@metamask/snaps-rpc-methods 4.1.0 → 6.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +24 -2
- package/dist/cjs/endowments/caveats/generic.js +40 -0
- package/dist/cjs/endowments/caveats/generic.js.map +1 -0
- package/dist/cjs/endowments/caveats/index.js +21 -0
- package/dist/cjs/endowments/caveats/index.js.map +1 -0
- package/dist/cjs/endowments/caveats/requestTime.js +99 -0
- package/dist/cjs/endowments/caveats/requestTime.js.map +1 -0
- package/dist/cjs/endowments/cronjob.js +100 -0
- package/dist/cjs/endowments/cronjob.js.map +1 -0
- package/dist/cjs/endowments/enum.js +26 -0
- package/dist/cjs/endowments/enum.js.map +1 -0
- package/dist/cjs/endowments/ethereum-provider.js +43 -0
- package/dist/cjs/endowments/ethereum-provider.js.map +1 -0
- package/dist/cjs/endowments/home-page.js +37 -0
- package/dist/cjs/endowments/home-page.js.map +1 -0
- package/dist/cjs/endowments/index.js +121 -0
- package/dist/cjs/endowments/index.js.map +1 -0
- package/dist/cjs/endowments/keyring.js +104 -0
- package/dist/cjs/endowments/keyring.js.map +1 -0
- package/dist/cjs/endowments/lifecycle-hooks.js +37 -0
- package/dist/cjs/endowments/lifecycle-hooks.js.map +1 -0
- package/dist/cjs/endowments/name-lookup.js +148 -0
- package/dist/cjs/endowments/name-lookup.js.map +1 -0
- package/dist/cjs/endowments/network-access.js +44 -0
- package/dist/cjs/endowments/network-access.js.map +1 -0
- package/dist/cjs/endowments/rpc.js +103 -0
- package/dist/cjs/endowments/rpc.js.map +1 -0
- package/dist/cjs/endowments/signature-insight.js +110 -0
- package/dist/cjs/endowments/signature-insight.js.map +1 -0
- package/dist/cjs/endowments/transaction-insight.js +111 -0
- package/dist/cjs/endowments/transaction-insight.js.map +1 -0
- package/dist/cjs/endowments/web-assembly.js +42 -0
- package/dist/cjs/endowments/web-assembly.js.map +1 -0
- package/dist/cjs/index.js +3 -1
- package/dist/cjs/index.js.map +1 -1
- package/dist/cjs/permissions.js +62 -0
- package/dist/cjs/permissions.js.map +1 -0
- package/dist/cjs/permitted/createInterface.js +68 -0
- package/dist/cjs/permitted/createInterface.js.map +1 -0
- package/dist/cjs/permitted/getClientStatus.js +40 -0
- package/dist/cjs/permitted/getClientStatus.js.map +1 -0
- package/dist/cjs/permitted/getFile.js +1 -1
- package/dist/cjs/permitted/getFile.js.map +1 -1
- package/dist/cjs/permitted/getInterfaceState.js +67 -0
- package/dist/cjs/permitted/getInterfaceState.js.map +1 -0
- package/dist/cjs/permitted/handlers.js +9 -1
- package/dist/cjs/permitted/handlers.js.map +1 -1
- package/dist/cjs/permitted/index.js.map +1 -1
- package/dist/cjs/permitted/invokeKeyring.js +2 -3
- package/dist/cjs/permitted/invokeKeyring.js.map +1 -1
- package/dist/cjs/permitted/updateInterface.js +70 -0
- package/dist/cjs/permitted/updateInterface.js.map +1 -0
- package/dist/cjs/restricted/dialog.js +51 -24
- package/dist/cjs/restricted/dialog.js.map +1 -1
- package/dist/cjs/restricted/index.js +3 -0
- package/dist/cjs/restricted/index.js.map +1 -1
- package/dist/cjs/restricted/manageState.js +4 -13
- package/dist/cjs/restricted/manageState.js.map +1 -1
- package/dist/esm/endowments/caveats/generic.js +40 -0
- package/dist/esm/endowments/caveats/generic.js.map +1 -0
- package/dist/esm/endowments/caveats/index.js +4 -0
- package/dist/esm/endowments/caveats/index.js.map +1 -0
- package/dist/esm/endowments/caveats/requestTime.js +93 -0
- package/dist/esm/endowments/caveats/requestTime.js.map +1 -0
- package/dist/esm/endowments/cronjob.js +99 -0
- package/dist/esm/endowments/cronjob.js.map +1 -0
- package/dist/esm/endowments/enum.js +16 -0
- package/dist/esm/endowments/enum.js.map +1 -0
- package/dist/esm/endowments/ethereum-provider.js +33 -0
- package/dist/esm/endowments/ethereum-provider.js.map +1 -0
- package/dist/esm/endowments/home-page.js +27 -0
- package/dist/esm/endowments/home-page.js.map +1 -0
- package/dist/esm/endowments/index.js +68 -0
- package/dist/esm/endowments/index.js.map +1 -0
- package/dist/esm/endowments/keyring.js +95 -0
- package/dist/esm/endowments/keyring.js.map +1 -0
- package/dist/esm/endowments/lifecycle-hooks.js +27 -0
- package/dist/esm/endowments/lifecycle-hooks.js.map +1 -0
- package/dist/esm/endowments/name-lookup.js +146 -0
- package/dist/esm/endowments/name-lookup.js.map +1 -0
- package/dist/esm/endowments/network-access.js +34 -0
- package/dist/esm/endowments/network-access.js.map +1 -0
- package/dist/esm/endowments/rpc.js +92 -0
- package/dist/esm/endowments/rpc.js.map +1 -0
- package/dist/esm/endowments/signature-insight.js +103 -0
- package/dist/esm/endowments/signature-insight.js.map +1 -0
- package/dist/esm/endowments/transaction-insight.js +104 -0
- package/dist/esm/endowments/transaction-insight.js.map +1 -0
- package/dist/esm/endowments/web-assembly.js +32 -0
- package/dist/esm/endowments/web-assembly.js.map +1 -0
- package/dist/esm/index.js +3 -1
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/permissions.js +51 -0
- package/dist/esm/permissions.js.map +1 -0
- package/dist/esm/permitted/createInterface.js +58 -0
- package/dist/esm/permitted/createInterface.js.map +1 -0
- package/dist/esm/permitted/getClientStatus.js +32 -0
- package/dist/esm/permitted/getClientStatus.js.map +1 -0
- package/dist/esm/permitted/getFile.js +1 -1
- package/dist/esm/permitted/getFile.js.map +1 -1
- package/dist/esm/permitted/getInterfaceState.js +57 -0
- package/dist/esm/permitted/getInterfaceState.js.map +1 -0
- package/dist/esm/permitted/handlers.js +9 -1
- package/dist/esm/permitted/handlers.js.map +1 -1
- package/dist/esm/permitted/index.js.map +1 -1
- package/dist/esm/permitted/invokeKeyring.js +2 -3
- package/dist/esm/permitted/invokeKeyring.js.map +1 -1
- package/dist/esm/permitted/updateInterface.js +60 -0
- package/dist/esm/permitted/updateInterface.js.map +1 -0
- package/dist/esm/restricted/dialog.js +55 -29
- package/dist/esm/restricted/dialog.js.map +1 -1
- package/dist/esm/restricted/index.js +1 -0
- package/dist/esm/restricted/index.js.map +1 -1
- package/dist/esm/restricted/manageState.js +1 -1
- package/dist/esm/restricted/manageState.js.map +1 -1
- package/dist/types/endowments/caveats/generic.d.ts +19 -0
- package/dist/types/endowments/caveats/index.d.ts +2 -0
- package/dist/types/endowments/caveats/requestTime.d.ts +29 -0
- package/dist/types/endowments/cronjob.d.ts +51 -0
- package/dist/types/endowments/enum.d.ts +13 -0
- package/dist/types/endowments/ethereum-provider.d.ts +14 -0
- package/dist/types/endowments/home-page.d.ts +15 -0
- package/dist/types/endowments/index.d.ts +131 -0
- package/dist/types/endowments/keyring.d.ts +39 -0
- package/dist/types/endowments/lifecycle-hooks.d.ts +15 -0
- package/dist/types/endowments/name-lookup.d.ts +49 -0
- package/dist/types/endowments/network-access.d.ts +14 -0
- package/dist/types/endowments/rpc.d.ts +38 -0
- package/dist/types/endowments/signature-insight.d.ts +39 -0
- package/dist/types/endowments/transaction-insight.d.ts +39 -0
- package/dist/types/endowments/web-assembly.d.ts +14 -0
- package/dist/types/index.d.ts +4 -2
- package/dist/types/permissions.d.ts +16 -0
- package/dist/types/permitted/createInterface.d.ts +150 -0
- package/dist/types/permitted/getClientStatus.d.ts +13 -0
- package/dist/types/permitted/getInterfaceState.d.ts +18 -0
- package/dist/types/permitted/handlers.d.ts +5 -1
- package/dist/types/permitted/index.d.ts +5 -1
- package/dist/types/permitted/invokeKeyring.d.ts +3 -3
- package/dist/types/permitted/updateInterface.d.ts +152 -0
- package/dist/types/restricted/dialog.d.ts +776 -14
- package/dist/types/restricted/index.d.ts +1 -0
- package/dist/types/restricted/manageState.d.ts +18 -0
- package/package.json +8 -8
package/CHANGELOG.md
CHANGED
|
@@ -6,6 +6,26 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
6
6
|
|
|
7
7
|
## [Unreleased]
|
|
8
8
|
|
|
9
|
+
## [6.0.0]
|
|
10
|
+
### Added
|
|
11
|
+
- **BREAKING:** Add support for dynamic user interfaces ([#1465](https://github.com/MetaMask/snaps/pull/1465), [#2144](https://github.com/MetaMask/snaps/pull/2144), [#2143](https://github.com/MetaMask/snaps/pull/2143))
|
|
12
|
+
- This adds the `snap_createInterface`, `snap_updateInterface`, and `snap_getInterfaceState` methods.
|
|
13
|
+
- This is breaking because it changes the expected type of the `showDialog` RPC method hook.
|
|
14
|
+
- **BREAKING:** Update the permission format for the name lookup endowment ([#2113](https://github.com/MetaMask/snaps/pull/2113))
|
|
15
|
+
- The new format is documented in [SIP-12](https://metamask.github.io/SIPs/SIPS/sip-12).
|
|
16
|
+
- Add endowment permission specifications to this package ([#2155](https://github.com/MetaMask/snaps/pull/2155))
|
|
17
|
+
|
|
18
|
+
### Changed
|
|
19
|
+
- Bump MetaMask dependencies ([#2129](https://github.com/MetaMask/snaps/pull/2129), [#2142](https://github.com/MetaMask/snaps/pull/2142))
|
|
20
|
+
|
|
21
|
+
## [5.0.0]
|
|
22
|
+
### Added
|
|
23
|
+
- Add `snap_getClientStatus` ([#2051](https://github.com/MetaMask/snaps/pull/2051))
|
|
24
|
+
|
|
25
|
+
### Changed
|
|
26
|
+
- **BREAKING:** Use origin bound hooks for `invokeKeyring` ([#2090](https://github.com/MetaMask/snaps/pull/2090))
|
|
27
|
+
- Bump several MetaMask dependencies ([#2069](https://github.com/MetaMask/snaps/pull/2069), [#2100](https://github.com/MetaMask/snaps/pull/2100))
|
|
28
|
+
|
|
9
29
|
## [4.1.0]
|
|
10
30
|
### Added
|
|
11
31
|
- Add `wallet_getAllSnaps` method to get all installed Snaps ([#2047](https://github.com/MetaMask/snaps/pull/2047))
|
|
@@ -80,7 +100,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
80
100
|
## [0.38.0-flask.1]
|
|
81
101
|
### Added
|
|
82
102
|
- Add `snap_getLocale` JSON-RPC method ([#1557](https://github.com/MetaMask/snaps/pull/1557))
|
|
83
|
-
|
|
103
|
+
- This will let snaps get the user locale from the client.
|
|
84
104
|
|
|
85
105
|
### Fixed
|
|
86
106
|
- Fix ed25519 public key derivation ([#1678](https://github.com/MetaMask/snaps/pull/1678))
|
|
@@ -91,7 +111,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
91
111
|
- The version of the package no longer needs to match the version of all other
|
|
92
112
|
MetaMask Snaps packages.
|
|
93
113
|
|
|
94
|
-
[Unreleased]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@
|
|
114
|
+
[Unreleased]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@6.0.0...HEAD
|
|
115
|
+
[6.0.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@5.0.0...@metamask/snaps-rpc-methods@6.0.0
|
|
116
|
+
[5.0.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.1.0...@metamask/snaps-rpc-methods@5.0.0
|
|
95
117
|
[4.1.0]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.3...@metamask/snaps-rpc-methods@4.1.0
|
|
96
118
|
[4.0.3]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.2...@metamask/snaps-rpc-methods@4.0.3
|
|
97
119
|
[4.0.2]: https://github.com/MetaMask/snaps/compare/@metamask/snaps-rpc-methods@4.0.1...@metamask/snaps-rpc-methods@4.0.2
|
|
@@ -0,0 +1,40 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
Object.defineProperty(exports, "createGenericPermissionValidator", {
|
|
6
|
+
enumerable: true,
|
|
7
|
+
get: function() {
|
|
8
|
+
return createGenericPermissionValidator;
|
|
9
|
+
}
|
|
10
|
+
});
|
|
11
|
+
const _rpcerrors = require("@metamask/rpc-errors");
|
|
12
|
+
function createGenericPermissionValidator(caveatsToValidate) {
|
|
13
|
+
const validCaveatTypes = new Set(caveatsToValidate.map((caveat)=>caveat.type));
|
|
14
|
+
const requiredCaveats = caveatsToValidate.filter((caveat)=>!caveat.optional);
|
|
15
|
+
return function({ caveats }) {
|
|
16
|
+
const actualCaveats = caveats ?? [];
|
|
17
|
+
const passedCaveatTypes = actualCaveats.map((caveat)=>caveat.type);
|
|
18
|
+
const passedCaveatsSet = new Set(passedCaveatTypes);
|
|
19
|
+
// Disallow duplicates
|
|
20
|
+
if (passedCaveatsSet.size !== passedCaveatTypes.length) {
|
|
21
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
22
|
+
message: 'Duplicate caveats are not allowed.'
|
|
23
|
+
});
|
|
24
|
+
}
|
|
25
|
+
// Disallow caveats that don't match expected types
|
|
26
|
+
if (!actualCaveats.every((caveat)=>validCaveatTypes.has(caveat.type))) {
|
|
27
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
28
|
+
message: `Expected the following caveats: ${caveatsToValidate.map((caveat)=>`"${caveat.type}"`).join(', ')}, received ${actualCaveats.map((caveat)=>`"${caveat.type}"`).join(', ')}.`
|
|
29
|
+
});
|
|
30
|
+
}
|
|
31
|
+
// Fail if not all required caveats are specified
|
|
32
|
+
if (!requiredCaveats.every((caveat)=>passedCaveatsSet.has(caveat.type))) {
|
|
33
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
34
|
+
message: `Expected the following caveats: ${requiredCaveats.map((caveat)=>`"${caveat.type}"`).join(', ')}.`
|
|
35
|
+
});
|
|
36
|
+
}
|
|
37
|
+
};
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
//# sourceMappingURL=generic.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/endowments/caveats/generic.ts"],"sourcesContent":["import type {\n PermissionConstraint,\n PermissionValidatorConstraint,\n} from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport type { Json } from '@metamask/utils';\n\nexport type CaveatMapperReturnValue = Pick<PermissionConstraint, 'caveats'>;\n\nexport type CaveatMapperFunction = (value: Json) => CaveatMapperReturnValue;\n\n/**\n * Create a generic permission validator that validates the presence of certain caveats.\n *\n * This validator only validates the types of the caveats, not the values.\n *\n * @param caveatsToValidate - A list of objects that represent caveats.\n * @param caveatsToValidate.type - The string defining the caveat type.\n * @param caveatsToValidate.optional - An optional boolean flag that defines\n * whether the caveat is optional or not.\n * @returns A function that validates a permission.\n */\nexport function createGenericPermissionValidator(\n caveatsToValidate: {\n type: string;\n optional?: boolean;\n }[],\n): PermissionValidatorConstraint {\n const validCaveatTypes = new Set(\n caveatsToValidate.map((caveat) => caveat.type),\n );\n const requiredCaveats = caveatsToValidate.filter(\n (caveat) => !caveat.optional,\n );\n\n return function ({ caveats }) {\n const actualCaveats = caveats ?? [];\n const passedCaveatTypes = actualCaveats.map((caveat) => caveat.type);\n const passedCaveatsSet = new Set(passedCaveatTypes);\n\n // Disallow duplicates\n if (passedCaveatsSet.size !== passedCaveatTypes.length) {\n throw rpcErrors.invalidParams({\n message: 'Duplicate caveats are not allowed.',\n });\n }\n\n // Disallow caveats that don't match expected types\n if (!actualCaveats.every((caveat) => validCaveatTypes.has(caveat.type))) {\n throw rpcErrors.invalidParams({\n message: `Expected the following caveats: ${caveatsToValidate\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}, received ${actualCaveats\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}.`,\n });\n }\n\n // Fail if not all required caveats are specified\n if (!requiredCaveats.every((caveat) => passedCaveatsSet.has(caveat.type))) {\n throw rpcErrors.invalidParams({\n message: `Expected the following caveats: ${requiredCaveats\n .map((caveat) => `\"${caveat.type}\"`)\n .join(', ')}.`,\n });\n }\n };\n}\n"],"names":["createGenericPermissionValidator","caveatsToValidate","validCaveatTypes","Set","map","caveat","type","requiredCaveats","filter","optional","caveats","actualCaveats","passedCaveatTypes","passedCaveatsSet","size","length","rpcErrors","invalidParams","message","every","has","join"],"mappings":";;;;+BAsBgBA;;;eAAAA;;;2BAlBU;AAkBnB,SAASA,iCACdC,iBAGG;IAEH,MAAMC,mBAAmB,IAAIC,IAC3BF,kBAAkBG,GAAG,CAAC,CAACC,SAAWA,OAAOC,IAAI;IAE/C,MAAMC,kBAAkBN,kBAAkBO,MAAM,CAC9C,CAACH,SAAW,CAACA,OAAOI,QAAQ;IAG9B,OAAO,SAAU,EAAEC,OAAO,EAAE;QAC1B,MAAMC,gBAAgBD,WAAW,EAAE;QACnC,MAAME,oBAAoBD,cAAcP,GAAG,CAAC,CAACC,SAAWA,OAAOC,IAAI;QACnE,MAAMO,mBAAmB,IAAIV,IAAIS;QAEjC,sBAAsB;QACtB,IAAIC,iBAAiBC,IAAI,KAAKF,kBAAkBG,MAAM,EAAE;YACtD,MAAMC,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS;YACX;QACF;QAEA,mDAAmD;QACnD,IAAI,CAACP,cAAcQ,KAAK,CAAC,CAACd,SAAWH,iBAAiBkB,GAAG,CAACf,OAAOC,IAAI,IAAI;YACvE,MAAMU,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS,CAAC,gCAAgC,EAAEjB,kBACzCG,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,WAAW,EAAEV,cACxBP,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,CAAC,CAAC;YAClB;QACF;QAEA,iDAAiD;QACjD,IAAI,CAACd,gBAAgBY,KAAK,CAAC,CAACd,SAAWQ,iBAAiBO,GAAG,CAACf,OAAOC,IAAI,IAAI;YACzE,MAAMU,oBAAS,CAACC,aAAa,CAAC;gBAC5BC,SAAS,CAAC,gCAAgC,EAAEX,gBACzCH,GAAG,CAAC,CAACC,SAAW,CAAC,CAAC,EAAEA,OAAOC,IAAI,CAAC,CAAC,CAAC,EAClCe,IAAI,CAAC,MAAM,CAAC,CAAC;YAClB;QACF;IACF;AACF"}
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
_export_star(require("./generic"), exports);
|
|
6
|
+
_export_star(require("./requestTime"), exports);
|
|
7
|
+
function _export_star(from, to) {
|
|
8
|
+
Object.keys(from).forEach(function(k) {
|
|
9
|
+
if (k !== "default" && !Object.prototype.hasOwnProperty.call(to, k)) {
|
|
10
|
+
Object.defineProperty(to, k, {
|
|
11
|
+
enumerable: true,
|
|
12
|
+
get: function() {
|
|
13
|
+
return from[k];
|
|
14
|
+
}
|
|
15
|
+
});
|
|
16
|
+
}
|
|
17
|
+
});
|
|
18
|
+
return from;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/endowments/caveats/index.ts"],"sourcesContent":["export * from './generic';\nexport * from './requestTime';\n"],"names":[],"mappings":";;;;qBAAc;qBACA"}
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
function _export(target, all) {
|
|
6
|
+
for(var name in all)Object.defineProperty(target, name, {
|
|
7
|
+
enumerable: true,
|
|
8
|
+
get: all[name]
|
|
9
|
+
});
|
|
10
|
+
}
|
|
11
|
+
_export(exports, {
|
|
12
|
+
getMaxRequestTimeCaveatMapper: function() {
|
|
13
|
+
return getMaxRequestTimeCaveatMapper;
|
|
14
|
+
},
|
|
15
|
+
createMaxRequestTimeMapper: function() {
|
|
16
|
+
return createMaxRequestTimeMapper;
|
|
17
|
+
},
|
|
18
|
+
getMaxRequestTimeCaveat: function() {
|
|
19
|
+
return getMaxRequestTimeCaveat;
|
|
20
|
+
},
|
|
21
|
+
maxRequestTimeCaveatSpecifications: function() {
|
|
22
|
+
return maxRequestTimeCaveatSpecifications;
|
|
23
|
+
}
|
|
24
|
+
});
|
|
25
|
+
const _rpcerrors = require("@metamask/rpc-errors");
|
|
26
|
+
const _snapsutils = require("@metamask/snaps-utils");
|
|
27
|
+
const _utils = require("@metamask/utils");
|
|
28
|
+
/**
|
|
29
|
+
* Asserts that the given value is a valid `maxRequestTime` value.
|
|
30
|
+
*
|
|
31
|
+
* @param value - The value to assert.
|
|
32
|
+
* @param ErrorWrapper - An optional error wrapper to use. Defaults to
|
|
33
|
+
* {@link AssertionError}.
|
|
34
|
+
* @throws If the value is not a valid `maxRequestTime` value.
|
|
35
|
+
*/ function assertIsMaxRequestTime(value, ErrorWrapper) {
|
|
36
|
+
(0, _utils.assertStruct)(value, _snapsutils.MaxRequestTimeStruct, 'Invalid maxRequestTime', ErrorWrapper);
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* Validate the value of a caveat. This does not validate the type of the
|
|
40
|
+
* caveat itself, only the value of the caveat.
|
|
41
|
+
*
|
|
42
|
+
* @param caveat - The caveat to validate.
|
|
43
|
+
* @throws If the caveat value is invalid.
|
|
44
|
+
*/ function validateMaxRequestTimeCaveat(caveat) {
|
|
45
|
+
if (!(0, _utils.hasProperty)(caveat, 'value')) {
|
|
46
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
47
|
+
message: 'Invalid maxRequestTime caveat.'
|
|
48
|
+
});
|
|
49
|
+
}
|
|
50
|
+
const { value } = caveat;
|
|
51
|
+
assertIsMaxRequestTime(value, _rpcerrors.rpcErrors.invalidParams);
|
|
52
|
+
}
|
|
53
|
+
function getMaxRequestTimeCaveatMapper(value) {
|
|
54
|
+
if (!value || !(0, _utils.isObject)(value) || (0, _utils.isObject)(value) && !(0, _utils.hasProperty)(value, 'maxRequestTime')) {
|
|
55
|
+
return {
|
|
56
|
+
caveats: null
|
|
57
|
+
};
|
|
58
|
+
}
|
|
59
|
+
return {
|
|
60
|
+
caveats: [
|
|
61
|
+
{
|
|
62
|
+
type: _snapsutils.SnapCaveatType.MaxRequestTime,
|
|
63
|
+
value: value.maxRequestTime
|
|
64
|
+
}
|
|
65
|
+
]
|
|
66
|
+
};
|
|
67
|
+
}
|
|
68
|
+
function createMaxRequestTimeMapper(mapper) {
|
|
69
|
+
return function(value) {
|
|
70
|
+
// We assume this to be used only with caveats of this type
|
|
71
|
+
const { maxRequestTime, ...rest } = value;
|
|
72
|
+
const mapperResult = mapper(rest);
|
|
73
|
+
if (!maxRequestTime) {
|
|
74
|
+
return mapperResult;
|
|
75
|
+
}
|
|
76
|
+
return {
|
|
77
|
+
...mapperResult,
|
|
78
|
+
caveats: [
|
|
79
|
+
...mapperResult.caveats ?? [],
|
|
80
|
+
{
|
|
81
|
+
type: _snapsutils.SnapCaveatType.MaxRequestTime,
|
|
82
|
+
value: maxRequestTime
|
|
83
|
+
}
|
|
84
|
+
]
|
|
85
|
+
};
|
|
86
|
+
};
|
|
87
|
+
}
|
|
88
|
+
function getMaxRequestTimeCaveat(permission) {
|
|
89
|
+
const foundCaveat = permission?.caveats?.find((caveat)=>caveat.type === _snapsutils.SnapCaveatType.MaxRequestTime);
|
|
90
|
+
return (foundCaveat?.value) ?? null;
|
|
91
|
+
}
|
|
92
|
+
const maxRequestTimeCaveatSpecifications = {
|
|
93
|
+
[_snapsutils.SnapCaveatType.MaxRequestTime]: Object.freeze({
|
|
94
|
+
type: _snapsutils.SnapCaveatType.MaxRequestTime,
|
|
95
|
+
validator: (caveat)=>validateMaxRequestTimeCaveat(caveat)
|
|
96
|
+
})
|
|
97
|
+
};
|
|
98
|
+
|
|
99
|
+
//# sourceMappingURL=requestTime.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../../src/endowments/caveats/requestTime.ts"],"sourcesContent":["import type {\n Caveat,\n CaveatSpecificationConstraint,\n PermissionConstraint,\n} from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport { MaxRequestTimeStruct, SnapCaveatType } from '@metamask/snaps-utils';\nimport type { AssertionErrorConstructor, Json } from '@metamask/utils';\nimport { assertStruct, hasProperty, isObject } from '@metamask/utils';\n\nimport type { CaveatMapperFunction, CaveatMapperReturnValue } from './generic';\n\n/**\n * Asserts that the given value is a valid `maxRequestTime` value.\n *\n * @param value - The value to assert.\n * @param ErrorWrapper - An optional error wrapper to use. Defaults to\n * {@link AssertionError}.\n * @throws If the value is not a valid `maxRequestTime` value.\n */\nfunction assertIsMaxRequestTime(\n value: unknown, // eslint-disable-next-line @typescript-eslint/naming-convention\n ErrorWrapper?: AssertionErrorConstructor,\n): asserts value is number {\n assertStruct(\n value,\n MaxRequestTimeStruct,\n 'Invalid maxRequestTime',\n ErrorWrapper,\n );\n}\n\n/**\n * Validate the value of a caveat. This does not validate the type of the\n * caveat itself, only the value of the caveat.\n *\n * @param caveat - The caveat to validate.\n * @throws If the caveat value is invalid.\n */\nfunction validateMaxRequestTimeCaveat(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value')) {\n throw rpcErrors.invalidParams({\n message: 'Invalid maxRequestTime caveat.',\n });\n }\n\n const { value } = caveat;\n assertIsMaxRequestTime(value, rpcErrors.invalidParams);\n}\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getMaxRequestTimeCaveatMapper(\n value: Json,\n): CaveatMapperReturnValue {\n if (\n !value ||\n !isObject(value) ||\n (isObject(value) && !hasProperty(value, 'maxRequestTime'))\n ) {\n return { caveats: null };\n }\n return {\n caveats: [\n {\n type: SnapCaveatType.MaxRequestTime,\n value: value.maxRequestTime,\n },\n ],\n };\n}\n\n/**\n * Creates a wrapping caveat mapper that creates the `maxRequestTime` caveat\n * and merges it with any other caveats created by the mapper function.\n *\n * @param mapper - Another caveat mapper function.\n * @returns The caveat specification.\n */\nexport function createMaxRequestTimeMapper(\n mapper: CaveatMapperFunction,\n): CaveatMapperFunction {\n return function (value: Json) {\n // We assume this to be used only with caveats of this type\n const { maxRequestTime, ...rest } = value as Record<string, Json>;\n\n const mapperResult = mapper(rest);\n\n if (!maxRequestTime) {\n return mapperResult;\n }\n\n return {\n ...mapperResult,\n caveats: [\n ...(mapperResult.caveats ?? []),\n {\n type: SnapCaveatType.MaxRequestTime,\n value: maxRequestTime,\n },\n ],\n };\n };\n}\n\n/**\n * Getter function to get the {@link MaxRequestTime} caveat value from a permission if specified.\n *\n * @param permission - The permission to get the caveat value from.\n * @returns The caveat value if present, otherwise null.\n */\nexport function getMaxRequestTimeCaveat(\n permission?: PermissionConstraint,\n): number | null {\n const foundCaveat = permission?.caveats?.find(\n (caveat) => caveat.type === SnapCaveatType.MaxRequestTime,\n );\n return (foundCaveat?.value as number) ?? null;\n}\n\nexport const maxRequestTimeCaveatSpecifications: Record<\n SnapCaveatType.MaxRequestTime,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.MaxRequestTime]: Object.freeze({\n type: SnapCaveatType.MaxRequestTime,\n validator: (caveat: Caveat<string, any>) =>\n validateMaxRequestTimeCaveat(caveat),\n }),\n};\n"],"names":["getMaxRequestTimeCaveatMapper","createMaxRequestTimeMapper","getMaxRequestTimeCaveat","maxRequestTimeCaveatSpecifications","assertIsMaxRequestTime","value","ErrorWrapper","assertStruct","MaxRequestTimeStruct","validateMaxRequestTimeCaveat","caveat","hasProperty","rpcErrors","invalidParams","message","isObject","caveats","type","SnapCaveatType","MaxRequestTime","maxRequestTime","mapper","rest","mapperResult","permission","foundCaveat","find","Object","freeze","validator"],"mappings":";;;;;;;;;;;IA0DgBA,6BAA6B;eAA7BA;;IA2BAC,0BAA0B;eAA1BA;;IAgCAC,uBAAuB;eAAvBA;;IASHC,kCAAkC;eAAlCA;;;2BAzHa;4BAC2B;uBAED;AAIpD;;;;;;;CAOC,GACD,SAASC,uBACPC,KAAc,EACdC,YAAwC;IAExCC,IAAAA,mBAAY,EACVF,OACAG,gCAAoB,EACpB,0BACAF;AAEJ;AAEA;;;;;;CAMC,GACD,SAASG,6BAA6BC,MAA2B;IAC/D,IAAI,CAACC,IAAAA,kBAAW,EAACD,QAAQ,UAAU;QACjC,MAAME,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,MAAM,EAAET,KAAK,EAAE,GAAGK;IAClBN,uBAAuBC,OAAOO,oBAAS,CAACC,aAAa;AACvD;AAUO,SAASb,8BACdK,KAAW;IAEX,IACE,CAACA,SACD,CAACU,IAAAA,eAAQ,EAACV,UACTU,IAAAA,eAAQ,EAACV,UAAU,CAACM,IAAAA,kBAAW,EAACN,OAAO,mBACxC;QACA,OAAO;YAAEW,SAAS;QAAK;IACzB;IACA,OAAO;QACLA,SAAS;YACP;gBACEC,MAAMC,0BAAc,CAACC,cAAc;gBACnCd,OAAOA,MAAMe,cAAc;YAC7B;SACD;IACH;AACF;AASO,SAASnB,2BACdoB,MAA4B;IAE5B,OAAO,SAAUhB,KAAW;QAC1B,2DAA2D;QAC3D,MAAM,EAAEe,cAAc,EAAE,GAAGE,MAAM,GAAGjB;QAEpC,MAAMkB,eAAeF,OAAOC;QAE5B,IAAI,CAACF,gBAAgB;YACnB,OAAOG;QACT;QAEA,OAAO;YACL,GAAGA,YAAY;YACfP,SAAS;mBACHO,aAAaP,OAAO,IAAI,EAAE;gBAC9B;oBACEC,MAAMC,0BAAc,CAACC,cAAc;oBACnCd,OAAOe;gBACT;aACD;QACH;IACF;AACF;AAQO,SAASlB,wBACdsB,UAAiC;IAEjC,MAAMC,cAAcD,YAAYR,SAASU,KACvC,CAAChB,SAAWA,OAAOO,IAAI,KAAKC,0BAAc,CAACC,cAAc;IAE3D,OAAO,CAACM,aAAapB,KAAe,KAAK;AAC3C;AAEO,MAAMF,qCAGT;IACF,CAACe,0BAAc,CAACC,cAAc,CAAC,EAAEQ,OAAOC,MAAM,CAAC;QAC7CX,MAAMC,0BAAc,CAACC,cAAc;QACnCU,WAAW,CAACnB,SACVD,6BAA6BC;IACjC;AACF"}
|
|
@@ -0,0 +1,100 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
function _export(target, all) {
|
|
6
|
+
for(var name in all)Object.defineProperty(target, name, {
|
|
7
|
+
enumerable: true,
|
|
8
|
+
get: all[name]
|
|
9
|
+
});
|
|
10
|
+
}
|
|
11
|
+
_export(exports, {
|
|
12
|
+
cronjobEndowmentBuilder: function() {
|
|
13
|
+
return cronjobEndowmentBuilder;
|
|
14
|
+
},
|
|
15
|
+
getCronjobCaveatMapper: function() {
|
|
16
|
+
return getCronjobCaveatMapper;
|
|
17
|
+
},
|
|
18
|
+
getCronjobCaveatJobs: function() {
|
|
19
|
+
return getCronjobCaveatJobs;
|
|
20
|
+
},
|
|
21
|
+
validateCronjobCaveat: function() {
|
|
22
|
+
return validateCronjobCaveat;
|
|
23
|
+
},
|
|
24
|
+
cronjobCaveatSpecifications: function() {
|
|
25
|
+
return cronjobCaveatSpecifications;
|
|
26
|
+
}
|
|
27
|
+
});
|
|
28
|
+
const _permissioncontroller = require("@metamask/permission-controller");
|
|
29
|
+
const _rpcerrors = require("@metamask/rpc-errors");
|
|
30
|
+
const _snapsutils = require("@metamask/snaps-utils");
|
|
31
|
+
const _utils = require("@metamask/utils");
|
|
32
|
+
const _enum = require("./enum");
|
|
33
|
+
const permissionName = _enum.SnapEndowments.Cronjob;
|
|
34
|
+
/**
|
|
35
|
+
* `endowment:cronjob` returns nothing; it is intended to be used as a flag to determine whether the snap wants to run cronjobs.
|
|
36
|
+
*
|
|
37
|
+
* @param _builderOptions - Optional specification builder options.
|
|
38
|
+
* @returns The specification for the cronjob endowment.
|
|
39
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
40
|
+
return {
|
|
41
|
+
permissionType: _permissioncontroller.PermissionType.Endowment,
|
|
42
|
+
targetName: permissionName,
|
|
43
|
+
allowedCaveats: [
|
|
44
|
+
_snapsutils.SnapCaveatType.SnapCronjob
|
|
45
|
+
],
|
|
46
|
+
endowmentGetter: (_getterOptions)=>undefined,
|
|
47
|
+
subjectTypes: [
|
|
48
|
+
_permissioncontroller.SubjectType.Snap
|
|
49
|
+
]
|
|
50
|
+
};
|
|
51
|
+
};
|
|
52
|
+
const cronjobEndowmentBuilder = Object.freeze({
|
|
53
|
+
targetName: permissionName,
|
|
54
|
+
specificationBuilder
|
|
55
|
+
});
|
|
56
|
+
function getCronjobCaveatMapper(value) {
|
|
57
|
+
return {
|
|
58
|
+
caveats: [
|
|
59
|
+
{
|
|
60
|
+
type: _snapsutils.SnapCaveatType.SnapCronjob,
|
|
61
|
+
value
|
|
62
|
+
}
|
|
63
|
+
]
|
|
64
|
+
};
|
|
65
|
+
}
|
|
66
|
+
function getCronjobCaveatJobs(permission) {
|
|
67
|
+
if (!permission?.caveats) {
|
|
68
|
+
return null;
|
|
69
|
+
}
|
|
70
|
+
(0, _utils.assert)(permission.caveats.length === 1);
|
|
71
|
+
(0, _utils.assert)(permission.caveats[0].type === _snapsutils.SnapCaveatType.SnapCronjob);
|
|
72
|
+
const caveat = permission.caveats[0];
|
|
73
|
+
return (caveat.value?.jobs) ?? null;
|
|
74
|
+
}
|
|
75
|
+
function validateCronjobCaveat(caveat) {
|
|
76
|
+
if (!(0, _utils.hasProperty)(caveat, 'value') || !(0, _utils.isPlainObject)(caveat.value)) {
|
|
77
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
78
|
+
message: 'Expected a plain object.'
|
|
79
|
+
});
|
|
80
|
+
}
|
|
81
|
+
const { value } = caveat;
|
|
82
|
+
if (!(0, _utils.hasProperty)(value, 'jobs') || !(0, _utils.isPlainObject)(value)) {
|
|
83
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
84
|
+
message: 'Expected a plain object.'
|
|
85
|
+
});
|
|
86
|
+
}
|
|
87
|
+
if (!(0, _snapsutils.isCronjobSpecificationArray)(value.jobs)) {
|
|
88
|
+
throw _rpcerrors.rpcErrors.invalidParams({
|
|
89
|
+
message: 'Expected a valid cronjob specification array.'
|
|
90
|
+
});
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
const cronjobCaveatSpecifications = {
|
|
94
|
+
[_snapsutils.SnapCaveatType.SnapCronjob]: Object.freeze({
|
|
95
|
+
type: _snapsutils.SnapCaveatType.SnapCronjob,
|
|
96
|
+
validator: (caveat)=>validateCronjobCaveat(caveat)
|
|
97
|
+
})
|
|
98
|
+
};
|
|
99
|
+
|
|
100
|
+
//# sourceMappingURL=cronjob.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/endowments/cronjob.ts"],"sourcesContent":["import type {\n PermissionSpecificationBuilder,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n PermissionConstraint,\n Caveat,\n CaveatSpecificationConstraint,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\nimport { rpcErrors } from '@metamask/rpc-errors';\nimport type { CronjobSpecification } from '@metamask/snaps-utils';\nimport {\n SnapCaveatType,\n isCronjobSpecificationArray,\n} from '@metamask/snaps-utils';\nimport type { Json, NonEmptyArray } from '@metamask/utils';\nimport { assert, hasProperty, isPlainObject } from '@metamask/utils';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.Cronjob;\n\ntype CronjobEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n}>;\n\n/**\n * `endowment:cronjob` returns nothing; it is intended to be used as a flag to determine whether the snap wants to run cronjobs.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the cronjob endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n CronjobEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: [SnapCaveatType.SnapCronjob],\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const cronjobEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n\n/**\n * Map a raw value from the `initialPermissions` to a caveat specification.\n * Note that this function does not do any validation, that's handled by the\n * PermissionsController when the permission is requested.\n *\n * @param value - The raw value from the `initialPermissions`.\n * @returns The caveat specification.\n */\nexport function getCronjobCaveatMapper(\n value: Json,\n): Pick<PermissionConstraint, 'caveats'> {\n return {\n caveats: [\n {\n type: SnapCaveatType.SnapCronjob,\n value,\n },\n ],\n };\n}\n\n/**\n * Getter function to get the cronjobs from a permission.\n *\n * This does basic validation of the caveat, but does not validate the type or\n * value of the namespaces object itself, as this is handled by the\n * `PermissionsController` when the permission is requested.\n *\n * @param permission - The permission to get the keyring namespaces from.\n * @returns The cronjobs, or `null` if the permission does not have a\n * cronjob caveat.\n */\nexport function getCronjobCaveatJobs(\n permission?: PermissionConstraint,\n): CronjobSpecification[] | null {\n if (!permission?.caveats) {\n return null;\n }\n\n assert(permission.caveats.length === 1);\n assert(permission.caveats[0].type === SnapCaveatType.SnapCronjob);\n\n const caveat = permission.caveats[0] as Caveat<string, { jobs: Json[] }>;\n\n return (caveat.value?.jobs as CronjobSpecification[]) ?? null;\n}\n\n/**\n * Validate the cronjob specification values associated with a caveat.\n * This validates that the value is a non-empty array with valid\n * cronjob expression and request object.\n *\n * @param caveat - The caveat to validate.\n * @throws If the value is invalid.\n */\nexport function validateCronjobCaveat(caveat: Caveat<string, any>) {\n if (!hasProperty(caveat, 'value') || !isPlainObject(caveat.value)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n const { value } = caveat;\n\n if (!hasProperty(value, 'jobs') || !isPlainObject(value)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a plain object.',\n });\n }\n\n if (!isCronjobSpecificationArray(value.jobs)) {\n throw rpcErrors.invalidParams({\n message: 'Expected a valid cronjob specification array.',\n });\n }\n}\n\n/**\n * Caveat specification for the Cronjob.\n */\nexport const cronjobCaveatSpecifications: Record<\n SnapCaveatType.SnapCronjob,\n CaveatSpecificationConstraint\n> = {\n [SnapCaveatType.SnapCronjob]: Object.freeze({\n type: SnapCaveatType.SnapCronjob,\n validator: (caveat) => validateCronjobCaveat(caveat),\n }),\n};\n"],"names":["cronjobEndowmentBuilder","getCronjobCaveatMapper","getCronjobCaveatJobs","validateCronjobCaveat","cronjobCaveatSpecifications","permissionName","SnapEndowments","Cronjob","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","SnapCaveatType","SnapCronjob","endowmentGetter","_getterOptions","undefined","subjectTypes","SubjectType","Snap","Object","freeze","value","caveats","type","permission","assert","length","caveat","jobs","hasProperty","isPlainObject","rpcErrors","invalidParams","message","isCronjobSpecificationArray","validator"],"mappings":";;;;;;;;;;;IAiDaA,uBAAuB;eAAvBA;;IAaGC,sBAAsB;eAAtBA;;IAwBAC,oBAAoB;eAApBA;;IAuBAC,qBAAqB;eAArBA;;IAyBHC,2BAA2B;eAA3BA;;;sCA9H+B;2BAClB;4BAKnB;uBAE4C;sBAEpB;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,OAAO;AAS7C;;;;;CAKC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;YAACC,0BAAc,CAACC,WAAW;SAAC;QAC5CC,iBAAiB,CAACC,iBAA2CC;QAC7DC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMtB,0BAA0BuB,OAAOC,MAAM,CAAC;IACnDX,YAAYR;IACZG;AACF;AAUO,SAASP,uBACdwB,KAAW;IAEX,OAAO;QACLC,SAAS;YACP;gBACEC,MAAMZ,0BAAc,CAACC,WAAW;gBAChCS;YACF;SACD;IACH;AACF;AAaO,SAASvB,qBACd0B,UAAiC;IAEjC,IAAI,CAACA,YAAYF,SAAS;QACxB,OAAO;IACT;IAEAG,IAAAA,aAAM,EAACD,WAAWF,OAAO,CAACI,MAAM,KAAK;IACrCD,IAAAA,aAAM,EAACD,WAAWF,OAAO,CAAC,EAAE,CAACC,IAAI,KAAKZ,0BAAc,CAACC,WAAW;IAEhE,MAAMe,SAASH,WAAWF,OAAO,CAAC,EAAE;IAEpC,OAAO,CAACK,OAAON,KAAK,EAAEO,IAA8B,KAAK;AAC3D;AAUO,SAAS7B,sBAAsB4B,MAA2B;IAC/D,IAAI,CAACE,IAAAA,kBAAW,EAACF,QAAQ,YAAY,CAACG,IAAAA,oBAAa,EAACH,OAAON,KAAK,GAAG;QACjE,MAAMU,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,MAAM,EAAEZ,KAAK,EAAE,GAAGM;IAElB,IAAI,CAACE,IAAAA,kBAAW,EAACR,OAAO,WAAW,CAACS,IAAAA,oBAAa,EAACT,QAAQ;QACxD,MAAMU,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;IAEA,IAAI,CAACC,IAAAA,uCAA2B,EAACb,MAAMO,IAAI,GAAG;QAC5C,MAAMG,oBAAS,CAACC,aAAa,CAAC;YAC5BC,SAAS;QACX;IACF;AACF;AAKO,MAAMjC,8BAGT;IACF,CAACW,0BAAc,CAACC,WAAW,CAAC,EAAEO,OAAOC,MAAM,CAAC;QAC1CG,MAAMZ,0BAAc,CAACC,WAAW;QAChCuB,WAAW,CAACR,SAAW5B,sBAAsB4B;IAC/C;AACF"}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
Object.defineProperty(exports, "SnapEndowments", {
|
|
6
|
+
enumerable: true,
|
|
7
|
+
get: function() {
|
|
8
|
+
return SnapEndowments;
|
|
9
|
+
}
|
|
10
|
+
});
|
|
11
|
+
var SnapEndowments;
|
|
12
|
+
(function(SnapEndowments) {
|
|
13
|
+
SnapEndowments["NetworkAccess"] = 'endowment:network-access';
|
|
14
|
+
SnapEndowments["SignatureInsight"] = 'endowment:signature-insight';
|
|
15
|
+
SnapEndowments["TransactionInsight"] = 'endowment:transaction-insight';
|
|
16
|
+
SnapEndowments["Cronjob"] = 'endowment:cronjob';
|
|
17
|
+
SnapEndowments["EthereumProvider"] = 'endowment:ethereum-provider';
|
|
18
|
+
SnapEndowments["Rpc"] = 'endowment:rpc';
|
|
19
|
+
SnapEndowments["WebAssemblyAccess"] = 'endowment:webassembly';
|
|
20
|
+
SnapEndowments["NameLookup"] = 'endowment:name-lookup';
|
|
21
|
+
SnapEndowments["LifecycleHooks"] = 'endowment:lifecycle-hooks';
|
|
22
|
+
SnapEndowments["Keyring"] = 'endowment:keyring';
|
|
23
|
+
SnapEndowments["HomePage"] = 'endowment:page-home';
|
|
24
|
+
})(SnapEndowments || (SnapEndowments = {}));
|
|
25
|
+
|
|
26
|
+
//# sourceMappingURL=enum.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/endowments/enum.ts"],"sourcesContent":["export enum SnapEndowments {\n NetworkAccess = 'endowment:network-access',\n SignatureInsight = 'endowment:signature-insight',\n TransactionInsight = 'endowment:transaction-insight',\n Cronjob = 'endowment:cronjob',\n EthereumProvider = 'endowment:ethereum-provider',\n Rpc = 'endowment:rpc',\n WebAssemblyAccess = 'endowment:webassembly',\n NameLookup = 'endowment:name-lookup',\n LifecycleHooks = 'endowment:lifecycle-hooks',\n Keyring = 'endowment:keyring',\n HomePage = 'endowment:page-home',\n}\n"],"names":["SnapEndowments","NetworkAccess","SignatureInsight","TransactionInsight","Cronjob","EthereumProvider","Rpc","WebAssemblyAccess","NameLookup","LifecycleHooks","Keyring","HomePage"],"mappings":";;;;;;;;;;IAAO;UAAKA,cAAc;IAAdA,eACVC,mBAAgB;IADND,eAEVE,sBAAmB;IAFTF,eAGVG,wBAAqB;IAHXH,eAIVI,aAAU;IAJAJ,eAKVK,sBAAmB;IALTL,eAMVM,SAAM;IANIN,eAOVO,uBAAoB;IAPVP,eAQVQ,gBAAa;IARHR,eASVS,oBAAiB;IATPT,eAUVU,aAAU;IAVAV,eAWVW,cAAW;GAXDX,mBAAAA"}
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
Object.defineProperty(exports, "ethereumProviderEndowmentBuilder", {
|
|
6
|
+
enumerable: true,
|
|
7
|
+
get: function() {
|
|
8
|
+
return ethereumProviderEndowmentBuilder;
|
|
9
|
+
}
|
|
10
|
+
});
|
|
11
|
+
const _permissioncontroller = require("@metamask/permission-controller");
|
|
12
|
+
const _enum = require("./enum");
|
|
13
|
+
const permissionName = _enum.SnapEndowments.EthereumProvider;
|
|
14
|
+
/**
|
|
15
|
+
* `endowment:ethereum-provider` returns the name of the ethereum global browser API.
|
|
16
|
+
* This is intended to populate the endowments of the
|
|
17
|
+
* SES Compartment in which a Snap executes.
|
|
18
|
+
*
|
|
19
|
+
* This populates the global scope with an EIP-1193 provider, which DOES NOT implement all legacy functionality exposed to dapps.
|
|
20
|
+
*
|
|
21
|
+
* @param _builderOptions - Optional specification builder options.
|
|
22
|
+
* @returns The specification for the network endowment.
|
|
23
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
24
|
+
return {
|
|
25
|
+
permissionType: _permissioncontroller.PermissionType.Endowment,
|
|
26
|
+
targetName: permissionName,
|
|
27
|
+
allowedCaveats: null,
|
|
28
|
+
endowmentGetter: (_getterOptions)=>{
|
|
29
|
+
return [
|
|
30
|
+
'ethereum'
|
|
31
|
+
];
|
|
32
|
+
},
|
|
33
|
+
subjectTypes: [
|
|
34
|
+
_permissioncontroller.SubjectType.Snap
|
|
35
|
+
]
|
|
36
|
+
};
|
|
37
|
+
};
|
|
38
|
+
const ethereumProviderEndowmentBuilder = Object.freeze({
|
|
39
|
+
targetName: permissionName,
|
|
40
|
+
specificationBuilder
|
|
41
|
+
});
|
|
42
|
+
|
|
43
|
+
//# sourceMappingURL=ethereum-provider.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/endowments/ethereum-provider.ts"],"sourcesContent":["import type {\n EndowmentGetterParams,\n PermissionSpecificationBuilder,\n ValidPermissionSpecification,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.EthereumProvider;\n\ntype EthereumProviderEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: any) => ['ethereum'];\n allowedCaveats: null;\n}>;\n\n/**\n * `endowment:ethereum-provider` returns the name of the ethereum global browser API.\n * This is intended to populate the endowments of the\n * SES Compartment in which a Snap executes.\n *\n * This populates the global scope with an EIP-1193 provider, which DOES NOT implement all legacy functionality exposed to dapps.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the network endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n EthereumProviderEndowmentSpecification\n> = (_builderOptions?: any) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => {\n return ['ethereum'];\n },\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const ethereumProviderEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["ethereumProviderEndowmentBuilder","permissionName","SnapEndowments","EthereumProvider","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","subjectTypes","SubjectType","Snap","Object","freeze"],"mappings":";;;;+BA4CaA;;;eAAAA;;;sCAvC+B;sBAEb;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,gBAAgB;AAStD;;;;;;;;;CASC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;QAChBC,iBAAiB,CAACC;YAChB,OAAO;gBAAC;aAAW;QACrB;QACAC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMf,mCAAmCgB,OAAOC,MAAM,CAAC;IAC5DR,YAAYR;IACZG;AACF"}
|
|
@@ -0,0 +1,37 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
Object.defineProperty(exports, "homePageEndowmentBuilder", {
|
|
6
|
+
enumerable: true,
|
|
7
|
+
get: function() {
|
|
8
|
+
return homePageEndowmentBuilder;
|
|
9
|
+
}
|
|
10
|
+
});
|
|
11
|
+
const _permissioncontroller = require("@metamask/permission-controller");
|
|
12
|
+
const _enum = require("./enum");
|
|
13
|
+
const permissionName = _enum.SnapEndowments.HomePage;
|
|
14
|
+
/**
|
|
15
|
+
* `endowment:page-home` returns nothing; it is intended to be used as a
|
|
16
|
+
* flag by the snap controller to detect whether the snap has the capability to
|
|
17
|
+
* use the snap home page feature.
|
|
18
|
+
*
|
|
19
|
+
* @param _builderOptions - Optional specification builder options.
|
|
20
|
+
* @returns The specification for the `snap-pages` endowment.
|
|
21
|
+
*/ const specificationBuilder = (_builderOptions)=>{
|
|
22
|
+
return {
|
|
23
|
+
permissionType: _permissioncontroller.PermissionType.Endowment,
|
|
24
|
+
targetName: permissionName,
|
|
25
|
+
allowedCaveats: null,
|
|
26
|
+
endowmentGetter: (_getterOptions)=>undefined,
|
|
27
|
+
subjectTypes: [
|
|
28
|
+
_permissioncontroller.SubjectType.Snap
|
|
29
|
+
]
|
|
30
|
+
};
|
|
31
|
+
};
|
|
32
|
+
const homePageEndowmentBuilder = Object.freeze({
|
|
33
|
+
targetName: permissionName,
|
|
34
|
+
specificationBuilder
|
|
35
|
+
});
|
|
36
|
+
|
|
37
|
+
//# sourceMappingURL=home-page.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/endowments/home-page.ts"],"sourcesContent":["import type {\n PermissionSpecificationBuilder,\n EndowmentGetterParams,\n ValidPermissionSpecification,\n} from '@metamask/permission-controller';\nimport { PermissionType, SubjectType } from '@metamask/permission-controller';\nimport type { NonEmptyArray } from '@metamask/utils';\n\nimport { SnapEndowments } from './enum';\n\nconst permissionName = SnapEndowments.HomePage;\n\ntype HomePageEndowmentSpecification = ValidPermissionSpecification<{\n permissionType: PermissionType.Endowment;\n targetName: typeof permissionName;\n endowmentGetter: (_options?: EndowmentGetterParams) => undefined;\n allowedCaveats: Readonly<NonEmptyArray<string>> | null;\n}>;\n\n/**\n * `endowment:page-home` returns nothing; it is intended to be used as a\n * flag by the snap controller to detect whether the snap has the capability to\n * use the snap home page feature.\n *\n * @param _builderOptions - Optional specification builder options.\n * @returns The specification for the `snap-pages` endowment.\n */\nconst specificationBuilder: PermissionSpecificationBuilder<\n PermissionType.Endowment,\n any,\n HomePageEndowmentSpecification\n> = (_builderOptions?: unknown) => {\n return {\n permissionType: PermissionType.Endowment,\n targetName: permissionName,\n allowedCaveats: null,\n endowmentGetter: (_getterOptions?: EndowmentGetterParams) => undefined,\n subjectTypes: [SubjectType.Snap],\n };\n};\n\nexport const homePageEndowmentBuilder = Object.freeze({\n targetName: permissionName,\n specificationBuilder,\n} as const);\n"],"names":["homePageEndowmentBuilder","permissionName","SnapEndowments","HomePage","specificationBuilder","_builderOptions","permissionType","PermissionType","Endowment","targetName","allowedCaveats","endowmentGetter","_getterOptions","undefined","subjectTypes","SubjectType","Snap","Object","freeze"],"mappings":";;;;+BAyCaA;;;eAAAA;;;sCApC+B;sBAGb;AAE/B,MAAMC,iBAAiBC,oBAAc,CAACC,QAAQ;AAS9C;;;;;;;CAOC,GACD,MAAMC,uBAIF,CAACC;IACH,OAAO;QACLC,gBAAgBC,oCAAc,CAACC,SAAS;QACxCC,YAAYR;QACZS,gBAAgB;QAChBC,iBAAiB,CAACC,iBAA2CC;QAC7DC,cAAc;YAACC,iCAAW,CAACC,IAAI;SAAC;IAClC;AACF;AAEO,MAAMhB,2BAA2BiB,OAAOC,MAAM,CAAC;IACpDT,YAAYR;IACZG;AACF"}
|
|
@@ -0,0 +1,121 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", {
|
|
3
|
+
value: true
|
|
4
|
+
});
|
|
5
|
+
function _export(target, all) {
|
|
6
|
+
for(var name in all)Object.defineProperty(target, name, {
|
|
7
|
+
enumerable: true,
|
|
8
|
+
get: all[name]
|
|
9
|
+
});
|
|
10
|
+
}
|
|
11
|
+
_export(exports, {
|
|
12
|
+
endowmentPermissionBuilders: function() {
|
|
13
|
+
return endowmentPermissionBuilders;
|
|
14
|
+
},
|
|
15
|
+
endowmentCaveatSpecifications: function() {
|
|
16
|
+
return endowmentCaveatSpecifications;
|
|
17
|
+
},
|
|
18
|
+
endowmentCaveatMappers: function() {
|
|
19
|
+
return endowmentCaveatMappers;
|
|
20
|
+
},
|
|
21
|
+
handlerEndowments: function() {
|
|
22
|
+
return handlerEndowments;
|
|
23
|
+
},
|
|
24
|
+
getRpcCaveatOrigins: function() {
|
|
25
|
+
return _rpc.getRpcCaveatOrigins;
|
|
26
|
+
},
|
|
27
|
+
getSignatureOriginCaveat: function() {
|
|
28
|
+
return _signatureinsight.getSignatureOriginCaveat;
|
|
29
|
+
},
|
|
30
|
+
getTransactionOriginCaveat: function() {
|
|
31
|
+
return _transactioninsight.getTransactionOriginCaveat;
|
|
32
|
+
},
|
|
33
|
+
getChainIdsCaveat: function() {
|
|
34
|
+
return _namelookup.getChainIdsCaveat;
|
|
35
|
+
},
|
|
36
|
+
getLookupMatchersCaveat: function() {
|
|
37
|
+
return _namelookup.getLookupMatchersCaveat;
|
|
38
|
+
},
|
|
39
|
+
getKeyringCaveatOrigins: function() {
|
|
40
|
+
return _keyring.getKeyringCaveatOrigins;
|
|
41
|
+
},
|
|
42
|
+
getMaxRequestTimeCaveat: function() {
|
|
43
|
+
return _caveats.getMaxRequestTimeCaveat;
|
|
44
|
+
},
|
|
45
|
+
getCronjobCaveatJobs: function() {
|
|
46
|
+
return _cronjob.getCronjobCaveatJobs;
|
|
47
|
+
}
|
|
48
|
+
});
|
|
49
|
+
const _snapsutils = require("@metamask/snaps-utils");
|
|
50
|
+
const _caveats = require("./caveats");
|
|
51
|
+
const _cronjob = require("./cronjob");
|
|
52
|
+
const _ethereumprovider = require("./ethereum-provider");
|
|
53
|
+
const _homepage = require("./home-page");
|
|
54
|
+
const _keyring = require("./keyring");
|
|
55
|
+
const _lifecyclehooks = require("./lifecycle-hooks");
|
|
56
|
+
const _namelookup = require("./name-lookup");
|
|
57
|
+
const _networkaccess = require("./network-access");
|
|
58
|
+
const _rpc = require("./rpc");
|
|
59
|
+
const _signatureinsight = require("./signature-insight");
|
|
60
|
+
const _transactioninsight = require("./transaction-insight");
|
|
61
|
+
const _webassembly = require("./web-assembly");
|
|
62
|
+
_export_star(require("./enum"), exports);
|
|
63
|
+
function _export_star(from, to) {
|
|
64
|
+
Object.keys(from).forEach(function(k) {
|
|
65
|
+
if (k !== "default" && !Object.prototype.hasOwnProperty.call(to, k)) {
|
|
66
|
+
Object.defineProperty(to, k, {
|
|
67
|
+
enumerable: true,
|
|
68
|
+
get: function() {
|
|
69
|
+
return from[k];
|
|
70
|
+
}
|
|
71
|
+
});
|
|
72
|
+
}
|
|
73
|
+
});
|
|
74
|
+
return from;
|
|
75
|
+
}
|
|
76
|
+
const endowmentPermissionBuilders = {
|
|
77
|
+
[_networkaccess.networkAccessEndowmentBuilder.targetName]: _networkaccess.networkAccessEndowmentBuilder,
|
|
78
|
+
[_transactioninsight.transactionInsightEndowmentBuilder.targetName]: _transactioninsight.transactionInsightEndowmentBuilder,
|
|
79
|
+
[_cronjob.cronjobEndowmentBuilder.targetName]: _cronjob.cronjobEndowmentBuilder,
|
|
80
|
+
[_ethereumprovider.ethereumProviderEndowmentBuilder.targetName]: _ethereumprovider.ethereumProviderEndowmentBuilder,
|
|
81
|
+
[_rpc.rpcEndowmentBuilder.targetName]: _rpc.rpcEndowmentBuilder,
|
|
82
|
+
[_webassembly.webAssemblyEndowmentBuilder.targetName]: _webassembly.webAssemblyEndowmentBuilder,
|
|
83
|
+
[_namelookup.nameLookupEndowmentBuilder.targetName]: _namelookup.nameLookupEndowmentBuilder,
|
|
84
|
+
[_lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName]: _lifecyclehooks.lifecycleHooksEndowmentBuilder,
|
|
85
|
+
[_keyring.keyringEndowmentBuilder.targetName]: _keyring.keyringEndowmentBuilder,
|
|
86
|
+
[_homepage.homePageEndowmentBuilder.targetName]: _homepage.homePageEndowmentBuilder,
|
|
87
|
+
[_signatureinsight.signatureInsightEndowmentBuilder.targetName]: _signatureinsight.signatureInsightEndowmentBuilder
|
|
88
|
+
};
|
|
89
|
+
const endowmentCaveatSpecifications = {
|
|
90
|
+
..._cronjob.cronjobCaveatSpecifications,
|
|
91
|
+
..._transactioninsight.transactionInsightCaveatSpecifications,
|
|
92
|
+
..._rpc.rpcCaveatSpecifications,
|
|
93
|
+
..._namelookup.nameLookupCaveatSpecifications,
|
|
94
|
+
..._keyring.keyringCaveatSpecifications,
|
|
95
|
+
..._signatureinsight.signatureInsightCaveatSpecifications,
|
|
96
|
+
..._caveats.maxRequestTimeCaveatSpecifications
|
|
97
|
+
};
|
|
98
|
+
const endowmentCaveatMappers = {
|
|
99
|
+
[_cronjob.cronjobEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_cronjob.getCronjobCaveatMapper),
|
|
100
|
+
[_transactioninsight.transactionInsightEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_transactioninsight.getTransactionInsightCaveatMapper),
|
|
101
|
+
[_rpc.rpcEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_rpc.getRpcCaveatMapper),
|
|
102
|
+
[_namelookup.nameLookupEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_namelookup.getNameLookupCaveatMapper),
|
|
103
|
+
[_keyring.keyringEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_keyring.getKeyringCaveatMapper),
|
|
104
|
+
[_signatureinsight.signatureInsightEndowmentBuilder.targetName]: (0, _caveats.createMaxRequestTimeMapper)(_signatureinsight.getSignatureInsightCaveatMapper),
|
|
105
|
+
[_lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName]: _caveats.getMaxRequestTimeCaveatMapper,
|
|
106
|
+
[_homepage.homePageEndowmentBuilder.targetName]: _caveats.getMaxRequestTimeCaveatMapper
|
|
107
|
+
};
|
|
108
|
+
const handlerEndowments = {
|
|
109
|
+
[_snapsutils.HandlerType.OnRpcRequest]: _rpc.rpcEndowmentBuilder.targetName,
|
|
110
|
+
[_snapsutils.HandlerType.OnTransaction]: _transactioninsight.transactionInsightEndowmentBuilder.targetName,
|
|
111
|
+
[_snapsutils.HandlerType.OnCronjob]: _cronjob.cronjobEndowmentBuilder.targetName,
|
|
112
|
+
[_snapsutils.HandlerType.OnNameLookup]: _namelookup.nameLookupEndowmentBuilder.targetName,
|
|
113
|
+
[_snapsutils.HandlerType.OnInstall]: _lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName,
|
|
114
|
+
[_snapsutils.HandlerType.OnUpdate]: _lifecyclehooks.lifecycleHooksEndowmentBuilder.targetName,
|
|
115
|
+
[_snapsutils.HandlerType.OnKeyringRequest]: _keyring.keyringEndowmentBuilder.targetName,
|
|
116
|
+
[_snapsutils.HandlerType.OnHomePage]: _homepage.homePageEndowmentBuilder.targetName,
|
|
117
|
+
[_snapsutils.HandlerType.OnSignature]: _signatureinsight.signatureInsightEndowmentBuilder.targetName,
|
|
118
|
+
[_snapsutils.HandlerType.OnUserInput]: null
|
|
119
|
+
};
|
|
120
|
+
|
|
121
|
+
//# sourceMappingURL=index.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"sources":["../../../src/endowments/index.ts"],"sourcesContent":["import type { PermissionConstraint } from '@metamask/permission-controller';\nimport { HandlerType } from '@metamask/snaps-utils';\nimport type { Json } from '@metamask/utils';\n\nimport {\n createMaxRequestTimeMapper,\n getMaxRequestTimeCaveatMapper,\n maxRequestTimeCaveatSpecifications,\n} from './caveats';\nimport {\n cronjobCaveatSpecifications,\n cronjobEndowmentBuilder,\n getCronjobCaveatMapper,\n} from './cronjob';\nimport { ethereumProviderEndowmentBuilder } from './ethereum-provider';\nimport { homePageEndowmentBuilder } from './home-page';\nimport {\n getKeyringCaveatMapper,\n keyringCaveatSpecifications,\n keyringEndowmentBuilder,\n} from './keyring';\nimport { lifecycleHooksEndowmentBuilder } from './lifecycle-hooks';\nimport {\n getNameLookupCaveatMapper,\n nameLookupCaveatSpecifications,\n nameLookupEndowmentBuilder,\n} from './name-lookup';\nimport { networkAccessEndowmentBuilder } from './network-access';\nimport {\n getRpcCaveatMapper,\n rpcCaveatSpecifications,\n rpcEndowmentBuilder,\n} from './rpc';\nimport {\n getSignatureInsightCaveatMapper,\n signatureInsightCaveatSpecifications,\n signatureInsightEndowmentBuilder,\n} from './signature-insight';\nimport {\n getTransactionInsightCaveatMapper,\n transactionInsightCaveatSpecifications,\n transactionInsightEndowmentBuilder,\n} from './transaction-insight';\nimport { webAssemblyEndowmentBuilder } from './web-assembly';\n\nexport const endowmentPermissionBuilders = {\n [networkAccessEndowmentBuilder.targetName]: networkAccessEndowmentBuilder,\n [transactionInsightEndowmentBuilder.targetName]:\n transactionInsightEndowmentBuilder,\n [cronjobEndowmentBuilder.targetName]: cronjobEndowmentBuilder,\n [ethereumProviderEndowmentBuilder.targetName]:\n ethereumProviderEndowmentBuilder,\n [rpcEndowmentBuilder.targetName]: rpcEndowmentBuilder,\n [webAssemblyEndowmentBuilder.targetName]: webAssemblyEndowmentBuilder,\n [nameLookupEndowmentBuilder.targetName]: nameLookupEndowmentBuilder,\n [lifecycleHooksEndowmentBuilder.targetName]: lifecycleHooksEndowmentBuilder,\n [keyringEndowmentBuilder.targetName]: keyringEndowmentBuilder,\n [homePageEndowmentBuilder.targetName]: homePageEndowmentBuilder,\n [signatureInsightEndowmentBuilder.targetName]:\n signatureInsightEndowmentBuilder,\n} as const;\n\nexport const endowmentCaveatSpecifications = {\n ...cronjobCaveatSpecifications,\n ...transactionInsightCaveatSpecifications,\n ...rpcCaveatSpecifications,\n ...nameLookupCaveatSpecifications,\n ...keyringCaveatSpecifications,\n ...signatureInsightCaveatSpecifications,\n ...maxRequestTimeCaveatSpecifications,\n};\n\nexport const endowmentCaveatMappers: Record<\n string,\n (value: Json) => Pick<PermissionConstraint, 'caveats'>\n> = {\n [cronjobEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getCronjobCaveatMapper,\n ),\n [transactionInsightEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getTransactionInsightCaveatMapper,\n ),\n [rpcEndowmentBuilder.targetName]:\n createMaxRequestTimeMapper(getRpcCaveatMapper),\n [nameLookupEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getNameLookupCaveatMapper,\n ),\n [keyringEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getKeyringCaveatMapper,\n ),\n [signatureInsightEndowmentBuilder.targetName]: createMaxRequestTimeMapper(\n getSignatureInsightCaveatMapper,\n ),\n [lifecycleHooksEndowmentBuilder.targetName]: getMaxRequestTimeCaveatMapper,\n [homePageEndowmentBuilder.targetName]: getMaxRequestTimeCaveatMapper,\n};\n\n// We allow null because a permitted handler does not have an endowment\nexport const handlerEndowments: Record<HandlerType, string | null> = {\n [HandlerType.OnRpcRequest]: rpcEndowmentBuilder.targetName,\n [HandlerType.OnTransaction]: transactionInsightEndowmentBuilder.targetName,\n [HandlerType.OnCronjob]: cronjobEndowmentBuilder.targetName,\n [HandlerType.OnNameLookup]: nameLookupEndowmentBuilder.targetName,\n [HandlerType.OnInstall]: lifecycleHooksEndowmentBuilder.targetName,\n [HandlerType.OnUpdate]: lifecycleHooksEndowmentBuilder.targetName,\n [HandlerType.OnKeyringRequest]: keyringEndowmentBuilder.targetName,\n [HandlerType.OnHomePage]: homePageEndowmentBuilder.targetName,\n [HandlerType.OnSignature]: signatureInsightEndowmentBuilder.targetName,\n [HandlerType.OnUserInput]: null,\n};\n\nexport * from './enum';\nexport { getRpcCaveatOrigins } from './rpc';\nexport { getSignatureOriginCaveat } from './signature-insight';\nexport { getTransactionOriginCaveat } from './transaction-insight';\nexport { getChainIdsCaveat, getLookupMatchersCaveat } from './name-lookup';\nexport { getKeyringCaveatOrigins } from './keyring';\nexport { getMaxRequestTimeCaveat } from './caveats';\nexport { getCronjobCaveatJobs } from './cronjob';\n"],"names":["endowmentPermissionBuilders","endowmentCaveatSpecifications","endowmentCaveatMappers","handlerEndowments","getRpcCaveatOrigins","getSignatureOriginCaveat","getTransactionOriginCaveat","getChainIdsCaveat","getLookupMatchersCaveat","getKeyringCaveatOrigins","getMaxRequestTimeCaveat","getCronjobCaveatJobs","networkAccessEndowmentBuilder","targetName","transactionInsightEndowmentBuilder","cronjobEndowmentBuilder","ethereumProviderEndowmentBuilder","rpcEndowmentBuilder","webAssemblyEndowmentBuilder","nameLookupEndowmentBuilder","lifecycleHooksEndowmentBuilder","keyringEndowmentBuilder","homePageEndowmentBuilder","signatureInsightEndowmentBuilder","cronjobCaveatSpecifications","transactionInsightCaveatSpecifications","rpcCaveatSpecifications","nameLookupCaveatSpecifications","keyringCaveatSpecifications","signatureInsightCaveatSpecifications","maxRequestTimeCaveatSpecifications","createMaxRequestTimeMapper","getCronjobCaveatMapper","getTransactionInsightCaveatMapper","getRpcCaveatMapper","getNameLookupCaveatMapper","getKeyringCaveatMapper","getSignatureInsightCaveatMapper","getMaxRequestTimeCaveatMapper","HandlerType","OnRpcRequest","OnTransaction","OnCronjob","OnNameLookup","OnInstall","OnUpdate","OnKeyringRequest","OnHomePage","OnSignature","OnUserInput"],"mappings":";;;;;;;;;;;IA6CaA,2BAA2B;eAA3BA;;IAiBAC,6BAA6B;eAA7BA;;IAUAC,sBAAsB;eAAtBA;;IA0BAC,iBAAiB;eAAjBA;;IAcJC,mBAAmB;eAAnBA,wBAAmB;;IACnBC,wBAAwB;eAAxBA,0CAAwB;;IACxBC,0BAA0B;eAA1BA,8CAA0B;;IAC1BC,iBAAiB;eAAjBA,6BAAiB;;IAAEC,uBAAuB;eAAvBA,mCAAuB;;IAC1CC,uBAAuB;eAAvBA,gCAAuB;;IACvBC,uBAAuB;eAAvBA,gCAAuB;;IACvBC,oBAAoB;eAApBA,6BAAoB;;;4BArHD;yBAOrB;yBAKA;kCAC0C;0BACR;yBAKlC;gCACwC;4BAKxC;+BACuC;qBAKvC;kCAKA;oCAKA;6BACqC;qBAoE9B;;;;;;;;;;;;;;AAlEP,MAAMX,8BAA8B;IACzC,CAACY,4CAA6B,CAACC,UAAU,CAAC,EAAED,4CAA6B;IACzE,CAACE,sDAAkC,CAACD,UAAU,CAAC,EAC7CC,sDAAkC;IACpC,CAACC,gCAAuB,CAACF,UAAU,CAAC,EAAEE,gCAAuB;IAC7D,CAACC,kDAAgC,CAACH,UAAU,CAAC,EAC3CG,kDAAgC;IAClC,CAACC,wBAAmB,CAACJ,UAAU,CAAC,EAAEI,wBAAmB;IACrD,CAACC,wCAA2B,CAACL,UAAU,CAAC,EAAEK,wCAA2B;IACrE,CAACC,sCAA0B,CAACN,UAAU,CAAC,EAAEM,sCAA0B;IACnE,CAACC,8CAA8B,CAACP,UAAU,CAAC,EAAEO,8CAA8B;IAC3E,CAACC,gCAAuB,CAACR,UAAU,CAAC,EAAEQ,gCAAuB;IAC7D,CAACC,kCAAwB,CAACT,UAAU,CAAC,EAAES,kCAAwB;IAC/D,CAACC,kDAAgC,CAACV,UAAU,CAAC,EAC3CU,kDAAgC;AACpC;AAEO,MAAMtB,gCAAgC;IAC3C,GAAGuB,oCAA2B;IAC9B,GAAGC,0DAAsC;IACzC,GAAGC,4BAAuB;IAC1B,GAAGC,0CAA8B;IACjC,GAAGC,oCAA2B;IAC9B,GAAGC,sDAAoC;IACvC,GAAGC,2CAAkC;AACvC;AAEO,MAAM5B,yBAGT;IACF,CAACa,gCAAuB,CAACF,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EAC9DC,+BAAsB;IAExB,CAAClB,sDAAkC,CAACD,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACzEE,qDAAiC;IAEnC,CAAChB,wBAAmB,CAACJ,UAAU,CAAC,EAC9BkB,IAAAA,mCAA0B,EAACG,uBAAkB;IAC/C,CAACf,sCAA0B,CAACN,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACjEI,qCAAyB;IAE3B,CAACd,gCAAuB,CAACR,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EAC9DK,+BAAsB;IAExB,CAACb,kDAAgC,CAACV,UAAU,CAAC,EAAEkB,IAAAA,mCAA0B,EACvEM,iDAA+B;IAEjC,CAACjB,8CAA8B,CAACP,UAAU,CAAC,EAAEyB,sCAA6B;IAC1E,CAAChB,kCAAwB,CAACT,UAAU,CAAC,EAAEyB,sCAA6B;AACtE;AAGO,MAAMnC,oBAAwD;IACnE,CAACoC,uBAAW,CAACC,YAAY,CAAC,EAAEvB,wBAAmB,CAACJ,UAAU;IAC1D,CAAC0B,uBAAW,CAACE,aAAa,CAAC,EAAE3B,sDAAkC,CAACD,UAAU;IAC1E,CAAC0B,uBAAW,CAACG,SAAS,CAAC,EAAE3B,gCAAuB,CAACF,UAAU;IAC3D,CAAC0B,uBAAW,CAACI,YAAY,CAAC,EAAExB,sCAA0B,CAACN,UAAU;IACjE,CAAC0B,uBAAW,CAACK,SAAS,CAAC,EAAExB,8CAA8B,CAACP,UAAU;IAClE,CAAC0B,uBAAW,CAACM,QAAQ,CAAC,EAAEzB,8CAA8B,CAACP,UAAU;IACjE,CAAC0B,uBAAW,CAACO,gBAAgB,CAAC,EAAEzB,gCAAuB,CAACR,UAAU;IAClE,CAAC0B,uBAAW,CAACQ,UAAU,CAAC,EAAEzB,kCAAwB,CAACT,UAAU;IAC7D,CAAC0B,uBAAW,CAACS,WAAW,CAAC,EAAEzB,kDAAgC,CAACV,UAAU;IACtE,CAAC0B,uBAAW,CAACU,WAAW,CAAC,EAAE;AAC7B"}
|