps → types/snaps}/location/http.d.ts +3 -2
- package/dist/{snaps → types/snaps}/location/local.d.ts +3 -3
- package/dist/{snaps → types/snaps}/location/location.d.ts +2 -2
- package/dist/types/snaps/location/npm.d.ts +49 -0
- package/dist/types/snaps/permissions.d.ts +16 -0
- package/dist/{snaps → types/snaps}/registry/json.d.ts +5 -4
- package/dist/{snaps → types/snaps}/registry/registry.d.ts +5 -5
- package/dist/types/snaps/selectors.d.ts +2 -0
- package/dist/{utils.d.ts → types/utils.d.ts} +14 -14
- package/package.json +55 -45
- package/dist/cronjob/CronjobController.js +0 -248
- package/dist/cronjob/CronjobController.js.map +0 -1
- package/dist/cronjob/index.js +0 -18
- package/dist/cronjob/index.js.map +0 -1
- package/dist/fsm.js +0 -75
- package/dist/fsm.js.map +0 -1
- package/dist/index.js +0 -22
- package/dist/index.js.map +0 -1
- package/dist/logging.js +0 -13
- package/dist/logging.js.map +0 -1
- package/dist/multichain/MultiChainController.d.ts +0 -137
- package/dist/multichain/MultiChainController.js +0 -339
- package/dist/multichain/MultiChainController.js.map +0 -1
- package/dist/multichain/index.d.ts +0 -3
- package/dist/multichain/index.js +0 -20
- package/dist/multichain/index.js.map +0 -1
- package/dist/multichain/matching.d.ts +0 -9
- package/dist/multichain/matching.js +0 -57
- package/dist/multichain/matching.js.map +0 -1
- package/dist/multichain/middleware.d.ts +0 -14
- package/dist/multichain/middleware.js +0 -42
- package/dist/multichain/middleware.js.map +0 -1
- package/dist/services/AbstractExecutionService.js +0 -318
- package/dist/services/AbstractExecutionService.js.map +0 -1
- package/dist/services/ExecutionService.js +0 -4
- package/dist/services/ExecutionService.js.map +0 -1
- package/dist/services/browser.js +0 -22
- package/dist/services/browser.js.map +0 -1
- package/dist/services/iframe/IframeExecutionService.js +0 -30
- package/dist/services/iframe/IframeExecutionService.js.map +0 -1
- package/dist/services/iframe/index.js +0 -18
- package/dist/services/iframe/index.js.map +0 -1
- package/dist/services/index.js +0 -22
- package/dist/services/index.js.map +0 -1
- package/dist/services/node/NodeProcessExecutionService.js +0 -18
- package/dist/services/node/NodeProcessExecutionService.js.map +0 -1
- package/dist/services/node/NodeThreadExecutionService.js +0 -19
- package/dist/services/node/NodeThreadExecutionService.js.map +0 -1
- package/dist/services/node/index.js +0 -19
- package/dist/services/node/index.js.map +0 -1
- package/dist/services/offscreen/OffscreenExecutionService.js +0 -100
- package/dist/services/offscreen/OffscreenExecutionService.js.map +0 -1
- package/dist/services/offscreen/OffscreenPostMessageStream.js +0 -66
- package/dist/services/offscreen/OffscreenPostMessageStream.js.map +0 -1
- package/dist/services/offscreen/index.d.ts +0 -2
- package/dist/services/offscreen/index.js +0 -19
- package/dist/services/offscreen/index.js.map +0 -1
- package/dist/snaps/RequestQueue.js +0 -44
- package/dist/snaps/RequestQueue.js.map +0 -1
- package/dist/snaps/SnapController.js +0 -1478
- package/dist/snaps/SnapController.js.map +0 -1
- package/dist/snaps/Timer.js +0 -86
- package/dist/snaps/Timer.js.map +0 -1
- package/dist/snaps/endowments/cronjob.js +0 -105
- package/dist/snaps/endowments/cronjob.js.map +0 -1
- package/dist/snaps/endowments/enum.js +0 -15
- package/dist/snaps/endowments/enum.js.map +0 -1
- package/dist/snaps/endowments/ethereum-provider.js +0 -32
- package/dist/snaps/endowments/ethereum-provider.js.map +0 -1
- package/dist/snaps/endowments/index.js +0 -60
- package/dist/snaps/endowments/index.js.map +0 -1
- package/dist/snaps/endowments/keyring.d.ts +0 -40
- package/dist/snaps/endowments/keyring.js +0 -103
- package/dist/snaps/endowments/keyring.js.map +0 -1
- package/dist/snaps/endowments/long-running.js +0 -29
- package/dist/snaps/endowments/long-running.js.map +0 -1
- package/dist/snaps/endowments/network-access.js +0 -30
- package/dist/snaps/endowments/network-access.js.map +0 -1
- package/dist/snaps/endowments/rpc.js +0 -92
- package/dist/snaps/endowments/rpc.js.map +0 -1
- package/dist/snaps/endowments/transaction-insight.js +0 -106
- package/dist/snaps/endowments/transaction-insight.js.map +0 -1
- package/dist/snaps/endowments/web-assembly.js +0 -31
- package/dist/snaps/endowments/web-assembly.js.map +0 -1
- package/dist/snaps/index.js +0 -21
- package/dist/snaps/index.js.map +0 -1
- package/dist/snaps/location/http.js.map +0 -1
- package/dist/snaps/location/index.js +0 -21
- package/dist/snaps/location/index.js.map +0 -1
- package/dist/snaps/location/local.js +0 -51
- package/dist/snaps/location/local.js.map +0 -1
- package/dist/snaps/location/location.js +0 -34
- package/dist/snaps/location/location.js.map +0 -1
- package/dist/snaps/location/npm.d.ts +0 -28
- package/dist/snaps/location/npm.js.map +0 -1
- package/dist/snaps/registry/index.js +0 -19
- package/dist/snaps/registry/index.js.map +0 -1
- package/dist/snaps/registry/json.js +0 -197
- package/dist/snaps/registry/json.js.map +0 -1
- package/dist/snaps/registry/registry.js +0 -11
- package/dist/snaps/registry/registry.js.map +0 -1
- package/dist/snaps/selectors.d.ts +0 -2
- package/dist/snaps/selectors.js +0 -6
- package/dist/snaps/selectors.js.map +0 -1
- package/dist/utils.js.map +0 -1
- /package/dist/{cronjob → types/cronjob}/index.d.ts +0 -0
- /package/dist/{logging.d.ts → types/logging.d.ts} +0 -0
- /package/dist/{services → types/services}/iframe/index.d.ts +0 -0
- /package/dist/{services → types/services}/node/index.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/RequestQueue.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/Timer.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/location/index.d.ts +0 -0
- /package/dist/{snaps → types/snaps}/registry/index.d.ts +0 -0
|
@@ -1,60 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
exports.getTransactionOriginCaveat = exports.getRpcCaveatOrigins = exports.handlerEndowments = exports.endowmentCaveatMappers = exports.endowmentCaveatSpecifications = exports.endowmentPermissionBuilders = void 0;
|
|
18
|
-
const snaps_utils_1 = require("@metamask/snaps-utils");
|
|
19
|
-
const cronjob_1 = require("./cronjob");
|
|
20
|
-
const ethereum_provider_1 = require("./ethereum-provider");
|
|
21
|
-
const keyring_1 = require("./keyring");
|
|
22
|
-
const long_running_1 = require("./long-running");
|
|
23
|
-
const network_access_1 = require("./network-access");
|
|
24
|
-
const rpc_1 = require("./rpc");
|
|
25
|
-
const transaction_insight_1 = require("./transaction-insight");
|
|
26
|
-
const web_assembly_1 = require("./web-assembly");
|
|
27
|
-
exports.endowmentPermissionBuilders = {
|
|
28
|
-
[network_access_1.networkAccessEndowmentBuilder.targetName]: network_access_1.networkAccessEndowmentBuilder,
|
|
29
|
-
[long_running_1.longRunningEndowmentBuilder.targetName]: long_running_1.longRunningEndowmentBuilder,
|
|
30
|
-
[transaction_insight_1.transactionInsightEndowmentBuilder.targetName]: transaction_insight_1.transactionInsightEndowmentBuilder,
|
|
31
|
-
[keyring_1.keyringEndowmentBuilder.targetName]: keyring_1.keyringEndowmentBuilder,
|
|
32
|
-
[cronjob_1.cronjobEndowmentBuilder.targetName]: cronjob_1.cronjobEndowmentBuilder,
|
|
33
|
-
[ethereum_provider_1.ethereumProviderEndowmentBuilder.targetName]: ethereum_provider_1.ethereumProviderEndowmentBuilder,
|
|
34
|
-
[rpc_1.rpcEndowmentBuilder.targetName]: rpc_1.rpcEndowmentBuilder,
|
|
35
|
-
[web_assembly_1.webAssemblyEndowmentBuilder.targetName]: web_assembly_1.webAssemblyEndowmentBuilder,
|
|
36
|
-
};
|
|
37
|
-
exports.endowmentCaveatSpecifications = {
|
|
38
|
-
...keyring_1.keyringCaveatSpecifications,
|
|
39
|
-
...cronjob_1.cronjobCaveatSpecifications,
|
|
40
|
-
...transaction_insight_1.transactionInsightCaveatSpecifications,
|
|
41
|
-
...rpc_1.rpcCaveatSpecifications,
|
|
42
|
-
};
|
|
43
|
-
exports.endowmentCaveatMappers = {
|
|
44
|
-
[keyring_1.keyringEndowmentBuilder.targetName]: keyring_1.getKeyringCaveatMapper,
|
|
45
|
-
[cronjob_1.cronjobEndowmentBuilder.targetName]: cronjob_1.getCronjobCaveatMapper,
|
|
46
|
-
[transaction_insight_1.transactionInsightEndowmentBuilder.targetName]: transaction_insight_1.getTransactionInsightCaveatMapper,
|
|
47
|
-
[rpc_1.rpcEndowmentBuilder.targetName]: rpc_1.getRpcCaveatMapper,
|
|
48
|
-
};
|
|
49
|
-
exports.handlerEndowments = {
|
|
50
|
-
[snaps_utils_1.HandlerType.OnRpcRequest]: rpc_1.rpcEndowmentBuilder.targetName,
|
|
51
|
-
[snaps_utils_1.HandlerType.SnapKeyring]: keyring_1.keyringEndowmentBuilder.targetName,
|
|
52
|
-
[snaps_utils_1.HandlerType.OnTransaction]: transaction_insight_1.transactionInsightEndowmentBuilder.targetName,
|
|
53
|
-
[snaps_utils_1.HandlerType.OnCronjob]: cronjob_1.cronjobEndowmentBuilder.targetName,
|
|
54
|
-
};
|
|
55
|
-
__exportStar(require("./enum"), exports);
|
|
56
|
-
var rpc_2 = require("./rpc");
|
|
57
|
-
Object.defineProperty(exports, "getRpcCaveatOrigins", { enumerable: true, get: function () { return rpc_2.getRpcCaveatOrigins; } });
|
|
58
|
-
var transaction_insight_2 = require("./transaction-insight");
|
|
59
|
-
Object.defineProperty(exports, "getTransactionOriginCaveat", { enumerable: true, get: function () { return transaction_insight_2.getTransactionOriginCaveat; } });
|
|
60
|
-
//# sourceMappingURL=index.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/snaps/endowments/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;AACA,uDAAoD;AAGpD,uCAImB;AACnB,2DAAuE;AACvE,uCAImB;AACnB,iDAA6D;AAC7D,qDAAiE;AACjE,+BAIe;AACf,+DAI+B;AAC/B,iDAA6D;AAEhD,QAAA,2BAA2B,GAAG;IACzC,CAAC,8CAA6B,CAAC,UAAU,CAAC,EAAE,8CAA6B;IACzE,CAAC,0CAA2B,CAAC,UAAU,CAAC,EAAE,0CAA2B;IACrE,CAAC,wDAAkC,CAAC,UAAU,CAAC,EAC7C,wDAAkC;IACpC,CAAC,iCAAuB,CAAC,UAAU,CAAC,EAAE,iCAAuB;IAC7D,CAAC,iCAAuB,CAAC,UAAU,CAAC,EAAE,iCAAuB;IAC7D,CAAC,oDAAgC,CAAC,UAAU,CAAC,EAC3C,oDAAgC;IAClC,CAAC,yBAAmB,CAAC,UAAU,CAAC,EAAE,yBAAmB;IACrD,CAAC,0CAA2B,CAAC,UAAU,CAAC,EAAE,0CAA2B;CAC7D,CAAC;AAEE,QAAA,6BAA6B,GAAG;IAC3C,GAAG,qCAA2B;IAC9B,GAAG,qCAA2B;IAC9B,GAAG,4DAAsC;IACzC,GAAG,6BAAuB;CAC3B,CAAC;AAEW,QAAA,sBAAsB,GAG/B;IACF,CAAC,iCAAuB,CAAC,UAAU,CAAC,EAAE,gCAAsB;IAC5D,CAAC,iCAAuB,CAAC,UAAU,CAAC,EAAE,gCAAsB;IAC5D,CAAC,wDAAkC,CAAC,UAAU,CAAC,EAC7C,uDAAiC;IACnC,CAAC,yBAAmB,CAAC,UAAU,CAAC,EAAE,wBAAkB;CACrD,CAAC;AAEW,QAAA,iBAAiB,GAAgC;IAC5D,CAAC,yBAAW,CAAC,YAAY,CAAC,EAAE,yBAAmB,CAAC,UAAU;IAC1D,CAAC,yBAAW,CAAC,WAAW,CAAC,EAAE,iCAAuB,CAAC,UAAU;IAC7D,CAAC,yBAAW,CAAC,aAAa,CAAC,EAAE,wDAAkC,CAAC,UAAU;IAC1E,CAAC,yBAAW,CAAC,SAAS,CAAC,EAAE,iCAAuB,CAAC,UAAU;CAC5D,CAAC;AAEF,yCAAuB;AACvB,6BAA4C;AAAnC,0GAAA,mBAAmB,OAAA;AAC5B,6DAAmE;AAA1D,iIAAA,0BAA0B,OAAA","sourcesContent":["import { PermissionConstraint } from '@metamask/permission-controller';\nimport { HandlerType } from '@metamask/snaps-utils';\nimport { Json } from '@metamask/utils';\n\nimport {\n cronjobCaveatSpecifications,\n cronjobEndowmentBuilder,\n getCronjobCaveatMapper,\n} from './cronjob';\nimport { ethereumProviderEndowmentBuilder } from './ethereum-provider';\nimport {\n keyringEndowmentBuilder,\n keyringCaveatSpecifications,\n getKeyringCaveatMapper,\n} from './keyring';\nimport { longRunningEndowmentBuilder } from './long-running';\nimport { networkAccessEndowmentBuilder } from './network-access';\nimport {\n getRpcCaveatMapper,\n rpcCaveatSpecifications,\n rpcEndowmentBuilder,\n} from './rpc';\nimport {\n getTransactionInsightCaveatMapper,\n transactionInsightCaveatSpecifications,\n transactionInsightEndowmentBuilder,\n} from './transaction-insight';\nimport { webAssemblyEndowmentBuilder } from './web-assembly';\n\nexport const endowmentPermissionBuilders = {\n [networkAccessEndowmentBuilder.targetName]: networkAccessEndowmentBuilder,\n [longRunningEndowmentBuilder.targetName]: longRunningEndowmentBuilder,\n [transactionInsightEndowmentBuilder.targetName]:\n transactionInsightEndowmentBuilder,\n [keyringEndowmentBuilder.targetName]: keyringEndowmentBuilder,\n [cronjobEndowmentBuilder.targetName]: cronjobEndowmentBuilder,\n [ethereumProviderEndowmentBuilder.targetName]:\n ethereumProviderEndowmentBuilder,\n [rpcEndowmentBuilder.targetName]: rpcEndowmentBuilder,\n [webAssemblyEndowmentBuilder.targetName]: webAssemblyEndowmentBuilder,\n} as const;\n\nexport const endowmentCaveatSpecifications = {\n ...keyringCaveatSpecifications,\n ...cronjobCaveatSpecifications,\n ...transactionInsightCaveatSpecifications,\n ...rpcCaveatSpecifications,\n};\n\nexport const endowmentCaveatMappers: Record<\n string,\n (value: Json) => Pick<PermissionConstraint, 'caveats'>\n> = {\n [keyringEndowmentBuilder.targetName]: getKeyringCaveatMapper,\n [cronjobEndowmentBuilder.targetName]: getCronjobCaveatMapper,\n [transactionInsightEndowmentBuilder.targetName]:\n getTransactionInsightCaveatMapper,\n [rpcEndowmentBuilder.targetName]: getRpcCaveatMapper,\n};\n\nexport const handlerEndowments: Record<HandlerType, string> = {\n [HandlerType.OnRpcRequest]: rpcEndowmentBuilder.targetName,\n [HandlerType.SnapKeyring]: keyringEndowmentBuilder.targetName,\n [HandlerType.OnTransaction]: transactionInsightEndowmentBuilder.targetName,\n [HandlerType.OnCronjob]: cronjobEndowmentBuilder.targetName,\n};\n\nexport * from './enum';\nexport { getRpcCaveatOrigins } from './rpc';\nexport { getTransactionOriginCaveat } from './transaction-insight';\n"]}
|
|
@@ -1,40 +0,0 @@
|
|
|
1
|
-
import { CaveatSpecificationConstraint, PermissionConstraint, PermissionSpecificationBuilder, PermissionType, PermissionValidatorConstraint, SubjectType } from '@metamask/permission-controller';
|
|
2
|
-
import { Namespaces, SnapCaveatType } from '@metamask/snaps-utils';
|
|
3
|
-
import { Json, NonEmptyArray } from '@metamask/utils';
|
|
4
|
-
import { SnapEndowments } from './enum';
|
|
5
|
-
declare const targetName = SnapEndowments.Keyring;
|
|
6
|
-
declare type KeyringSpecificationBuilderOptions = {};
|
|
7
|
-
export declare const keyringEndowmentBuilder: Readonly<{
|
|
8
|
-
readonly targetName: SnapEndowments.Keyring;
|
|
9
|
-
readonly specificationBuilder: PermissionSpecificationBuilder<PermissionType.Endowment, KeyringSpecificationBuilderOptions, {
|
|
10
|
-
permissionType: PermissionType.Endowment;
|
|
11
|
-
targetName: typeof targetName;
|
|
12
|
-
endowmentGetter: (_options?: any) => undefined;
|
|
13
|
-
allowedCaveats: Readonly<NonEmptyArray<string>> | null;
|
|
14
|
-
validator: PermissionValidatorConstraint;
|
|
15
|
-
subjectTypes: readonly SubjectType[];
|
|
16
|
-
}>;
|
|
17
|
-
}>;
|
|
18
|
-
/**
|
|
19
|
-
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
20
|
-
* Note that this function does not do any validation, that's handled by the
|
|
21
|
-
* PermissionsController when the permission is requested.
|
|
22
|
-
*
|
|
23
|
-
* @param value - The raw value from the `initialPermissions`.
|
|
24
|
-
* @returns The caveat specification.
|
|
25
|
-
*/
|
|
26
|
-
export declare function getKeyringCaveatMapper(value: Json): Pick<PermissionConstraint, 'caveats'>;
|
|
27
|
-
/**
|
|
28
|
-
* Getter function to get the keyring namespaces from a permission.
|
|
29
|
-
*
|
|
30
|
-
* This does basic validation of the caveat, but does not validate the type or
|
|
31
|
-
* value of the namespaces object itself, as this is handled by the
|
|
32
|
-
* `PermissionsController` when the permission is requested.
|
|
33
|
-
*
|
|
34
|
-
* @param permission - The permission to get the keyring namespaces from.
|
|
35
|
-
* @returns The keyring namespaces, or `null` if the permission does not have a
|
|
36
|
-
* keyring caveat.
|
|
37
|
-
*/
|
|
38
|
-
export declare function getKeyringCaveatNamespaces(permission?: PermissionConstraint): Namespaces | null;
|
|
39
|
-
export declare const keyringCaveatSpecifications: Record<SnapCaveatType.SnapKeyring, CaveatSpecificationConstraint>;
|
|
40
|
-
export {};
|
|
@@ -1,103 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.keyringCaveatSpecifications = exports.getKeyringCaveatNamespaces = exports.getKeyringCaveatMapper = exports.keyringEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const snaps_utils_1 = require("@metamask/snaps-utils");
|
|
6
|
-
const utils_1 = require("@metamask/utils");
|
|
7
|
-
const eth_rpc_errors_1 = require("eth-rpc-errors");
|
|
8
|
-
const enum_1 = require("./enum");
|
|
9
|
-
const targetName = enum_1.SnapEndowments.Keyring;
|
|
10
|
-
/**
|
|
11
|
-
* The specification builder for the keyring endowment permission.
|
|
12
|
-
*
|
|
13
|
-
* @returns The specification for the keyring endowment permission.
|
|
14
|
-
*/
|
|
15
|
-
const specificationBuilder = () => {
|
|
16
|
-
return {
|
|
17
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
18
|
-
targetName,
|
|
19
|
-
allowedCaveats: [snaps_utils_1.SnapCaveatType.SnapKeyring],
|
|
20
|
-
endowmentGetter: (_getterOptions) => undefined,
|
|
21
|
-
validator: ({ caveats }) => {
|
|
22
|
-
if (caveats?.length !== 1 ||
|
|
23
|
-
caveats[0].type !== snaps_utils_1.SnapCaveatType.SnapKeyring) {
|
|
24
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
25
|
-
message: `Expected a single "${snaps_utils_1.SnapCaveatType.SnapKeyring}" caveat.`,
|
|
26
|
-
});
|
|
27
|
-
}
|
|
28
|
-
},
|
|
29
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
30
|
-
};
|
|
31
|
-
};
|
|
32
|
-
exports.keyringEndowmentBuilder = Object.freeze({
|
|
33
|
-
targetName,
|
|
34
|
-
specificationBuilder,
|
|
35
|
-
});
|
|
36
|
-
/**
|
|
37
|
-
* Validate the namespaces value of a caveat. This does not validate the type or
|
|
38
|
-
* value of the caveat itself, only the value of the namespaces object.
|
|
39
|
-
*
|
|
40
|
-
* @param caveat - The caveat to validate.
|
|
41
|
-
* @throws If the caveat value is invalid.
|
|
42
|
-
*/
|
|
43
|
-
function validateCaveatNamespace(caveat) {
|
|
44
|
-
if (!(0, utils_1.hasProperty)(caveat, 'value') || !(0, utils_1.isPlainObject)(caveat.value)) {
|
|
45
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
46
|
-
message: 'Expected a plain object.',
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
const { value } = caveat;
|
|
50
|
-
if (!(0, utils_1.hasProperty)(value, 'namespaces') || !(0, utils_1.isPlainObject)(value)) {
|
|
51
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
52
|
-
message: 'Expected a plain object.',
|
|
53
|
-
});
|
|
54
|
-
}
|
|
55
|
-
(0, snaps_utils_1.assertIsNamespacesObject)(value.namespaces, eth_rpc_errors_1.ethErrors.rpc.invalidParams);
|
|
56
|
-
}
|
|
57
|
-
/**
|
|
58
|
-
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
59
|
-
* Note that this function does not do any validation, that's handled by the
|
|
60
|
-
* PermissionsController when the permission is requested.
|
|
61
|
-
*
|
|
62
|
-
* @param value - The raw value from the `initialPermissions`.
|
|
63
|
-
* @returns The caveat specification.
|
|
64
|
-
*/
|
|
65
|
-
function getKeyringCaveatMapper(value) {
|
|
66
|
-
return {
|
|
67
|
-
caveats: [
|
|
68
|
-
{
|
|
69
|
-
type: snaps_utils_1.SnapCaveatType.SnapKeyring,
|
|
70
|
-
value,
|
|
71
|
-
},
|
|
72
|
-
],
|
|
73
|
-
};
|
|
74
|
-
}
|
|
75
|
-
exports.getKeyringCaveatMapper = getKeyringCaveatMapper;
|
|
76
|
-
/**
|
|
77
|
-
* Getter function to get the keyring namespaces from a permission.
|
|
78
|
-
*
|
|
79
|
-
* This does basic validation of the caveat, but does not validate the type or
|
|
80
|
-
* value of the namespaces object itself, as this is handled by the
|
|
81
|
-
* `PermissionsController` when the permission is requested.
|
|
82
|
-
*
|
|
83
|
-
* @param permission - The permission to get the keyring namespaces from.
|
|
84
|
-
* @returns The keyring namespaces, or `null` if the permission does not have a
|
|
85
|
-
* keyring caveat.
|
|
86
|
-
*/
|
|
87
|
-
function getKeyringCaveatNamespaces(permission) {
|
|
88
|
-
if (!permission?.caveats) {
|
|
89
|
-
return null;
|
|
90
|
-
}
|
|
91
|
-
(0, utils_1.assert)(permission.caveats.length === 1);
|
|
92
|
-
(0, utils_1.assert)(permission.caveats[0].type === snaps_utils_1.SnapCaveatType.SnapKeyring);
|
|
93
|
-
const caveat = permission.caveats[0];
|
|
94
|
-
return caveat.value?.namespaces ?? null;
|
|
95
|
-
}
|
|
96
|
-
exports.getKeyringCaveatNamespaces = getKeyringCaveatNamespaces;
|
|
97
|
-
exports.keyringCaveatSpecifications = {
|
|
98
|
-
[snaps_utils_1.SnapCaveatType.SnapKeyring]: Object.freeze({
|
|
99
|
-
type: snaps_utils_1.SnapCaveatType.SnapKeyring,
|
|
100
|
-
validator: (caveat) => validateCaveatNamespace(caveat),
|
|
101
|
-
}),
|
|
102
|
-
};
|
|
103
|
-
//# sourceMappingURL=keyring.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"keyring.js","sourceRoot":"","sources":["../../../src/snaps/endowments/keyring.ts"],"names":[],"mappings":";;;AAAA,2EAUyC;AACzC,uDAI+B;AAC/B,2CAMyB;AACzB,mDAA2C;AAE3C,iCAAwC;AAExC,MAAM,UAAU,GAAG,qBAAc,CAAC,OAAO,CAAC;AAe1C;;;;GAIG;AACH,MAAM,oBAAoB,GAItB,GAAyB,EAAE;IAC7B,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU;QACV,cAAc,EAAE,CAAC,4BAAc,CAAC,WAAW,CAAC;QAC5C,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE,CAAC,SAAS;QACtE,SAAS,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,EAAE;YACzB,IACE,OAAO,EAAE,MAAM,KAAK,CAAC;gBACrB,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,WAAW,EAC9C;gBACA,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;oBAChC,OAAO,EAAE,sBAAsB,4BAAc,CAAC,WAAW,WAAW;iBACrE,CAAC,CAAC;aACJ;QACH,CAAC;QACD,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,uBAAuB,GAAG,MAAM,CAAC,MAAM,CAAC;IACnD,UAAU;IACV,oBAAoB;CACZ,CAAC,CAAC;AAEZ;;;;;;GAMG;AACH,SAAS,uBAAuB,CAAC,MAA2B;IAC1D,IAAI,CAAC,IAAA,mBAAW,EAAC,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,IAAA,qBAAa,EAAC,MAAM,CAAC,KAAK,CAAC,EAAE;QACjE,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;YAChC,OAAO,EAAE,0BAA0B;SACpC,CAAC,CAAC;KACJ;IAED,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,CAAC;IAEzB,IAAI,CAAC,IAAA,mBAAW,EAAC,KAAK,EAAE,YAAY,CAAC,IAAI,CAAC,IAAA,qBAAa,EAAC,KAAK,CAAC,EAAE;QAC9D,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;YAChC,OAAO,EAAE,0BAA0B;SACpC,CAAC,CAAC;KACJ;IAED,IAAA,sCAAwB,EAAC,KAAK,CAAC,UAAU,EAAE,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;AAC1E,CAAC;AAED;;;;;;;GAOG;AACH,SAAgB,sBAAsB,CACpC,KAAW;IAEX,OAAO;QACL,OAAO,EAAE;YACP;gBACE,IAAI,EAAE,4BAAc,CAAC,WAAW;gBAChC,KAAK;aACN;SACF;KACF,CAAC;AACJ,CAAC;AAXD,wDAWC;AAED;;;;;;;;;;GAUG;AACH,SAAgB,0BAA0B,CACxC,UAAiC;IAEjC,IAAI,CAAC,UAAU,EAAE,OAAO,EAAE;QACxB,OAAO,IAAI,CAAC;KACb;IAED,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,CAAC,CAAC;IACxC,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,WAAW,CAAC,CAAC;IAElE,MAAM,MAAM,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAGlC,CAAC;IAEF,OAAO,MAAM,CAAC,KAAK,EAAE,UAAU,IAAI,IAAI,CAAC;AAC1C,CAAC;AAhBD,gEAgBC;AAEY,QAAA,2BAA2B,GAGpC;IACF,CAAC,4BAAc,CAAC,WAAW,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC;QAC1C,IAAI,EAAE,4BAAc,CAAC,WAAW;QAChC,SAAS,EAAE,CAAC,MAA2B,EAAE,EAAE,CAAC,uBAAuB,CAAC,MAAM,CAAC;KAC5E,CAAC;CACH,CAAC","sourcesContent":["import {\n Caveat,\n CaveatSpecificationConstraint,\n EndowmentGetterParams,\n PermissionConstraint,\n PermissionSpecificationBuilder,\n PermissionType,\n PermissionValidatorConstraint,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\nimport {\n assertIsNamespacesObject,\n Namespaces,\n SnapCaveatType,\n} from '@metamask/snaps-utils';\nimport {\n hasProperty,\n isPlainObject,\n Json,\n NonEmptyArray,\n assert,\n} from '@metamask/utils';\nimport { ethErrors } from 'eth-rpc-errors';\n\nimport { SnapEndowments } from './enum';\n\nconst targetName = SnapEndowments.Keyring;\n\ntype KeyringSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof targetName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n validator: PermissionValidatorConstraint;\n subjectTypes: readonly SubjectType[];\n}>;\n\ntype KeyringSpecificationBuilderOptions = {\n // Empty for now.\n};\n\n/**\n * The specification builder for the keyring endowment permission.\n *\n * @returns The specification for the keyring endowment permission.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n KeyringSpecificationBuilderOptions,\n KeyringSpecification\n> = (): KeyringSpecification => {\n return {\n permissionType: PermissionType.Endowment,\n targetName,\n allowedCaveats: [SnapCaveatType.SnapKeyring],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n validator: ({ caveats }) => {\n if (\n caveats?.length !== 1 ||\n caveats[0].type !== SnapCaveatType.SnapKeyring\n ) {\n throw ethErrors.rpc.invalidParams({\n message: `Expected a single \"${SnapCaveatType.SnapKeyring}\" caveat.`,\n });\n }\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const keyringEndowmentBuilder = Object.freeze({\n targetName,\n specificationBuilder,\n} as const);\n\n/**\n * Validate the namespaces value of a caveat. This does not validate the type or\n * value of the caveat itself, only the value of the namespaces object.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateCaveatNamespace(caveat: Caveat<string, any>): void {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n\n if (!hasProperty(value, 'namespaces') || !isPlainObject(value)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n assertIsNamespacesObject(value.namespaces, ethErrors.rpc.invalidParams);\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getKeyringCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n return {\n caveats: [\n {\n type: SnapCaveatType.SnapKeyring,\n value,\n },\n ],\n };\n}\n\n/**\n * Getter function to get the keyring namespaces from a permission.\n *\n * This does basic validation of the caveat, but does not validate the type or\n * value of the namespaces object itself, as this is handled by the\n * `PermissionsController` when the permission is requested.\n *\n * @param permission - The permission to get the keyring namespaces from.\n * @returns The keyring namespaces, or `null` if the permission does not have a\n * keyring caveat.\n */\nexport function getKeyringCaveatNamespaces(\n permission?: PermissionConstraint,\n): Namespaces | null {\n if (!permission?.caveats) {\n return null;\n }\n\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.SnapKeyring);\n\n const caveat = permission.caveats[0] as Caveat<\n string,\n { namespaces: Namespaces }\n >;\n\n return caveat.value?.namespaces ?? null;\n}\n\nexport const keyringCaveatSpecifications: Record<\n SnapCaveatType.SnapKeyring,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.SnapKeyring]: Object.freeze({\n type: SnapCaveatType.SnapKeyring,\n validator: (caveat: Caveat<string, any>) => validateCaveatNamespace(caveat),\n }),\n};\n"]}
|
|
@@ -1,29 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.longRunningEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const enum_1 = require("./enum");
|
|
6
|
-
const permissionName = enum_1.SnapEndowments.LongRunning;
|
|
7
|
-
/**
|
|
8
|
-
* `endowment:long-running` returns nothing; it is intended to be used as a flag
|
|
9
|
-
* by the `SnapController` to make it ignore the request processing timeout
|
|
10
|
-
* during snap lifecycle management. Essentially, it allows a snap to take an
|
|
11
|
-
* infinite amount of time to process a request.
|
|
12
|
-
*
|
|
13
|
-
* @param _builderOptions - Optional specification builder options.
|
|
14
|
-
* @returns The specification for the long-running endowment.
|
|
15
|
-
*/
|
|
16
|
-
const specificationBuilder = (_builderOptions) => {
|
|
17
|
-
return {
|
|
18
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
19
|
-
targetName: permissionName,
|
|
20
|
-
allowedCaveats: null,
|
|
21
|
-
endowmentGetter: (_getterOptions) => undefined,
|
|
22
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
23
|
-
};
|
|
24
|
-
};
|
|
25
|
-
exports.longRunningEndowmentBuilder = Object.freeze({
|
|
26
|
-
targetName: permissionName,
|
|
27
|
-
specificationBuilder,
|
|
28
|
-
});
|
|
29
|
-
//# sourceMappingURL=long-running.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"long-running.js","sourceRoot":"","sources":["../../../src/snaps/endowments/long-running.ts"],"names":[],"mappings":";;;AAAA,2EAMyC;AAEzC,iCAAwC;AAExC,MAAM,cAAc,GAAG,qBAAc,CAAC,WAAW,CAAC;AASlD;;;;;;;;GAQG;AACH,MAAM,oBAAoB,GAItB,CAAC,eAAqB,EAAE,EAAE;IAC5B,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU,EAAE,cAAc;QAC1B,cAAc,EAAE,IAAI;QACpB,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE,CAAC,SAAS;QACtE,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,2BAA2B,GAAG,MAAM,CAAC,MAAM,CAAC;IACvD,UAAU,EAAE,cAAc;IAC1B,oBAAoB;CACZ,CAAC,CAAC","sourcesContent":["import {\n PermissionSpecificationBuilder,\n PermissionType,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.LongRunning;\n\ntype LongRunningEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:long-running` returns nothing; it is intended to be used as a flag\n * by the `SnapController` to make it ignore the request processing timeout\n * during snap lifecycle management. Essentially, it allows a snap to take an\n * infinite amount of time to process a request.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the long-running endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n LongRunningEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const longRunningEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"]}
|
|
@@ -1,30 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.networkAccessEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const enum_1 = require("./enum");
|
|
6
|
-
const permissionName = enum_1.SnapEndowments.NetworkAccess;
|
|
7
|
-
/**
|
|
8
|
-
* `endowment:network-access` returns the name of global browser API(s) that
|
|
9
|
-
* enable network access. This is intended to populate the endowments of the
|
|
10
|
-
* SES Compartment in which a Snap executes.
|
|
11
|
-
*
|
|
12
|
-
* @param _builderOptions - Optional specification builder options.
|
|
13
|
-
* @returns The specification for the network endowment.
|
|
14
|
-
*/
|
|
15
|
-
const specificationBuilder = (_builderOptions) => {
|
|
16
|
-
return {
|
|
17
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
18
|
-
targetName: permissionName,
|
|
19
|
-
allowedCaveats: null,
|
|
20
|
-
endowmentGetter: (_getterOptions) => {
|
|
21
|
-
return ['fetch', 'Request', 'Headers', 'Response'];
|
|
22
|
-
},
|
|
23
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
24
|
-
};
|
|
25
|
-
};
|
|
26
|
-
exports.networkAccessEndowmentBuilder = Object.freeze({
|
|
27
|
-
targetName: permissionName,
|
|
28
|
-
specificationBuilder,
|
|
29
|
-
});
|
|
30
|
-
//# sourceMappingURL=network-access.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"network-access.js","sourceRoot":"","sources":["../../../src/snaps/endowments/network-access.ts"],"names":[],"mappings":";;;AAAA,2EAMyC;AAEzC,iCAAwC;AAExC,MAAM,cAAc,GAAG,qBAAc,CAAC,aAAa,CAAC;AAWpD;;;;;;;GAOG;AACH,MAAM,oBAAoB,GAItB,CAAC,eAAqB,EAAE,EAAE;IAC5B,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU,EAAE,cAAc;QAC1B,cAAc,EAAE,IAAI;QACpB,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE;YAC1D,OAAO,CAAC,OAAO,EAAE,SAAS,EAAE,SAAS,EAAE,UAAU,CAAC,CAAC;QACrD,CAAC;QACD,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,6BAA6B,GAAG,MAAM,CAAC,MAAM,CAAC;IACzD,UAAU,EAAE,cAAc;IAC1B,oBAAoB;CACZ,CAAC,CAAC","sourcesContent":["import {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n PermissionType,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.NetworkAccess;\n\ntype NetworkAccessEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (\n _options?: any,\n ) => ['fetch', 'Request', 'Headers', 'Response'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:network-access` returns the name of global browser API(s) that\n * enable network access. This is intended to populate the endowments of the\n * SES Compartment in which a Snap executes.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the network endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n NetworkAccessEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['fetch', 'Request', 'Headers', 'Response'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const networkAccessEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"]}
|
|
@@ -1,92 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.rpcCaveatSpecifications = exports.getRpcCaveatOrigins = exports.getRpcCaveatMapper = exports.rpcEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const snaps_utils_1 = require("@metamask/snaps-utils");
|
|
6
|
-
const utils_1 = require("@metamask/utils");
|
|
7
|
-
const eth_rpc_errors_1 = require("eth-rpc-errors");
|
|
8
|
-
const enum_1 = require("./enum");
|
|
9
|
-
const targetName = enum_1.SnapEndowments.Rpc;
|
|
10
|
-
/**
|
|
11
|
-
* The specification builder for the JSON-RPC endowment permission.
|
|
12
|
-
*
|
|
13
|
-
* @returns The specification for the JSON-RPC endowment permission.
|
|
14
|
-
*/
|
|
15
|
-
const specificationBuilder = () => {
|
|
16
|
-
return {
|
|
17
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
18
|
-
targetName,
|
|
19
|
-
allowedCaveats: [snaps_utils_1.SnapCaveatType.RpcOrigin],
|
|
20
|
-
endowmentGetter: (_getterOptions) => undefined,
|
|
21
|
-
validator: ({ caveats }) => {
|
|
22
|
-
if (caveats?.length !== 1 ||
|
|
23
|
-
caveats[0].type !== snaps_utils_1.SnapCaveatType.RpcOrigin) {
|
|
24
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
25
|
-
message: `Expected a single "${snaps_utils_1.SnapCaveatType.RpcOrigin}" caveat.`,
|
|
26
|
-
});
|
|
27
|
-
}
|
|
28
|
-
},
|
|
29
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
30
|
-
};
|
|
31
|
-
};
|
|
32
|
-
exports.rpcEndowmentBuilder = Object.freeze({
|
|
33
|
-
targetName,
|
|
34
|
-
specificationBuilder,
|
|
35
|
-
});
|
|
36
|
-
/**
|
|
37
|
-
* Validate the value of a caveat. This does not validate the type of the
|
|
38
|
-
* caveat itself, only the value of the caveat.
|
|
39
|
-
*
|
|
40
|
-
* @param caveat - The caveat to validate.
|
|
41
|
-
* @throws If the caveat value is invalid.
|
|
42
|
-
*/
|
|
43
|
-
function validateCaveatOrigins(caveat) {
|
|
44
|
-
if (!(0, utils_1.hasProperty)(caveat, 'value') || !(0, utils_1.isPlainObject)(caveat.value)) {
|
|
45
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
46
|
-
message: 'Invalid JSON-RPC origins: Expected a plain object.',
|
|
47
|
-
});
|
|
48
|
-
}
|
|
49
|
-
const { value } = caveat;
|
|
50
|
-
(0, snaps_utils_1.assertIsRpcOrigins)(value, eth_rpc_errors_1.ethErrors.rpc.invalidParams);
|
|
51
|
-
}
|
|
52
|
-
/**
|
|
53
|
-
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
54
|
-
* Note that this function does not do any validation, that's handled by the
|
|
55
|
-
* PermissionsController when the permission is requested.
|
|
56
|
-
*
|
|
57
|
-
* @param value - The raw value from the `initialPermissions`.
|
|
58
|
-
* @returns The caveat specification.
|
|
59
|
-
*/
|
|
60
|
-
function getRpcCaveatMapper(value) {
|
|
61
|
-
return {
|
|
62
|
-
caveats: [
|
|
63
|
-
{
|
|
64
|
-
type: snaps_utils_1.SnapCaveatType.RpcOrigin,
|
|
65
|
-
value,
|
|
66
|
-
},
|
|
67
|
-
],
|
|
68
|
-
};
|
|
69
|
-
}
|
|
70
|
-
exports.getRpcCaveatMapper = getRpcCaveatMapper;
|
|
71
|
-
/**
|
|
72
|
-
* Getter function to get the {@link RpcOrigins} caveat value from a permission.
|
|
73
|
-
*
|
|
74
|
-
* @param permission - The permission to get the caveat value from.
|
|
75
|
-
* @returns The caveat value.
|
|
76
|
-
* @throws If the permission does not have a valid {@link RpcOrigins} caveat.
|
|
77
|
-
*/
|
|
78
|
-
function getRpcCaveatOrigins(permission) {
|
|
79
|
-
(0, utils_1.assert)(permission?.caveats);
|
|
80
|
-
(0, utils_1.assert)(permission.caveats.length === 1);
|
|
81
|
-
(0, utils_1.assert)(permission.caveats[0].type === snaps_utils_1.SnapCaveatType.RpcOrigin);
|
|
82
|
-
const caveat = permission.caveats[0];
|
|
83
|
-
return caveat.value;
|
|
84
|
-
}
|
|
85
|
-
exports.getRpcCaveatOrigins = getRpcCaveatOrigins;
|
|
86
|
-
exports.rpcCaveatSpecifications = {
|
|
87
|
-
[snaps_utils_1.SnapCaveatType.RpcOrigin]: Object.freeze({
|
|
88
|
-
type: snaps_utils_1.SnapCaveatType.RpcOrigin,
|
|
89
|
-
validator: (caveat) => validateCaveatOrigins(caveat),
|
|
90
|
-
}),
|
|
91
|
-
};
|
|
92
|
-
//# sourceMappingURL=rpc.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"rpc.js","sourceRoot":"","sources":["../../../src/snaps/endowments/rpc.ts"],"names":[],"mappings":";;;AAAA,2EAUyC;AACzC,uDAI+B;AAC/B,2CAMyB;AACzB,mDAA2C;AAE3C,iCAAwC;AAExC,MAAM,UAAU,GAAG,qBAAc,CAAC,GAAG,CAAC;AAetC;;;;GAIG;AACH,MAAM,oBAAoB,GAItB,GAAqB,EAAE;IACzB,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU;QACV,cAAc,EAAE,CAAC,4BAAc,CAAC,SAAS,CAAC;QAC1C,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE,CAAC,SAAS;QACtE,SAAS,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,EAAE;YACzB,IACE,OAAO,EAAE,MAAM,KAAK,CAAC;gBACrB,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,SAAS,EAC5C;gBACA,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;oBAChC,OAAO,EAAE,sBAAsB,4BAAc,CAAC,SAAS,WAAW;iBACnE,CAAC,CAAC;aACJ;QACH,CAAC;QACD,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,mBAAmB,GAAG,MAAM,CAAC,MAAM,CAAC;IAC/C,UAAU;IACV,oBAAoB;CACZ,CAAC,CAAC;AAEZ;;;;;;GAMG;AACH,SAAS,qBAAqB,CAAC,MAA2B;IACxD,IAAI,CAAC,IAAA,mBAAW,EAAC,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,IAAA,qBAAa,EAAC,MAAM,CAAC,KAAK,CAAC,EAAE;QACjE,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;YAChC,OAAO,EAAE,oDAAoD;SAC9D,CAAC,CAAC;KACJ;IAED,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,CAAC;IACzB,IAAA,gCAAkB,EAAC,KAAK,EAAE,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;AACzD,CAAC;AAED;;;;;;;GAOG;AACH,SAAgB,kBAAkB,CAChC,KAAW;IAEX,OAAO;QACL,OAAO,EAAE;YACP;gBACE,IAAI,EAAE,4BAAc,CAAC,SAAS;gBAC9B,KAAK;aACN;SACF;KACF,CAAC;AACJ,CAAC;AAXD,gDAWC;AAED;;;;;;GAMG;AACH,SAAgB,mBAAmB,CACjC,UAAiC;IAEjC,IAAA,cAAM,EAAC,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5B,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,CAAC,CAAC;IACxC,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,SAAS,CAAC,CAAC;IAEhE,MAAM,MAAM,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAA+B,CAAC;IACnE,OAAO,MAAM,CAAC,KAAK,CAAC;AACtB,CAAC;AATD,kDASC;AAEY,QAAA,uBAAuB,GAGhC;IACF,CAAC,4BAAc,CAAC,SAAS,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC;QACxC,IAAI,EAAE,4BAAc,CAAC,SAAS;QAC9B,SAAS,EAAE,CAAC,MAA2B,EAAE,EAAE,CAAC,qBAAqB,CAAC,MAAM,CAAC;KAC1E,CAAC;CACH,CAAC","sourcesContent":["import {\n Caveat,\n CaveatSpecificationConstraint,\n EndowmentGetterParams,\n PermissionConstraint,\n PermissionSpecificationBuilder,\n PermissionType,\n PermissionValidatorConstraint,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\nimport {\n assertIsRpcOrigins,\n RpcOrigins,\n SnapCaveatType,\n} from '@metamask/snaps-utils';\nimport {\n hasProperty,\n isPlainObject,\n Json,\n NonEmptyArray,\n assert,\n} from '@metamask/utils';\nimport { ethErrors } from 'eth-rpc-errors';\n\nimport { SnapEndowments } from './enum';\n\nconst targetName = SnapEndowments.Rpc;\n\ntype RpcSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof targetName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n validator: PermissionValidatorConstraint;\n subjectTypes: readonly SubjectType[];\n}>;\n\ntype RpcSpecificationBuilderOptions = {\n // Empty for now.\n};\n\n/**\n * The specification builder for the JSON-RPC endowment permission.\n *\n * @returns The specification for the JSON-RPC endowment permission.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n RpcSpecificationBuilderOptions,\n RpcSpecification\n> = (): RpcSpecification => {\n return {\n permissionType: PermissionType.Endowment,\n targetName,\n allowedCaveats: [SnapCaveatType.RpcOrigin],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n validator: ({ caveats }) => {\n if (\n caveats?.length !== 1 ||\n caveats[0].type !== SnapCaveatType.RpcOrigin\n ) {\n throw ethErrors.rpc.invalidParams({\n message: `Expected a single \"${SnapCaveatType.RpcOrigin}\" caveat.`,\n });\n }\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const rpcEndowmentBuilder = Object.freeze({\n targetName,\n specificationBuilder,\n} as const);\n\n/**\n * Validate the value of a caveat. This does not validate the type of the\n * caveat itself, only the value of the caveat.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateCaveatOrigins(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Invalid JSON-RPC origins: Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n assertIsRpcOrigins(value, ethErrors.rpc.invalidParams);\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getRpcCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n return {\n caveats: [\n {\n type: SnapCaveatType.RpcOrigin,\n value,\n },\n ],\n };\n}\n\n/**\n * Getter function to get the {@link RpcOrigins} caveat value from a permission.\n *\n * @param permission - The permission to get the caveat value from.\n * @returns The caveat value.\n * @throws If the permission does not have a valid {@link RpcOrigins} caveat.\n */\nexport function getRpcCaveatOrigins(\n permission?: PermissionConstraint,\n): RpcOrigins | null {\n assert(permission?.caveats);\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.RpcOrigin);\n\n const caveat = permission.caveats[0] as Caveat<string, RpcOrigins>;\n return caveat.value;\n}\n\nexport const rpcCaveatSpecifications: Record<\n SnapCaveatType.RpcOrigin,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.RpcOrigin]: Object.freeze({\n type: SnapCaveatType.RpcOrigin,\n validator: (caveat: Caveat<string, any>) => validateCaveatOrigins(caveat),\n }),\n};\n"]}
|
|
@@ -1,106 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.transactionInsightCaveatSpecifications = exports.getTransactionOriginCaveat = exports.getTransactionInsightCaveatMapper = exports.transactionInsightEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const snaps_utils_1 = require("@metamask/snaps-utils");
|
|
6
|
-
const utils_1 = require("@metamask/utils");
|
|
7
|
-
const eth_rpc_errors_1 = require("eth-rpc-errors");
|
|
8
|
-
const enum_1 = require("./enum");
|
|
9
|
-
const permissionName = enum_1.SnapEndowments.TransactionInsight;
|
|
10
|
-
/**
|
|
11
|
-
* `endowment:transaction-insight` returns nothing; it is intended to be used as a flag
|
|
12
|
-
* by the extension to detect whether the snap has the capability to show information on the transaction confirmation screen.
|
|
13
|
-
*
|
|
14
|
-
* @param _builderOptions - Optional specification builder options.
|
|
15
|
-
* @returns The specification for the transaction-insight endowment.
|
|
16
|
-
*/
|
|
17
|
-
const specificationBuilder = (_builderOptions) => {
|
|
18
|
-
return {
|
|
19
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
20
|
-
targetName: permissionName,
|
|
21
|
-
allowedCaveats: [snaps_utils_1.SnapCaveatType.TransactionOrigin],
|
|
22
|
-
endowmentGetter: (_getterOptions) => undefined,
|
|
23
|
-
validator: ({ caveats }) => {
|
|
24
|
-
if ((caveats !== null && caveats?.length > 1) ||
|
|
25
|
-
(caveats?.length === 1 &&
|
|
26
|
-
caveats[0].type !== snaps_utils_1.SnapCaveatType.TransactionOrigin)) {
|
|
27
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
28
|
-
message: `Expected a single "${snaps_utils_1.SnapCaveatType.TransactionOrigin}" caveat.`,
|
|
29
|
-
});
|
|
30
|
-
}
|
|
31
|
-
},
|
|
32
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
33
|
-
};
|
|
34
|
-
};
|
|
35
|
-
exports.transactionInsightEndowmentBuilder = Object.freeze({
|
|
36
|
-
targetName: permissionName,
|
|
37
|
-
specificationBuilder,
|
|
38
|
-
});
|
|
39
|
-
/**
|
|
40
|
-
* Validates the type of the caveat value.
|
|
41
|
-
*
|
|
42
|
-
* @param caveat - The caveat to validate.
|
|
43
|
-
* @throws If the caveat value is invalid.
|
|
44
|
-
*/
|
|
45
|
-
function validateCaveat(caveat) {
|
|
46
|
-
if (!(0, utils_1.hasProperty)(caveat, 'value') || !(0, utils_1.isPlainObject)(caveat)) {
|
|
47
|
-
throw eth_rpc_errors_1.ethErrors.rpc.invalidParams({
|
|
48
|
-
message: 'Expected a plain object.',
|
|
49
|
-
});
|
|
50
|
-
}
|
|
51
|
-
const { value } = caveat;
|
|
52
|
-
(0, utils_1.assert)(typeof value === 'boolean', 'Expected caveat value to have type "boolean"');
|
|
53
|
-
}
|
|
54
|
-
/**
|
|
55
|
-
* Map a raw value from the `initialPermissions` to a caveat specification.
|
|
56
|
-
* Note that this function does not do any validation, that's handled by the
|
|
57
|
-
* PermissionsController when the permission is requested.
|
|
58
|
-
*
|
|
59
|
-
* @param value - The raw value from the `initialPermissions`.
|
|
60
|
-
* @returns The caveat specification.
|
|
61
|
-
*/
|
|
62
|
-
function getTransactionInsightCaveatMapper(value) {
|
|
63
|
-
if (!value ||
|
|
64
|
-
!(0, utils_1.isObject)(value) ||
|
|
65
|
-
((0, utils_1.isObject)(value) && Object.keys(value).length === 0)) {
|
|
66
|
-
return { caveats: null };
|
|
67
|
-
}
|
|
68
|
-
return {
|
|
69
|
-
caveats: [
|
|
70
|
-
{
|
|
71
|
-
type: snaps_utils_1.SnapCaveatType.TransactionOrigin,
|
|
72
|
-
value: (0, utils_1.hasProperty)(value, 'allowTransactionOrigin') &&
|
|
73
|
-
value.allowTransactionOrigin,
|
|
74
|
-
},
|
|
75
|
-
],
|
|
76
|
-
};
|
|
77
|
-
}
|
|
78
|
-
exports.getTransactionInsightCaveatMapper = getTransactionInsightCaveatMapper;
|
|
79
|
-
/**
|
|
80
|
-
* Getter function to get the transaction origin caveat from a permission.
|
|
81
|
-
*
|
|
82
|
-
* This does basic validation of the caveat, but does not validate the type or
|
|
83
|
-
* value of the namespaces object itself, as this is handled by the
|
|
84
|
-
* `PermissionsController` when the permission is requested.
|
|
85
|
-
*
|
|
86
|
-
* @param permission - The permission to get the transaction origin caveat from.
|
|
87
|
-
* @returns The transaction origin, or `null` if the permission does not have a
|
|
88
|
-
* transaction origin caveat.
|
|
89
|
-
*/
|
|
90
|
-
function getTransactionOriginCaveat(permission) {
|
|
91
|
-
if (!permission?.caveats) {
|
|
92
|
-
return null;
|
|
93
|
-
}
|
|
94
|
-
(0, utils_1.assert)(permission.caveats.length === 1);
|
|
95
|
-
(0, utils_1.assert)(permission.caveats[0].type === snaps_utils_1.SnapCaveatType.TransactionOrigin);
|
|
96
|
-
const caveat = permission.caveats[0];
|
|
97
|
-
return caveat.value ?? null;
|
|
98
|
-
}
|
|
99
|
-
exports.getTransactionOriginCaveat = getTransactionOriginCaveat;
|
|
100
|
-
exports.transactionInsightCaveatSpecifications = {
|
|
101
|
-
[snaps_utils_1.SnapCaveatType.TransactionOrigin]: Object.freeze({
|
|
102
|
-
type: snaps_utils_1.SnapCaveatType.TransactionOrigin,
|
|
103
|
-
validator: (caveat) => validateCaveat(caveat),
|
|
104
|
-
}),
|
|
105
|
-
};
|
|
106
|
-
//# sourceMappingURL=transaction-insight.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"transaction-insight.js","sourceRoot":"","sources":["../../../src/snaps/endowments/transaction-insight.ts"],"names":[],"mappings":";;;AAAA,2EAUyC;AACzC,uDAAuD;AACvD,2CAOyB;AACzB,mDAA2C;AAE3C,iCAAwC;AAExC,MAAM,cAAc,GAAG,qBAAc,CAAC,kBAAkB,CAAC;AAUzD;;;;;;GAMG;AACH,MAAM,oBAAoB,GAItB,CAAC,eAAyB,EAAE,EAAE;IAChC,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU,EAAE,cAAc;QAC1B,cAAc,EAAE,CAAC,4BAAc,CAAC,iBAAiB,CAAC;QAClD,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE,CAAC,SAAS;QACtE,SAAS,EAAE,CAAC,EAAE,OAAO,EAAE,EAAE,EAAE;YACzB,IACE,CAAC,OAAO,KAAK,IAAI,IAAI,OAAO,EAAE,MAAM,GAAG,CAAC,CAAC;gBACzC,CAAC,OAAO,EAAE,MAAM,KAAK,CAAC;oBACpB,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,iBAAiB,CAAC,EACvD;gBACA,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;oBAChC,OAAO,EAAE,sBAAsB,4BAAc,CAAC,iBAAiB,WAAW;iBAC3E,CAAC,CAAC;aACJ;QACH,CAAC;QACD,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,kCAAkC,GAAG,MAAM,CAAC,MAAM,CAAC;IAC9D,UAAU,EAAE,cAAc;IAC1B,oBAAoB;CACZ,CAAC,CAAC;AAEZ;;;;;GAKG;AACH,SAAS,cAAc,CAAC,MAA2B;IACjD,IAAI,CAAC,IAAA,mBAAW,EAAC,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,IAAA,qBAAa,EAAC,MAAM,CAAC,EAAE;QAC3D,MAAM,0BAAS,CAAC,GAAG,CAAC,aAAa,CAAC;YAChC,OAAO,EAAE,0BAA0B;SACpC,CAAC,CAAC;KACJ;IAED,MAAM,EAAE,KAAK,EAAE,GAAG,MAAM,CAAC;IAEzB,IAAA,cAAM,EACJ,OAAO,KAAK,KAAK,SAAS,EAC1B,8CAA8C,CAC/C,CAAC;AACJ,CAAC;AAED;;;;;;;GAOG;AACH,SAAgB,iCAAiC,CAC/C,KAAW;IAEX,IACE,CAAC,KAAK;QACN,CAAC,IAAA,gBAAQ,EAAC,KAAK,CAAC;QAChB,CAAC,IAAA,gBAAQ,EAAC,KAAK,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,MAAM,KAAK,CAAC,CAAC,EACpD;QACA,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;KAC1B;IACD,OAAO;QACL,OAAO,EAAE;YACP;gBACE,IAAI,EAAE,4BAAc,CAAC,iBAAiB;gBACtC,KAAK,EACH,IAAA,mBAAW,EAAC,KAAK,EAAE,wBAAwB,CAAC;oBAC3C,KAAK,CAAC,sBAAkC;aAC5C;SACF;KACF,CAAC;AACJ,CAAC;AApBD,8EAoBC;AAED;;;;;;;;;;GAUG;AACH,SAAgB,0BAA0B,CACxC,UAAiC;IAEjC,IAAI,CAAC,UAAU,EAAE,OAAO,EAAE;QACxB,OAAO,IAAI,CAAC;KACb;IAED,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,MAAM,KAAK,CAAC,CAAC,CAAC;IACxC,IAAA,cAAM,EAAC,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,IAAI,KAAK,4BAAc,CAAC,iBAAiB,CAAC,CAAC;IAExE,MAAM,MAAM,GAAG,UAAU,CAAC,OAAO,CAAC,CAAC,CAA4B,CAAC;IAEhE,OAAO,MAAM,CAAC,KAAK,IAAI,IAAI,CAAC;AAC9B,CAAC;AAbD,gEAaC;AAEY,QAAA,sCAAsC,GAG/C;IACF,CAAC,4BAAc,CAAC,iBAAiB,CAAC,EAAE,MAAM,CAAC,MAAM,CAAC;QAChD,IAAI,EAAE,4BAAc,CAAC,iBAAiB;QACtC,SAAS,EAAE,CAAC,MAA2B,EAAE,EAAE,CAAC,cAAc,CAAC,MAAM,CAAC;KACnE,CAAC;CACH,CAAC","sourcesContent":["import {\n PermissionSpecificationBuilder,\n PermissionType,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n PermissionValidatorConstraint,\n PermissionConstraint,\n CaveatSpecificationConstraint,\n Caveat,\n SubjectType,\n} from '@metamask/permission-controller';\nimport { SnapCaveatType } from '@metamask/snaps-utils';\nimport {\n assert,\n hasProperty,\n isObject,\n isPlainObject,\n Json,\n NonEmptyArray,\n} from '@metamask/utils';\nimport { ethErrors } from 'eth-rpc-errors';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.TransactionInsight;\n\ntype TransactionInsightEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: EndowmentGetterParams) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n validator: PermissionValidatorConstraint;\n}>;\n\n/**\n * `endowment:transaction-insight` returns nothing; it is intended to be used as a flag\n * by the extension to detect whether the snap has the capability to show information on the transaction confirmation screen.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the transaction-insight endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n TransactionInsightEndowmentSpecification\n> = (_builderOptions?: unknown) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: [SnapCaveatType.TransactionOrigin],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n validator: ({ caveats }) => {\n if (\n (caveats !== null && caveats?.length > 1) ||\n (caveats?.length === 1 &&\n caveats[0].type !== SnapCaveatType.TransactionOrigin)\n ) {\n throw ethErrors.rpc.invalidParams({\n message: `Expected a single \"${SnapCaveatType.TransactionOrigin}\" caveat.`,\n });\n }\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const transactionInsightEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n\n/**\n * Validates the type of the caveat value.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateCaveat(caveat: Caveat<string, any>): void {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat)) {\n throw ethErrors.rpc.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n\n assert(\n typeof value === 'boolean',\n 'Expected caveat value to have type \"boolean\"',\n );\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getTransactionInsightCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n if (\n !value ||\n !isObject(value) ||\n (isObject(value) && Object.keys(value).length === 0)\n ) {\n return { caveats: null };\n }\n return {\n caveats: [\n {\n type: SnapCaveatType.TransactionOrigin,\n value:\n hasProperty(value, 'allowTransactionOrigin') &&\n (value.allowTransactionOrigin as boolean),\n },\n ],\n };\n}\n\n/**\n * Getter function to get the transaction origin caveat from a permission.\n *\n * This does basic validation of the caveat, but does not validate the type or\n * value of the namespaces object itself, as this is handled by the\n * `PermissionsController` when the permission is requested.\n *\n * @param permission - The permission to get the transaction origin caveat from.\n * @returns The transaction origin, or `null` if the permission does not have a\n * transaction origin caveat.\n */\nexport function getTransactionOriginCaveat(\n permission?: PermissionConstraint,\n): boolean | null {\n if (!permission?.caveats) {\n return null;\n }\n\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.TransactionOrigin);\n\n const caveat = permission.caveats[0] as Caveat<string, boolean>;\n\n return caveat.value ?? null;\n}\n\nexport const transactionInsightCaveatSpecifications: Record<\n SnapCaveatType.TransactionOrigin,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.TransactionOrigin]: Object.freeze({\n type: SnapCaveatType.TransactionOrigin,\n validator: (caveat: Caveat<string, any>) => validateCaveat(caveat),\n }),\n};\n"]}
|
|
@@ -1,31 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.webAssemblyEndowmentBuilder = void 0;
|
|
4
|
-
const permission_controller_1 = require("@metamask/permission-controller");
|
|
5
|
-
const enum_1 = require("./enum");
|
|
6
|
-
const permissionName = enum_1.SnapEndowments.WebAssemblyAccess;
|
|
7
|
-
/**
|
|
8
|
-
* `endowment:webassembly` returns the name of global browser API(s) that
|
|
9
|
-
* enable access to the WebAssembly API.
|
|
10
|
-
* This is intended to populate the endowments of the SES Compartment
|
|
11
|
-
* in which a Snap executes.
|
|
12
|
-
*
|
|
13
|
-
* @param _builderOptions - Optional specification builder options.
|
|
14
|
-
* @returns The specification for the WebAssembly endowment.
|
|
15
|
-
*/
|
|
16
|
-
const specificationBuilder = (_builderOptions) => {
|
|
17
|
-
return {
|
|
18
|
-
permissionType: permission_controller_1.PermissionType.Endowment,
|
|
19
|
-
targetName: permissionName,
|
|
20
|
-
allowedCaveats: null,
|
|
21
|
-
endowmentGetter: (_getterOptions) => {
|
|
22
|
-
return ['WebAssembly'];
|
|
23
|
-
},
|
|
24
|
-
subjectTypes: [permission_controller_1.SubjectType.Snap],
|
|
25
|
-
};
|
|
26
|
-
};
|
|
27
|
-
exports.webAssemblyEndowmentBuilder = Object.freeze({
|
|
28
|
-
targetName: permissionName,
|
|
29
|
-
specificationBuilder,
|
|
30
|
-
});
|
|
31
|
-
//# sourceMappingURL=web-assembly.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"web-assembly.js","sourceRoot":"","sources":["../../../src/snaps/endowments/web-assembly.ts"],"names":[],"mappings":";;;AAAA,2EAMyC;AAEzC,iCAAwC;AAExC,MAAM,cAAc,GAAG,qBAAc,CAAC,iBAAiB,CAAC;AASxD;;;;;;;;GAQG;AACH,MAAM,oBAAoB,GAItB,CAAC,eAAqB,EAAE,EAAE;IAC5B,OAAO;QACL,cAAc,EAAE,sCAAc,CAAC,SAAS;QACxC,UAAU,EAAE,cAAc;QAC1B,cAAc,EAAE,IAAI;QACpB,eAAe,EAAE,CAAC,cAAsC,EAAE,EAAE;YAC1D,OAAO,CAAC,aAAa,CAAC,CAAC;QACzB,CAAC;QACD,YAAY,EAAE,CAAC,mCAAW,CAAC,IAAI,CAAC;KACjC,CAAC;AACJ,CAAC,CAAC;AAEW,QAAA,2BAA2B,GAAG,MAAM,CAAC,MAAM,CAAC;IACvD,UAAU,EAAE,cAAc;IAC1B,oBAAoB;CACZ,CAAC,CAAC","sourcesContent":["import {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n PermissionType,\n ValidPermissionSpecification,\n SubjectType,\n} from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.WebAssemblyAccess;\n\ntype WebAssemblyEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => ['WebAssembly'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:webassembly` returns the name of global browser API(s) that\n * enable access to the WebAssembly API.\n * This is intended to populate the endowments of the SES Compartment\n * in which a Snap executes.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the WebAssembly endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n WebAssemblyEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['WebAssembly'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const webAssemblyEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"]}
|
package/dist/snaps/index.js
DELETED
|
@@ -1,21 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
14
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
15
|
-
};
|
|
16
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
17
|
-
__exportStar(require("./SnapController"), exports);
|
|
18
|
-
__exportStar(require("./endowments"), exports);
|
|
19
|
-
__exportStar(require("./selectors"), exports);
|
|
20
|
-
__exportStar(require("./registry"), exports);
|
|
21
|
-
//# sourceMappingURL=index.js.map
|
package/dist/snaps/index.js.map
DELETED
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/snaps/index.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;AAAA,mDAAiC;AACjC,+CAA6B;AAC7B,8CAA4B;AAC5B,6CAA2B","sourcesContent":["export * from './SnapController';\nexport * from './endowments';\nexport * from './selectors';\nexport * from './registry';\n"]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"http.js","sourceRoot":"","sources":["../../../src/snaps/location/http.ts"],"names":[],"mappings":";;;AAAA,uDAQ+B;AAC/B,2CAAuD;AAYvD,MAAa,YAAY;IAoBvB,YAAY,GAAQ,EAAE,OAAoB,EAAE;QAnB5C,4EAA4E;QAC5E,mEAAmE;QACnE,EAAE;QACF,yCAAyC;QACzC,8DAA8D;QAC9D,uEAAuE;QACtD,UAAK,GAAG,IAAI,GAAG,EAG7B,CAAC;QAWF,IAAA,oBAAY,EAAC,GAAG,CAAC,QAAQ,EAAE,EAAE,8BAAgB,EAAE,mBAAmB,CAAC,CAAC;QACpE,IAAI,CAAC,OAAO,GAAG,IAAI,CAAC,KAAK,IAAI,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;QAC/D,IAAI,CAAC,YAAY,GAAG,IAAI,CAAC,YAAY,CAAC;QACtC,IAAI,CAAC,GAAG,GAAG,GAAG,CAAC;IACjB,CAAC;IAED,KAAK,CAAC,QAAQ;QACZ,IAAI,IAAI,CAAC,iBAAiB,EAAE;YAC1B,OAAO,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,CAAC;SACvC;QAED,2EAA2E;QAC3E,MAAM,aAAa,GAAG,IAAI,GAAG,CAC3B,8BAAgB,CAAC,QAAQ,EACzB,IAAI,CAAC,GAAG,CACT,CAAC,QAAQ,EAAE,CAAC;QAEb,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QACtE,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE;YAChB,MAAM,IAAI,KAAK,CACb,oBAAoB,aAAa,mBAAmB,QAAQ,CAAC,MAAM,GAAG,CACvE,CAAC;SACH;QACD,MAAM,QAAQ,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;QACvC,MAAM,QAAQ,GAAG,IAAA,uBAAS,EAAC,QAAQ,CAAC,CAAC;QACrC,MAAM,KAAK,GAAG,IAAI,yBAAW,CAAe;YAC1C,KAAK,EAAE,QAAQ;YACf,MAAM,EAAE,IAAA,gCAAkB,EAAC,QAAQ,CAAC;YACpC,IAAI,EAAE,8BAAgB,CAAC,QAAQ;YAC/B,IAAI,EAAE,EAAE,aAAa,EAAE;SACxB,CAAC,CAAC;QACH,IAAI,CAAC,iBAAiB,GAAG,KAAK,CAAC;QAE/B,OAAO,IAAI,CAAC,QAAQ,EAAE,CAAC;IACzB,CAAC;IAED,KAAK,CAAC,KAAK,CAAC,IAAY;QACtB,MAAM,YAAY,GAAG,IAAA,+BAAiB,EAAC,IAAI,CAAC,CAAC;QAC7C,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;QAC5C,IAAI,MAAM,KAAK,SAAS,EAAE;YACxB,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,MAAM,CAAC;YAClC,MAAM,KAAK,GAAG,IAAI,UAAU,CAAC,MAAM,QAAQ,CAAC,WAAW,EAAE,CAAC,CAAC;YAC3D,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC;YAC3B,KAAK,CAAC,KAAK,GAAG,KAAK,CAAC;YACpB,OAAO,KAAK,CAAC;SACd;QAED,MAAM,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,CAAC,QAAQ,EAAE,CAAC;QAChE,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,OAAO,CAAC,aAAa,EAAE,IAAI,CAAC,YAAY,CAAC,CAAC;QACtE,IAAI,CAAC,QAAQ,CAAC,EAAE,EAAE;YAChB,MAAM,IAAI,KAAK,CACb,oBAAoB,aAAa,mBAAmB,QAAQ,CAAC,MAAM,GAAG,CACvE,CAAC;SACH;QACD,MAAM,KAAK,GAAG,IAAI,yBAAW,CAAC;YAC5B,KAAK,EAAE,EAAE;YACT,IAAI,EAAE,YAAY;YAClB,IAAI,EAAE,EAAE,aAAa,EAAE;SACxB,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,MAAM,QAAQ,CAAC,IAAI,EAAE,CAAC;QACnC,IAAA,cAAM,EACJ,CAAC,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,YAAY,CAAC,EAC7B,iDAAiD,CAClD,CAAC;QACF,IAAI,CAAC,KAAK,CAAC,GAAG,CAAC,YAAY,EAAE,EAAE,IAAI,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,EAAE,CAAC,CAAC;QAE9D,OAAO,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC;IAClC,CAAC;IAED,IAAI,IAAI;QACN,OAAO,IAAI,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC3B,CAAC;IAEO,WAAW,CAAC,IAAY;QAC9B,IAAA,cAAM,EAAC,CAAC,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,+BAA+B,CAAC,CAAC;QAC/D,OAAO,IAAI,GAAG,CAAC,IAAI,EAAE,IAAI,CAAC,GAAG,CAAC,CAAC;IACjC,CAAC;CACF;AAlGD,oCAkGC","sourcesContent":["import {\n SnapManifest,\n VirtualFile,\n HttpSnapIdStruct,\n NpmSnapFileNames,\n createSnapManifest,\n normalizeRelative,\n parseJson,\n} from '@metamask/snaps-utils';\nimport { assert, assertStruct } from '@metamask/utils';\n\nimport { SnapLocation } from './location';\n\nexport interface HttpOptions {\n /**\n * @default fetch\n */\n fetch?: typeof fetch;\n fetchOptions?: RequestInit;\n}\n\nexport class HttpLocation implements SnapLocation {\n // We keep contents separate because then we can use only one Blob in cache,\n // which we convert to Uint8Array when actually returning the file.\n //\n // That avoids deepCloning file contents.\n // I imagine ArrayBuffers are copy-on-write optimized, meaning\n // in most often case we'll only have one file contents in common case.\n private readonly cache = new Map<\n string,\n { file: VirtualFile; contents: Blob }\n >();\n\n private validatedManifest?: VirtualFile<SnapManifest>;\n\n private readonly url: URL;\n\n private readonly fetchFn: typeof fetch;\n\n private readonly fetchOptions?: RequestInit;\n\n constructor(url: URL, opts: HttpOptions = {}) {\n assertStruct(url.toString(), HttpSnapIdStruct, 'Invalid Snap Id: ');\n this.fetchFn = opts.fetch ?? globalThis.fetch.bind(globalThis);\n this.fetchOptions = opts.fetchOptions;\n this.url = url;\n }\n\n async manifest(): Promise<VirtualFile<SnapManifest>> {\n if (this.validatedManifest) {\n return this.validatedManifest.clone();\n }\n\n // jest-fetch-mock doesn't handle new URL(), we need to convert .toString()\n const canonicalPath = new URL(\n NpmSnapFileNames.Manifest,\n this.url,\n ).toString();\n\n const response = await this.fetchFn(canonicalPath, this.fetchOptions);\n if (!response.ok) {\n throw new Error(\n `Failed to fetch \"${canonicalPath}\". Status code: ${response.status}.`,\n );\n }\n const contents = await response.text();\n const manifest = parseJson(contents);\n const vfile = new VirtualFile<SnapManifest>({\n value: contents,\n result: createSnapManifest(manifest),\n path: NpmSnapFileNames.Manifest,\n data: { canonicalPath },\n });\n this.validatedManifest = vfile;\n\n return this.manifest();\n }\n\n async fetch(path: string): Promise<VirtualFile> {\n const relativePath = normalizeRelative(path);\n const cached = this.cache.get(relativePath);\n if (cached !== undefined) {\n const { file, contents } = cached;\n const value = new Uint8Array(await contents.arrayBuffer());\n const vfile = file.clone();\n vfile.value = value;\n return vfile;\n }\n\n const canonicalPath = this.toCanonical(relativePath).toString();\n const response = await this.fetchFn(canonicalPath, this.fetchOptions);\n if (!response.ok) {\n throw new Error(\n `Failed to fetch \"${canonicalPath}\". Status code: ${response.status}.`,\n );\n }\n const vfile = new VirtualFile({\n value: '',\n path: relativePath,\n data: { canonicalPath },\n });\n const blob = await response.blob();\n assert(\n !this.cache.has(relativePath),\n 'Corrupted cache, multiple files with same path.',\n );\n this.cache.set(relativePath, { file: vfile, contents: blob });\n\n return this.fetch(relativePath);\n }\n\n get root(): URL {\n return new URL(this.url);\n }\n\n private toCanonical(path: string): URL {\n assert(!path.startsWith('/'), 'Tried to parse absolute path.');\n return new URL(path, this.url);\n }\n}\n"]}
|