@metamask/snaps-rpc-methods 4.1.0 → 6.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (144) hide show
  1. package/CHANGELOG.md +24 -2
  2. package/dist/cjs/endowments/caveats/generic.js +40 -0
  3. package/dist/cjs/endowments/caveats/generic.js.map +1 -0
  4. package/dist/cjs/endowments/caveats/index.js +21 -0
  5. package/dist/cjs/endowments/caveats/index.js.map +1 -0
  6. package/dist/cjs/endowments/caveats/requestTime.js +99 -0
  7. package/dist/cjs/endowments/caveats/requestTime.js.map +1 -0
  8. package/dist/cjs/endowments/cronjob.js +100 -0
  9. package/dist/cjs/endowments/cronjob.js.map +1 -0
  10. package/dist/cjs/endowments/enum.js +26 -0
  11. package/dist/cjs/endowments/enum.js.map +1 -0
  12. package/dist/cjs/endowments/ethereum-provider.js +43 -0
  13. package/dist/cjs/endowments/ethereum-provider.js.map +1 -0
  14. package/dist/cjs/endowments/home-page.js +37 -0
  15. package/dist/cjs/endowments/home-page.js.map +1 -0
  16. package/dist/cjs/endowments/index.js +121 -0
  17. package/dist/cjs/endowments/index.js.map +1 -0
  18. package/dist/cjs/endowments/keyring.js +104 -0
  19. package/dist/cjs/endowments/keyring.js.map +1 -0
  20. package/dist/cjs/endowments/lifecycle-hooks.js +37 -0
  21. package/dist/cjs/endowments/lifecycle-hooks.js.map +1 -0
  22. package/dist/cjs/endowments/name-lookup.js +148 -0
  23. package/dist/cjs/endowments/name-lookup.js.map +1 -0
  24. package/dist/cjs/endowments/network-access.js +44 -0
  25. package/dist/cjs/endowments/network-access.js.map +1 -0
  26. package/dist/cjs/endowments/rpc.js +103 -0
  27. package/dist/cjs/endowments/rpc.js.map +1 -0
  28. package/dist/cjs/endowments/signature-insight.js +110 -0
  29. package/dist/cjs/endowments/signature-insight.js.map +1 -0
  30. package/dist/cjs/endowments/transaction-insight.js +111 -0
  31. package/dist/cjs/endowments/transaction-insight.js.map +1 -0
  32. package/dist/cjs/endowments/web-assembly.js +42 -0
  33. package/dist/cjs/endowments/web-assembly.js.map +1 -0
  34. package/dist/cjs/index.js +3 -1
  35. package/dist/cjs/index.js.map +1 -1
  36. package/dist/cjs/permissions.js +62 -0
  37. package/dist/cjs/permissions.js.map +1 -0
  38. package/dist/cjs/permitted/createInterface.js +68 -0
  39. package/dist/cjs/permitted/createInterface.js.map +1 -0
  40. package/dist/cjs/permitted/getClientStatus.js +40 -0
  41. package/dist/cjs/permitted/getClientStatus.js.map +1 -0
  42. package/dist/cjs/permitted/getFile.js +1 -1
  43. package/dist/cjs/permitted/getFile.js.map +1 -1
  44. package/dist/cjs/permitted/getInterfaceState.js +67 -0
  45. package/dist/cjs/permitted/getInterfaceState.js.map +1 -0
  46. package/dist/cjs/permitted/handlers.js +9 -1
  47. package/dist/cjs/permitted/handlers.js.map +1 -1
  48. package/dist/cjs/permitted/index.js.map +1 -1
  49. package/dist/cjs/permitted/invokeKeyring.js +2 -3
  50. package/dist/cjs/permitted/invokeKeyring.js.map +1 -1
  51. package/dist/cjs/permitted/updateInterface.js +70 -0
  52. package/dist/cjs/permitted/updateInterface.js.map +1 -0
  53. package/dist/cjs/restricted/dialog.js +51 -24
  54. package/dist/cjs/restricted/dialog.js.map +1 -1
  55. package/dist/cjs/restricted/index.js +3 -0
  56. package/dist/cjs/restricted/index.js.map +1 -1
  57. package/dist/cjs/restricted/manageState.js +4 -13
  58. package/dist/cjs/restricted/manageState.js.map +1 -1
  59. package/dist/esm/endowments/caveats/generic.js +40 -0
  60. package/dist/esm/endowments/caveats/generic.js.map +1 -0
  61. package/dist/esm/endowments/caveats/index.js +4 -0
  62. package/dist/esm/endowments/caveats/index.js.map +1 -0
  63. package/dist/esm/endowments/caveats/requestTime.js +93 -0
  64. package/dist/esm/endowments/caveats/requestTime.js.map +1 -0
  65. package/dist/esm/endowments/cronjob.js +99 -0
  66. package/dist/esm/endowments/cronjob.js.map +1 -0
  67. package/dist/esm/endowments/enum.js +16 -0
  68. package/dist/esm/endowments/enum.js.map +1 -0
  69. package/dist/esm/endowments/ethereum-provider.js +33 -0
  70. package/dist/esm/endowments/ethereum-provider.js.map +1 -0
  71. package/dist/esm/endowments/home-page.js +27 -0
  72. package/dist/esm/endowments/home-page.js.map +1 -0
  73. package/dist/esm/endowments/index.js +68 -0
  74. package/dist/esm/endowments/index.js.map +1 -0
  75. package/dist/esm/endowments/keyring.js +95 -0
  76. package/dist/esm/endowments/keyring.js.map +1 -0
  77. package/dist/esm/endowments/lifecycle-hooks.js +27 -0
  78. package/dist/esm/endowments/lifecycle-hooks.js.map +1 -0
  79. package/dist/esm/endowments/name-lookup.js +146 -0
  80. package/dist/esm/endowments/name-lookup.js.map +1 -0
  81. package/dist/esm/endowments/network-access.js +34 -0
  82. package/dist/esm/endowments/network-access.js.map +1 -0
  83. package/dist/esm/endowments/rpc.js +92 -0
  84. package/dist/esm/endowments/rpc.js.map +1 -0
  85. package/dist/esm/endowments/signature-insight.js +103 -0
  86. package/dist/esm/endowments/signature-insight.js.map +1 -0
  87. package/dist/esm/endowments/transaction-insight.js +104 -0
  88. package/dist/esm/endowments/transaction-insight.js.map +1 -0
  89. package/dist/esm/endowments/web-assembly.js +32 -0
  90. package/dist/esm/endowments/web-assembly.js.map +1 -0
  91. package/dist/esm/index.js +3 -1
  92. package/dist/esm/index.js.map +1 -1
  93. package/dist/esm/permissions.js +51 -0
  94. package/dist/esm/permissions.js.map +1 -0
  95. package/dist/esm/permitted/createInterface.js +58 -0
  96. package/dist/esm/permitted/createInterface.js.map +1 -0
  97. package/dist/esm/permitted/getClientStatus.js +32 -0
  98. package/dist/esm/permitted/getClientStatus.js.map +1 -0
  99. package/dist/esm/permitted/getFile.js +1 -1
  100. package/dist/esm/permitted/getFile.js.map +1 -1
  101. package/dist/esm/permitted/getInterfaceState.js +57 -0
  102. package/dist/esm/permitted/getInterfaceState.js.map +1 -0
  103. package/dist/esm/permitted/handlers.js +9 -1
  104. package/dist/esm/permitted/handlers.js.map +1 -1
  105. package/dist/esm/permitted/index.js.map +1 -1
  106. package/dist/esm/permitted/invokeKeyring.js +2 -3
  107. package/dist/esm/permitted/invokeKeyring.js.map +1 -1
  108. package/dist/esm/permitted/updateInterface.js +60 -0
  109. package/dist/esm/permitted/updateInterface.js.map +1 -0
  110. package/dist/esm/restricted/dialog.js +55 -29
  111. package/dist/esm/restricted/dialog.js.map +1 -1
  112. package/dist/esm/restricted/index.js +1 -0
  113. package/dist/esm/restricted/index.js.map +1 -1
  114. package/dist/esm/restricted/manageState.js +1 -1
  115. package/dist/esm/restricted/manageState.js.map +1 -1
  116. package/dist/types/endowments/caveats/generic.d.ts +19 -0
  117. package/dist/types/endowments/caveats/index.d.ts +2 -0
  118. package/dist/types/endowments/caveats/requestTime.d.ts +29 -0
  119. package/dist/types/endowments/cronjob.d.ts +51 -0
  120. package/dist/types/endowments/enum.d.ts +13 -0
  121. package/dist/types/endowments/ethereum-provider.d.ts +14 -0
  122. package/dist/types/endowments/home-page.d.ts +15 -0
  123. package/dist/types/endowments/index.d.ts +131 -0
  124. package/dist/types/endowments/keyring.d.ts +39 -0
  125. package/dist/types/endowments/lifecycle-hooks.d.ts +15 -0
  126. package/dist/types/endowments/name-lookup.d.ts +49 -0
  127. package/dist/types/endowments/network-access.d.ts +14 -0
  128. package/dist/types/endowments/rpc.d.ts +38 -0
  129. package/dist/types/endowments/signature-insight.d.ts +39 -0
  130. package/dist/types/endowments/transaction-insight.d.ts +39 -0
  131. package/dist/types/endowments/web-assembly.d.ts +14 -0
  132. package/dist/types/index.d.ts +4 -2
  133. package/dist/types/permissions.d.ts +16 -0
  134. package/dist/types/permitted/createInterface.d.ts +150 -0
  135. package/dist/types/permitted/getClientStatus.d.ts +13 -0
  136. package/dist/types/permitted/getInterfaceState.d.ts +18 -0
  137. package/dist/types/permitted/handlers.d.ts +5 -1
  138. package/dist/types/permitted/index.d.ts +5 -1
  139. package/dist/types/permitted/invokeKeyring.d.ts +3 -3
  140. package/dist/types/permitted/updateInterface.d.ts +152 -0
  141. package/dist/types/restricted/dialog.d.ts +776 -14
  142. package/dist/types/restricted/index.d.ts +1 -0
  143. package/dist/types/restricted/manageState.d.ts +18 -0
  144. package/package.json +8 -8
package/CHANGELOG.md CHANGED
@@ -6,6 +6,26 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
6
6
 
7
7
  ## [Unreleased]
8
8
 
9
+ ## [6.0.0]
10
+ ### Added
11
+ - **BREAKING:** Add support for dynamic user interfaces ([#1465](https://github.com/MetaMask/snaps/pull/1465), [#2144](https://github.com/MetaMask/snaps/pull/2144), [#2143](https://github.com/MetaMask/snaps/pull/2143))
12
+ - This adds the `snap_createInterface`, `snap_updateInterface`, and `snap_getInterfaceState` methods.
13
+ - This is breaking because it changes the expected type of the `showDialog` RPC method hook.
14
+ - **BREAKING:** Update the permission format for the name lookup endowment ([#2113](https://github.com/MetaMask/snaps/pull/2113))
15
+ - The new format is documented in [SIP-12](https://metamask.github.io/SIPs/SIPS/sip-12).
16
+ - Add endowment permission specifications to this package ([#2155](https://github.com/MetaMask/snaps/pull/2155))
17
+
18
+ ### Changed
19
+ - Bump MetaMask dependencies ([#2129](https://github.com/MetaMask/snaps/pull/2129), [#2142](https://github.com/MetaMask/snaps/pull/2142))
20
+
21
+ ## [5.0.0]
22
+ ### Added
23
+ - Add `snap_getClientStatus` ([#2051](https://github.com/MetaMask/snaps/pull/2051))
24
+
25
+ ### Changed
26
+ - **BREAKING:** Use origin bound hooks for `invokeKeyring` ([#2090](https://github.com/MetaMask/snaps/pull/2090))
27
+ - Bump several MetaMask dependencies ([#2069](https://github.com/MetaMask/snaps/pull/2069), [#2100](https://github.com/MetaMask/snaps/pull/2100))
28
+
9
29
  ## [4.1.0]
10
30
  ### Added
11
31
  - Add `wallet_getAllSnaps` method to get all installed Snaps ([#2047](https://github.com/MetaMask/snaps/pull/2047))
@@ -80,7 +100,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
80
100
  ## [0.38.0-flask.1]
81
101
  ### Added
82
102
  - Add `snap_getLocale` JSON-RPC method ([#1557](https://github.com/MetaMask/snaps/pull/1557))
83
- - This will let snaps get the user locale from the client.
103
+ - This will let snaps get the user locale from the client.
84
104
 
85
105
  ### Fixed
86
106
  - Fix ed25519 public key derivation ([#1678](https://github.com/MetaMask/snaps/pull/1678))
@@ -91,7 +111,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
91
111
  - The version of the package no longer needs to match the version of all other
92
112
  MetaMask Snaps packages.
93
113
 
94
- [Unreleased]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.1.0...HEAD
114
+ [Unreleased]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@6.0.0...HEAD
115
+ [6.0.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@5.0.0...@metamask/snaps-rpc-methods@6.0.0
116
+ [5.0.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.1.0...@metamask/snaps-rpc-methods@5.0.0
95
117
  [4.1.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.3...@metamask/snaps-rpc-methods@4.1.0
96
118
  [4.0.3]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.2...@metamask/snaps-rpc-methods@4.0.3
97
119
  [4.0.2]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.1...@metamask/snaps-rpc-methods@4.0.2
@@ -0,0 +1,40 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ Object.defineProperty(exports, "createGenericPermissionValidator", {
6
+ enumerable: true,
7
+ get: function() {
8
+ return createGenericPermissionValidator;
9
+ }
10
+ });
11
+ const _rpcerrors = require("@metamask/rpc-errors");
12
+ function createGenericPermissionValidator(caveatsToValidate) {
13
+ const validCaveatTypes = new Set(caveatsToValidate.map((caveat)=>caveat.type));
14
+ const requiredCaveats = caveatsToValidate.filter((caveat)=>!caveat.optional);
15
+ return function({ caveats }) {
16
+ const actualCaveats = caveats ?? [];
17
+ const passedCaveatTypes = actualCaveats.map((caveat)=>caveat.type);
18
+ const passedCaveatsSet = new Set(passedCaveatTypes);
19
+ // Disallow duplicates
20
+ if (passedCaveatsSet.size !== passedCaveatTypes.length) {
21
+ throw _rpcerrors.rpcErrors.invalidParams({
22
+ message: 'Duplicate caveats are not allowed.'
23
+ });
24
+ }
25
+ // Disallow caveats that don't match expected types
26
+ if (!actualCaveats.every((caveat)=>validCaveatTypes.has(caveat.type))) {
27
+ throw _rpcerrors.rpcErrors.invalidParams({
28
+ message: `Expected the following caveats: ${caveatsToValidate.map((caveat)=>`"${caveat.type}"`).join(', ')}, received ${actualCaveats.map((caveat)=>`"${caveat.type}"`).join(', ')}.`
29
+ });
30
+ }
31
+ // Fail if not all required caveats are specified
32
+ if (!requiredCaveats.every((caveat)=>passedCaveatsSet.has(caveat.type))) {
33
+ throw _rpcerrors.rpcErrors.invalidParams({
34
+ message: `Expected the following caveats: ${requiredCaveats.map((caveat)=>`"${caveat.type}"`).join(', ')}.`
35
+ });
36
+ }
37
+ };
38
+ }
39
+
40
+ //# sourceMappingURL=generic.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../../src/endowments/caveats/generic.ts"],"sourcesContent":["import type {\n PermissionConstraint,\n PermissionValidatorConstraint,\n} from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport type { Json } from '@metamask/utils';\n\nexport type CaveatMapperReturnValue = Pick<PermissionConstraint, 'caveats'>;\n\nexport type CaveatMapperFunction = (value: Json) => CaveatMapperReturnValue;\n\n/**\n * Create a generic permission validator that validates the presence of certain caveats.\n *\n * This validator only validates the types of the caveats, not the values.\n *\n * @param caveatsToValidate - A list of objects that represent caveats.\n * @param caveatsToValidate.type - The string defining the caveat type.\n * @param caveatsToValidate.optional - An optional boolean flag that defines\n * whether the caveat is optional or not.\n * @returns A function that validates a permission.\n */\nexport function createGenericPermissionValidator(\n caveatsToValidate: {\n type: string;\n optional?: boolean;\n }[],\n): PermissionValidatorConstraint {\n const validCaveatTypes = new Set(\n caveatsToValidate.map((caveat) => caveat.type),\n );\n const requiredCaveats = caveatsToValidate.filter(\n (caveat) => !caveat.optional,\n );\n\n return function ({ caveats }) {\n const actualCaveats = caveats ?? [];\n const passedCaveatTypes = actualCaveats.map((caveat) => caveat.type);\n const passedCaveatsSet = new Set(passedCaveatTypes);\n\n // Disallow duplicates\n if (passedCaveatsSet.size !== passedCaveatTypes.length) {\n throw rpcErrors.invalidParams({\n message: 'Duplicate caveats are not allowed.',\n });\n }\n\n // Disallow caveats that don't match expected types\n if (!actualCaveats.every((caveat) => validCaveatTypes.has(caveat.type))) {\n throw rpcErrors.invalidParams({\n message: `Expected the following caveats: ${caveatsToValidate\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}, received ${actualCaveats\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}.`,\n });\n }\n\n // Fail if not all required caveats are specified\n if (!requiredCaveats.every((caveat) => passedCaveatsSet.has(caveat.type))) {\n throw rpcErrors.invalidParams({\n message: `Expected the following caveats: ${requiredCaveats\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}.`,\n });\n }\n };\n}\n"],"names":["createGenericPermissionValidator","caveatsToValidate","validCaveatTypes","Set","map","caveat","type","requiredCaveats","filter","optional","caveats","actualCaveats","passedCaveatTypes","passedCaveatsSet","size","length","rpcErrors","invalidParams","message","every","has","join"],"mappings":";;;;+BAsBgBA;;;eAAAA;;;2BAlBU;AAkBnB,SAASA,iCACdC,iBAGG;IAEH,MAAMC,mBAAmB,IAAIC,IAC3BF,kBAAkBG,GAAG,CAAC,CAACC,SAAWA,OAAOC,IAAI;IAE/C,MAAMC,kBAAkBN,kBAAkBO,MAAM,CAC9C,CAACH,SAAW,CAACA,OAAOI,QAAQ;IAG9B,OAAO,SAAU,EAAEC,OAAO,EAAE;QAC1B,MAAMC,gBAAgBD,WAAW,EAAE;QACnC,MAAME,oBAAoBD,cAAcP,GAAG,CAAC,CAACC,SAAWA,OAAOC,IAAI;QACnE,MAAMO,mBAAmB,IAAIV,IAAIS;QAEjC,sBAAsB;QACtB,IAAIC,iBAAiBC,IAAI,KAAKF,kBAAkBG,MAAM,EAAE;YACtD,MAAMC,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS;YACX;QACF;QAEA,mDAAmD;QACnD,IAAI,CAACP,cAAcQ,KAAK,CAAC,CAACd,SAAWH,iBAAiBkB,GAAG,CAACf,OAAOC,IAAI,IAAI;YACvE,MAAMU,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS,CAAC,gCAAgC,EAAEjB,kBACzCG,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,WAAW,EAAEV,cACxBP,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,CAAC,CAAC;YAClB;QACF;QAEA,iDAAiD;QACjD,IAAI,CAACd,gBAAgBY,KAAK,CAAC,CAACd,SAAWQ,iBAAiBO,GAAG,CAACf,OAAOC,IAAI,IAAI;YACzE,MAAMU,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS,CAAC,gCAAgC,EAAEX,gBACzCH,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,CAAC,CAAC;YAClB;QACF;IACF;AACF"}
@@ -0,0 +1,21 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ _export_star(require("./generic"), exports);
6
+ _export_star(require("./requestTime"), exports);
7
+ function _export_star(from, to) {
8
+ Object.keys(from).forEach(function(k) {
9
+ if (k !== "default" && !Object.prototype.hasOwnProperty.call(to, k)) {
10
+ Object.defineProperty(to, k, {
11
+ enumerable: true,
12
+ get: function() {
13
+ return from[k];
14
+ }
15
+ });
16
+ }
17
+ });
18
+ return from;
19
+ }
20
+
21
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../../src/endowments/caveats/index.ts"],"sourcesContent":["export * from './generic';\nexport * from './requestTime';\n"],"names":[],"mappings":";;;;qBAAc;qBACA"}
@@ -0,0 +1,99 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ function _export(target, all) {
6
+ for(var name in all)Object.defineProperty(target, name, {
7
+ enumerable: true,
8
+ get: all[name]
9
+ });
10
+ }
11
+ _export(exports, {
12
+ getMaxRequestTimeCaveatMapper: function() {
13
+ return getMaxRequestTimeCaveatMapper;
14
+ },
15
+ createMaxRequestTimeMapper: function() {
16
+ return createMaxRequestTimeMapper;
17
+ },
18
+ getMaxRequestTimeCaveat: function() {
19
+ return getMaxRequestTimeCaveat;
20
+ },
21
+ maxRequestTimeCaveatSpecifications: function() {
22
+ return maxRequestTimeCaveatSpecifications;
23
+ }
24
+ });
25
+ const _rpcerrors = require("@metamask/rpc-errors");
26
+ const _snapsutils = require("@metamask/snaps-utils");
27
+ const _utils = require("@metamask/utils");
28
+ /**
29
+ * Asserts that the given value is a valid `maxRequestTime` value.
30
+ *
31
+ * @param value - The value to assert.
32
+ * @param ErrorWrapper - An optional error wrapper to use. Defaults to
33
+ * {@link AssertionError}.
34
+ * @throws If the value is not a valid `maxRequestTime` value.
35
+ */ function assertIsMaxRequestTime(value, ErrorWrapper) {
36
+ (0, _utils.assertStruct)(value, _snapsutils.MaxRequestTimeStruct, 'Invalid maxRequestTime', ErrorWrapper);
37
+ }
38
+ /**
39
+ * Validate the value of a caveat. This does not validate the type of the
40
+ * caveat itself, only the value of the caveat.
41
+ *
42
+ * @param caveat - The caveat to validate.
43
+ * @throws If the caveat value is invalid.
44
+ */ function validateMaxRequestTimeCaveat(caveat) {
45
+ if (!(0, _utils.hasProperty)(caveat, 'value')) {
46
+ throw _rpcerrors.rpcErrors.invalidParams({
47
+ message: 'Invalid maxRequestTime caveat.'
48
+ });
49
+ }
50
+ const { value } = caveat;
51
+ assertIsMaxRequestTime(value, _rpcerrors.rpcErrors.invalidParams);
52
+ }
53
+ function getMaxRequestTimeCaveatMapper(value) {
54
+ if (!value || !(0, _utils.isObject)(value) || (0, _utils.isObject)(value) && !(0, _utils.hasProperty)(value, 'maxRequestTime')) {
55
+ return {
56
+ caveats: null
57
+ };
58
+ }
59
+ return {
60
+ caveats: [
61
+ {
62
+ type: _snapsutils.SnapCaveatType.MaxRequestTime,
63
+ value: value.maxRequestTime
64
+ }
65
+ ]
66
+ };
67
+ }
68
+ function createMaxRequestTimeMapper(mapper) {
69
+ return function(value) {
70
+ // We assume this to be used only with caveats of this type
71
+ const { maxRequestTime, ...rest } = value;
72
+ const mapperResult = mapper(rest);
73
+ if (!maxRequestTime) {
74
+ return mapperResult;
75
+ }
76
+ return {
77
+ ...mapperResult,
78
+ caveats: [
79
+ ...mapperResult.caveats ?? [],
80
+ {
81
+ type: _snapsutils.SnapCaveatType.MaxRequestTime,
82
+ value: maxRequestTime
83
+ }
84
+ ]
85
+ };
86
+ };
87
+ }
88
+ function getMaxRequestTimeCaveat(permission) {
89
+ const foundCaveat = permission?.caveats?.find((caveat)=>caveat.type === _snapsutils.SnapCaveatType.MaxRequestTime);
90
+ return (foundCaveat?.value) ?? null;
91
+ }
92
+ const maxRequestTimeCaveatSpecifications = {
93
+ [_snapsutils.SnapCaveatType.MaxRequestTime]: Object.freeze({
94
+ type: _snapsutils.SnapCaveatType.MaxRequestTime,
95
+ validator: (caveat)=>validateMaxRequestTimeCaveat(caveat)
96
+ })
97
+ };
98
+
99
+ //# sourceMappingURL=requestTime.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../../src/endowments/caveats/requestTime.ts"],"sourcesContent":["import type {\n Caveat,\n CaveatSpecificationConstraint,\n PermissionConstraint,\n} from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport { MaxRequestTimeStruct, SnapCaveatType } from '@metamask/snaps-utils';\nimport type { AssertionErrorConstructor, Json } from '@metamask/utils';\nimport { assertStruct, hasProperty, isObject } from '@metamask/utils';\n\nimport type { CaveatMapperFunction, CaveatMapperReturnValue } from './generic';\n\n/**\n * Asserts that the given value is a valid `maxRequestTime` value.\n *\n * @param value - The value to assert.\n * @param ErrorWrapper - An optional error wrapper to use. Defaults to\n * {@link AssertionError}.\n * @throws If the value is not a valid `maxRequestTime` value.\n */\nfunction assertIsMaxRequestTime(\n value: unknown, // eslint-disable-next-line @typescript-eslint/naming-convention\n ErrorWrapper?: AssertionErrorConstructor,\n): asserts value is number {\n assertStruct(\n value,\n MaxRequestTimeStruct,\n 'Invalid maxRequestTime',\n ErrorWrapper,\n );\n}\n\n/**\n * Validate the value of a caveat. This does not validate the type of the\n * caveat itself, only the value of the caveat.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateMaxRequestTimeCaveat(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value')) {\n throw rpcErrors.invalidParams({\n message: 'Invalid maxRequestTime caveat.',\n });\n }\n\n const { value } = caveat;\n assertIsMaxRequestTime(value, rpcErrors.invalidParams);\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getMaxRequestTimeCaveatMapper(\n value: Json,\n): CaveatMapperReturnValue {\n if (\n !value ||\n !isObject(value) ||\n (isObject(value) && !hasProperty(value, 'maxRequestTime'))\n ) {\n return { caveats: null };\n }\n return {\n caveats: [\n {\n type: SnapCaveatType.MaxRequestTime,\n value: value.maxRequestTime,\n },\n ],\n };\n}\n\n/**\n * Creates a wrapping caveat mapper that creates the `maxRequestTime` caveat\n * and merges it with any other caveats created by the mapper function.\n *\n * @param mapper - Another caveat mapper function.\n * @returns The caveat specification.\n */\nexport function createMaxRequestTimeMapper(\n mapper: CaveatMapperFunction,\n): CaveatMapperFunction {\n return function (value: Json) {\n // We assume this to be used only with caveats of this type\n const { maxRequestTime, ...rest } = value as Record<string, Json>;\n\n const mapperResult = mapper(rest);\n\n if (!maxRequestTime) {\n return mapperResult;\n }\n\n return {\n ...mapperResult,\n caveats: [\n ...(mapperResult.caveats ?? []),\n {\n type: SnapCaveatType.MaxRequestTime,\n value: maxRequestTime,\n },\n ],\n };\n };\n}\n\n/**\n * Getter function to get the {@link MaxRequestTime} caveat value from a permission if specified.\n *\n * @param permission - The permission to get the caveat value from.\n * @returns The caveat value if present, otherwise null.\n */\nexport function getMaxRequestTimeCaveat(\n permission?: PermissionConstraint,\n): number | null {\n const foundCaveat = permission?.caveats?.find(\n (caveat) => caveat.type === SnapCaveatType.MaxRequestTime,\n );\n return (foundCaveat?.value as number) ?? null;\n}\n\nexport const maxRequestTimeCaveatSpecifications: Record<\n SnapCaveatType.MaxRequestTime,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.MaxRequestTime]: Object.freeze({\n type: SnapCaveatType.MaxRequestTime,\n validator: (caveat: Caveat<string, any>) =>\n validateMaxRequestTimeCaveat(caveat),\n }),\n};\n"],"names":["getMaxRequestTimeCaveatMapper","createMaxRequestTimeMapper","getMaxRequestTimeCaveat","maxRequestTimeCaveatSpecifications","assertIsMaxRequestTime","value","ErrorWrapper","assertStruct","MaxRequestTimeStruct","validateMaxRequestTimeCaveat","caveat","hasProperty","rpcErrors","invalidParams","message","isObject","caveats","type","SnapCaveatType","MaxRequestTime","maxRequestTime","mapper","rest","mapperResult","permission","foundCaveat","find","Object","freeze","validator"],"mappings":";;;;;;;;;;;IA0DgBA,6BAA6B;eAA7BA;;IA2BAC,0BAA0B;eAA1BA;;IAgCAC,uBAAuB;eAAvBA;;IASHC,kCAAkC;eAAlCA;;;2BAzHa;4BAC2B;uBAED;AAIpD;;;;;;;CAOC,GACD,SAASC,uBACPC,KAAc,EACdC,YAAwC;IAExCC,IAAAA,mBAAY,EACVF,OACAG,gCAAoB,EACpB,0BACAF;AAEJ;AAEA;;;;;;CAMC,GACD,SAASG,6BAA6BC,MAA2B;IAC/D,IAAI,CAACC,IAAAA,kBAAW,EAACD,QAAQ,UAAU;QACjC,MAAME,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,MAAM,EAAET,KAAK,EAAE,GAAGK;IAClBN,uBAAuBC,OAAOO,oBAAS,CAACC,aAAa;AACvD;AAUO,SAASb,8BACdK,KAAW;IAEX,IACE,CAACA,SACD,CAACU,IAAAA,eAAQ,EAACV,UACTU,IAAAA,eAAQ,EAACV,UAAU,CAACM,IAAAA,kBAAW,EAACN,OAAO,mBACxC;QACA,OAAO;YAAEW,SAAS;QAAK;IACzB;IACA,OAAO;QACLA,SAAS;YACP;gBACEC,MAAMC,0BAAc,CAACC,cAAc;gBACnCd,OAAOA,MAAMe,cAAc;YAC7B;SACD;IACH;AACF;AASO,SAASnB,2BACdoB,MAA4B;IAE5B,OAAO,SAAUhB,KAAW;QAC1B,2DAA2D;QAC3D,MAAM,EAAEe,cAAc,EAAE,GAAGE,MAAM,GAAGjB;QAEpC,MAAMkB,eAAeF,OAAOC;QAE5B,IAAI,CAACF,gBAAgB;YACnB,OAAOG;QACT;QAEA,OAAO;YACL,GAAGA,YAAY;YACfP,SAAS;mBACHO,aAAaP,OAAO,IAAI,EAAE;gBAC9B;oBACEC,MAAMC,0BAAc,CAACC,cAAc;oBACnCd,OAAOe;gBACT;aACD;QACH;IACF;AACF;AAQO,SAASlB,wBACdsB,UAAiC;IAEjC,MAAMC,cAAcD,YAAYR,SAASU,KACvC,CAAChB,SAAWA,OAAOO,IAAI,KAAKC,0BAAc,CAACC,cAAc;IAE3D,OAAO,CAACM,aAAapB,KAAe,KAAK;AAC3C;AAEO,MAAMF,qCAGT;IACF,CAACe,0BAAc,CAACC,cAAc,CAAC,EAAEQ,OAAOC,MAAM,CAAC;QAC7CX,MAAMC,0BAAc,CAACC,cAAc;QACnCU,WAAW,CAACnB,SACVD,6BAA6BC;IACjC;AACF"}
@@ -0,0 +1,100 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ function _export(target, all) {
6
+ for(var name in all)Object.defineProperty(target, name, {
7
+ enumerable: true,
8
+ get: all[name]
9
+ });
10
+ }
11
+ _export(exports, {
12
+ cronjobEndowmentBuilder: function() {
13
+ return cronjobEndowmentBuilder;
14
+ },
15
+ getCronjobCaveatMapper: function() {
16
+ return getCronjobCaveatMapper;
17
+ },
18
+ getCronjobCaveatJobs: function() {
19
+ return getCronjobCaveatJobs;
20
+ },
21
+ validateCronjobCaveat: function() {
22
+ return validateCronjobCaveat;
23
+ },
24
+ cronjobCaveatSpecifications: function() {
25
+ return cronjobCaveatSpecifications;
26
+ }
27
+ });
28
+ const _permissioncontroller = require("@metamask/permission-controller");
29
+ const _rpcerrors = require("@metamask/rpc-errors");
30
+ const _snapsutils = require("@metamask/snaps-utils");
31
+ const _utils = require("@metamask/utils");
32
+ const _enum = require("./enum");
33
+ const permissionName = _enum.SnapEndowments.Cronjob;
34
+ /**
35
+ * `endowment:cronjob` returns nothing; it is intended to be used as a flag to determine whether the snap wants to run cronjobs.
36
+ *
37
+ * @param _builderOptions - Optional specification builder options.
38
+ * @returns The specification for the cronjob endowment.
39
+ */ const specificationBuilder = (_builderOptions)=>{
40
+ return {
41
+ permissionType: _permissioncontroller.PermissionType.Endowment,
42
+ targetName: permissionName,
43
+ allowedCaveats: [
44
+ _snapsutils.SnapCaveatType.SnapCronjob
45
+ ],
46
+ endowmentGetter: (_getterOptions)=>undefined,
47
+ subjectTypes: [
48
+ _permissioncontroller.SubjectType.Snap
49
+ ]
50
+ };
51
+ };
52
+ const cronjobEndowmentBuilder = Object.freeze({
53
+ targetName: permissionName,
54
+ specificationBuilder
55
+ });
56
+ function getCronjobCaveatMapper(value) {
57
+ return {
58
+ caveats: [
59
+ {
60
+ type: _snapsutils.SnapCaveatType.SnapCronjob,
61
+ value
62
+ }
63
+ ]
64
+ };
65
+ }
66
+ function getCronjobCaveatJobs(permission) {
67
+ if (!permission?.caveats) {
68
+ return null;
69
+ }
70
+ (0, _utils.assert)(permission.caveats.length === 1);
71
+ (0, _utils.assert)(permission.caveats[0].type === _snapsutils.SnapCaveatType.SnapCronjob);
72
+ const caveat = permission.caveats[0];
73
+ return (caveat.value?.jobs) ?? null;
74
+ }
75
+ function validateCronjobCaveat(caveat) {
76
+ if (!(0, _utils.hasProperty)(caveat, 'value') || !(0, _utils.isPlainObject)(caveat.value)) {
77
+ throw _rpcerrors.rpcErrors.invalidParams({
78
+ message: 'Expected a plain object.'
79
+ });
80
+ }
81
+ const { value } = caveat;
82
+ if (!(0, _utils.hasProperty)(value, 'jobs') || !(0, _utils.isPlainObject)(value)) {
83
+ throw _rpcerrors.rpcErrors.invalidParams({
84
+ message: 'Expected a plain object.'
85
+ });
86
+ }
87
+ if (!(0, _snapsutils.isCronjobSpecificationArray)(value.jobs)) {
88
+ throw _rpcerrors.rpcErrors.invalidParams({
89
+ message: 'Expected a valid cronjob specification array.'
90
+ });
91
+ }
92
+ }
93
+ const cronjobCaveatSpecifications = {
94
+ [_snapsutils.SnapCaveatType.SnapCronjob]: Object.freeze({
95
+ type: _snapsutils.SnapCaveatType.SnapCronjob,
96
+ validator: (caveat)=>validateCronjobCaveat(caveat)
97
+ })
98
+ };
99
+
100
+ //# sourceMappingURL=cronjob.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/endowments/cronjob.ts"],"sourcesContent":["import type {\n PermissionSpecificationBuilder,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n PermissionConstraint,\n Caveat,\n CaveatSpecificationConstraint,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport type { CronjobSpecification } from '@metamask/snaps-utils';\nimport {\n SnapCaveatType,\n isCronjobSpecificationArray,\n} from '@metamask/snaps-utils';\nimport type { Json, NonEmptyArray } from '@metamask/utils';\nimport { assert, hasProperty, isPlainObject } from '@metamask/utils';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.Cronjob;\n\ntype CronjobEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n}>;\n\n/**\n * `endowment:cronjob` returns nothing; it is intended to be used as a flag to determine whether the snap wants to run cronjobs.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the cronjob endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n CronjobEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: [SnapCaveatType.SnapCronjob],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const cronjobEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getCronjobCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n return {\n caveats: [\n {\n type: SnapCaveatType.SnapCronjob,\n value,\n },\n ],\n };\n}\n\n/**\n * Getter function to get the cronjobs from a permission.\n *\n * This does basic validation of the caveat, but does not validate the type or\n * value of the namespaces object itself, as this is handled by the\n * `PermissionsController` when the permission is requested.\n *\n * @param permission - The permission to get the keyring namespaces from.\n * @returns The cronjobs, or `null` if the permission does not have a\n * cronjob caveat.\n */\nexport function getCronjobCaveatJobs(\n permission?: PermissionConstraint,\n): CronjobSpecification[] | null {\n if (!permission?.caveats) {\n return null;\n }\n\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.SnapCronjob);\n\n const caveat = permission.caveats[0] as Caveat<string, { jobs: Json[] }>;\n\n return (caveat.value?.jobs as CronjobSpecification[]) ?? null;\n}\n\n/**\n * Validate the cronjob specification values associated with a caveat.\n * This validates that the value is a non-empty array with valid\n * cronjob expression and request object.\n *\n * @param caveat - The caveat to validate.\n * @throws If the value is invalid.\n */\nexport function validateCronjobCaveat(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n\n if (!hasProperty(value, 'jobs') || !isPlainObject(value)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n if (!isCronjobSpecificationArray(value.jobs)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a valid cronjob specification array.',\n });\n }\n}\n\n/**\n * Caveat specification for the Cronjob.\n */\nexport const cronjobCaveatSpecifications: Record<\n SnapCaveatType.SnapCronjob,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.SnapCronjob]: Object.freeze({\n type: SnapCaveatType.SnapCronjob,\n validator: (caveat) => validateCronjobCaveat(caveat),\n }),\n};\n"],"names":["cronjobEndowmentBuilder","getCronjobCaveatMapper","getCronjobCaveatJobs","validateCronjobCaveat","cronjobCaveatSpecifications","permissionName","SnapEndowments","Cronjob","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","SnapCaveatType","SnapCronjob","endowmentGetter","_getterOptions","undefined","subjectTypes","SubjectType","Snap","Object","freeze","value","caveats","type","permission","assert","length","caveat","jobs","hasProperty","isPlainObject","rpcErrors","invalidParams","message","isCronjobSpecificationArray","validator"],"mappings":";;;;;;;;;;;IAiDaA,uBAAuB;eAAvBA;;IAaGC,sBAAsB;eAAtBA;;IAwBAC,oBAAoB;eAApBA;;IAuBAC,qBAAqB;eAArBA;;IAyBHC,2BAA2B;eAA3BA;;;sCA9H+B;2BAClB;4BAKnB;uBAE4C;sBAEpB;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,OAAO;AAS7C;;;;;CAKC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;YAACC,0BAAc,CAACC,WAAW;SAAC;QAC5CC,iBAAiB,CAACC,iBAA2CC;QAC7DC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMtB,0BAA0BuB,OAAOC,MAAM,CAAC;IACnDX,YAAYR;IACZG;AACF;AAUO,SAASP,uBACdwB,KAAW;IAEX,OAAO;QACLC,SAAS;YACP;gBACEC,MAAMZ,0BAAc,CAACC,WAAW;gBAChCS;YACF;SACD;IACH;AACF;AAaO,SAASvB,qBACd0B,UAAiC;IAEjC,IAAI,CAACA,YAAYF,SAAS;QACxB,OAAO;IACT;IAEAG,IAAAA,aAAM,EAACD,WAAWF,OAAO,CAACI,MAAM,KAAK;IACrCD,IAAAA,aAAM,EAACD,WAAWF,OAAO,CAAC,EAAE,CAACC,IAAI,KAAKZ,0BAAc,CAACC,WAAW;IAEhE,MAAMe,SAASH,WAAWF,OAAO,CAAC,EAAE;IAEpC,OAAO,CAACK,OAAON,KAAK,EAAEO,IAA8B,KAAK;AAC3D;AAUO,SAAS7B,sBAAsB4B,MAA2B;IAC/D,IAAI,CAACE,IAAAA,kBAAW,EAACF,QAAQ,YAAY,CAACG,IAAAA,oBAAa,EAACH,OAAON,KAAK,GAAG;QACjE,MAAMU,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,MAAM,EAAEZ,KAAK,EAAE,GAAGM;IAElB,IAAI,CAACE,IAAAA,kBAAW,EAACR,OAAO,WAAW,CAACS,IAAAA,oBAAa,EAACT,QAAQ;QACxD,MAAMU,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,IAAI,CAACC,IAAAA,uCAA2B,EAACb,MAAMO,IAAI,GAAG;QAC5C,MAAMG,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;AACF;AAKO,MAAMjC,8BAGT;IACF,CAACW,0BAAc,CAACC,WAAW,CAAC,EAAEO,OAAOC,MAAM,CAAC;QAC1CG,MAAMZ,0BAAc,CAACC,WAAW;QAChCuB,WAAW,CAACR,SAAW5B,sBAAsB4B;IAC/C;AACF"}
@@ -0,0 +1,26 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ Object.defineProperty(exports, "SnapEndowments", {
6
+ enumerable: true,
7
+ get: function() {
8
+ return SnapEndowments;
9
+ }
10
+ });
11
+ var SnapEndowments;
12
+ (function(SnapEndowments) {
13
+ SnapEndowments["NetworkAccess"] = 'endowment:network-access';
14
+ SnapEndowments["SignatureInsight"] = 'endowment:signature-insight';
15
+ SnapEndowments["TransactionInsight"] = 'endowment:transaction-insight';
16
+ SnapEndowments["Cronjob"] = 'endowment:cronjob';
17
+ SnapEndowments["EthereumProvider"] = 'endowment:ethereum-provider';
18
+ SnapEndowments["Rpc"] = 'endowment:rpc';
19
+ SnapEndowments["WebAssemblyAccess"] = 'endowment:webassembly';
20
+ SnapEndowments["NameLookup"] = 'endowment:name-lookup';
21
+ SnapEndowments["LifecycleHooks"] = 'endowment:lifecycle-hooks';
22
+ SnapEndowments["Keyring"] = 'endowment:keyring';
23
+ SnapEndowments["HomePage"] = 'endowment:page-home';
24
+ })(SnapEndowments || (SnapEndowments = {}));
25
+
26
+ //# sourceMappingURL=enum.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/endowments/enum.ts"],"sourcesContent":["export enum SnapEndowments {\n NetworkAccess = 'endowment:network-access',\n SignatureInsight = 'endowment:signature-insight',\n TransactionInsight = 'endowment:transaction-insight',\n Cronjob = 'endowment:cronjob',\n EthereumProvider = 'endowment:ethereum-provider',\n Rpc = 'endowment:rpc',\n WebAssemblyAccess = 'endowment:webassembly',\n NameLookup = 'endowment:name-lookup',\n LifecycleHooks = 'endowment:lifecycle-hooks',\n Keyring = 'endowment:keyring',\n HomePage = 'endowment:page-home',\n}\n"],"names":["SnapEndowments","NetworkAccess","SignatureInsight","TransactionInsight","Cronjob","EthereumProvider","Rpc","WebAssemblyAccess","NameLookup","LifecycleHooks","Keyring","HomePage"],"mappings":";;;;;;;;;;IAAO;UAAKA,cAAc;IAAdA,eACVC,mBAAgB;IADND,eAEVE,sBAAmB;IAFTF,eAGVG,wBAAqB;IAHXH,eAIVI,aAAU;IAJAJ,eAKVK,sBAAmB;IALTL,eAMVM,SAAM;IANIN,eAOVO,uBAAoB;IAPVP,eAQVQ,gBAAa;IARHR,eASVS,oBAAiB;IATPT,eAUVU,aAAU;IAVAV,eAWVW,cAAW;GAXDX,mBAAAA"}
@@ -0,0 +1,43 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ Object.defineProperty(exports, "ethereumProviderEndowmentBuilder", {
6
+ enumerable: true,
7
+ get: function() {
8
+ return ethereumProviderEndowmentBuilder;
9
+ }
10
+ });
11
+ const _permissioncontroller = require("@metamask/permission-controller");
12
+ const _enum = require("./enum");
13
+ const permissionName = _enum.SnapEndowments.EthereumProvider;
14
+ /**
15
+ * `endowment:ethereum-provider` returns the name of the ethereum global browser API.
16
+ * This is intended to populate the endowments of the
17
+ * SES Compartment in which a Snap executes.
18
+ *
19
+ * This populates the global scope with an EIP-1193 provider, which DOES NOT implement all legacy functionality exposed to dapps.
20
+ *
21
+ * @param _builderOptions - Optional specification builder options.
22
+ * @returns The specification for the network endowment.
23
+ */ const specificationBuilder = (_builderOptions)=>{
24
+ return {
25
+ permissionType: _permissioncontroller.PermissionType.Endowment,
26
+ targetName: permissionName,
27
+ allowedCaveats: null,
28
+ endowmentGetter: (_getterOptions)=>{
29
+ return [
30
+ 'ethereum'
31
+ ];
32
+ },
33
+ subjectTypes: [
34
+ _permissioncontroller.SubjectType.Snap
35
+ ]
36
+ };
37
+ };
38
+ const ethereumProviderEndowmentBuilder = Object.freeze({
39
+ targetName: permissionName,
40
+ specificationBuilder
41
+ });
42
+
43
+ //# sourceMappingURL=ethereum-provider.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/endowments/ethereum-provider.ts"],"sourcesContent":["import type {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n ValidPermissionSpecification,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.EthereumProvider;\n\ntype EthereumProviderEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => ['ethereum'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:ethereum-provider` returns the name of the ethereum global browser API.\n * This is intended to populate the endowments of the\n * SES Compartment in which a Snap executes.\n *\n * This populates the global scope with an EIP-1193 provider, which DOES NOT implement all legacy functionality exposed to dapps.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the network endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n EthereumProviderEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['ethereum'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const ethereumProviderEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["ethereumProviderEndowmentBuilder","permissionName","SnapEndowments","EthereumProvider","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","subjectTypes","SubjectType","Snap","Object","freeze"],"mappings":";;;;+BA4CaA;;;eAAAA;;;sCAvC+B;sBAEb;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,gBAAgB;AAStD;;;;;;;;;CASC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;QAChBC,iBAAiB,CAACC;YAChB,OAAO;gBAAC;aAAW;QACrB;QACAC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMf,mCAAmCgB,OAAOC,MAAM,CAAC;IAC5DR,YAAYR;IACZG;AACF"}
@@ -0,0 +1,37 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ Object.defineProperty(exports, "homePageEndowmentBuilder", {
6
+ enumerable: true,
7
+ get: function() {
8
+ return homePageEndowmentBuilder;
9
+ }
10
+ });
11
+ const _permissioncontroller = require("@metamask/permission-controller");
12
+ const _enum = require("./enum");
13
+ const permissionName = _enum.SnapEndowments.HomePage;
14
+ /**
15
+ * `endowment:page-home` returns nothing; it is intended to be used as a
16
+ * flag by the snap controller to detect whether the snap has the capability to
17
+ * use the snap home page feature.
18
+ *
19
+ * @param _builderOptions - Optional specification builder options.
20
+ * @returns The specification for the `snap-pages` endowment.
21
+ */ const specificationBuilder = (_builderOptions)=>{
22
+ return {
23
+ permissionType: _permissioncontroller.PermissionType.Endowment,
24
+ targetName: permissionName,
25
+ allowedCaveats: null,
26
+ endowmentGetter: (_getterOptions)=>undefined,
27
+ subjectTypes: [
28
+ _permissioncontroller.SubjectType.Snap
29
+ ]
30
+ };
31
+ };
32
+ const homePageEndowmentBuilder = Object.freeze({
33
+ targetName: permissionName,
34
+ specificationBuilder
35
+ });
36
+
37
+ //# sourceMappingURL=home-page.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/endowments/home-page.ts"],"sourcesContent":["import type {\n PermissionSpecificationBuilder,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\nimport type { NonEmptyArray } from '@metamask/utils';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.HomePage;\n\ntype HomePageEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: EndowmentGetterParams) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n}>;\n\n/**\n * `endowment:page-home` returns nothing; it is intended to be used as a\n * flag by the snap controller to detect whether the snap has the capability to\n * use the snap home page feature.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the `snap-pages` endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n HomePageEndowmentSpecification\n> = (_builderOptions?: unknown) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const homePageEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["homePageEndowmentBuilder","permissionName","SnapEndowments","HomePage","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","undefined","subjectTypes","SubjectType","Snap","Object","freeze"],"mappings":";;;;+BAyCaA;;;eAAAA;;;sCApC+B;sBAGb;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,QAAQ;AAS9C;;;;;;;CAOC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;QAChBC,iBAAiB,CAACC,iBAA2CC;QAC7DC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMhB,2BAA2BiB,OAAOC,MAAM,CAAC;IACpDT,YAAYR;IACZG;AACF"}
@@ -0,0 +1,121 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", {
3
+ value: true
4
+ });
5
+ function _export(target, all) {
6
+ for(var name in all)Object.defineProperty(target, name, {
7
+ enumerable: true,
8
+ get: all[name]
9
+ });
10
+ }
11
+ _export(exports, {
12
+ endowmentPermissionBuilders: function() {
13
+ return endowmentPermissionBuilders;
14
+ },
15
+ endowmentCaveatSpecifications: function() {
16
+ return endowmentCaveatSpecifications;
17
+ },
18
+ endowmentCaveatMappers: function() {
19
+ return endowmentCaveatMappers;
20
+ },
21
+ handlerEndowments: function() {
22
+ return handlerEndowments;
23
+ },
24
+ getRpcCaveatOrigins: function() {
25
+ return _rpc.getRpcCaveatOrigins;
26
+ },
27
+ getSignatureOriginCaveat: function() {
28
+ return _signatureinsight.getSignatureOriginCaveat;
29
+ },
30
+ getTransactionOriginCaveat: function() {
31
+ return _transactioninsight.getTransactionOriginCaveat;
32
+ },
33
+ getChainIdsCaveat: function() {
34
+ return _namelookup.getChainIdsCaveat;
35
+ },
36
+ getLookupMatchersCaveat: function() {
37
+ return _namelookup.getLookupMatchersCaveat;
38
+ },
39
+ getKeyringCaveatOrigins: function() {
40
+ return _keyring.getKeyringCaveatOrigins;
41
+ },
42
+ getMaxRequestTimeCaveat: function() {
43
+ return _caveats.getMaxRequestTimeCaveat;
44
+ },
45
+ getCronjobCaveatJobs: function() {
46
+ return _cronjob.getCronjobCaveatJobs;
47
+ }
48
+ });
49
+ const _snapsutils = require("@metamask/snaps-utils");
50
+ const _caveats = require("./caveats");
51
+ const _cronjob = require("./cronjob");
52
+ const _ethereumprovider = require("./ethereum-provider");
53
+ const _homepage = require("./home-page");
54
+ const _keyring = require("./keyring");
55
+ const _lifecyclehooks = require("./lifecycle-hooks");
56
+ const _namelookup = require("./name-lookup");
57
+ const _networkaccess = require("./network-access");
58
+ const _rpc = require("./rpc");
59
+ const _signatureinsight = require("./signature-insight");
60
+ const _transactioninsight = require("./transaction-insight");
61
+ const _webassembly = require("./web-assembly");
62
+ _export_star(require("./enum"), exports);
63
+ function _export_star(from, to) {
64
+ Object.keys(from).forEach(function(k) {
65
+ if (k !== "default" && !Object.prototype.hasOwnProperty.call(to, k)) {
66
+ Object.defineProperty(to, k, {
67
+ enumerable: true,
68
+ get: function() {
69
+ return from[k];
70
+ }
71
+ });
72
+ }
73
+ });
74
+ return from;
75
+ }
76
+ const endowmentPermissionBuilders = {
77
+ [_networkaccess.networkAccessEndowmentBuilder.targetName]: _networkaccess.networkAccessEndowmentBuilder,
78
+ [_transactioninsight.transactionInsightEndowmentBuilder.targetName]: _transactioninsight.transactionInsightEndowmentBuilder,
79
+ [_cronjob.cronjobEndowmentBuilder.targetName]: _cronjob.cronjobEndowmentBuilder,
80
+ [_ethereumprovider.ethereumProviderEndowmentBuilder.targetName]: _ethereumprovider.ethereumProviderEndowmentBuilder,
81
+ [_rpc.rpcEndowmentBuilder.targetName]: _rpc.rpcEndowmentBuilder,
82
+ [_webassembly.webAssemblyEndowmentBuilder.targetName]: _webassembly.webAssemblyEndowmentBuilder,
83
+ [_namelookup.nameLookupEndowmentBuilder.targetName]: _namelookup.nameLookupEndowmentBuilder,
84
+ [_lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName]: _lifecyclehooks.lifecycleHooksEndowmentBuilder,
85
+ [_keyring.keyringEndowmentBuilder.targetName]: _keyring.keyringEndowmentBuilder,
86
+ [_homepage.homePageEndowmentBuilder.targetName]: _homepage.homePageEndowmentBuilder,
87
+ [_signatureinsight.signatureInsightEndowmentBuilder.targetName]: _signatureinsight.signatureInsightEndowmentBuilder
88
+ };
89
+ const endowmentCaveatSpecifications = {
90
+ ..._cronjob.cronjobCaveatSpecifications,
91
+ ..._transactioninsight.transactionInsightCaveatSpecifications,
92
+ ..._rpc.rpcCaveatSpecifications,
93
+ ..._namelookup.nameLookupCaveatSpecifications,
94
+ ..._keyring.keyringCaveatSpecifications,
95
+ ..._signatureinsight.signatureInsightCaveatSpecifications,
96
+ ..._caveats.maxRequestTimeCaveatSpecifications
97
+ };
98
+ const endowmentCaveatMappers = {
99
+ [_cronjob.cronjobEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_cronjob.getCronjobCaveatMapper),
100
+ [_transactioninsight.transactionInsightEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_transactioninsight.getTransactionInsightCaveatMapper),
101
+ [_rpc.rpcEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_rpc.getRpcCaveatMapper),
102
+ [_namelookup.nameLookupEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_namelookup.getNameLookupCaveatMapper),
103
+ [_keyring.keyringEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_keyring.getKeyringCaveatMapper),
104
+ [_signatureinsight.signatureInsightEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_signatureinsight.getSignatureInsightCaveatMapper),
105
+ [_lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName]: _caveats.getMaxRequestTimeCaveatMapper,
106
+ [_homepage.homePageEndowmentBuilder.targetName]: _caveats.getMaxRequestTimeCaveatMapper
107
+ };
108
+ const handlerEndowments = {
109
+ [_snapsutils.HandlerType.OnRpcRequest]: _rpc.rpcEndowmentBuilder.targetName,
110
+ [_snapsutils.HandlerType.OnTransaction]: _transactioninsight.transactionInsightEndowmentBuilder.targetName,
111
+ [_snapsutils.HandlerType.OnCronjob]: _cronjob.cronjobEndowmentBuilder.targetName,
112
+ [_snapsutils.HandlerType.OnNameLookup]: _namelookup.nameLookupEndowmentBuilder.targetName,
113
+ [_snapsutils.HandlerType.OnInstall]: _lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName,
114
+ [_snapsutils.HandlerType.OnUpdate]: _lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName,
115
+ [_snapsutils.HandlerType.OnKeyringRequest]: _keyring.keyringEndowmentBuilder.targetName,
116
+ [_snapsutils.HandlerType.OnHomePage]: _homepage.homePageEndowmentBuilder.targetName,
117
+ [_snapsutils.HandlerType.OnSignature]: _signatureinsight.signatureInsightEndowmentBuilder.targetName,
118
+ [_snapsutils.HandlerType.OnUserInput]: null
119
+ };
120
+
121
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"sources":["../../../src/endowments/index.ts"],"sourcesContent":["import type { PermissionConstraint } from '@metamask/permission-controller';\nimport { HandlerType } from '@metamask/snaps-utils';\nimport type { Json } from '@metamask/utils';\n\nimport {\n createMaxRequestTimeMapper,\n getMaxRequestTimeCaveatMapper,\n maxRequestTimeCaveatSpecifications,\n} from './caveats';\nimport {\n cronjobCaveatSpecifications,\n cronjobEndowmentBuilder,\n getCronjobCaveatMapper,\n} from './cronjob';\nimport { ethereumProviderEndowmentBuilder } from './ethereum-provider';\nimport { homePageEndowmentBuilder } from './home-page';\nimport {\n getKeyringCaveatMapper,\n keyringCaveatSpecifications,\n keyringEndowmentBuilder,\n} from './keyring';\nimport { lifecycleHooksEndowmentBuilder } from './lifecycle-hooks';\nimport {\n getNameLookupCaveatMapper,\n nameLookupCaveatSpecifications,\n nameLookupEndowmentBuilder,\n} from './name-lookup';\nimport { networkAccessEndowmentBuilder } from './network-access';\nimport {\n getRpcCaveatMapper,\n rpcCaveatSpecifications,\n rpcEndowmentBuilder,\n} from './rpc';\nimport {\n getSignatureInsightCaveatMapper,\n signatureInsightCaveatSpecifications,\n signatureInsightEndowmentBuilder,\n} from './signature-insight';\nimport {\n getTransactionInsightCaveatMapper,\n transactionInsightCaveatSpecifications,\n transactionInsightEndowmentBuilder,\n} from './transaction-insight';\nimport { webAssemblyEndowmentBuilder } from './web-assembly';\n\nexport const endowmentPermissionBuilders = {\n [networkAccessEndowmentBuilder.targetName]: networkAccessEndowmentBuilder,\n [transactionInsightEndowmentBuilder.targetName]:\n transactionInsightEndowmentBuilder,\n [cronjobEndowmentBuilder.targetName]: cronjobEndowmentBuilder,\n [ethereumProviderEndowmentBuilder.targetName]:\n ethereumProviderEndowmentBuilder,\n [rpcEndowmentBuilder.targetName]: rpcEndowmentBuilder,\n [webAssemblyEndowmentBuilder.targetName]: webAssemblyEndowmentBuilder,\n [nameLookupEndowmentBuilder.targetName]: nameLookupEndowmentBuilder,\n [lifecycleHooksEndowmentBuilder.targetName]: lifecycleHooksEndowmentBuilder,\n [keyringEndowmentBuilder.targetName]: keyringEndowmentBuilder,\n [homePageEndowmentBuilder.targetName]: homePageEndowmentBuilder,\n [signatureInsightEndowmentBuilder.targetName]:\n signatureInsightEndowmentBuilder,\n} as const;\n\nexport const endowmentCaveatSpecifications = {\n ...cronjobCaveatSpecifications,\n ...transactionInsightCaveatSpecifications,\n ...rpcCaveatSpecifications,\n ...nameLookupCaveatSpecifications,\n ...keyringCaveatSpecifications,\n ...signatureInsightCaveatSpecifications,\n ...maxRequestTimeCaveatSpecifications,\n};\n\nexport const endowmentCaveatMappers: Record<\n string,\n (value: Json) => Pick<PermissionConstraint, 'caveats'>\n> = {\n [cronjobEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getCronjobCaveatMapper,\n ),\n [transactionInsightEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getTransactionInsightCaveatMapper,\n ),\n [rpcEndowmentBuilder.targetName]:\n createMaxRequestTimeMapper(getRpcCaveatMapper),\n [nameLookupEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getNameLookupCaveatMapper,\n ),\n [keyringEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getKeyringCaveatMapper,\n ),\n [signatureInsightEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getSignatureInsightCaveatMapper,\n ),\n [lifecycleHooksEndowmentBuilder.targetName]: getMaxRequestTimeCaveatMapper,\n [homePageEndowmentBuilder.targetName]: getMaxRequestTimeCaveatMapper,\n};\n\n// We allow null because a permitted handler does not have an endowment\nexport const handlerEndowments: Record<HandlerType, string | null> = {\n [HandlerType.OnRpcRequest]: rpcEndowmentBuilder.targetName,\n [HandlerType.OnTransaction]: transactionInsightEndowmentBuilder.targetName,\n [HandlerType.OnCronjob]: cronjobEndowmentBuilder.targetName,\n [HandlerType.OnNameLookup]: nameLookupEndowmentBuilder.targetName,\n [HandlerType.OnInstall]: lifecycleHooksEndowmentBuilder.targetName,\n [HandlerType.OnUpdate]: lifecycleHooksEndowmentBuilder.targetName,\n [HandlerType.OnKeyringRequest]: keyringEndowmentBuilder.targetName,\n [HandlerType.OnHomePage]: homePageEndowmentBuilder.targetName,\n [HandlerType.OnSignature]: signatureInsightEndowmentBuilder.targetName,\n [HandlerType.OnUserInput]: null,\n};\n\nexport * from './enum';\nexport { getRpcCaveatOrigins } from './rpc';\nexport { getSignatureOriginCaveat } from './signature-insight';\nexport { getTransactionOriginCaveat } from './transaction-insight';\nexport { getChainIdsCaveat, getLookupMatchersCaveat } from './name-lookup';\nexport { getKeyringCaveatOrigins } from './keyring';\nexport { getMaxRequestTimeCaveat } from './caveats';\nexport { getCronjobCaveatJobs } from './cronjob';\n"],"names":["endowmentPermissionBuilders","endowmentCaveatSpecifications","endowmentCaveatMappers","handlerEndowments","getRpcCaveatOrigins","getSignatureOriginCaveat","getTransactionOriginCaveat","getChainIdsCaveat","getLookupMatchersCaveat","getKeyringCaveatOrigins","getMaxRequestTimeCaveat","getCronjobCaveatJobs","networkAccessEndowmentBuilder","targetName","transactionInsightEndowmentBuilder","cronjobEndowmentBuilder","ethereumProviderEndowmentBuilder","rpcEndowmentBuilder","webAssemblyEndowmentBuilder","nameLookupEndowmentBuilder","lifecycleHooksEndowmentBuilder","keyringEndowmentBuilder","homePageEndowmentBuilder","signatureInsightEndowmentBuilder","cronjobCaveatSpecifications","transactionInsightCaveatSpecifications","rpcCaveatSpecifications","nameLookupCaveatSpecifications","keyringCaveatSpecifications","signatureInsightCaveatSpecifications","maxRequestTimeCaveatSpecifications","createMaxRequestTimeMapper","getCronjobCaveatMapper","getTransactionInsightCaveatMapper","getRpcCaveatMapper","getNameLookupCaveatMapper","getKeyringCaveatMapper","getSignatureInsightCaveatMapper","getMaxRequestTimeCaveatMapper","HandlerType","OnRpcRequest","OnTransaction","OnCronjob","OnNameLookup","OnInstall","OnUpdate","OnKeyringRequest","OnHomePage","OnSignature","OnUserInput"],"mappings":";;;;;;;;;;;IA6CaA,2BAA2B;eAA3BA;;IAiBAC,6BAA6B;eAA7BA;;IAUAC,sBAAsB;eAAtBA;;IA0BAC,iBAAiB;eAAjBA;;IAcJC,mBAAmB;eAAnBA,wBAAmB;;IACnBC,wBAAwB;eAAxBA,0CAAwB;;IACxBC,0BAA0B;eAA1BA,8CAA0B;;IAC1BC,iBAAiB;eAAjBA,6BAAiB;;IAAEC,uBAAuB;eAAvBA,mCAAuB;;IAC1CC,uBAAuB;eAAvBA,gCAAuB;;IACvBC,uBAAuB;eAAvBA,gCAAuB;;IACvBC,oBAAoB;eAApBA,6BAAoB;;;4BArHD;yBAOrB;yBAKA;kCAC0C;0BACR;yBAKlC;gCACwC;4BAKxC;+BACuC;qBAKvC;kCAKA;oCAKA;6BACqC;qBAoE9B;;;;;;;;;;;;;;AAlEP,MAAMX,8BAA8B;IACzC,CAACY,4CAA6B,CAACC,UAAU,CAAC,EAAED,4CAA6B;IACzE,CAACE,sDAAkC,CAACD,UAAU,CAAC,EAC7CC,sDAAkC;IACpC,CAACC,gCAAuB,CAACF,UAAU,CAAC,EAAEE,gCAAuB;IAC7D,CAACC,kDAAgC,CAACH,UAAU,CAAC,EAC3CG,kDAAgC;IAClC,CAACC,wBAAmB,CAACJ,UAAU,CAAC,EAAEI,wBAAmB;IACrD,CAACC,wCAA2B,CAACL,UAAU,CAAC,EAAEK,wCAA2B;IACrE,CAACC,sCAA0B,CAACN,UAAU,CAAC,EAAEM,sCAA0B;IACnE,CAACC,8CAA8B,CAACP,UAAU,CAAC,EAAEO,8CAA8B;IAC3E,CAACC,gCAAuB,CAACR,UAAU,CAAC,EAAEQ,gCAAuB;IAC7D,CAACC,kCAAwB,CAACT,UAAU,CAAC,EAAES,kCAAwB;IAC/D,CAACC,kDAAgC,CAACV,UAAU,CAAC,EAC3CU,kDAAgC;AACpC;AAEO,MAAMtB,gCAAgC;IAC3C,GAAGuB,oCAA2B;IAC9B,GAAGC,0DAAsC;IACzC,GAAGC,4BAAuB;IAC1B,GAAGC,0CAA8B;IACjC,GAAGC,oCAA2B;IAC9B,GAAGC,sDAAoC;IACvC,GAAGC,2CAAkC;AACvC;AAEO,MAAM5B,yBAGT;IACF,CAACa,gCAAuB,CAACF,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EAC9DC,+BAAsB;IAExB,CAAClB,sDAAkC,CAACD,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACzEE,qDAAiC;IAEnC,CAAChB,wBAAmB,CAACJ,UAAU,CAAC,EAC9BkB,IAAAA,mCAA0B,EAACG,uBAAkB;IAC/C,CAACf,sCAA0B,CAACN,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACjEI,qCAAyB;IAE3B,CAACd,gCAAuB,CAACR,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EAC9DK,+BAAsB;IAExB,CAACb,kDAAgC,CAACV,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACvEM,iDAA+B;IAEjC,CAACjB,8CAA8B,CAACP,UAAU,CAAC,EAAEyB,sCAA6B;IAC1E,CAAChB,kCAAwB,CAACT,UAAU,CAAC,EAAEyB,sCAA6B;AACtE;AAGO,MAAMnC,oBAAwD;IACnE,CAACoC,uBAAW,CAACC,YAAY,CAAC,EAAEvB,wBAAmB,CAACJ,UAAU;IAC1D,CAAC0B,uBAAW,CAACE,aAAa,CAAC,EAAE3B,sDAAkC,CAACD,UAAU;IAC1E,CAAC0B,uBAAW,CAACG,SAAS,CAAC,EAAE3B,gCAAuB,CAACF,UAAU;IAC3D,CAAC0B,uBAAW,CAACI,YAAY,CAAC,EAAExB,sCAA0B,CAACN,UAAU;IACjE,CAAC0B,uBAAW,CAACK,SAAS,CAAC,EAAExB,8CAA8B,CAACP,UAAU;IAClE,CAAC0B,uBAAW,CAACM,QAAQ,CAAC,EAAEzB,8CAA8B,CAACP,UAAU;IACjE,CAAC0B,uBAAW,CAACO,gBAAgB,CAAC,EAAEzB,gCAAuB,CAACR,UAAU;IAClE,CAAC0B,uBAAW,CAACQ,UAAU,CAAC,EAAEzB,kCAAwB,CAACT,UAAU;IAC7D,CAAC0B,uBAAW,CAACS,WAAW,CAAC,EAAEzB,kDAAgC,CAACV,UAAU;IACtE,CAAC0B,uBAAW,CAACU,WAAW,CAAC,EAAE;AAC7B"}