@rhinestone/sdk 0.8.1 → 0.8.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (119) hide show
  1. package/README.md +4 -4
  2. package/dist/src/accounts/index.d.ts.map +1 -0
  3. package/dist/src/accounts/index.test.d.ts +2 -0
  4. package/dist/src/accounts/index.test.d.ts.map +1 -0
  5. package/dist/src/accounts/index.test.js +35 -0
  6. package/dist/src/accounts/nexus.d.ts.map +1 -0
  7. package/dist/src/accounts/nexus.test.d.ts +2 -0
  8. package/dist/src/accounts/nexus.test.d.ts.map +1 -0
  9. package/dist/src/accounts/nexus.test.js +39 -0
  10. package/dist/src/accounts/safe.d.ts.map +1 -0
  11. package/dist/src/accounts/safe.test.d.ts +2 -0
  12. package/dist/src/accounts/safe.test.d.ts.map +1 -0
  13. package/dist/src/accounts/safe.test.js +39 -0
  14. package/dist/src/accounts/utils.d.ts.map +1 -0
  15. package/dist/src/accounts/utils.test.d.ts +2 -0
  16. package/dist/src/accounts/utils.test.d.ts.map +1 -0
  17. package/dist/src/accounts/utils.test.js +49 -0
  18. package/dist/src/execution/index.d.ts.map +1 -0
  19. package/dist/{execution → src/execution}/index.js +8 -2
  20. package/dist/src/execution/smart-session.d.ts.map +1 -0
  21. package/dist/src/execution/smart-session.test.d.ts +2 -0
  22. package/dist/src/execution/smart-session.test.d.ts.map +1 -0
  23. package/dist/src/execution/smart-session.test.js +133 -0
  24. package/dist/src/index.d.ts.map +1 -0
  25. package/dist/src/modules/abi/smart-sessions.d.ts +104 -0
  26. package/dist/src/modules/abi/smart-sessions.d.ts.map +1 -0
  27. package/dist/src/modules/common.d.ts.map +1 -0
  28. package/dist/src/modules/index.d.ts.map +1 -0
  29. package/dist/src/modules/index.test.d.ts +2 -0
  30. package/dist/src/modules/index.test.d.ts.map +1 -0
  31. package/dist/src/modules/index.test.js +104 -0
  32. package/dist/src/modules/omni-account.d.ts.map +1 -0
  33. package/dist/src/modules/validators/core.d.ts +8 -0
  34. package/dist/src/modules/validators/core.d.ts.map +1 -0
  35. package/dist/{modules → src/modules}/validators/core.js +0 -2
  36. package/dist/src/modules/validators/core.test.d.ts +2 -0
  37. package/dist/src/modules/validators/core.test.d.ts.map +1 -0
  38. package/dist/src/modules/validators/core.test.js +101 -0
  39. package/dist/src/modules/validators/index.d.ts.map +1 -0
  40. package/dist/{modules → src/modules}/validators/smart-sessions.d.ts +34 -0
  41. package/dist/src/modules/validators/smart-sessions.d.ts.map +1 -0
  42. package/dist/src/modules/validators/smart-sessions.test.d.ts +2 -0
  43. package/dist/src/modules/validators/smart-sessions.test.d.ts.map +1 -0
  44. package/dist/src/modules/validators/smart-sessions.test.js +226 -0
  45. package/dist/src/orchestrator/client.d.ts.map +1 -0
  46. package/dist/src/orchestrator/consts.d.ts.map +1 -0
  47. package/dist/src/orchestrator/error.d.ts.map +1 -0
  48. package/dist/src/orchestrator/index.d.ts.map +1 -0
  49. package/dist/{orchestrator → src/orchestrator}/registry.d.ts +4 -1
  50. package/dist/src/orchestrator/registry.d.ts.map +1 -0
  51. package/dist/{orchestrator → src/orchestrator}/registry.js +9 -0
  52. package/dist/src/orchestrator/types.d.ts.map +1 -0
  53. package/dist/src/orchestrator/utils.d.ts.map +1 -0
  54. package/dist/src/types.d.ts.map +1 -0
  55. package/dist/test/consts.d.ts +9 -0
  56. package/dist/test/consts.d.ts.map +1 -0
  57. package/dist/test/consts.js +20 -0
  58. package/package.json +1 -1
  59. package/dist/accounts/index.d.ts.map +0 -1
  60. package/dist/accounts/nexus.d.ts.map +0 -1
  61. package/dist/accounts/safe.d.ts.map +0 -1
  62. package/dist/accounts/utils.d.ts.map +0 -1
  63. package/dist/execution/index.d.ts.map +0 -1
  64. package/dist/execution/smart-session.d.ts.map +0 -1
  65. package/dist/index.d.ts.map +0 -1
  66. package/dist/modules/abi/smart-sessions.d.ts +0 -42
  67. package/dist/modules/abi/smart-sessions.d.ts.map +0 -1
  68. package/dist/modules/common.d.ts.map +0 -1
  69. package/dist/modules/index.d.ts.map +0 -1
  70. package/dist/modules/omni-account.d.ts.map +0 -1
  71. package/dist/modules/validators/core.d.ts +0 -23
  72. package/dist/modules/validators/core.d.ts.map +0 -1
  73. package/dist/modules/validators/index.d.ts.map +0 -1
  74. package/dist/modules/validators/smart-sessions.d.ts.map +0 -1
  75. package/dist/orchestrator/client.d.ts.map +0 -1
  76. package/dist/orchestrator/consts.d.ts.map +0 -1
  77. package/dist/orchestrator/error.d.ts.map +0 -1
  78. package/dist/orchestrator/index.d.ts.map +0 -1
  79. package/dist/orchestrator/registry.d.ts.map +0 -1
  80. package/dist/orchestrator/types.d.ts.map +0 -1
  81. package/dist/orchestrator/utils.d.ts.map +0 -1
  82. package/dist/types.d.ts.map +0 -1
  83. /package/dist/{accounts → src/accounts}/index.d.ts +0 -0
  84. /package/dist/{accounts → src/accounts}/index.js +0 -0
  85. /package/dist/{accounts → src/accounts}/nexus.d.ts +0 -0
  86. /package/dist/{accounts → src/accounts}/nexus.js +0 -0
  87. /package/dist/{accounts → src/accounts}/safe.d.ts +0 -0
  88. /package/dist/{accounts → src/accounts}/safe.js +0 -0
  89. /package/dist/{accounts → src/accounts}/utils.d.ts +0 -0
  90. /package/dist/{accounts → src/accounts}/utils.js +0 -0
  91. /package/dist/{execution → src/execution}/index.d.ts +0 -0
  92. /package/dist/{execution → src/execution}/smart-session.d.ts +0 -0
  93. /package/dist/{execution → src/execution}/smart-session.js +0 -0
  94. /package/dist/{index.d.ts → src/index.d.ts} +0 -0
  95. /package/dist/{index.js → src/index.js} +0 -0
  96. /package/dist/{modules → src/modules}/abi/smart-sessions.js +0 -0
  97. /package/dist/{modules → src/modules}/common.d.ts +0 -0
  98. /package/dist/{modules → src/modules}/common.js +0 -0
  99. /package/dist/{modules → src/modules}/index.d.ts +0 -0
  100. /package/dist/{modules → src/modules}/index.js +0 -0
  101. /package/dist/{modules → src/modules}/omni-account.d.ts +0 -0
  102. /package/dist/{modules → src/modules}/omni-account.js +0 -0
  103. /package/dist/{modules → src/modules}/validators/index.d.ts +0 -0
  104. /package/dist/{modules → src/modules}/validators/index.js +0 -0
  105. /package/dist/{modules → src/modules}/validators/smart-sessions.js +0 -0
  106. /package/dist/{orchestrator → src/orchestrator}/client.d.ts +0 -0
  107. /package/dist/{orchestrator → src/orchestrator}/client.js +0 -0
  108. /package/dist/{orchestrator → src/orchestrator}/consts.d.ts +0 -0
  109. /package/dist/{orchestrator → src/orchestrator}/consts.js +0 -0
  110. /package/dist/{orchestrator → src/orchestrator}/error.d.ts +0 -0
  111. /package/dist/{orchestrator → src/orchestrator}/error.js +0 -0
  112. /package/dist/{orchestrator → src/orchestrator}/index.d.ts +0 -0
  113. /package/dist/{orchestrator → src/orchestrator}/index.js +0 -0
  114. /package/dist/{orchestrator → src/orchestrator}/types.d.ts +0 -0
  115. /package/dist/{orchestrator → src/orchestrator}/types.js +0 -0
  116. /package/dist/{orchestrator → src/orchestrator}/utils.d.ts +0 -0
  117. /package/dist/{orchestrator → src/orchestrator}/utils.js +0 -0
  118. /package/dist/{types.d.ts → src/types.d.ts} +0 -0
  119. /package/dist/{types.js → src/types.js} +0 -0
@@ -0,0 +1,104 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const vitest_1 = require("vitest");
4
+ const consts_1 = require("../../test/consts");
5
+ const index_1 = require("./index");
6
+ (0, vitest_1.describe)('Modules', () => {
7
+ (0, vitest_1.describe)('Setup', () => {
8
+ (0, vitest_1.test)('should use ownable validator for ECDSA owners', () => {
9
+ const config = {
10
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
11
+ owners: {
12
+ type: 'ecdsa',
13
+ accounts: [consts_1.accountA],
14
+ threshold: 1,
15
+ },
16
+ };
17
+ const setup = (0, index_1.getSetup)(config);
18
+ (0, vitest_1.expect)(setup.validators[0].address).toBe('0x2483DA3A338895199E5e538530213157e931Bf06');
19
+ (0, vitest_1.expect)(setup.validators[0].type).toBe(1n);
20
+ });
21
+ (0, vitest_1.test)('should use webauthn validator for passkey owners', () => {
22
+ const config = {
23
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
24
+ owners: {
25
+ type: 'passkey',
26
+ account: consts_1.passkeyAccount,
27
+ },
28
+ };
29
+ const setup = (0, index_1.getSetup)(config);
30
+ (0, vitest_1.expect)(setup.validators).toHaveLength(1);
31
+ (0, vitest_1.expect)(setup.validators[0].address).toBe('0x2f167e55d42584f65e2e30a748f41ee75a311414');
32
+ (0, vitest_1.expect)(setup.validators[0].type).toBe(1n);
33
+ });
34
+ (0, vitest_1.test)('should use smart session validator when sessions are enabled', () => {
35
+ const config = {
36
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
37
+ owners: {
38
+ type: 'ecdsa',
39
+ accounts: [consts_1.accountA],
40
+ threshold: 1,
41
+ },
42
+ sessions: [
43
+ {
44
+ owners: {
45
+ type: 'ecdsa',
46
+ accounts: [consts_1.accountB],
47
+ threshold: 1,
48
+ },
49
+ },
50
+ ],
51
+ };
52
+ const setup = (0, index_1.getSetup)(config);
53
+ const smartSessionValidator = setup.validators.find((validator) => validator.address === '0x00000000002b0ecfbd0496ee71e01257da0e37de');
54
+ if (!smartSessionValidator) {
55
+ return;
56
+ }
57
+ (0, vitest_1.expect)(smartSessionValidator.type).toBe(1n);
58
+ });
59
+ (0, vitest_1.test)('should use smart session compatibility fallback for safe accounts with sessions', () => {
60
+ const config = {
61
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
62
+ owners: {
63
+ type: 'ecdsa',
64
+ accounts: [consts_1.accountA],
65
+ threshold: 1,
66
+ },
67
+ sessions: [
68
+ {
69
+ owners: {
70
+ type: 'ecdsa',
71
+ accounts: [consts_1.accountB],
72
+ threshold: 1,
73
+ },
74
+ },
75
+ ],
76
+ account: {
77
+ type: 'safe',
78
+ },
79
+ };
80
+ const setup = (0, index_1.getSetup)(config);
81
+ const smartSessionFallback = setup.fallbacks.find((fallback) => fallback.address === '0x12cae64c42f362e7d5a847c2d33388373f629177');
82
+ (0, vitest_1.expect)(smartSessionFallback).toBeDefined();
83
+ if (!smartSessionFallback) {
84
+ return;
85
+ }
86
+ (0, vitest_1.expect)(smartSessionFallback.type).toBe(3n);
87
+ });
88
+ vitest_1.test.todo('using the omni account should install the necessary modules');
89
+ });
90
+ (0, vitest_1.describe)('WebAuthn Validator Signature', () => {
91
+ (0, vitest_1.test)('default', () => {
92
+ const signature = (0, index_1.getWebauthnValidatorSignature)({
93
+ webauthn: {
94
+ authenticatorData: '0x49960de5880e8c687434170f6476605b8fe4aeb9a28632c7995cf3ba831d97631d00000000',
95
+ clientDataJSON: '{"type":"webauthn.get","challenge":"tbxXNFS9X_4Byr1cMwqKrIGB-_30a0QhZ6y7ucM0BOE","origin":"http://localhost:3000","crossOrigin":false, "other_keys_can_be_added_here":"do not compare clientDataJSON against a template. See https://goo.gl/yabPex"}',
96
+ typeIndex: 44941127272049826721201904734628716258498742255959991581049806490182030242267n,
97
+ },
98
+ signature: '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',
99
+ usePrecompiled: true,
100
+ });
101
+ (0, vitest_1.expect)(signature).toEqual('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');
102
+ });
103
+ });
104
+ });
@@ -0,0 +1 @@
1
+ {"version":3,"file":"omni-account.d.ts","sourceRoot":"","sources":["../../../modules/omni-account.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,MAAM,CAAA;AAEnC,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAE9C,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAC9C,QAAA,MAAM,2BAA2B,EAAE,OACW,CAAA;AAE9C,QAAA,MAAM,YAAY,EAAE,OAAsD,CAAA;AAC1E,QAAA,MAAM,qBAAqB,EAAE,OACiB,CAAA;AAC9C,QAAA,MAAM,yBAAyB,EAAE,OACa,CAAA;AAE9C,OAAO,EACL,kCAAkC,EAClC,kCAAkC,EAClC,2BAA2B,EAC3B,YAAY,EACZ,qBAAqB,EACrB,yBAAyB,GAC1B,CAAA"}
@@ -0,0 +1,8 @@
1
+ import { type Hex } from 'viem';
2
+ import type { OwnerSet, RhinestoneAccountConfig } from '../../types';
3
+ import { type Module } from '../common';
4
+ declare function getOwnerValidator(config: RhinestoneAccountConfig): Module;
5
+ declare function getMockSignature(ownerSet: OwnerSet): Hex;
6
+ declare function getValidator(owners: OwnerSet): Module;
7
+ export { getOwnerValidator, getValidator, getMockSignature };
8
+ //# sourceMappingURL=core.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"core.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,KAAK,GAAG,EAIT,MAAM,MAAM,CAAA;AAEb,OAAO,KAAK,EAAE,QAAQ,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAA;AAEpE,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AAwBjE,iBAAS,iBAAiB,CAAC,MAAM,EAAE,uBAAuB,UAEzD;AAED,iBAAS,gBAAgB,CAAC,QAAQ,EAAE,QAAQ,GAAG,GAAG,CAUjD;AAED,iBAAS,YAAY,CAAC,MAAM,EAAE,QAAQ,UAarC;AAkGD,OAAO,EAAE,iBAAiB,EAAE,YAAY,EAAE,gBAAgB,EAAE,CAAA"}
@@ -2,8 +2,6 @@
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.getOwnerValidator = getOwnerValidator;
4
4
  exports.getValidator = getValidator;
5
- exports.getOwnableValidator = getOwnableValidator;
6
- exports.getWebAuthnValidator = getWebAuthnValidator;
7
5
  exports.getMockSignature = getMockSignature;
8
6
  const viem_1 = require("viem");
9
7
  const common_1 = require("../common");
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=core.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"core.test.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,101 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const viem_1 = require("viem");
4
+ const vitest_1 = require("vitest");
5
+ const consts_1 = require("../../../test/consts");
6
+ const common_1 = require("../common");
7
+ const core_1 = require("./core");
8
+ (0, vitest_1.describe)('Validators Core', () => {
9
+ (0, vitest_1.describe)('Validator', () => {
10
+ (0, vitest_1.test)('ECDSA: single address', () => {
11
+ const validator = (0, core_1.getValidator)({
12
+ type: 'ecdsa',
13
+ accounts: [consts_1.accountA],
14
+ });
15
+ (0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
16
+ (0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
17
+ (0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
18
+ (0, vitest_1.expect)(validator.initData).toEqual('0x000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000001000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
19
+ });
20
+ (0, vitest_1.test)('ECDSA: two addresses', () => {
21
+ const validator = (0, core_1.getValidator)({
22
+ type: 'ecdsa',
23
+ accounts: [consts_1.accountA, consts_1.accountB],
24
+ });
25
+ (0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
26
+ (0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
27
+ (0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
28
+ (0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000020000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
29
+ });
30
+ (0, vitest_1.test)('ECDSA: three addresses, custom threshold', () => {
31
+ const validator = (0, core_1.getValidator)({
32
+ type: 'ecdsa',
33
+ accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
34
+ threshold: 2,
35
+ });
36
+ (0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
37
+ (0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
38
+ (0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
39
+ (0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000030000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000c27b7578151c5ef713c62c65db09763d57ac3596000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
40
+ });
41
+ (0, vitest_1.test)('Passkey', () => {
42
+ const validator = (0, core_1.getValidator)({
43
+ type: 'passkey',
44
+ account: consts_1.passkeyAccount,
45
+ });
46
+ (0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
47
+ (0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
48
+ (0, vitest_1.expect)(validator.address).toEqual('0x2f167e55d42584f65e2e30a748f41ee75a311414');
49
+ (0, vitest_1.expect)(validator.initData).toEqual('0x580a9af0569ad3905b26a703201b358aa0904236642ebe79b22a19d00d3737637d46f725a5427ae45a9569259bf67e1e16b187d7b3ad1ed70138c4f0409677d19c9a01073b202db2ed56e604ad11db557d8c3ad75181619597f21b830f2da82a');
50
+ });
51
+ });
52
+ (0, vitest_1.describe)('Mock Signature', () => {
53
+ (0, vitest_1.test)('ECDSA: single address', () => {
54
+ const signature = (0, core_1.getMockSignature)({
55
+ type: 'ecdsa',
56
+ accounts: [consts_1.accountA],
57
+ });
58
+ (0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(65);
59
+ });
60
+ (0, vitest_1.test)('ECDSA: multiple addresses', () => {
61
+ const signature = (0, core_1.getMockSignature)({
62
+ type: 'ecdsa',
63
+ accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
64
+ });
65
+ (0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(3 * 65);
66
+ });
67
+ (0, vitest_1.test)('Passkey', () => {
68
+ const signature = (0, core_1.getMockSignature)({
69
+ type: 'passkey',
70
+ account: consts_1.passkeyAccount,
71
+ });
72
+ // Should have the proper schema
73
+ (0, viem_1.decodeAbiParameters)([
74
+ {
75
+ type: 'bytes',
76
+ name: 'authenticatorData',
77
+ },
78
+ {
79
+ type: 'string',
80
+ name: 'clientDataJSON',
81
+ },
82
+ {
83
+ type: 'uint256',
84
+ name: 'challengeIndex',
85
+ },
86
+ {
87
+ type: 'uint256',
88
+ name: 'typeIndex',
89
+ },
90
+ {
91
+ type: 'uint256',
92
+ name: 'r',
93
+ },
94
+ {
95
+ type: 'uint256',
96
+ name: 's',
97
+ },
98
+ ], signature);
99
+ });
100
+ });
101
+ });
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../modules/validators/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,QAAQ,CAAA;AAC5D,OAAO,EACL,2BAA2B,EAC3B,sBAAsB,EACtB,oBAAoB,EACpB,eAAe,EACf,+BAA+B,EAC/B,wBAAwB,EACxB,gBAAgB,EAChB,yBAAyB,EACzB,sBAAsB,EACtB,gCAAgC,EACjC,MAAM,kBAAkB,CAAA;AAEzB,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,iBAAiB,EACjB,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,gBAAgB,EAChB,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA"}
@@ -1,6 +1,39 @@
1
1
  import { type Address, type Chain, type Hex, type PublicClient } from 'viem';
2
2
  import type { RhinestoneAccountConfig, Session } from '../../types';
3
3
  import { type Module } from '../common';
4
+ interface SessionData {
5
+ sessionValidator: Address;
6
+ sessionValidatorInitData: Hex;
7
+ salt: Hex;
8
+ userOpPolicies: readonly UserOpPolicy[];
9
+ erc7739Policies: {
10
+ allowedERC7739Content: readonly AllowedERC7739Content[];
11
+ erc1271Policies: readonly ERC1271Policy[];
12
+ };
13
+ actions: readonly ActionData[];
14
+ permitERC4337Paymaster: boolean;
15
+ }
16
+ interface UserOpPolicy {
17
+ policy: Address;
18
+ initData: Hex;
19
+ }
20
+ interface ERC1271Policy {
21
+ policy: Address;
22
+ initData: Hex;
23
+ }
24
+ interface AllowedERC7739Content {
25
+ appDomainSeparator: Hex;
26
+ contentName: readonly string[];
27
+ }
28
+ interface ActionData {
29
+ actionTarget: Address;
30
+ actionTargetSelector: Hex;
31
+ actionPolicies: readonly PolicyData[];
32
+ }
33
+ interface PolicyData {
34
+ policy: Address;
35
+ initData: Hex;
36
+ }
4
37
  type SmartSessionModeType = typeof SMART_SESSION_MODE_USE | typeof SMART_SESSION_MODE_ENABLE | typeof SMART_SESSION_MODE_UNSAFE_ENABLE;
5
38
  declare const SMART_SESSIONS_VALIDATOR_ADDRESS: Address;
6
39
  declare const SMART_SESSION_MODE_USE = "0x00";
@@ -26,4 +59,5 @@ declare function getAccountEIP712Domain(client: PublicClient, account: Address):
26
59
  salt: `0x${string}`;
27
60
  }>;
28
61
  export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
62
+ export type { SessionData };
29
63
  //# sourceMappingURL=smart-sessions.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"smart-sessions.d.ts","sourceRoot":"","sources":["../../../../modules/validators/smart-sessions.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,KAAK,EAKV,KAAK,GAAG,EAIR,KAAK,YAAY,EAKlB,MAAM,MAAM,CAAA;AAMb,OAAO,KAAK,EAEV,uBAAuB,EACvB,OAAO,EAER,MAAM,aAAa,CAAA;AAEpB,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AAWjE,UAAU,WAAW;IACnB,gBAAgB,EAAE,OAAO,CAAA;IACzB,wBAAwB,EAAE,GAAG,CAAA;IAC7B,IAAI,EAAE,GAAG,CAAA;IACT,cAAc,EAAE,SAAS,YAAY,EAAE,CAAA;IACvC,eAAe,EAAE;QACf,qBAAqB,EAAE,SAAS,qBAAqB,EAAE,CAAA;QACvD,eAAe,EAAE,SAAS,aAAa,EAAE,CAAA;KAC1C,CAAA;IACD,OAAO,EAAE,SAAS,UAAU,EAAE,CAAA;IAC9B,sBAAsB,EAAE,OAAO,CAAA;CAChC;AAED,UAAU,YAAY;IACpB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAED,UAAU,aAAa;IACrB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAED,UAAU,qBAAqB;IAC7B,kBAAkB,EAAE,GAAG,CAAA;IACvB,WAAW,EAAE,SAAS,MAAM,EAAE,CAAA;CAC/B;AAED,UAAU,UAAU;IAClB,YAAY,EAAE,OAAO,CAAA;IACrB,oBAAoB,EAAE,GAAG,CAAA;IACzB,cAAc,EAAE,SAAS,UAAU,EAAE,CAAA;CACtC;AAED,UAAU,UAAU;IAClB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAaD,KAAK,oBAAoB,GACrB,OAAO,sBAAsB,GAC7B,OAAO,yBAAyB,GAChC,OAAO,gCAAgC,CAAA;AAE3C,QAAA,MAAM,gCAAgC,EAAE,OACM,CAAA;AAE9C,QAAA,MAAM,sBAAsB,SAAS,CAAA;AACrC,QAAA,MAAM,yBAAyB,SAAS,CAAA;AACxC,QAAA,MAAM,gCAAgC,SAAS,CAAA;AAyB/C,iBAAe,oBAAoB,CAAC,KAAK,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO;;;GAsBjE;AA6BD,iBAAe,+BAA+B,CAAC,KAAK,EAAE,KAAK;;;GAgB1D;AA0DD,iBAAS,wBAAwB,CAC/B,MAAM,EAAE,uBAAuB,GAC9B,MAAM,GAAG,IAAI,CAWf;AA8KD,iBAAe,gBAAgB,CAC7B,MAAM,EAAE,YAAY,EACpB,OAAO,EAAE,OAAO,EAChB,YAAY,EAAE,GAAG,oBAiClB;AAED,iBAAS,2BAA2B,CAClC,IAAI,EAAE,oBAAoB,EAC1B,YAAY,EAAE,GAAG,EACjB,SAAS,EAAE,GAAG,iBAcf;AAED,iBAAS,eAAe,CAAC,OAAO,EAAE,OAAO,iBAyBxC;AAED,iBAAe,sBAAsB,CAAC,MAAM,EAAE,YAAY,EAAE,OAAO,EAAE,OAAO;;;;;;GAoD3E;AAED,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA;AACD,YAAY,EAAE,WAAW,EAAE,CAAA"}
@@ -0,0 +1,2 @@
1
+ export {};
2
+ //# sourceMappingURL=smart-sessions.test.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"smart-sessions.test.d.ts","sourceRoot":"","sources":["../../../../modules/validators/smart-sessions.test.ts"],"names":[],"mappings":""}
@@ -0,0 +1,226 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ const viem_1 = require("viem");
4
+ const chains_1 = require("viem/chains");
5
+ const vitest_1 = require("vitest");
6
+ const consts_1 = require("../../../test/consts");
7
+ const smart_sessions_1 = require("../abi/smart-sessions");
8
+ const common_1 = require("../common");
9
+ const smart_sessions_2 = require("./smart-sessions");
10
+ (0, vitest_1.describe)('Smart Sessions', () => {
11
+ (0, vitest_1.describe)('Permission ID', () => {
12
+ (0, vitest_1.test)('default', () => {
13
+ (0, vitest_1.expect)((0, smart_sessions_2.getPermissionId)({
14
+ owners: {
15
+ type: 'ecdsa',
16
+ accounts: [consts_1.accountA, consts_1.accountB],
17
+ },
18
+ })).toBe('0xa16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344');
19
+ });
20
+ (0, vitest_1.test)('with salt', () => {
21
+ (0, vitest_1.expect)((0, smart_sessions_2.getPermissionId)({
22
+ owners: {
23
+ type: 'ecdsa',
24
+ accounts: [consts_1.accountA, consts_1.accountB],
25
+ },
26
+ salt: '0x97340e1cfff3319c76ef22b2bc9d3231071d550125d68c9d4a8972823f166320',
27
+ })).toBe('0x85ff7cd77e7e0f8fbc2e42c86cdb948e4c79ac5a5e4595def4c38d7ed804eef9');
28
+ });
29
+ });
30
+ (0, vitest_1.describe)('Smart Session Validator', () => {
31
+ (0, vitest_1.test)('no session', () => {
32
+ (0, vitest_1.expect)((0, smart_sessions_2.getSmartSessionValidator)({
33
+ owners: {
34
+ type: 'ecdsa',
35
+ accounts: [consts_1.accountA],
36
+ },
37
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
38
+ })).toBeNull();
39
+ });
40
+ (0, vitest_1.test)('empty session list', () => {
41
+ (0, vitest_1.expect)((0, smart_sessions_2.getSmartSessionValidator)({
42
+ owners: {
43
+ type: 'ecdsa',
44
+ accounts: [consts_1.accountA],
45
+ },
46
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
47
+ sessions: [],
48
+ })).not.toBeNull();
49
+ });
50
+ (0, vitest_1.test)('single session', () => {
51
+ const validator = (0, smart_sessions_2.getSmartSessionValidator)({
52
+ owners: {
53
+ type: 'ecdsa',
54
+ accounts: [consts_1.accountA],
55
+ },
56
+ rhinestoneApiKey: consts_1.MOCK_API_KEY,
57
+ sessions: [
58
+ {
59
+ owners: {
60
+ type: 'ecdsa',
61
+ accounts: [consts_1.accountA],
62
+ },
63
+ },
64
+ ],
65
+ });
66
+ (0, vitest_1.expect)(validator).not.toBeNull();
67
+ (0, vitest_1.expect)(validator?.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
68
+ (0, vitest_1.expect)(validator && (0, viem_1.isAddress)(validator.address)).toEqual(true);
69
+ });
70
+ });
71
+ (0, vitest_1.describe)('Enable Session Call', () => {
72
+ vitest_1.vi.mock('viem', async (importOriginal) => {
73
+ const actual = await importOriginal();
74
+ return {
75
+ // @ts-ignore
76
+ ...actual,
77
+ createPublicClient: vitest_1.vi.fn().mockReturnValue({
78
+ readContract: vitest_1.vi.fn(),
79
+ }),
80
+ };
81
+ });
82
+ const client = viem_1.createPublicClient;
83
+ client.mockImplementation((_) => {
84
+ return {
85
+ readContract: (params) => {
86
+ if (params.functionName === 'DOMAIN_SEPARATOR') {
87
+ return '0xf5f6dfa751763cc5278cba45d03ea9797c1660b2cb7f5ffd188fa3e8523abdca';
88
+ }
89
+ throw new Error('Unknown function call');
90
+ },
91
+ };
92
+ });
93
+ const TARGET = '0x063DFbDb1610EC7BbfA1fFBE603Ac5aA1B67a935';
94
+ const SELECTOR = '0x12345678';
95
+ const FALLBACK_TARGET = '0x0000000000000000000000000000000000000001';
96
+ const FALLBACK_SELECTOR = '0x00000001';
97
+ (0, vitest_1.test)('default', async () => {
98
+ const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
99
+ owners: {
100
+ type: 'ecdsa',
101
+ accounts: [consts_1.accountA],
102
+ },
103
+ });
104
+ const sessionData = toSessionData(call);
105
+ // Should have a fallback action
106
+ (0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === FALLBACK_TARGET &&
107
+ action.actionTargetSelector === FALLBACK_SELECTOR)).toEqual(true);
108
+ });
109
+ (0, vitest_1.test)('with action', async () => {
110
+ const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
111
+ owners: {
112
+ type: 'ecdsa',
113
+ accounts: [consts_1.accountA],
114
+ },
115
+ actions: [
116
+ {
117
+ target: TARGET,
118
+ selector: SELECTOR,
119
+ },
120
+ ],
121
+ });
122
+ const sessionData = toSessionData(call);
123
+ // Should have the action
124
+ (0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === TARGET &&
125
+ action.actionTargetSelector === SELECTOR)).toEqual(true);
126
+ // Should not have the fallback action
127
+ (0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === FALLBACK_TARGET &&
128
+ action.actionTargetSelector === FALLBACK_SELECTOR)).toEqual(false);
129
+ });
130
+ (0, vitest_1.test)('with policy', async () => {
131
+ const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
132
+ owners: {
133
+ type: 'ecdsa',
134
+ accounts: [consts_1.accountA],
135
+ },
136
+ policies: [
137
+ {
138
+ type: 'sudo',
139
+ },
140
+ {
141
+ type: 'universal-action',
142
+ rules: [
143
+ {
144
+ condition: 'equal',
145
+ calldataOffset: 0n,
146
+ referenceValue: '0xd8da6bf26964af9d7eed9e03e53415d37aa96045',
147
+ },
148
+ ],
149
+ },
150
+ ],
151
+ });
152
+ const sessionData = toSessionData(call);
153
+ // Should have two policies
154
+ (0, vitest_1.expect)(sessionData.userOpPolicies.length).toEqual(2);
155
+ (0, vitest_1.expect)((0, viem_1.isAddress)(sessionData.userOpPolicies[0].policy)).toEqual(true);
156
+ (0, vitest_1.expect)((0, viem_1.isHex)(sessionData.userOpPolicies[0].initData)).toEqual(true);
157
+ (0, vitest_1.expect)((0, viem_1.isAddress)(sessionData.userOpPolicies[1].policy)).toEqual(true);
158
+ (0, vitest_1.expect)((0, viem_1.isHex)(sessionData.userOpPolicies[1].initData)).toEqual(true);
159
+ });
160
+ (0, vitest_1.test)('with action policy', async () => {
161
+ const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
162
+ owners: {
163
+ type: 'ecdsa',
164
+ accounts: [consts_1.accountA],
165
+ },
166
+ actions: [
167
+ {
168
+ target: TARGET,
169
+ selector: SELECTOR,
170
+ policies: [
171
+ {
172
+ type: 'sudo',
173
+ },
174
+ {
175
+ type: 'universal-action',
176
+ rules: [
177
+ {
178
+ condition: 'equal',
179
+ calldataOffset: 0n,
180
+ referenceValue: '0xd8da6bf26964af9d7eed9e03e53415d37aa96045',
181
+ },
182
+ ],
183
+ },
184
+ ],
185
+ },
186
+ ],
187
+ });
188
+ const sessionData = toSessionData(call);
189
+ // Should have the action
190
+ const action = sessionData.actions.find((action) => action.actionTarget === TARGET &&
191
+ action.actionTargetSelector === SELECTOR);
192
+ (0, vitest_1.expect)(action).toBeDefined();
193
+ if (!action) {
194
+ throw new Error('No action');
195
+ }
196
+ // Should have 2 policies
197
+ const actionPolicies = action.actionPolicies;
198
+ (0, vitest_1.expect)(actionPolicies.length).toEqual(2);
199
+ (0, vitest_1.expect)((0, viem_1.isAddress)(actionPolicies[0].policy)).toEqual(true);
200
+ (0, vitest_1.expect)((0, viem_1.isHex)(actionPolicies[0].initData)).toEqual(true);
201
+ (0, vitest_1.expect)((0, viem_1.isAddress)(actionPolicies[1].policy)).toEqual(true);
202
+ (0, vitest_1.expect)((0, viem_1.isHex)(actionPolicies[1].initData)).toEqual(true);
203
+ });
204
+ function toSessionData(call) {
205
+ (0, vitest_1.expect)((0, viem_1.isHex)(call.data)).toEqual(true);
206
+ (0, vitest_1.expect)((0, viem_1.isAddress)(call.to)).toEqual(true);
207
+ const decoded = (0, viem_1.decodeFunctionData)({
208
+ abi: smart_sessions_1.enableSessionsAbi,
209
+ data: call.data,
210
+ });
211
+ (0, vitest_1.expect)(decoded.functionName).toEqual('enableSessions');
212
+ (0, vitest_1.expect)(decoded.args.length).toEqual(1);
213
+ (0, vitest_1.expect)(decoded.args[0].length).toEqual(1);
214
+ const session = decoded.args[0][0];
215
+ return session;
216
+ }
217
+ });
218
+ (0, vitest_1.describe)('Encode Smart Session Signature', () => {
219
+ (0, vitest_1.test)('use mode', () => {
220
+ const permissionId = '0xa16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344';
221
+ const signature = '0xabcdef';
222
+ const sessionSignature = (0, smart_sessions_2.encodeSmartSessionSignature)(smart_sessions_2.SMART_SESSION_MODE_USE, permissionId, signature);
223
+ (0, vitest_1.expect)(sessionSignature).toEqual('0x00a16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344abcdef');
224
+ });
225
+ });
226
+ });
@@ -0,0 +1 @@
1
+ {"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../orchestrator/client.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,OAAO,EAAU,KAAK,GAAG,EAAE,MAAM,MAAM,CAAA;AACrD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAG7D,OAAO,KAAK,EACV,WAAW,EACX,YAAY,EACZ,UAAU,EACV,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAShB,qBAAa,YAAY;IACvB,OAAO,CAAC,SAAS,CAAQ;IACzB,OAAO,CAAC,MAAM,CAAQ;gBAEV,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;IAKvC,YAAY,CAChB,WAAW,EAAE,OAAO,EACpB,MAAM,CAAC,EAAE;QACP,QAAQ,CAAC,EAAE,MAAM,EAAE,CAAA;QACnB,MAAM,CAAC,EAAE;YACP,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,EAAE,CAAA;SAC7B,CAAA;KACF,GACA,OAAO,CAAC,gBAAgB,EAAE,CAAC;IAwCxB,iBAAiB,CACrB,WAAW,EAAE,OAAO,EACpB,aAAa,EAAE,MAAM,EACrB,kBAAkB,EAAE,OAAO,EAC3B,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC;IAgCZ,aAAa,CACjB,MAAM,EAAE,aAAa,EACrB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,eAAe,CAAC;IAqBrB,YAAY,CAChB,MAAM,EAAE,UAAU,EAClB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,SAAS,CAAC;IAgCf,qBAAqB,CACzB,kBAAkB,EAAE;QAClB,iBAAiB,EAAE,uBAAuB,CAAA;QAC1C,QAAQ,CAAC,EAAE,GAAG,CAAA;QACd,MAAM,CAAC,EAAE,aAAa,CAAA;KACvB,EAAE,GACF,OAAO,CAAC,qBAAqB,CAAC;IA2C3B,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyBxD,iBAAiB,CACrB,KAAK,GAAE,MAAW,EAClB,MAAM,GAAE,MAAU,GACjB,OAAO,CAAC;QAAE,cAAc,EAAE,WAAW,EAAE,CAAC;QAAC,UAAU,CAAC,EAAE,MAAM,CAAA;KAAE,CAAC;IAuBlE,OAAO,CAAC,UAAU;CA6DnB"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"consts.d.ts","sourceRoot":"","sources":["../../../orchestrator/consts.ts"],"names":[],"mappings":"AAAA,QAAA,MAAM,qBAAqB,wCAAwC,CAAA;AACnE,QAAA,MAAM,oBAAoB,4CAA4C,CAAA;AACtE,QAAA,MAAM,6BAA6B,+CACW,CAAA;AAE9C,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,6BAA6B,GAC9B,CAAA"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../../../orchestrator/error.ts"],"names":[],"mappings":"AAAA,qBAAa,iBAAkB,SAAQ,KAAK;IAC1C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAQ;IACjC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAK;IAC9B,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAQ;IACnC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAQ;gBAErB,MAAM,CAAC,EAAE;QACnB,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,OAAO,CAAC,EAAE,GAAG,CAAA;QACb,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,OAAO,CAAC,EAAE,MAAM,CAAA;KACjB;IAQD,IAAI,OAAO,WAEV;IAED,IAAI,OAAO,QAEV;IAED,IAAI,SAAS,WAEZ;IAED,IAAI,OAAO,WAEV;CACF;AAED,wBAAgB,mBAAmB,CAAC,KAAK,EAAE,KAAK,GAAG,KAAK,IAAI,iBAAiB,CAE5E"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../orchestrator/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,UAAU,CAAA;AACvC,OAAO,EAAyB,6BAA6B,EAAE,MAAM,UAAU,CAAA;AAC/E,OAAO,EAAE,mBAAmB,EAAE,iBAAiB,EAAE,MAAM,SAAS,CAAA;AAChE,OAAO,EACL,cAAc,EACd,6BAA6B,EAC7B,yBAAyB,EACzB,kBAAkB,EAClB,sBAAsB,EACtB,eAAe,EACf,mBAAmB,EACnB,uBAAuB,EACvB,cAAc,EACd,cAAc,EACd,uBAAuB,EACxB,MAAM,YAAY,CAAA;AACnB,OAAO,KAAK,EACV,YAAY,EACZ,SAAS,EACT,UAAU,EACV,iBAAiB,EACjB,SAAS,EACT,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAChB,OAAO,EACL,uBAAuB,EACvB,qBAAqB,EACrB,oBAAoB,EACpB,oBAAoB,EACpB,iCAAiC,EACjC,qBAAqB,EACrB,0BAA0B,EAC1B,qBAAqB,EACtB,MAAM,SAAS,CAAA;AAChB,OAAO,EACL,uBAAuB,EACvB,gBAAgB,EAChB,cAAc,EACd,kBAAkB,EACnB,MAAM,SAAS,CAAA;AAEhB,iBAAS,eAAe,CACtB,MAAM,EAAE,MAAM,EACd,eAAe,CAAC,EAAE,MAAM,GACvB,YAAY,CAEd;AAED,YAAY,EACV,SAAS,EACT,YAAY,EACZ,UAAU,EACV,iBAAiB,EACjB,SAAS,EACT,uBAAuB,EACvB,qBAAqB,EACrB,SAAS,EACT,eAAe,EACf,aAAa,EACb,gBAAgB,GACjB,CAAA;AACD,OAAO,EACL,gBAAgB,IAAI,YAAY,EAChC,qBAAqB,EACrB,qBAAqB,EACrB,iCAAiC,EACjC,uBAAuB,EACvB,oBAAoB,EACpB,oBAAoB,EACpB,0BAA0B,EAC1B,qBAAqB,EACrB,6BAA6B,EAC7B,YAAY,EACZ,iBAAiB,EACjB,eAAe,EACf,kBAAkB,EAClB,cAAc,EACd,cAAc,EACd,mBAAmB,EACnB,uBAAuB,EACvB,cAAc,EACd,cAAc,EACd,yBAAyB,EACzB,sBAAsB,EACtB,6BAA6B,EAC7B,eAAe,EACf,kBAAkB,EAClB,mBAAmB,EACnB,uBAAuB,EACvB,uBAAuB,GACxB,CAAA"}
@@ -13,5 +13,8 @@ declare function getChainById(chainId: number): Chain | undefined;
13
13
  declare function isTestnet(chainId: number): boolean;
14
14
  declare function isTokenAddressSupported(address: Address, chainId: number): boolean;
15
15
  declare function getSupportedTokens(chainId: number): TokenConfig[];
16
- export { getTokenSymbol, getTokenAddress, getTokenRootBalanceSlot, getTokenBalanceSlot, getWethAddress, getHookAddress, getSameChainModuleAddress, getTargetModuleAddress, getRhinestoneSpokePoolAddress, getChainById, getSupportedTokens, isTestnet, isTokenAddressSupported, };
16
+ declare function getDefaultAccountAccessList(): {
17
+ chainIds: (1 | 10 | 8453 | 42161)[];
18
+ };
19
+ export { getTokenSymbol, getTokenAddress, getTokenRootBalanceSlot, getTokenBalanceSlot, getWethAddress, getHookAddress, getSameChainModuleAddress, getTargetModuleAddress, getRhinestoneSpokePoolAddress, getChainById, getSupportedTokens, isTestnet, isTokenAddressSupported, getDefaultAccountAccessList, };
17
20
  //# sourceMappingURL=registry.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"registry.d.ts","sourceRoot":"","sources":["../../../orchestrator/registry.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,KAAK,EAEV,KAAK,GAAG,EAGT,MAAM,MAAM,CAAA;AAcb,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAA;AAErC,iBAAS,cAAc,CAAC,KAAK,EAAE,KAAK,0UAoCnC;AAwCD,iBAAS,uBAAuB,CAC9B,KAAK,EAAE,KAAK,EACZ,YAAY,EAAE,OAAO,GACpB,MAAM,GAAG,IAAI,CAqJf;AAED,iBAAS,mBAAmB,CAC1B,WAAW,EAAE,MAAM,EACnB,OAAO,EAAE,MAAM,EACf,cAAc,EAAE,OAAO,GACtB,GAAG,CAgBL;AAED,iBAAS,cAAc,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAElD;AAED,iBAAS,yBAAyB,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAE7D;AAED,iBAAS,sBAAsB,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAE1D;AAED,iBAAS,6BAA6B,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAEjE;AAED,iBAAS,cAAc,CAAC,YAAY,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,GAAG,MAAM,CAWtE;AAED,iBAAS,eAAe,CAAC,WAAW,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAkBtE;AAED,iBAAS,YAAY,CAAC,OAAO,EAAE,MAAM,qBAkBpC;AAED,iBAAS,SAAS,CAAC,OAAO,EAAE,MAAM,WAMjC;AAED,iBAAS,uBAAuB,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAW3E;AAED,iBAAS,kBAAkB,CAAC,OAAO,EAAE,MAAM,GAAG,WAAW,EAAE,CAkB1D;AAkBD,iBAAS,2BAA2B;;EAInC;AAED,OAAO,EACL,cAAc,EACd,eAAe,EACf,uBAAuB,EACvB,mBAAmB,EACnB,cAAc,EACd,cAAc,EACd,yBAAyB,EACzB,sBAAsB,EACtB,6BAA6B,EAC7B,YAAY,EACZ,kBAAkB,EAClB,SAAS,EACT,uBAAuB,EACvB,2BAA2B,GAC5B,CAAA"}
@@ -13,6 +13,7 @@ exports.getChainById = getChainById;
13
13
  exports.getSupportedTokens = getSupportedTokens;
14
14
  exports.isTestnet = isTestnet;
15
15
  exports.isTokenAddressSupported = isTokenAddressSupported;
16
+ exports.getDefaultAccountAccessList = getDefaultAccountAccessList;
16
17
  const viem_1 = require("viem");
17
18
  const chains_1 = require("viem/chains");
18
19
  function getWethAddress(chain) {
@@ -271,6 +272,9 @@ function getTokenSymbol(tokenAddress, chainId) {
271
272
  throw new Error(`Unsupported token address ${tokenAddress} for chain ${chainId}`);
272
273
  }
273
274
  function getTokenAddress(tokenSymbol, chainId) {
275
+ if (chainId === 137 && tokenSymbol === 'ETH') {
276
+ throw new Error(`Chain ${chainId} does not allow for ETH to be used`);
277
+ }
274
278
  if (tokenSymbol === 'ETH') {
275
279
  return viem_1.zeroAddress;
276
280
  }
@@ -356,3 +360,8 @@ function getTokenDecimals(symbol) {
356
360
  throw new Error(`Symbol not supported: ${symbol}`);
357
361
  }
358
362
  }
363
+ function getDefaultAccountAccessList() {
364
+ return {
365
+ chainIds: [chains_1.mainnet.id, chains_1.base.id, chains_1.arbitrum.id, chains_1.optimism.id],
366
+ };
367
+ }
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../orchestrator/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,GAAG,EAAE,MAAM,MAAM,CAAA;AACxC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAC7D,OAAO,KAAK,EACV,QAAQ,EACR,eAAe,EACf,IAAI,EACJ,WAAW,EACX,OAAO,EACP,QAAQ,EACR,eAAe,EACf,OAAO,EACP,WAAW,EACX,OAAO,EACR,MAAM,aAAa,CAAA;AAEpB,KAAK,gBAAgB,GACjB,OAAO,OAAO,CAAC,EAAE,GACjB,OAAO,WAAW,CAAC,EAAE,GACrB,OAAO,eAAe,CAAC,EAAE,GACzB,OAAO,eAAe,CAAC,EAAE,GACzB,OAAO,WAAW,CAAC,EAAE,CAAA;AACzB,KAAK,gBAAgB,GACjB,OAAO,OAAO,CAAC,EAAE,GACjB,OAAO,IAAI,CAAC,EAAE,GACd,OAAO,QAAQ,CAAC,EAAE,GAClB,OAAO,QAAQ,CAAC,EAAE,GAClB,OAAO,OAAO,CAAC,EAAE,CAAA;AACrB,KAAK,cAAc,GAAG,gBAAgB,GAAG,gBAAgB,CAAA;AACzD,KAAK,oBAAoB,GAAG,KAAK,GAAG,MAAM,GAAG,MAAM,CAAA;AACnD,KAAK,cAAc,GAAG,oBAAoB,GAAG,OAAO,CAAA;AAEpD,KAAK,YAAY,GACb,OAAO,qBAAqB,GAC5B,OAAO,qBAAqB,GAC5B,OAAO,iCAAiC,GACxC,OAAO,uBAAuB,GAC9B,OAAO,oBAAoB,GAC3B,OAAO,0BAA0B,GACjC,OAAO,oBAAoB,GAC3B,OAAO,qBAAqB,CAAA;AAEhC,KAAK,uBAAuB,GAAG;IAC7B,OAAO,EAAE,MAAM,CAAA;IACf,YAAY,EAAE,OAAO,CAAA;CACtB,EAAE,CAAA;AAEH,KAAK,0BAA0B,GAAG;IAChC,WAAW,CAAC,EAAE;SACX,OAAO,IAAI,cAAc,CAAC,CAAC,EAAE,cAAc,EAAE;KAC/C,CAAA;CACF,CAAA;AAED,KAAK,4BAA4B,GAAG;IAClC,QAAQ,CAAC,EAAE,cAAc,EAAE,CAAA;IAC3B,MAAM,CAAC,EAAE,cAAc,EAAE,CAAA;CAC1B,CAAA;AAED,KAAK,iBAAiB,GAClB,uBAAuB,GACvB,0BAA0B,GAC1B,4BAA4B,CAAA;AAEhC,KAAK,WAAW,GAAG,SAAS,GAAG,SAAS,GAAG,SAAS,CAAA;AAEpD,UAAU,KAAK;IACb,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,MAAM,CAAA;IACf,MAAM,EAAE,WAAW,CAAA;IACnB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,oBAAoB,CAAC,EAAE,GAAG,CAAA;CAC3B;AAED,UAAU,SAAS;IACjB,EAAE,EAAE,OAAO,CAAA;IACX,KAAK,EAAE,MAAM,CAAA;IACb,IAAI,EAAE,GAAG,CAAA;CACV;AAED,KAAK,gBAAgB,GACjB;IAAE,OAAO,EAAE,IAAI,CAAA;CAAE,GACjB;IACE,OAAO,EAAE,KAAK,CAAA;IACd,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE;QACP,OAAO,EAAE,MAAM,CAAA;QACf,eAAe,EAAE,OAAO,CAAA;QACxB,IAAI,EAAE,GAAG,EAAE,CAAA;QACX,YAAY,EAAE,MAAM,CAAA;KACrB,CAAA;CACF,CAAA;AAEL,KAAK,qBAAqB,GAAG,CACzB;IACE,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,EAAE,OAAO,qBAAqB,CAAA;CACrC,GACD;IACE,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,EAAE,OAAO,oBAAoB,CAAA;IACnC,KAAK,EAAE,gBAAgB,CAAA;CACxB,CACJ,EAAE,CAAA;AAEH,UAAU,YAAY;IACpB,MAAM,EAAE,YAAY,CAAA;IACpB,aAAa,CAAC,EAAE,MAAM,CAAA;IACtB,mBAAmB,CAAC,EAAE,GAAG,CAAA;IACzB,MAAM,EAAE,KAAK,EAAE,CAAA;CAChB;AAED,UAAU,aAAa;IACrB,YAAY,EAAE,OAAO,CAAA;IACrB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,UAAU;IAClB,MAAM,EAAE,aAAa,CAAA;IACrB,gBAAgB,CAAC,EAAE,KAAK,CAAA;CACzB;AAED,UAAU,cAAc;IACtB,MAAM,CAAC,EAAE,KAAK,CAAA;IACd,gBAAgB,EAAE,SAAS,EAAE,CAAA;CAC9B;AAED,UAAU,gBAAgB;IACxB,MAAM,CAAC,EAAE,KAAK,CAAA;IACd,gBAAgB,CAAC,EAAE,KAAK,CAAA;CACzB;AAED,KAAK,QAAQ,GAAG,MAAM,GAAG,SAAS,CAAA;AAElC,UAAU,cAAc;IACtB,aAAa,EAAE,OAAO,CAAA;IACtB,aAAa,EAAE,MAAM,CAAA;IACrB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,cAAc,EAAE,aAAa,EAAE,CAAA;IAC/B,iBAAiB,CAAC,EAAE,iBAAiB,CAAA;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAA;IACnB,QAAQ,CAAC,EAAE,OAAO,CAAA;CACnB;AAED,KAAK,SAAS,GAAG;IACf,WAAW,EAAE,iBAAiB,CAAA;IAC9B,kBAAkB,EAAE,SAAS,EAAE,CAAA;IAC/B,UAAU,EAAE,SAAS,CAAA;CACtB,EAAE,CAAA;AAEH,KAAK,eAAe,GAAG,cAAc,GAAG,gBAAgB,CAAA;AACxD,KAAK,oBAAoB,GAAG,cAAc,GAAG,UAAU,CAAA;AACvD,KAAK,wBAAwB,GAAG,cAAc,GAAG,cAAc,CAAA;AAE/D,KAAK,UAAU,GACX,eAAe,GACf,oBAAoB,GACpB,wBAAwB,CAAA;AAE5B,KAAK,cAAc,GAAG,SAAS,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAErD,UAAU,YAAY;IACpB,kBAAkB,EAAE,cAAc,CAAA;IAClC,UAAU,EAAE,OAAO,CAAA;IACnB,WAAW,EAAE,OAAO,CAAA;IACpB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,kBAAkB,EAAE,MAAM,CAAA;IAC1B,aAAa,EAAE,MAAM,CAAA;IACrB,SAAS,EAAE,MAAM,CAAA;IACjB,cAAc,EAAE,MAAM,CAAA;IACtB,YAAY,EAAE,MAAM,CAAA;IACpB,mBAAmB,EAAE,MAAM,CAAA;IAC3B,SAAS,EAAE,OAAO,CAAA;IAClB,SAAS,EAAE,OAAO,CAAA;IAClB,gBAAgB,EAAE,OAAO,CAAA;IACzB,OAAO,EAAE,GAAG,CAAA;CACb;AAED,UAAU,WAAW;IACnB,QAAQ,EAAE,MAAM,CAAA;IAChB,IAAI,EAAE,MAAM,CAAA;IACZ,iBAAiB,EAAE,cAAc,CAAA;IACjC,mBAAmB,EAAE,YAAY,EAAE,CAAA;CACpC;AAED,UAAU,OAAO;IACf,SAAS,EAAE,OAAO,CAAA;IAClB,QAAQ,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC,EAAE,CAAA;IAC5B,SAAS,EAAE,MAAM,CAAA;IACjB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,KAAK,EAAE,SAAS,EAAE,CAAA;IAClB,UAAU,EAAE,GAAG,CAAA;IACf,SAAS,EAAE,MAAM,CAAA;CAClB;AAED,UAAU,OAAO;IACf,OAAO,EAAE,OAAO,CAAA;IAChB,OAAO,EAAE,MAAM,CAAA;IACf,aAAa,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC,EAAE,CAAA;IACjC,OAAO,EAAE,OAAO,CAAA;CACjB;AAED,UAAU,iBAAiB;IACzB,OAAO,EAAE,OAAO,CAAA;IAChB,KAAK,EAAE,MAAM,CAAA;IACb,OAAO,EAAE,MAAM,CAAA;IACf,QAAQ,EAAE,OAAO,EAAE,CAAA;CACpB;AAED,UAAU,uBAAwB,SAAQ,iBAAiB;IACzD,gBAAgB,EAAE,GAAG,EAAE,CAAA;IACvB,eAAe,EAAE,GAAG,CAAA;CACrB;AAED,UAAU,gBAAgB;IACxB,SAAS,EAAE,MAAM,CAAA;IACjB,aAAa,EAAE,MAAM,CAAA;IACrB,OAAO,EAAE,MAAM,CAAA;IACf,iBAAiB,EAAE;QACjB,OAAO,EAAE,MAAM,CAAA;QACf,YAAY,EAAE,OAAO,CAAA;QACrB,OAAO,EAAE,MAAM,CAAA;KAChB,EAAE,CAAA;CACJ;AAED,UAAU,iBAAiB;IACzB,CAAC,OAAO,EAAE,MAAM,GAAG;QAAE,CAAC,YAAY,EAAE,OAAO,GAAG,MAAM,CAAA;KAAE,CAAA;CACvD;AAGD,UAAU,aAAa;IACrB,aAAa,EAAE,MAAM,CAAA;IACrB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,MAAM,CAAC,EAAE;QACP,YAAY,EAAE,MAAM,CAAA;QACpB,oBAAoB,EAAE,MAAM,CAAA;QAC5B,kBAAkB,EAAE,MAAM,CAAA;KAC3B,CAAA;IACD,cAAc,EAAE;QACd,YAAY,EAAE,OAAO,CAAA;QACrB,MAAM,CAAC,EAAE,MAAM,CAAA;KAEhB,EAAE,CAAA;IACH,iBAAiB,CAAC,EAAE,iBAAiB,CAAA;CACtC;AAED,UAAU,sBAAsB;IAC9B,YAAY,EAAE,OAAO,CAAA;IACrB,YAAY,EAAE,OAAO,CAAA;IACrB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,GAAG,EAAE,MAAM,CAAA;CACZ;AAED,UAAU,SAAS;IACjB,eAAe,EAAE,IAAI,CAAA;IACrB,WAAW,EAAE,iBAAiB,CAAA;IAC9B,cAAc,EAAE,sBAAsB,EAAE,CAAA;CACzC;AAED,UAAU,yBAAyB;IACjC,eAAe,EAAE,KAAK,CAAA;IACtB,cAAc,EAAE;QACd,YAAY,EAAE,OAAO,CAAA;QACrB,YAAY,EAAE,MAAM,CAAA;QACpB,WAAW,EAAE,MAAM,CAAA;QACnB,GAAG,EAAE,MAAM,CAAA;QACX,WAAW,EAAE,MAAM,CAAA;QACnB,aAAa,EAAE,MAAM,CAAA;KACtB,EAAE,CAAA;IACH,wBAAwB,EAAE,MAAM,CAAA;CACjC;AAED,KAAK,eAAe,GAAG,SAAS,GAAG,yBAAyB,CAAA;AAE5D,KAAK,eAAe,GAAG,SAAS,CAAC,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,EAAE,CAAA;AAE7D,UAAU,WAAW;IACnB,MAAM,EAAE,MAAM,CAAA;IACd,OAAO,EAAE,OAAO,CAAA;IAChB,QAAQ,EAAE,MAAM,CAAA;IAChB,WAAW,EAAE,CAAC,OAAO,EAAE,OAAO,KAAK,GAAG,CAAA;CACvC;AAED,QAAA,MAAM,qBAAqB,YAAY,CAAA;AACvC,QAAA,MAAM,oBAAoB,WAAW,CAAA;AACrC,QAAA,MAAM,qBAAqB,YAAY,CAAA;AACvC,QAAA,MAAM,iCAAiC,wBAAwB,CAAA;AAC/D,QAAA,MAAM,uBAAuB,cAAc,CAAA;AAC3C,QAAA,MAAM,oBAAoB,WAAW,CAAA;AACrC,QAAA,MAAM,0BAA0B,iBAAiB,CAAA;AACjD,QAAA,MAAM,qBAAqB,YAAY,CAAA;AAEvC,YAAY,EACV,iBAAiB,EACjB,cAAc,EACd,YAAY,EACZ,qBAAqB,EACrB,eAAe,EACf,oBAAoB,EACpB,wBAAwB,EACxB,UAAU,EACV,eAAe,EACf,SAAS,EACT,YAAY,EACZ,WAAW,EACX,OAAO,EACP,OAAO,EACP,iBAAiB,EACjB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,iBAAiB,EACjB,aAAa,EACb,sBAAsB,EACtB,SAAS,EACT,yBAAyB,EACzB,eAAe,EACf,WAAW,GACZ,CAAA;AACD,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,qBAAqB,EACrB,iCAAiC,EACjC,uBAAuB,EACvB,oBAAoB,EACpB,0BAA0B,EAC1B,qBAAqB,GACtB,CAAA"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../orchestrator/utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,KAAK,GAAG,EAIT,MAAM,MAAM,CAAA;AACb,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAI7D,OAAO,EASL,KAAK,WAAW,EAChB,KAAK,SAAS,EACd,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,KAAK,SAAS,EACd,KAAK,eAAe,EAIpB,KAAK,iBAAiB,EAEvB,MAAM,SAAS,CAAA;AAWhB,aAAK,gBAAgB;IACnB,OAAO,YAAwB;IAC/B,OAAO,YAAwB;IAC/B,mBAAmB,wBAAoC;IACvD,YAAY,iBAA6B;IACzC,SAAS,cAA0B;IACnC,MAAM,WAAuB;IAC7B,MAAM,WAAuB;IAC7B,OAAO,YAAwB;CAChC;AAED,iBAAS,cAAc,IAAI,aAAa,CAAC,KAAK,CAAC,CAY9C;AAED,iBAAS,kBAAkB,CAAC,WAAW,EAAE,iBAAiB,GAAG,GAAG,CAM/D;AAED,iBAAS,mBAAmB,CAAC,GAAG,EAAE,GAAG,GAAG,GAAG,CAwB1C;AAED,iBAAS,oBAAoB,CAAC,QAAQ,EAAE,GAAG,GAAG,iBAAiB,CAiC9D;AAED,iBAAS,qBAAqB,CAAC,QAAQ,EAAE,GAAG,GAAG,iBAAiB,CAe/D;AAED,iBAAS,cAAc,CAAC,QAAQ,EAAE,GAAG,GAAG,SAAS,CAoChD;AAED,iBAAS,8BAA8B,CACrC,QAAQ,EAAE,GAAG,GACZ,yBAAyB,CAsB3B;AAED,iBAAS,oBAAoB,CAAC,QAAQ,EAAE,GAAG,GAAG,eAAe,CAS5D;AAED,iBAAS,uBAAuB,CAAC,QAAQ,EAAE,GAAG,GAAG,WAAW,CAkC3D;AAkBD,iBAAS,2CAA2C,CAClD,iBAAiB,EAAE,iBAAiB,GACnC,GAAG,CAmBL;AAyGD,iBAAS,uBAAuB,CAAC,SAAS,EAAE;IAC1C,WAAW,EAAE,iBAAiB,CAAA;IAC9B,kBAAkB,EAAE,SAAS,EAAE,CAAA;CAChC,GAAG,iBAAiB,CAQpB;AAED,OAAO,EACL,gBAAgB,EAChB,cAAc,EACd,kBAAkB,EAClB,mBAAmB,EACnB,oBAAoB,EACpB,uBAAuB,EACvB,2CAA2C,EAC3C,qBAAqB,EACrB,cAAc,EACd,8BAA8B,EAC9B,oBAAoB,EACpB,uBAAuB,GACxB,CAAA"}
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,GAAG,EAAE,MAAM,MAAM,CAAA;AACxD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAA;AAE/D,UAAU,qBAAqB;IAC7B,IAAI,EAAE,MAAM,GAAG,OAAO,CAAA;CACvB;AAED,UAAU,sBAAsB;IAC9B,IAAI,EAAE,OAAO,CAAA;IACb,QAAQ,EAAE,OAAO,EAAE,CAAA;IACnB,SAAS,CAAC,EAAE,MAAM,CAAA;CACnB;AAED,UAAU,uBAAuB;IAC/B,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE,eAAe,CAAA;CACzB;AAED,UAAU,aAAa;IACrB,IAAI,EAAE,SAAS,CAAA;IACf,MAAM,EAAE,MAAM,CAAA;CACf;AAED,KAAK,QAAQ,GAAG,sBAAsB,GAAG,uBAAuB,CAAA;AAEhE,UAAU,UAAU;IAClB,IAAI,EAAE,MAAM,CAAA;CACb;AAED,UAAU,qBAAqB;IAC7B,IAAI,EAAE,kBAAkB,CAAA;IACxB,gBAAgB,CAAC,EAAE,MAAM,CAAA;IACzB,KAAK,EAAE,CAAC,8BAA8B,EAAE,GAAG,8BAA8B,EAAE,CAAC,CAAA;CAC7E;AAED,UAAU,8BAA8B;IACtC,SAAS,EAAE,mCAAmC,CAAA;IAC9C,cAAc,EAAE,MAAM,CAAA;IACtB,UAAU,CAAC,EAAE,MAAM,CAAA;IACnB,cAAc,EAAE,GAAG,GAAG,MAAM,CAAA;CAC7B;AAED,KAAK,mCAAmC,GACpC,OAAO,GACP,aAAa,GACb,UAAU,GACV,oBAAoB,GACpB,iBAAiB,GACjB,UAAU,GACV,SAAS,CAAA;AAEb,UAAU,oBAAoB;IAC5B,IAAI,EAAE,iBAAiB,CAAA;IACvB,MAAM,EAAE;QACN,KAAK,EAAE,OAAO,CAAA;QACd,MAAM,EAAE,MAAM,CAAA;KACf,EAAE,CAAA;CACJ;AAED,UAAU,eAAe;IACvB,IAAI,EAAE,YAAY,CAAA;IAClB,UAAU,EAAE,MAAM,CAAA;IAClB,UAAU,EAAE,MAAM,CAAA;CACnB;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,aAAa,CAAA;IACnB,KAAK,EAAE,MAAM,CAAA;CACd;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,aAAa,CAAA;IACnB,KAAK,EAAE,MAAM,CAAA;CACd;AAED,KAAK,MAAM,GACP,UAAU,GACV,qBAAqB,GACrB,oBAAoB,GACpB,eAAe,GACf,gBAAgB,GAChB,gBAAgB,CAAA;AAEpB,UAAU,MAAM;IACd,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;IACb,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;CACjC;AAED,UAAU,OAAO;IACf,MAAM,EAAE,QAAQ,CAAA;IAChB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;IAChC,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;IAC/B,IAAI,CAAC,EAAE,GAAG,CAAA;CACX;AAED,UAAU,uBAAuB;IAC/B,OAAO,CAAC,EAAE,qBAAqB,CAAA;IAC/B,MAAM,EAAE,QAAQ,CAAA;IAChB,gBAAgB,EAAE,MAAM,CAAA;IACxB,eAAe,CAAC,EAAE,OAAO,CAAA;IACzB,QAAQ,CAAC,EAAE,OAAO,EAAE,CAAA;IACpB,GAAG,CAAC,EAAE,OAAO,CAAA;IACb,QAAQ,CAAC,EAAE;QACT,IAAI,EAAE,SAAS,CAAA;QACf,MAAM,EAAE,MAAM,CAAA;KACf,CAAA;IACD,OAAO,CAAC,EAAE,aAAa,CAAA;CACxB;AAED,UAAU,IAAI;IACZ,EAAE,EAAE,OAAO,CAAA;IACX,IAAI,CAAC,EAAE,GAAG,CAAA;IACV,KAAK,CAAC,EAAE,MAAM,CAAA;CACf;AAED;;GAEG;AACH,KAAK,SAAS,GAAG,IAAI,CAAA;AAErB,UAAU,YAAY;IACpB,OAAO,EAAE,OAAO,CAAA;IAChB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE,OAAO,CAAA;CACjB;AAED,KAAK,SAAS,GAAG,gBAAgB,CAAA;AAEjC,UAAU,eAAe;IACvB,KAAK,EAAE,IAAI,EAAE,CAAA;IACb,aAAa,EAAE,YAAY,EAAE,CAAA;IAC7B,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,OAAO,CAAC,EAAE,SAAS,CAAA;CACpB;AAED,UAAU,oBAAqB,SAAQ,eAAe;IACpD,KAAK,EAAE,KAAK,CAAA;CACb;AAED,UAAU,qBAAsB,SAAQ,eAAe;IACrD,WAAW,CAAC,EAAE,KAAK,CAAA;IACnB,WAAW,EAAE,KAAK,CAAA;CACnB;AAED,KAAK,WAAW,GAAG,oBAAoB,GAAG,qBAAqB,CAAA;AAE/D,YAAY,EACV,uBAAuB,EACvB,qBAAqB,EACrB,aAAa,EACb,WAAW,EACX,IAAI,EACJ,SAAS,EACT,YAAY,EACZ,QAAQ,EACR,SAAS,EACT,OAAO,EACP,MAAM,EACN,mCAAmC,GACpC,CAAA"}
@@ -0,0 +1,9 @@
1
+ import { WebAuthnAccount } from 'viem/account-abstraction';
2
+ import { Account } from 'viem/accounts';
3
+ declare const accountA: Account;
4
+ declare const accountB: Account;
5
+ declare const accountC: Account;
6
+ declare const passkeyAccount: WebAuthnAccount;
7
+ declare const MOCK_API_KEY = "MOCK_KEY";
8
+ export { accountA, accountB, accountC, passkeyAccount, MOCK_API_KEY };
9
+ //# sourceMappingURL=consts.d.ts.map