@rhinestone/sdk 0.8.1 → 0.8.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -4
- package/dist/src/accounts/index.d.ts.map +1 -0
- package/dist/src/accounts/index.test.d.ts +2 -0
- package/dist/src/accounts/index.test.d.ts.map +1 -0
- package/dist/src/accounts/index.test.js +35 -0
- package/dist/src/accounts/nexus.d.ts.map +1 -0
- package/dist/src/accounts/nexus.test.d.ts +2 -0
- package/dist/src/accounts/nexus.test.d.ts.map +1 -0
- package/dist/src/accounts/nexus.test.js +39 -0
- package/dist/src/accounts/safe.d.ts.map +1 -0
- package/dist/src/accounts/safe.test.d.ts +2 -0
- package/dist/src/accounts/safe.test.d.ts.map +1 -0
- package/dist/src/accounts/safe.test.js +39 -0
- package/dist/src/accounts/utils.d.ts.map +1 -0
- package/dist/src/accounts/utils.test.d.ts +2 -0
- package/dist/src/accounts/utils.test.d.ts.map +1 -0
- package/dist/src/accounts/utils.test.js +49 -0
- package/dist/src/execution/index.d.ts.map +1 -0
- package/dist/{execution → src/execution}/index.js +8 -2
- package/dist/src/execution/smart-session.d.ts.map +1 -0
- package/dist/src/execution/smart-session.test.d.ts +2 -0
- package/dist/src/execution/smart-session.test.d.ts.map +1 -0
- package/dist/src/execution/smart-session.test.js +133 -0
- package/dist/src/index.d.ts.map +1 -0
- package/dist/src/modules/abi/smart-sessions.d.ts +104 -0
- package/dist/src/modules/abi/smart-sessions.d.ts.map +1 -0
- package/dist/src/modules/common.d.ts.map +1 -0
- package/dist/src/modules/index.d.ts.map +1 -0
- package/dist/src/modules/index.test.d.ts +2 -0
- package/dist/src/modules/index.test.d.ts.map +1 -0
- package/dist/src/modules/index.test.js +104 -0
- package/dist/src/modules/omni-account.d.ts.map +1 -0
- package/dist/src/modules/validators/core.d.ts +8 -0
- package/dist/src/modules/validators/core.d.ts.map +1 -0
- package/dist/{modules → src/modules}/validators/core.js +0 -2
- package/dist/src/modules/validators/core.test.d.ts +2 -0
- package/dist/src/modules/validators/core.test.d.ts.map +1 -0
- package/dist/src/modules/validators/core.test.js +101 -0
- package/dist/src/modules/validators/index.d.ts.map +1 -0
- package/dist/{modules → src/modules}/validators/smart-sessions.d.ts +34 -0
- package/dist/src/modules/validators/smart-sessions.d.ts.map +1 -0
- package/dist/src/modules/validators/smart-sessions.test.d.ts +2 -0
- package/dist/src/modules/validators/smart-sessions.test.d.ts.map +1 -0
- package/dist/src/modules/validators/smart-sessions.test.js +226 -0
- package/dist/src/orchestrator/client.d.ts.map +1 -0
- package/dist/src/orchestrator/consts.d.ts.map +1 -0
- package/dist/src/orchestrator/error.d.ts.map +1 -0
- package/dist/src/orchestrator/index.d.ts.map +1 -0
- package/dist/{orchestrator → src/orchestrator}/registry.d.ts +4 -1
- package/dist/src/orchestrator/registry.d.ts.map +1 -0
- package/dist/{orchestrator → src/orchestrator}/registry.js +9 -0
- package/dist/src/orchestrator/types.d.ts.map +1 -0
- package/dist/src/orchestrator/utils.d.ts.map +1 -0
- package/dist/src/types.d.ts.map +1 -0
- package/dist/test/consts.d.ts +9 -0
- package/dist/test/consts.d.ts.map +1 -0
- package/dist/test/consts.js +20 -0
- package/package.json +1 -1
- package/dist/accounts/index.d.ts.map +0 -1
- package/dist/accounts/nexus.d.ts.map +0 -1
- package/dist/accounts/safe.d.ts.map +0 -1
- package/dist/accounts/utils.d.ts.map +0 -1
- package/dist/execution/index.d.ts.map +0 -1
- package/dist/execution/smart-session.d.ts.map +0 -1
- package/dist/index.d.ts.map +0 -1
- package/dist/modules/abi/smart-sessions.d.ts +0 -42
- package/dist/modules/abi/smart-sessions.d.ts.map +0 -1
- package/dist/modules/common.d.ts.map +0 -1
- package/dist/modules/index.d.ts.map +0 -1
- package/dist/modules/omni-account.d.ts.map +0 -1
- package/dist/modules/validators/core.d.ts +0 -23
- package/dist/modules/validators/core.d.ts.map +0 -1
- package/dist/modules/validators/index.d.ts.map +0 -1
- package/dist/modules/validators/smart-sessions.d.ts.map +0 -1
- package/dist/orchestrator/client.d.ts.map +0 -1
- package/dist/orchestrator/consts.d.ts.map +0 -1
- package/dist/orchestrator/error.d.ts.map +0 -1
- package/dist/orchestrator/index.d.ts.map +0 -1
- package/dist/orchestrator/registry.d.ts.map +0 -1
- package/dist/orchestrator/types.d.ts.map +0 -1
- package/dist/orchestrator/utils.d.ts.map +0 -1
- package/dist/types.d.ts.map +0 -1
- /package/dist/{accounts → src/accounts}/index.d.ts +0 -0
- /package/dist/{accounts → src/accounts}/index.js +0 -0
- /package/dist/{accounts → src/accounts}/nexus.d.ts +0 -0
- /package/dist/{accounts → src/accounts}/nexus.js +0 -0
- /package/dist/{accounts → src/accounts}/safe.d.ts +0 -0
- /package/dist/{accounts → src/accounts}/safe.js +0 -0
- /package/dist/{accounts → src/accounts}/utils.d.ts +0 -0
- /package/dist/{accounts → src/accounts}/utils.js +0 -0
- /package/dist/{execution → src/execution}/index.d.ts +0 -0
- /package/dist/{execution → src/execution}/smart-session.d.ts +0 -0
- /package/dist/{execution → src/execution}/smart-session.js +0 -0
- /package/dist/{index.d.ts → src/index.d.ts} +0 -0
- /package/dist/{index.js → src/index.js} +0 -0
- /package/dist/{modules → src/modules}/abi/smart-sessions.js +0 -0
- /package/dist/{modules → src/modules}/common.d.ts +0 -0
- /package/dist/{modules → src/modules}/common.js +0 -0
- /package/dist/{modules → src/modules}/index.d.ts +0 -0
- /package/dist/{modules → src/modules}/index.js +0 -0
- /package/dist/{modules → src/modules}/omni-account.d.ts +0 -0
- /package/dist/{modules → src/modules}/omni-account.js +0 -0
- /package/dist/{modules → src/modules}/validators/index.d.ts +0 -0
- /package/dist/{modules → src/modules}/validators/index.js +0 -0
- /package/dist/{modules → src/modules}/validators/smart-sessions.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/client.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/client.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/consts.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/consts.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/error.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/error.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/index.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/index.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/types.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/types.js +0 -0
- /package/dist/{orchestrator → src/orchestrator}/utils.d.ts +0 -0
- /package/dist/{orchestrator → src/orchestrator}/utils.js +0 -0
- /package/dist/{types.d.ts → src/types.d.ts} +0 -0
- /package/dist/{types.js → src/types.js} +0 -0
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const vitest_1 = require("vitest");
|
|
4
|
+
const consts_1 = require("../../test/consts");
|
|
5
|
+
const index_1 = require("./index");
|
|
6
|
+
(0, vitest_1.describe)('Modules', () => {
|
|
7
|
+
(0, vitest_1.describe)('Setup', () => {
|
|
8
|
+
(0, vitest_1.test)('should use ownable validator for ECDSA owners', () => {
|
|
9
|
+
const config = {
|
|
10
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
11
|
+
owners: {
|
|
12
|
+
type: 'ecdsa',
|
|
13
|
+
accounts: [consts_1.accountA],
|
|
14
|
+
threshold: 1,
|
|
15
|
+
},
|
|
16
|
+
};
|
|
17
|
+
const setup = (0, index_1.getSetup)(config);
|
|
18
|
+
(0, vitest_1.expect)(setup.validators[0].address).toBe('0x2483DA3A338895199E5e538530213157e931Bf06');
|
|
19
|
+
(0, vitest_1.expect)(setup.validators[0].type).toBe(1n);
|
|
20
|
+
});
|
|
21
|
+
(0, vitest_1.test)('should use webauthn validator for passkey owners', () => {
|
|
22
|
+
const config = {
|
|
23
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
24
|
+
owners: {
|
|
25
|
+
type: 'passkey',
|
|
26
|
+
account: consts_1.passkeyAccount,
|
|
27
|
+
},
|
|
28
|
+
};
|
|
29
|
+
const setup = (0, index_1.getSetup)(config);
|
|
30
|
+
(0, vitest_1.expect)(setup.validators).toHaveLength(1);
|
|
31
|
+
(0, vitest_1.expect)(setup.validators[0].address).toBe('0x2f167e55d42584f65e2e30a748f41ee75a311414');
|
|
32
|
+
(0, vitest_1.expect)(setup.validators[0].type).toBe(1n);
|
|
33
|
+
});
|
|
34
|
+
(0, vitest_1.test)('should use smart session validator when sessions are enabled', () => {
|
|
35
|
+
const config = {
|
|
36
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
37
|
+
owners: {
|
|
38
|
+
type: 'ecdsa',
|
|
39
|
+
accounts: [consts_1.accountA],
|
|
40
|
+
threshold: 1,
|
|
41
|
+
},
|
|
42
|
+
sessions: [
|
|
43
|
+
{
|
|
44
|
+
owners: {
|
|
45
|
+
type: 'ecdsa',
|
|
46
|
+
accounts: [consts_1.accountB],
|
|
47
|
+
threshold: 1,
|
|
48
|
+
},
|
|
49
|
+
},
|
|
50
|
+
],
|
|
51
|
+
};
|
|
52
|
+
const setup = (0, index_1.getSetup)(config);
|
|
53
|
+
const smartSessionValidator = setup.validators.find((validator) => validator.address === '0x00000000002b0ecfbd0496ee71e01257da0e37de');
|
|
54
|
+
if (!smartSessionValidator) {
|
|
55
|
+
return;
|
|
56
|
+
}
|
|
57
|
+
(0, vitest_1.expect)(smartSessionValidator.type).toBe(1n);
|
|
58
|
+
});
|
|
59
|
+
(0, vitest_1.test)('should use smart session compatibility fallback for safe accounts with sessions', () => {
|
|
60
|
+
const config = {
|
|
61
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
62
|
+
owners: {
|
|
63
|
+
type: 'ecdsa',
|
|
64
|
+
accounts: [consts_1.accountA],
|
|
65
|
+
threshold: 1,
|
|
66
|
+
},
|
|
67
|
+
sessions: [
|
|
68
|
+
{
|
|
69
|
+
owners: {
|
|
70
|
+
type: 'ecdsa',
|
|
71
|
+
accounts: [consts_1.accountB],
|
|
72
|
+
threshold: 1,
|
|
73
|
+
},
|
|
74
|
+
},
|
|
75
|
+
],
|
|
76
|
+
account: {
|
|
77
|
+
type: 'safe',
|
|
78
|
+
},
|
|
79
|
+
};
|
|
80
|
+
const setup = (0, index_1.getSetup)(config);
|
|
81
|
+
const smartSessionFallback = setup.fallbacks.find((fallback) => fallback.address === '0x12cae64c42f362e7d5a847c2d33388373f629177');
|
|
82
|
+
(0, vitest_1.expect)(smartSessionFallback).toBeDefined();
|
|
83
|
+
if (!smartSessionFallback) {
|
|
84
|
+
return;
|
|
85
|
+
}
|
|
86
|
+
(0, vitest_1.expect)(smartSessionFallback.type).toBe(3n);
|
|
87
|
+
});
|
|
88
|
+
vitest_1.test.todo('using the omni account should install the necessary modules');
|
|
89
|
+
});
|
|
90
|
+
(0, vitest_1.describe)('WebAuthn Validator Signature', () => {
|
|
91
|
+
(0, vitest_1.test)('default', () => {
|
|
92
|
+
const signature = (0, index_1.getWebauthnValidatorSignature)({
|
|
93
|
+
webauthn: {
|
|
94
|
+
authenticatorData: '0x49960de5880e8c687434170f6476605b8fe4aeb9a28632c7995cf3ba831d97631d00000000',
|
|
95
|
+
clientDataJSON: '{"type":"webauthn.get","challenge":"tbxXNFS9X_4Byr1cMwqKrIGB-_30a0QhZ6y7ucM0BOE","origin":"http://localhost:3000","crossOrigin":false, "other_keys_can_be_added_here":"do not compare clientDataJSON against a template. See https://goo.gl/yabPex"}',
|
|
96
|
+
typeIndex: 44941127272049826721201904734628716258498742255959991581049806490182030242267n,
|
|
97
|
+
},
|
|
98
|
+
signature: '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',
|
|
99
|
+
usePrecompiled: true,
|
|
100
|
+
});
|
|
101
|
+
(0, vitest_1.expect)(signature).toEqual('0x00000000000000000000000000000000000000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000120635bc6d0f68ff895cae8a288ecf7542a6a9cd555df784b73e1e2ea7e9104b1db00000000000000000000000000000000000000000000000000000000000000c000000000000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000002549960de5880e8c687434170f6476605b8fe4aeb9a28632c7995cf3ba831d97631d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f47b2274797065223a22776562617574686e2e676574222c226368616c6c656e6765223a22746278584e465339585f3442797231634d77714b724947422d5f3330613051685a36793775634d30424f45222c226f726967696e223a22687474703a2f2f6c6f63616c686f73743a33303030222c2263726f73734f726967696e223a66616c73652c20226f746865725f6b6579735f63616e5f62655f61646465645f68657265223a22646f206e6f7420636f6d7061726520636c69656e74446174614a534f4e20616761696e737420612074656d706c6174652e205365652068747470733a2f2f676f6f2e676c2f796162506578227d000000000000000000000000');
|
|
102
|
+
});
|
|
103
|
+
});
|
|
104
|
+
});
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"omni-account.d.ts","sourceRoot":"","sources":["../../../modules/omni-account.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,MAAM,CAAA;AAEnC,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAE9C,QAAA,MAAM,kCAAkC,EAAE,OACI,CAAA;AAC9C,QAAA,MAAM,2BAA2B,EAAE,OACW,CAAA;AAE9C,QAAA,MAAM,YAAY,EAAE,OAAsD,CAAA;AAC1E,QAAA,MAAM,qBAAqB,EAAE,OACiB,CAAA;AAC9C,QAAA,MAAM,yBAAyB,EAAE,OACa,CAAA;AAE9C,OAAO,EACL,kCAAkC,EAClC,kCAAkC,EAClC,2BAA2B,EAC3B,YAAY,EACZ,qBAAqB,EACrB,yBAAyB,GAC1B,CAAA"}
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
import { type Hex } from 'viem';
|
|
2
|
+
import type { OwnerSet, RhinestoneAccountConfig } from '../../types';
|
|
3
|
+
import { type Module } from '../common';
|
|
4
|
+
declare function getOwnerValidator(config: RhinestoneAccountConfig): Module;
|
|
5
|
+
declare function getMockSignature(ownerSet: OwnerSet): Hex;
|
|
6
|
+
declare function getValidator(owners: OwnerSet): Module;
|
|
7
|
+
export { getOwnerValidator, getValidator, getMockSignature };
|
|
8
|
+
//# sourceMappingURL=core.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"core.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,KAAK,GAAG,EAIT,MAAM,MAAM,CAAA;AAEb,OAAO,KAAK,EAAE,QAAQ,EAAE,uBAAuB,EAAE,MAAM,aAAa,CAAA;AAEpE,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AAwBjE,iBAAS,iBAAiB,CAAC,MAAM,EAAE,uBAAuB,UAEzD;AAED,iBAAS,gBAAgB,CAAC,QAAQ,EAAE,QAAQ,GAAG,GAAG,CAUjD;AAED,iBAAS,YAAY,CAAC,MAAM,EAAE,QAAQ,UAarC;AAkGD,OAAO,EAAE,iBAAiB,EAAE,YAAY,EAAE,gBAAgB,EAAE,CAAA"}
|
|
@@ -2,8 +2,6 @@
|
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
3
|
exports.getOwnerValidator = getOwnerValidator;
|
|
4
4
|
exports.getValidator = getValidator;
|
|
5
|
-
exports.getOwnableValidator = getOwnableValidator;
|
|
6
|
-
exports.getWebAuthnValidator = getWebAuthnValidator;
|
|
7
5
|
exports.getMockSignature = getMockSignature;
|
|
8
6
|
const viem_1 = require("viem");
|
|
9
7
|
const common_1 = require("../common");
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"core.test.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,101 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const viem_1 = require("viem");
|
|
4
|
+
const vitest_1 = require("vitest");
|
|
5
|
+
const consts_1 = require("../../../test/consts");
|
|
6
|
+
const common_1 = require("../common");
|
|
7
|
+
const core_1 = require("./core");
|
|
8
|
+
(0, vitest_1.describe)('Validators Core', () => {
|
|
9
|
+
(0, vitest_1.describe)('Validator', () => {
|
|
10
|
+
(0, vitest_1.test)('ECDSA: single address', () => {
|
|
11
|
+
const validator = (0, core_1.getValidator)({
|
|
12
|
+
type: 'ecdsa',
|
|
13
|
+
accounts: [consts_1.accountA],
|
|
14
|
+
});
|
|
15
|
+
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
16
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
17
|
+
(0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
|
|
18
|
+
(0, vitest_1.expect)(validator.initData).toEqual('0x000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000001000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
19
|
+
});
|
|
20
|
+
(0, vitest_1.test)('ECDSA: two addresses', () => {
|
|
21
|
+
const validator = (0, core_1.getValidator)({
|
|
22
|
+
type: 'ecdsa',
|
|
23
|
+
accounts: [consts_1.accountA, consts_1.accountB],
|
|
24
|
+
});
|
|
25
|
+
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
26
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
27
|
+
(0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
|
|
28
|
+
(0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000020000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
29
|
+
});
|
|
30
|
+
(0, vitest_1.test)('ECDSA: three addresses, custom threshold', () => {
|
|
31
|
+
const validator = (0, core_1.getValidator)({
|
|
32
|
+
type: 'ecdsa',
|
|
33
|
+
accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
|
|
34
|
+
threshold: 2,
|
|
35
|
+
});
|
|
36
|
+
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
37
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
38
|
+
(0, vitest_1.expect)(validator.address).toEqual('0x2483DA3A338895199E5e538530213157e931Bf06');
|
|
39
|
+
(0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000030000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000c27b7578151c5ef713c62c65db09763d57ac3596000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
40
|
+
});
|
|
41
|
+
(0, vitest_1.test)('Passkey', () => {
|
|
42
|
+
const validator = (0, core_1.getValidator)({
|
|
43
|
+
type: 'passkey',
|
|
44
|
+
account: consts_1.passkeyAccount,
|
|
45
|
+
});
|
|
46
|
+
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
47
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
48
|
+
(0, vitest_1.expect)(validator.address).toEqual('0x2f167e55d42584f65e2e30a748f41ee75a311414');
|
|
49
|
+
(0, vitest_1.expect)(validator.initData).toEqual('0x580a9af0569ad3905b26a703201b358aa0904236642ebe79b22a19d00d3737637d46f725a5427ae45a9569259bf67e1e16b187d7b3ad1ed70138c4f0409677d19c9a01073b202db2ed56e604ad11db557d8c3ad75181619597f21b830f2da82a');
|
|
50
|
+
});
|
|
51
|
+
});
|
|
52
|
+
(0, vitest_1.describe)('Mock Signature', () => {
|
|
53
|
+
(0, vitest_1.test)('ECDSA: single address', () => {
|
|
54
|
+
const signature = (0, core_1.getMockSignature)({
|
|
55
|
+
type: 'ecdsa',
|
|
56
|
+
accounts: [consts_1.accountA],
|
|
57
|
+
});
|
|
58
|
+
(0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(65);
|
|
59
|
+
});
|
|
60
|
+
(0, vitest_1.test)('ECDSA: multiple addresses', () => {
|
|
61
|
+
const signature = (0, core_1.getMockSignature)({
|
|
62
|
+
type: 'ecdsa',
|
|
63
|
+
accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
|
|
64
|
+
});
|
|
65
|
+
(0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(3 * 65);
|
|
66
|
+
});
|
|
67
|
+
(0, vitest_1.test)('Passkey', () => {
|
|
68
|
+
const signature = (0, core_1.getMockSignature)({
|
|
69
|
+
type: 'passkey',
|
|
70
|
+
account: consts_1.passkeyAccount,
|
|
71
|
+
});
|
|
72
|
+
// Should have the proper schema
|
|
73
|
+
(0, viem_1.decodeAbiParameters)([
|
|
74
|
+
{
|
|
75
|
+
type: 'bytes',
|
|
76
|
+
name: 'authenticatorData',
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
type: 'string',
|
|
80
|
+
name: 'clientDataJSON',
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
type: 'uint256',
|
|
84
|
+
name: 'challengeIndex',
|
|
85
|
+
},
|
|
86
|
+
{
|
|
87
|
+
type: 'uint256',
|
|
88
|
+
name: 'typeIndex',
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
type: 'uint256',
|
|
92
|
+
name: 'r',
|
|
93
|
+
},
|
|
94
|
+
{
|
|
95
|
+
type: 'uint256',
|
|
96
|
+
name: 's',
|
|
97
|
+
},
|
|
98
|
+
], signature);
|
|
99
|
+
});
|
|
100
|
+
});
|
|
101
|
+
});
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../modules/validators/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,QAAQ,CAAA;AAC5D,OAAO,EACL,2BAA2B,EAC3B,sBAAsB,EACtB,oBAAoB,EACpB,eAAe,EACf,+BAA+B,EAC/B,wBAAwB,EACxB,gBAAgB,EAChB,yBAAyB,EACzB,sBAAsB,EACtB,gCAAgC,EACjC,MAAM,kBAAkB,CAAA;AAEzB,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,iBAAiB,EACjB,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,gBAAgB,EAChB,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA"}
|
|
@@ -1,6 +1,39 @@
|
|
|
1
1
|
import { type Address, type Chain, type Hex, type PublicClient } from 'viem';
|
|
2
2
|
import type { RhinestoneAccountConfig, Session } from '../../types';
|
|
3
3
|
import { type Module } from '../common';
|
|
4
|
+
interface SessionData {
|
|
5
|
+
sessionValidator: Address;
|
|
6
|
+
sessionValidatorInitData: Hex;
|
|
7
|
+
salt: Hex;
|
|
8
|
+
userOpPolicies: readonly UserOpPolicy[];
|
|
9
|
+
erc7739Policies: {
|
|
10
|
+
allowedERC7739Content: readonly AllowedERC7739Content[];
|
|
11
|
+
erc1271Policies: readonly ERC1271Policy[];
|
|
12
|
+
};
|
|
13
|
+
actions: readonly ActionData[];
|
|
14
|
+
permitERC4337Paymaster: boolean;
|
|
15
|
+
}
|
|
16
|
+
interface UserOpPolicy {
|
|
17
|
+
policy: Address;
|
|
18
|
+
initData: Hex;
|
|
19
|
+
}
|
|
20
|
+
interface ERC1271Policy {
|
|
21
|
+
policy: Address;
|
|
22
|
+
initData: Hex;
|
|
23
|
+
}
|
|
24
|
+
interface AllowedERC7739Content {
|
|
25
|
+
appDomainSeparator: Hex;
|
|
26
|
+
contentName: readonly string[];
|
|
27
|
+
}
|
|
28
|
+
interface ActionData {
|
|
29
|
+
actionTarget: Address;
|
|
30
|
+
actionTargetSelector: Hex;
|
|
31
|
+
actionPolicies: readonly PolicyData[];
|
|
32
|
+
}
|
|
33
|
+
interface PolicyData {
|
|
34
|
+
policy: Address;
|
|
35
|
+
initData: Hex;
|
|
36
|
+
}
|
|
4
37
|
type SmartSessionModeType = typeof SMART_SESSION_MODE_USE | typeof SMART_SESSION_MODE_ENABLE | typeof SMART_SESSION_MODE_UNSAFE_ENABLE;
|
|
5
38
|
declare const SMART_SESSIONS_VALIDATOR_ADDRESS: Address;
|
|
6
39
|
declare const SMART_SESSION_MODE_USE = "0x00";
|
|
@@ -26,4 +59,5 @@ declare function getAccountEIP712Domain(client: PublicClient, account: Address):
|
|
|
26
59
|
salt: `0x${string}`;
|
|
27
60
|
}>;
|
|
28
61
|
export { SMART_SESSION_MODE_USE, SMART_SESSION_MODE_ENABLE, SMART_SESSIONS_VALIDATOR_ADDRESS, getSmartSessionValidator, getEnableSessionCall, encodeSmartSessionSignature, getPermissionId, getAccountEIP712Domain, isSessionEnabled, getSessionAllowedERC7739Content, };
|
|
62
|
+
export type { SessionData };
|
|
29
63
|
//# sourceMappingURL=smart-sessions.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"smart-sessions.d.ts","sourceRoot":"","sources":["../../../../modules/validators/smart-sessions.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,KAAK,EAKV,KAAK,GAAG,EAIR,KAAK,YAAY,EAKlB,MAAM,MAAM,CAAA;AAMb,OAAO,KAAK,EAEV,uBAAuB,EACvB,OAAO,EAER,MAAM,aAAa,CAAA;AAEpB,OAAO,EAA4B,KAAK,MAAM,EAAE,MAAM,WAAW,CAAA;AAWjE,UAAU,WAAW;IACnB,gBAAgB,EAAE,OAAO,CAAA;IACzB,wBAAwB,EAAE,GAAG,CAAA;IAC7B,IAAI,EAAE,GAAG,CAAA;IACT,cAAc,EAAE,SAAS,YAAY,EAAE,CAAA;IACvC,eAAe,EAAE;QACf,qBAAqB,EAAE,SAAS,qBAAqB,EAAE,CAAA;QACvD,eAAe,EAAE,SAAS,aAAa,EAAE,CAAA;KAC1C,CAAA;IACD,OAAO,EAAE,SAAS,UAAU,EAAE,CAAA;IAC9B,sBAAsB,EAAE,OAAO,CAAA;CAChC;AAED,UAAU,YAAY;IACpB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAED,UAAU,aAAa;IACrB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAED,UAAU,qBAAqB;IAC7B,kBAAkB,EAAE,GAAG,CAAA;IACvB,WAAW,EAAE,SAAS,MAAM,EAAE,CAAA;CAC/B;AAED,UAAU,UAAU;IAClB,YAAY,EAAE,OAAO,CAAA;IACrB,oBAAoB,EAAE,GAAG,CAAA;IACzB,cAAc,EAAE,SAAS,UAAU,EAAE,CAAA;CACtC;AAED,UAAU,UAAU;IAClB,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;CACd;AAaD,KAAK,oBAAoB,GACrB,OAAO,sBAAsB,GAC7B,OAAO,yBAAyB,GAChC,OAAO,gCAAgC,CAAA;AAE3C,QAAA,MAAM,gCAAgC,EAAE,OACM,CAAA;AAE9C,QAAA,MAAM,sBAAsB,SAAS,CAAA;AACrC,QAAA,MAAM,yBAAyB,SAAS,CAAA;AACxC,QAAA,MAAM,gCAAgC,SAAS,CAAA;AAyB/C,iBAAe,oBAAoB,CAAC,KAAK,EAAE,KAAK,EAAE,OAAO,EAAE,OAAO;;;GAsBjE;AA6BD,iBAAe,+BAA+B,CAAC,KAAK,EAAE,KAAK;;;GAgB1D;AA0DD,iBAAS,wBAAwB,CAC/B,MAAM,EAAE,uBAAuB,GAC9B,MAAM,GAAG,IAAI,CAWf;AA8KD,iBAAe,gBAAgB,CAC7B,MAAM,EAAE,YAAY,EACpB,OAAO,EAAE,OAAO,EAChB,YAAY,EAAE,GAAG,oBAiClB;AAED,iBAAS,2BAA2B,CAClC,IAAI,EAAE,oBAAoB,EAC1B,YAAY,EAAE,GAAG,EACjB,SAAS,EAAE,GAAG,iBAcf;AAED,iBAAS,eAAe,CAAC,OAAO,EAAE,OAAO,iBAyBxC;AAED,iBAAe,sBAAsB,CAAC,MAAM,EAAE,YAAY,EAAE,OAAO,EAAE,OAAO;;;;;;GAoD3E;AAED,OAAO,EACL,sBAAsB,EACtB,yBAAyB,EACzB,gCAAgC,EAChC,wBAAwB,EACxB,oBAAoB,EACpB,2BAA2B,EAC3B,eAAe,EACf,sBAAsB,EACtB,gBAAgB,EAChB,+BAA+B,GAChC,CAAA;AACD,YAAY,EAAE,WAAW,EAAE,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"smart-sessions.test.d.ts","sourceRoot":"","sources":["../../../../modules/validators/smart-sessions.test.ts"],"names":[],"mappings":""}
|
|
@@ -0,0 +1,226 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
const viem_1 = require("viem");
|
|
4
|
+
const chains_1 = require("viem/chains");
|
|
5
|
+
const vitest_1 = require("vitest");
|
|
6
|
+
const consts_1 = require("../../../test/consts");
|
|
7
|
+
const smart_sessions_1 = require("../abi/smart-sessions");
|
|
8
|
+
const common_1 = require("../common");
|
|
9
|
+
const smart_sessions_2 = require("./smart-sessions");
|
|
10
|
+
(0, vitest_1.describe)('Smart Sessions', () => {
|
|
11
|
+
(0, vitest_1.describe)('Permission ID', () => {
|
|
12
|
+
(0, vitest_1.test)('default', () => {
|
|
13
|
+
(0, vitest_1.expect)((0, smart_sessions_2.getPermissionId)({
|
|
14
|
+
owners: {
|
|
15
|
+
type: 'ecdsa',
|
|
16
|
+
accounts: [consts_1.accountA, consts_1.accountB],
|
|
17
|
+
},
|
|
18
|
+
})).toBe('0xa16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344');
|
|
19
|
+
});
|
|
20
|
+
(0, vitest_1.test)('with salt', () => {
|
|
21
|
+
(0, vitest_1.expect)((0, smart_sessions_2.getPermissionId)({
|
|
22
|
+
owners: {
|
|
23
|
+
type: 'ecdsa',
|
|
24
|
+
accounts: [consts_1.accountA, consts_1.accountB],
|
|
25
|
+
},
|
|
26
|
+
salt: '0x97340e1cfff3319c76ef22b2bc9d3231071d550125d68c9d4a8972823f166320',
|
|
27
|
+
})).toBe('0x85ff7cd77e7e0f8fbc2e42c86cdb948e4c79ac5a5e4595def4c38d7ed804eef9');
|
|
28
|
+
});
|
|
29
|
+
});
|
|
30
|
+
(0, vitest_1.describe)('Smart Session Validator', () => {
|
|
31
|
+
(0, vitest_1.test)('no session', () => {
|
|
32
|
+
(0, vitest_1.expect)((0, smart_sessions_2.getSmartSessionValidator)({
|
|
33
|
+
owners: {
|
|
34
|
+
type: 'ecdsa',
|
|
35
|
+
accounts: [consts_1.accountA],
|
|
36
|
+
},
|
|
37
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
38
|
+
})).toBeNull();
|
|
39
|
+
});
|
|
40
|
+
(0, vitest_1.test)('empty session list', () => {
|
|
41
|
+
(0, vitest_1.expect)((0, smart_sessions_2.getSmartSessionValidator)({
|
|
42
|
+
owners: {
|
|
43
|
+
type: 'ecdsa',
|
|
44
|
+
accounts: [consts_1.accountA],
|
|
45
|
+
},
|
|
46
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
47
|
+
sessions: [],
|
|
48
|
+
})).not.toBeNull();
|
|
49
|
+
});
|
|
50
|
+
(0, vitest_1.test)('single session', () => {
|
|
51
|
+
const validator = (0, smart_sessions_2.getSmartSessionValidator)({
|
|
52
|
+
owners: {
|
|
53
|
+
type: 'ecdsa',
|
|
54
|
+
accounts: [consts_1.accountA],
|
|
55
|
+
},
|
|
56
|
+
rhinestoneApiKey: consts_1.MOCK_API_KEY,
|
|
57
|
+
sessions: [
|
|
58
|
+
{
|
|
59
|
+
owners: {
|
|
60
|
+
type: 'ecdsa',
|
|
61
|
+
accounts: [consts_1.accountA],
|
|
62
|
+
},
|
|
63
|
+
},
|
|
64
|
+
],
|
|
65
|
+
});
|
|
66
|
+
(0, vitest_1.expect)(validator).not.toBeNull();
|
|
67
|
+
(0, vitest_1.expect)(validator?.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
68
|
+
(0, vitest_1.expect)(validator && (0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
69
|
+
});
|
|
70
|
+
});
|
|
71
|
+
(0, vitest_1.describe)('Enable Session Call', () => {
|
|
72
|
+
vitest_1.vi.mock('viem', async (importOriginal) => {
|
|
73
|
+
const actual = await importOriginal();
|
|
74
|
+
return {
|
|
75
|
+
// @ts-ignore
|
|
76
|
+
...actual,
|
|
77
|
+
createPublicClient: vitest_1.vi.fn().mockReturnValue({
|
|
78
|
+
readContract: vitest_1.vi.fn(),
|
|
79
|
+
}),
|
|
80
|
+
};
|
|
81
|
+
});
|
|
82
|
+
const client = viem_1.createPublicClient;
|
|
83
|
+
client.mockImplementation((_) => {
|
|
84
|
+
return {
|
|
85
|
+
readContract: (params) => {
|
|
86
|
+
if (params.functionName === 'DOMAIN_SEPARATOR') {
|
|
87
|
+
return '0xf5f6dfa751763cc5278cba45d03ea9797c1660b2cb7f5ffd188fa3e8523abdca';
|
|
88
|
+
}
|
|
89
|
+
throw new Error('Unknown function call');
|
|
90
|
+
},
|
|
91
|
+
};
|
|
92
|
+
});
|
|
93
|
+
const TARGET = '0x063DFbDb1610EC7BbfA1fFBE603Ac5aA1B67a935';
|
|
94
|
+
const SELECTOR = '0x12345678';
|
|
95
|
+
const FALLBACK_TARGET = '0x0000000000000000000000000000000000000001';
|
|
96
|
+
const FALLBACK_SELECTOR = '0x00000001';
|
|
97
|
+
(0, vitest_1.test)('default', async () => {
|
|
98
|
+
const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
|
|
99
|
+
owners: {
|
|
100
|
+
type: 'ecdsa',
|
|
101
|
+
accounts: [consts_1.accountA],
|
|
102
|
+
},
|
|
103
|
+
});
|
|
104
|
+
const sessionData = toSessionData(call);
|
|
105
|
+
// Should have a fallback action
|
|
106
|
+
(0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === FALLBACK_TARGET &&
|
|
107
|
+
action.actionTargetSelector === FALLBACK_SELECTOR)).toEqual(true);
|
|
108
|
+
});
|
|
109
|
+
(0, vitest_1.test)('with action', async () => {
|
|
110
|
+
const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
|
|
111
|
+
owners: {
|
|
112
|
+
type: 'ecdsa',
|
|
113
|
+
accounts: [consts_1.accountA],
|
|
114
|
+
},
|
|
115
|
+
actions: [
|
|
116
|
+
{
|
|
117
|
+
target: TARGET,
|
|
118
|
+
selector: SELECTOR,
|
|
119
|
+
},
|
|
120
|
+
],
|
|
121
|
+
});
|
|
122
|
+
const sessionData = toSessionData(call);
|
|
123
|
+
// Should have the action
|
|
124
|
+
(0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === TARGET &&
|
|
125
|
+
action.actionTargetSelector === SELECTOR)).toEqual(true);
|
|
126
|
+
// Should not have the fallback action
|
|
127
|
+
(0, vitest_1.expect)(sessionData.actions.some((action) => action.actionTarget === FALLBACK_TARGET &&
|
|
128
|
+
action.actionTargetSelector === FALLBACK_SELECTOR)).toEqual(false);
|
|
129
|
+
});
|
|
130
|
+
(0, vitest_1.test)('with policy', async () => {
|
|
131
|
+
const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
|
|
132
|
+
owners: {
|
|
133
|
+
type: 'ecdsa',
|
|
134
|
+
accounts: [consts_1.accountA],
|
|
135
|
+
},
|
|
136
|
+
policies: [
|
|
137
|
+
{
|
|
138
|
+
type: 'sudo',
|
|
139
|
+
},
|
|
140
|
+
{
|
|
141
|
+
type: 'universal-action',
|
|
142
|
+
rules: [
|
|
143
|
+
{
|
|
144
|
+
condition: 'equal',
|
|
145
|
+
calldataOffset: 0n,
|
|
146
|
+
referenceValue: '0xd8da6bf26964af9d7eed9e03e53415d37aa96045',
|
|
147
|
+
},
|
|
148
|
+
],
|
|
149
|
+
},
|
|
150
|
+
],
|
|
151
|
+
});
|
|
152
|
+
const sessionData = toSessionData(call);
|
|
153
|
+
// Should have two policies
|
|
154
|
+
(0, vitest_1.expect)(sessionData.userOpPolicies.length).toEqual(2);
|
|
155
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(sessionData.userOpPolicies[0].policy)).toEqual(true);
|
|
156
|
+
(0, vitest_1.expect)((0, viem_1.isHex)(sessionData.userOpPolicies[0].initData)).toEqual(true);
|
|
157
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(sessionData.userOpPolicies[1].policy)).toEqual(true);
|
|
158
|
+
(0, vitest_1.expect)((0, viem_1.isHex)(sessionData.userOpPolicies[1].initData)).toEqual(true);
|
|
159
|
+
});
|
|
160
|
+
(0, vitest_1.test)('with action policy', async () => {
|
|
161
|
+
const call = await (0, smart_sessions_2.getEnableSessionCall)(chains_1.mainnet, {
|
|
162
|
+
owners: {
|
|
163
|
+
type: 'ecdsa',
|
|
164
|
+
accounts: [consts_1.accountA],
|
|
165
|
+
},
|
|
166
|
+
actions: [
|
|
167
|
+
{
|
|
168
|
+
target: TARGET,
|
|
169
|
+
selector: SELECTOR,
|
|
170
|
+
policies: [
|
|
171
|
+
{
|
|
172
|
+
type: 'sudo',
|
|
173
|
+
},
|
|
174
|
+
{
|
|
175
|
+
type: 'universal-action',
|
|
176
|
+
rules: [
|
|
177
|
+
{
|
|
178
|
+
condition: 'equal',
|
|
179
|
+
calldataOffset: 0n,
|
|
180
|
+
referenceValue: '0xd8da6bf26964af9d7eed9e03e53415d37aa96045',
|
|
181
|
+
},
|
|
182
|
+
],
|
|
183
|
+
},
|
|
184
|
+
],
|
|
185
|
+
},
|
|
186
|
+
],
|
|
187
|
+
});
|
|
188
|
+
const sessionData = toSessionData(call);
|
|
189
|
+
// Should have the action
|
|
190
|
+
const action = sessionData.actions.find((action) => action.actionTarget === TARGET &&
|
|
191
|
+
action.actionTargetSelector === SELECTOR);
|
|
192
|
+
(0, vitest_1.expect)(action).toBeDefined();
|
|
193
|
+
if (!action) {
|
|
194
|
+
throw new Error('No action');
|
|
195
|
+
}
|
|
196
|
+
// Should have 2 policies
|
|
197
|
+
const actionPolicies = action.actionPolicies;
|
|
198
|
+
(0, vitest_1.expect)(actionPolicies.length).toEqual(2);
|
|
199
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(actionPolicies[0].policy)).toEqual(true);
|
|
200
|
+
(0, vitest_1.expect)((0, viem_1.isHex)(actionPolicies[0].initData)).toEqual(true);
|
|
201
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(actionPolicies[1].policy)).toEqual(true);
|
|
202
|
+
(0, vitest_1.expect)((0, viem_1.isHex)(actionPolicies[1].initData)).toEqual(true);
|
|
203
|
+
});
|
|
204
|
+
function toSessionData(call) {
|
|
205
|
+
(0, vitest_1.expect)((0, viem_1.isHex)(call.data)).toEqual(true);
|
|
206
|
+
(0, vitest_1.expect)((0, viem_1.isAddress)(call.to)).toEqual(true);
|
|
207
|
+
const decoded = (0, viem_1.decodeFunctionData)({
|
|
208
|
+
abi: smart_sessions_1.enableSessionsAbi,
|
|
209
|
+
data: call.data,
|
|
210
|
+
});
|
|
211
|
+
(0, vitest_1.expect)(decoded.functionName).toEqual('enableSessions');
|
|
212
|
+
(0, vitest_1.expect)(decoded.args.length).toEqual(1);
|
|
213
|
+
(0, vitest_1.expect)(decoded.args[0].length).toEqual(1);
|
|
214
|
+
const session = decoded.args[0][0];
|
|
215
|
+
return session;
|
|
216
|
+
}
|
|
217
|
+
});
|
|
218
|
+
(0, vitest_1.describe)('Encode Smart Session Signature', () => {
|
|
219
|
+
(0, vitest_1.test)('use mode', () => {
|
|
220
|
+
const permissionId = '0xa16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344';
|
|
221
|
+
const signature = '0xabcdef';
|
|
222
|
+
const sessionSignature = (0, smart_sessions_2.encodeSmartSessionSignature)(smart_sessions_2.SMART_SESSION_MODE_USE, permissionId, signature);
|
|
223
|
+
(0, vitest_1.expect)(sessionSignature).toEqual('0x00a16d89135da22ae1b97b6ac6ebc047dce282640bbbf56059958d96527b720344abcdef');
|
|
224
|
+
});
|
|
225
|
+
});
|
|
226
|
+
});
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../../orchestrator/client.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,KAAK,OAAO,EAAU,KAAK,GAAG,EAAE,MAAM,MAAM,CAAA;AACrD,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAG7D,OAAO,KAAK,EACV,WAAW,EACX,YAAY,EACZ,UAAU,EACV,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAShB,qBAAa,YAAY;IACvB,OAAO,CAAC,SAAS,CAAQ;IACzB,OAAO,CAAC,MAAM,CAAQ;gBAEV,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM;IAKvC,YAAY,CAChB,WAAW,EAAE,OAAO,EACpB,MAAM,CAAC,EAAE;QACP,QAAQ,CAAC,EAAE,MAAM,EAAE,CAAA;QACnB,MAAM,CAAC,EAAE;YACP,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,EAAE,CAAA;SAC7B,CAAA;KACF,GACA,OAAO,CAAC,gBAAgB,EAAE,CAAC;IAwCxB,iBAAiB,CACrB,WAAW,EAAE,OAAO,EACpB,aAAa,EAAE,MAAM,EACrB,kBAAkB,EAAE,OAAO,EAC3B,cAAc,EAAE,MAAM,GACrB,OAAO,CAAC,MAAM,CAAC;IAgCZ,aAAa,CACjB,MAAM,EAAE,aAAa,EACrB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,eAAe,CAAC;IAqBrB,YAAY,CAChB,MAAM,EAAE,UAAU,EAClB,WAAW,EAAE,OAAO,GACnB,OAAO,CAAC,SAAS,CAAC;IAgCf,qBAAqB,CACzB,kBAAkB,EAAE;QAClB,iBAAiB,EAAE,uBAAuB,CAAA;QAC1C,QAAQ,CAAC,EAAE,GAAG,CAAA;QACd,MAAM,CAAC,EAAE,aAAa,CAAA;KACvB,EAAE,GACF,OAAO,CAAC,qBAAqB,CAAC;IA2C3B,eAAe,CAAC,QAAQ,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,CAAC;IAyBxD,iBAAiB,CACrB,KAAK,GAAE,MAAW,EAClB,MAAM,GAAE,MAAU,GACjB,OAAO,CAAC;QAAE,cAAc,EAAE,WAAW,EAAE,CAAC;QAAC,UAAU,CAAC,EAAE,MAAM,CAAA;KAAE,CAAC;IAuBlE,OAAO,CAAC,UAAU;CA6DnB"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"consts.d.ts","sourceRoot":"","sources":["../../../orchestrator/consts.ts"],"names":[],"mappings":"AAAA,QAAA,MAAM,qBAAqB,wCAAwC,CAAA;AACnE,QAAA,MAAM,oBAAoB,4CAA4C,CAAA;AACtE,QAAA,MAAM,6BAA6B,+CACW,CAAA;AAE9C,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,6BAA6B,GAC9B,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../../../orchestrator/error.ts"],"names":[],"mappings":"AAAA,qBAAa,iBAAkB,SAAQ,KAAK;IAC1C,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAQ;IACjC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAK;IAC9B,OAAO,CAAC,QAAQ,CAAC,UAAU,CAAQ;IACnC,OAAO,CAAC,QAAQ,CAAC,QAAQ,CAAQ;gBAErB,MAAM,CAAC,EAAE;QACnB,OAAO,CAAC,EAAE,MAAM,CAAA;QAChB,OAAO,CAAC,EAAE,GAAG,CAAA;QACb,SAAS,CAAC,EAAE,MAAM,CAAA;QAClB,OAAO,CAAC,EAAE,MAAM,CAAA;KACjB;IAQD,IAAI,OAAO,WAEV;IAED,IAAI,OAAO,QAEV;IAED,IAAI,SAAS,WAEZ;IAED,IAAI,OAAO,WAEV;CACF;AAED,wBAAgB,mBAAmB,CAAC,KAAK,EAAE,KAAK,GAAG,KAAK,IAAI,iBAAiB,CAE5E"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../orchestrator/index.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,YAAY,EAAE,MAAM,UAAU,CAAA;AACvC,OAAO,EAAyB,6BAA6B,EAAE,MAAM,UAAU,CAAA;AAC/E,OAAO,EAAE,mBAAmB,EAAE,iBAAiB,EAAE,MAAM,SAAS,CAAA;AAChE,OAAO,EACL,cAAc,EACd,6BAA6B,EAC7B,yBAAyB,EACzB,kBAAkB,EAClB,sBAAsB,EACtB,eAAe,EACf,mBAAmB,EACnB,uBAAuB,EACvB,cAAc,EACd,cAAc,EACd,uBAAuB,EACxB,MAAM,YAAY,CAAA;AACnB,OAAO,KAAK,EACV,YAAY,EACZ,SAAS,EACT,UAAU,EACV,iBAAiB,EACjB,SAAS,EACT,eAAe,EACf,aAAa,EACb,SAAS,EACT,qBAAqB,EACrB,uBAAuB,EACvB,gBAAgB,EACjB,MAAM,SAAS,CAAA;AAChB,OAAO,EACL,uBAAuB,EACvB,qBAAqB,EACrB,oBAAoB,EACpB,oBAAoB,EACpB,iCAAiC,EACjC,qBAAqB,EACrB,0BAA0B,EAC1B,qBAAqB,EACtB,MAAM,SAAS,CAAA;AAChB,OAAO,EACL,uBAAuB,EACvB,gBAAgB,EAChB,cAAc,EACd,kBAAkB,EACnB,MAAM,SAAS,CAAA;AAEhB,iBAAS,eAAe,CACtB,MAAM,EAAE,MAAM,EACd,eAAe,CAAC,EAAE,MAAM,GACvB,YAAY,CAEd;AAED,YAAY,EACV,SAAS,EACT,YAAY,EACZ,UAAU,EACV,iBAAiB,EACjB,SAAS,EACT,uBAAuB,EACvB,qBAAqB,EACrB,SAAS,EACT,eAAe,EACf,aAAa,EACb,gBAAgB,GACjB,CAAA;AACD,OAAO,EACL,gBAAgB,IAAI,YAAY,EAChC,qBAAqB,EACrB,qBAAqB,EACrB,iCAAiC,EACjC,uBAAuB,EACvB,oBAAoB,EACpB,oBAAoB,EACpB,0BAA0B,EAC1B,qBAAqB,EACrB,6BAA6B,EAC7B,YAAY,EACZ,iBAAiB,EACjB,eAAe,EACf,kBAAkB,EAClB,cAAc,EACd,cAAc,EACd,mBAAmB,EACnB,uBAAuB,EACvB,cAAc,EACd,cAAc,EACd,yBAAyB,EACzB,sBAAsB,EACtB,6BAA6B,EAC7B,eAAe,EACf,kBAAkB,EAClB,mBAAmB,EACnB,uBAAuB,EACvB,uBAAuB,GACxB,CAAA"}
|
|
@@ -13,5 +13,8 @@ declare function getChainById(chainId: number): Chain | undefined;
|
|
|
13
13
|
declare function isTestnet(chainId: number): boolean;
|
|
14
14
|
declare function isTokenAddressSupported(address: Address, chainId: number): boolean;
|
|
15
15
|
declare function getSupportedTokens(chainId: number): TokenConfig[];
|
|
16
|
-
|
|
16
|
+
declare function getDefaultAccountAccessList(): {
|
|
17
|
+
chainIds: (1 | 10 | 8453 | 42161)[];
|
|
18
|
+
};
|
|
19
|
+
export { getTokenSymbol, getTokenAddress, getTokenRootBalanceSlot, getTokenBalanceSlot, getWethAddress, getHookAddress, getSameChainModuleAddress, getTargetModuleAddress, getRhinestoneSpokePoolAddress, getChainById, getSupportedTokens, isTestnet, isTokenAddressSupported, getDefaultAccountAccessList, };
|
|
17
20
|
//# sourceMappingURL=registry.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"registry.d.ts","sourceRoot":"","sources":["../../../orchestrator/registry.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,OAAO,EACZ,KAAK,KAAK,EAEV,KAAK,GAAG,EAGT,MAAM,MAAM,CAAA;AAcb,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAA;AAErC,iBAAS,cAAc,CAAC,KAAK,EAAE,KAAK,0UAoCnC;AAwCD,iBAAS,uBAAuB,CAC9B,KAAK,EAAE,KAAK,EACZ,YAAY,EAAE,OAAO,GACpB,MAAM,GAAG,IAAI,CAqJf;AAED,iBAAS,mBAAmB,CAC1B,WAAW,EAAE,MAAM,EACnB,OAAO,EAAE,MAAM,EACf,cAAc,EAAE,OAAO,GACtB,GAAG,CAgBL;AAED,iBAAS,cAAc,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAElD;AAED,iBAAS,yBAAyB,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAE7D;AAED,iBAAS,sBAAsB,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAE1D;AAED,iBAAS,6BAA6B,CAAC,QAAQ,CAAC,EAAE,MAAM,GAAG,OAAO,CAEjE;AAED,iBAAS,cAAc,CAAC,YAAY,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,GAAG,MAAM,CAWtE;AAED,iBAAS,eAAe,CAAC,WAAW,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAkBtE;AAED,iBAAS,YAAY,CAAC,OAAO,EAAE,MAAM,qBAkBpC;AAED,iBAAS,SAAS,CAAC,OAAO,EAAE,MAAM,WAMjC;AAED,iBAAS,uBAAuB,CAAC,OAAO,EAAE,OAAO,EAAE,OAAO,EAAE,MAAM,GAAG,OAAO,CAW3E;AAED,iBAAS,kBAAkB,CAAC,OAAO,EAAE,MAAM,GAAG,WAAW,EAAE,CAkB1D;AAkBD,iBAAS,2BAA2B;;EAInC;AAED,OAAO,EACL,cAAc,EACd,eAAe,EACf,uBAAuB,EACvB,mBAAmB,EACnB,cAAc,EACd,cAAc,EACd,yBAAyB,EACzB,sBAAsB,EACtB,6BAA6B,EAC7B,YAAY,EACZ,kBAAkB,EAClB,SAAS,EACT,uBAAuB,EACvB,2BAA2B,GAC5B,CAAA"}
|
|
@@ -13,6 +13,7 @@ exports.getChainById = getChainById;
|
|
|
13
13
|
exports.getSupportedTokens = getSupportedTokens;
|
|
14
14
|
exports.isTestnet = isTestnet;
|
|
15
15
|
exports.isTokenAddressSupported = isTokenAddressSupported;
|
|
16
|
+
exports.getDefaultAccountAccessList = getDefaultAccountAccessList;
|
|
16
17
|
const viem_1 = require("viem");
|
|
17
18
|
const chains_1 = require("viem/chains");
|
|
18
19
|
function getWethAddress(chain) {
|
|
@@ -271,6 +272,9 @@ function getTokenSymbol(tokenAddress, chainId) {
|
|
|
271
272
|
throw new Error(`Unsupported token address ${tokenAddress} for chain ${chainId}`);
|
|
272
273
|
}
|
|
273
274
|
function getTokenAddress(tokenSymbol, chainId) {
|
|
275
|
+
if (chainId === 137 && tokenSymbol === 'ETH') {
|
|
276
|
+
throw new Error(`Chain ${chainId} does not allow for ETH to be used`);
|
|
277
|
+
}
|
|
274
278
|
if (tokenSymbol === 'ETH') {
|
|
275
279
|
return viem_1.zeroAddress;
|
|
276
280
|
}
|
|
@@ -356,3 +360,8 @@ function getTokenDecimals(symbol) {
|
|
|
356
360
|
throw new Error(`Symbol not supported: ${symbol}`);
|
|
357
361
|
}
|
|
358
362
|
}
|
|
363
|
+
function getDefaultAccountAccessList() {
|
|
364
|
+
return {
|
|
365
|
+
chainIds: [chains_1.mainnet.id, chains_1.base.id, chains_1.arbitrum.id, chains_1.optimism.id],
|
|
366
|
+
};
|
|
367
|
+
}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../orchestrator/types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,GAAG,EAAE,MAAM,MAAM,CAAA;AACxC,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAC7D,OAAO,KAAK,EACV,QAAQ,EACR,eAAe,EACf,IAAI,EACJ,WAAW,EACX,OAAO,EACP,QAAQ,EACR,eAAe,EACf,OAAO,EACP,WAAW,EACX,OAAO,EACR,MAAM,aAAa,CAAA;AAEpB,KAAK,gBAAgB,GACjB,OAAO,OAAO,CAAC,EAAE,GACjB,OAAO,WAAW,CAAC,EAAE,GACrB,OAAO,eAAe,CAAC,EAAE,GACzB,OAAO,eAAe,CAAC,EAAE,GACzB,OAAO,WAAW,CAAC,EAAE,CAAA;AACzB,KAAK,gBAAgB,GACjB,OAAO,OAAO,CAAC,EAAE,GACjB,OAAO,IAAI,CAAC,EAAE,GACd,OAAO,QAAQ,CAAC,EAAE,GAClB,OAAO,QAAQ,CAAC,EAAE,GAClB,OAAO,OAAO,CAAC,EAAE,CAAA;AACrB,KAAK,cAAc,GAAG,gBAAgB,GAAG,gBAAgB,CAAA;AACzD,KAAK,oBAAoB,GAAG,KAAK,GAAG,MAAM,GAAG,MAAM,CAAA;AACnD,KAAK,cAAc,GAAG,oBAAoB,GAAG,OAAO,CAAA;AAEpD,KAAK,YAAY,GACb,OAAO,qBAAqB,GAC5B,OAAO,qBAAqB,GAC5B,OAAO,iCAAiC,GACxC,OAAO,uBAAuB,GAC9B,OAAO,oBAAoB,GAC3B,OAAO,0BAA0B,GACjC,OAAO,oBAAoB,GAC3B,OAAO,qBAAqB,CAAA;AAEhC,KAAK,uBAAuB,GAAG;IAC7B,OAAO,EAAE,MAAM,CAAA;IACf,YAAY,EAAE,OAAO,CAAA;CACtB,EAAE,CAAA;AAEH,KAAK,0BAA0B,GAAG;IAChC,WAAW,CAAC,EAAE;SACX,OAAO,IAAI,cAAc,CAAC,CAAC,EAAE,cAAc,EAAE;KAC/C,CAAA;CACF,CAAA;AAED,KAAK,4BAA4B,GAAG;IAClC,QAAQ,CAAC,EAAE,cAAc,EAAE,CAAA;IAC3B,MAAM,CAAC,EAAE,cAAc,EAAE,CAAA;CAC1B,CAAA;AAED,KAAK,iBAAiB,GAClB,uBAAuB,GACvB,0BAA0B,GAC1B,4BAA4B,CAAA;AAEhC,KAAK,WAAW,GAAG,SAAS,GAAG,SAAS,GAAG,SAAS,CAAA;AAEpD,UAAU,KAAK;IACb,SAAS,EAAE,MAAM,CAAA;IACjB,OAAO,EAAE,MAAM,CAAA;IACf,MAAM,EAAE,WAAW,CAAA;IACnB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,oBAAoB,CAAC,EAAE,GAAG,CAAA;CAC3B;AAED,UAAU,SAAS;IACjB,EAAE,EAAE,OAAO,CAAA;IACX,KAAK,EAAE,MAAM,CAAA;IACb,IAAI,EAAE,GAAG,CAAA;CACV;AAED,KAAK,gBAAgB,GACjB;IAAE,OAAO,EAAE,IAAI,CAAA;CAAE,GACjB;IACE,OAAO,EAAE,KAAK,CAAA;IACd,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE;QACP,OAAO,EAAE,MAAM,CAAA;QACf,eAAe,EAAE,OAAO,CAAA;QACxB,IAAI,EAAE,GAAG,EAAE,CAAA;QACX,YAAY,EAAE,MAAM,CAAA;KACrB,CAAA;CACF,CAAA;AAEL,KAAK,qBAAqB,GAAG,CACzB;IACE,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,EAAE,OAAO,qBAAqB,CAAA;CACrC,GACD;IACE,QAAQ,EAAE,MAAM,CAAA;IAChB,MAAM,EAAE,OAAO,oBAAoB,CAAA;IACnC,KAAK,EAAE,gBAAgB,CAAA;CACxB,CACJ,EAAE,CAAA;AAEH,UAAU,YAAY;IACpB,MAAM,EAAE,YAAY,CAAA;IACpB,aAAa,CAAC,EAAE,MAAM,CAAA;IACtB,mBAAmB,CAAC,EAAE,GAAG,CAAA;IACzB,MAAM,EAAE,KAAK,EAAE,CAAA;CAChB;AAED,UAAU,aAAa;IACrB,YAAY,EAAE,OAAO,CAAA;IACrB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,UAAU;IAClB,MAAM,EAAE,aAAa,CAAA;IACrB,gBAAgB,CAAC,EAAE,KAAK,CAAA;CACzB;AAED,UAAU,cAAc;IACtB,MAAM,CAAC,EAAE,KAAK,CAAA;IACd,gBAAgB,EAAE,SAAS,EAAE,CAAA;CAC9B;AAED,UAAU,gBAAgB;IACxB,MAAM,CAAC,EAAE,KAAK,CAAA;IACd,gBAAgB,CAAC,EAAE,KAAK,CAAA;CACzB;AAED,KAAK,QAAQ,GAAG,MAAM,GAAG,SAAS,CAAA;AAElC,UAAU,cAAc;IACtB,aAAa,EAAE,OAAO,CAAA;IACtB,aAAa,EAAE,MAAM,CAAA;IACrB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,cAAc,EAAE,aAAa,EAAE,CAAA;IAC/B,iBAAiB,CAAC,EAAE,iBAAiB,CAAA;IACrC,QAAQ,CAAC,EAAE,QAAQ,CAAA;IACnB,QAAQ,CAAC,EAAE,OAAO,CAAA;CACnB;AAED,KAAK,SAAS,GAAG;IACf,WAAW,EAAE,iBAAiB,CAAA;IAC9B,kBAAkB,EAAE,SAAS,EAAE,CAAA;IAC/B,UAAU,EAAE,SAAS,CAAA;CACtB,EAAE,CAAA;AAEH,KAAK,eAAe,GAAG,cAAc,GAAG,gBAAgB,CAAA;AACxD,KAAK,oBAAoB,GAAG,cAAc,GAAG,UAAU,CAAA;AACvD,KAAK,wBAAwB,GAAG,cAAc,GAAG,cAAc,CAAA;AAE/D,KAAK,UAAU,GACX,eAAe,GACf,oBAAoB,GACpB,wBAAwB,CAAA;AAE5B,KAAK,cAAc,GAAG,SAAS,GAAG;IAAE,OAAO,EAAE,MAAM,CAAA;CAAE,CAAA;AAErD,UAAU,YAAY;IACpB,kBAAkB,EAAE,cAAc,CAAA;IAClC,UAAU,EAAE,OAAO,CAAA;IACnB,WAAW,EAAE,OAAO,CAAA;IACpB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,kBAAkB,EAAE,MAAM,CAAA;IAC1B,aAAa,EAAE,MAAM,CAAA;IACrB,SAAS,EAAE,MAAM,CAAA;IACjB,cAAc,EAAE,MAAM,CAAA;IACtB,YAAY,EAAE,MAAM,CAAA;IACpB,mBAAmB,EAAE,MAAM,CAAA;IAC3B,SAAS,EAAE,OAAO,CAAA;IAClB,SAAS,EAAE,OAAO,CAAA;IAClB,gBAAgB,EAAE,OAAO,CAAA;IACzB,OAAO,EAAE,GAAG,CAAA;CACb;AAED,UAAU,WAAW;IACnB,QAAQ,EAAE,MAAM,CAAA;IAChB,IAAI,EAAE,MAAM,CAAA;IACZ,iBAAiB,EAAE,cAAc,CAAA;IACjC,mBAAmB,EAAE,YAAY,EAAE,CAAA;CACpC;AAED,UAAU,OAAO;IACf,SAAS,EAAE,OAAO,CAAA;IAClB,QAAQ,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC,EAAE,CAAA;IAC5B,SAAS,EAAE,MAAM,CAAA;IACjB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,KAAK,EAAE,SAAS,EAAE,CAAA;IAClB,UAAU,EAAE,GAAG,CAAA;IACf,SAAS,EAAE,MAAM,CAAA;CAClB;AAED,UAAU,OAAO;IACf,OAAO,EAAE,OAAO,CAAA;IAChB,OAAO,EAAE,MAAM,CAAA;IACf,aAAa,EAAE,CAAC,MAAM,EAAE,MAAM,CAAC,EAAE,CAAA;IACjC,OAAO,EAAE,OAAO,CAAA;CACjB;AAED,UAAU,iBAAiB;IACzB,OAAO,EAAE,OAAO,CAAA;IAChB,KAAK,EAAE,MAAM,CAAA;IACb,OAAO,EAAE,MAAM,CAAA;IACf,QAAQ,EAAE,OAAO,EAAE,CAAA;CACpB;AAED,UAAU,uBAAwB,SAAQ,iBAAiB;IACzD,gBAAgB,EAAE,GAAG,EAAE,CAAA;IACvB,eAAe,EAAE,GAAG,CAAA;CACrB;AAED,UAAU,gBAAgB;IACxB,SAAS,EAAE,MAAM,CAAA;IACjB,aAAa,EAAE,MAAM,CAAA;IACrB,OAAO,EAAE,MAAM,CAAA;IACf,iBAAiB,EAAE;QACjB,OAAO,EAAE,MAAM,CAAA;QACf,YAAY,EAAE,OAAO,CAAA;QACrB,OAAO,EAAE,MAAM,CAAA;KAChB,EAAE,CAAA;CACJ;AAED,UAAU,iBAAiB;IACzB,CAAC,OAAO,EAAE,MAAM,GAAG;QAAE,CAAC,YAAY,EAAE,OAAO,GAAG,MAAM,CAAA;KAAE,CAAA;CACvD;AAGD,UAAU,aAAa;IACrB,aAAa,EAAE,MAAM,CAAA;IACrB,cAAc,CAAC,EAAE,MAAM,CAAA;IACvB,MAAM,CAAC,EAAE;QACP,YAAY,EAAE,MAAM,CAAA;QACpB,oBAAoB,EAAE,MAAM,CAAA;QAC5B,kBAAkB,EAAE,MAAM,CAAA;KAC3B,CAAA;IACD,cAAc,EAAE;QACd,YAAY,EAAE,OAAO,CAAA;QACrB,MAAM,CAAC,EAAE,MAAM,CAAA;KAEhB,EAAE,CAAA;IACH,iBAAiB,CAAC,EAAE,iBAAiB,CAAA;CACtC;AAED,UAAU,sBAAsB;IAC9B,YAAY,EAAE,OAAO,CAAA;IACrB,YAAY,EAAE,OAAO,CAAA;IACrB,WAAW,EAAE,MAAM,CAAA;IACnB,YAAY,EAAE,MAAM,CAAA;IACpB,GAAG,EAAE,MAAM,CAAA;CACZ;AAED,UAAU,SAAS;IACjB,eAAe,EAAE,IAAI,CAAA;IACrB,WAAW,EAAE,iBAAiB,CAAA;IAC9B,cAAc,EAAE,sBAAsB,EAAE,CAAA;CACzC;AAED,UAAU,yBAAyB;IACjC,eAAe,EAAE,KAAK,CAAA;IACtB,cAAc,EAAE;QACd,YAAY,EAAE,OAAO,CAAA;QACrB,YAAY,EAAE,MAAM,CAAA;QACpB,WAAW,EAAE,MAAM,CAAA;QACnB,GAAG,EAAE,MAAM,CAAA;QACX,WAAW,EAAE,MAAM,CAAA;QACnB,aAAa,EAAE,MAAM,CAAA;KACtB,EAAE,CAAA;IACH,wBAAwB,EAAE,MAAM,CAAA;CACjC;AAED,KAAK,eAAe,GAAG,SAAS,GAAG,yBAAyB,CAAA;AAE5D,KAAK,eAAe,GAAG,SAAS,CAAC,SAAS,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC,EAAE,CAAA;AAE7D,UAAU,WAAW;IACnB,MAAM,EAAE,MAAM,CAAA;IACd,OAAO,EAAE,OAAO,CAAA;IAChB,QAAQ,EAAE,MAAM,CAAA;IAChB,WAAW,EAAE,CAAC,OAAO,EAAE,OAAO,KAAK,GAAG,CAAA;CACvC;AAED,QAAA,MAAM,qBAAqB,YAAY,CAAA;AACvC,QAAA,MAAM,oBAAoB,WAAW,CAAA;AACrC,QAAA,MAAM,qBAAqB,YAAY,CAAA;AACvC,QAAA,MAAM,iCAAiC,wBAAwB,CAAA;AAC/D,QAAA,MAAM,uBAAuB,cAAc,CAAA;AAC3C,QAAA,MAAM,oBAAoB,WAAW,CAAA;AACrC,QAAA,MAAM,0BAA0B,iBAAiB,CAAA;AACjD,QAAA,MAAM,qBAAqB,YAAY,CAAA;AAEvC,YAAY,EACV,iBAAiB,EACjB,cAAc,EACd,YAAY,EACZ,qBAAqB,EACrB,eAAe,EACf,oBAAoB,EACpB,wBAAwB,EACxB,UAAU,EACV,eAAe,EACf,SAAS,EACT,YAAY,EACZ,WAAW,EACX,OAAO,EACP,OAAO,EACP,iBAAiB,EACjB,uBAAuB,EACvB,gBAAgB,EAChB,SAAS,EACT,iBAAiB,EACjB,aAAa,EACb,sBAAsB,EACtB,SAAS,EACT,yBAAyB,EACzB,eAAe,EACf,WAAW,GACZ,CAAA;AACD,OAAO,EACL,qBAAqB,EACrB,oBAAoB,EACpB,qBAAqB,EACrB,iCAAiC,EACjC,uBAAuB,EACvB,oBAAoB,EACpB,0BAA0B,EAC1B,qBAAqB,GACtB,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"utils.d.ts","sourceRoot":"","sources":["../../../orchestrator/utils.ts"],"names":[],"mappings":"AAAA,OAAO,EAKL,KAAK,GAAG,EAIT,MAAM,MAAM,CAAA;AACb,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,0BAA0B,CAAA;AAI7D,OAAO,EASL,KAAK,WAAW,EAChB,KAAK,SAAS,EACd,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,KAAK,SAAS,EACd,KAAK,eAAe,EAIpB,KAAK,iBAAiB,EAEvB,MAAM,SAAS,CAAA;AAWhB,aAAK,gBAAgB;IACnB,OAAO,YAAwB;IAC/B,OAAO,YAAwB;IAC/B,mBAAmB,wBAAoC;IACvD,YAAY,iBAA6B;IACzC,SAAS,cAA0B;IACnC,MAAM,WAAuB;IAC7B,MAAM,WAAuB;IAC7B,OAAO,YAAwB;CAChC;AAED,iBAAS,cAAc,IAAI,aAAa,CAAC,KAAK,CAAC,CAY9C;AAED,iBAAS,kBAAkB,CAAC,WAAW,EAAE,iBAAiB,GAAG,GAAG,CAM/D;AAED,iBAAS,mBAAmB,CAAC,GAAG,EAAE,GAAG,GAAG,GAAG,CAwB1C;AAED,iBAAS,oBAAoB,CAAC,QAAQ,EAAE,GAAG,GAAG,iBAAiB,CAiC9D;AAED,iBAAS,qBAAqB,CAAC,QAAQ,EAAE,GAAG,GAAG,iBAAiB,CAe/D;AAED,iBAAS,cAAc,CAAC,QAAQ,EAAE,GAAG,GAAG,SAAS,CAoChD;AAED,iBAAS,8BAA8B,CACrC,QAAQ,EAAE,GAAG,GACZ,yBAAyB,CAsB3B;AAED,iBAAS,oBAAoB,CAAC,QAAQ,EAAE,GAAG,GAAG,eAAe,CAS5D;AAED,iBAAS,uBAAuB,CAAC,QAAQ,EAAE,GAAG,GAAG,WAAW,CAkC3D;AAkBD,iBAAS,2CAA2C,CAClD,iBAAiB,EAAE,iBAAiB,GACnC,GAAG,CAmBL;AAyGD,iBAAS,uBAAuB,CAAC,SAAS,EAAE;IAC1C,WAAW,EAAE,iBAAiB,CAAA;IAC9B,kBAAkB,EAAE,SAAS,EAAE,CAAA;CAChC,GAAG,iBAAiB,CAQpB;AAED,OAAO,EACL,gBAAgB,EAChB,cAAc,EACd,kBAAkB,EAClB,mBAAmB,EACnB,oBAAoB,EACpB,uBAAuB,EACvB,2CAA2C,EAC3C,qBAAqB,EACrB,cAAc,EACd,8BAA8B,EAC9B,oBAAoB,EACpB,uBAAuB,GACxB,CAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../types.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,OAAO,EAAE,OAAO,EAAE,KAAK,EAAE,GAAG,EAAE,MAAM,MAAM,CAAA;AACxD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,0BAA0B,CAAA;AAE/D,UAAU,qBAAqB;IAC7B,IAAI,EAAE,MAAM,GAAG,OAAO,CAAA;CACvB;AAED,UAAU,sBAAsB;IAC9B,IAAI,EAAE,OAAO,CAAA;IACb,QAAQ,EAAE,OAAO,EAAE,CAAA;IACnB,SAAS,CAAC,EAAE,MAAM,CAAA;CACnB;AAED,UAAU,uBAAuB;IAC/B,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE,eAAe,CAAA;CACzB;AAED,UAAU,aAAa;IACrB,IAAI,EAAE,SAAS,CAAA;IACf,MAAM,EAAE,MAAM,CAAA;CACf;AAED,KAAK,QAAQ,GAAG,sBAAsB,GAAG,uBAAuB,CAAA;AAEhE,UAAU,UAAU;IAClB,IAAI,EAAE,MAAM,CAAA;CACb;AAED,UAAU,qBAAqB;IAC7B,IAAI,EAAE,kBAAkB,CAAA;IACxB,gBAAgB,CAAC,EAAE,MAAM,CAAA;IACzB,KAAK,EAAE,CAAC,8BAA8B,EAAE,GAAG,8BAA8B,EAAE,CAAC,CAAA;CAC7E;AAED,UAAU,8BAA8B;IACtC,SAAS,EAAE,mCAAmC,CAAA;IAC9C,cAAc,EAAE,MAAM,CAAA;IACtB,UAAU,CAAC,EAAE,MAAM,CAAA;IACnB,cAAc,EAAE,GAAG,GAAG,MAAM,CAAA;CAC7B;AAED,KAAK,mCAAmC,GACpC,OAAO,GACP,aAAa,GACb,UAAU,GACV,oBAAoB,GACpB,iBAAiB,GACjB,UAAU,GACV,SAAS,CAAA;AAEb,UAAU,oBAAoB;IAC5B,IAAI,EAAE,iBAAiB,CAAA;IACvB,MAAM,EAAE;QACN,KAAK,EAAE,OAAO,CAAA;QACd,MAAM,EAAE,MAAM,CAAA;KACf,EAAE,CAAA;CACJ;AAED,UAAU,eAAe;IACvB,IAAI,EAAE,YAAY,CAAA;IAClB,UAAU,EAAE,MAAM,CAAA;IAClB,UAAU,EAAE,MAAM,CAAA;CACnB;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,aAAa,CAAA;IACnB,KAAK,EAAE,MAAM,CAAA;CACd;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,aAAa,CAAA;IACnB,KAAK,EAAE,MAAM,CAAA;CACd;AAED,KAAK,MAAM,GACP,UAAU,GACV,qBAAqB,GACrB,oBAAoB,GACpB,eAAe,GACf,gBAAgB,GAChB,gBAAgB,CAAA;AAEpB,UAAU,MAAM;IACd,MAAM,EAAE,OAAO,CAAA;IACf,QAAQ,EAAE,GAAG,CAAA;IACb,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;CACjC;AAED,UAAU,OAAO;IACf,MAAM,EAAE,QAAQ,CAAA;IAChB,QAAQ,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;IAChC,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,GAAG,MAAM,EAAE,CAAC,CAAA;IAC/B,IAAI,CAAC,EAAE,GAAG,CAAA;CACX;AAED,UAAU,uBAAuB;IAC/B,OAAO,CAAC,EAAE,qBAAqB,CAAA;IAC/B,MAAM,EAAE,QAAQ,CAAA;IAChB,gBAAgB,EAAE,MAAM,CAAA;IACxB,eAAe,CAAC,EAAE,OAAO,CAAA;IACzB,QAAQ,CAAC,EAAE,OAAO,EAAE,CAAA;IACpB,GAAG,CAAC,EAAE,OAAO,CAAA;IACb,QAAQ,CAAC,EAAE;QACT,IAAI,EAAE,SAAS,CAAA;QACf,MAAM,EAAE,MAAM,CAAA;KACf,CAAA;IACD,OAAO,CAAC,EAAE,aAAa,CAAA;CACxB;AAED,UAAU,IAAI;IACZ,EAAE,EAAE,OAAO,CAAA;IACX,IAAI,CAAC,EAAE,GAAG,CAAA;IACV,KAAK,CAAC,EAAE,MAAM,CAAA;CACf;AAED;;GAEG;AACH,KAAK,SAAS,GAAG,IAAI,CAAA;AAErB,UAAU,YAAY;IACpB,OAAO,EAAE,OAAO,CAAA;IAChB,MAAM,EAAE,MAAM,CAAA;CACf;AAED,UAAU,gBAAgB;IACxB,IAAI,EAAE,SAAS,CAAA;IACf,OAAO,EAAE,OAAO,CAAA;CACjB;AAED,KAAK,SAAS,GAAG,gBAAgB,CAAA;AAEjC,UAAU,eAAe;IACvB,KAAK,EAAE,IAAI,EAAE,CAAA;IACb,aAAa,EAAE,YAAY,EAAE,CAAA;IAC7B,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,OAAO,CAAC,EAAE,SAAS,CAAA;CACpB;AAED,UAAU,oBAAqB,SAAQ,eAAe;IACpD,KAAK,EAAE,KAAK,CAAA;CACb;AAED,UAAU,qBAAsB,SAAQ,eAAe;IACrD,WAAW,CAAC,EAAE,KAAK,CAAA;IACnB,WAAW,EAAE,KAAK,CAAA;CACnB;AAED,KAAK,WAAW,GAAG,oBAAoB,GAAG,qBAAqB,CAAA;AAE/D,YAAY,EACV,uBAAuB,EACvB,qBAAqB,EACrB,aAAa,EACb,WAAW,EACX,IAAI,EACJ,SAAS,EACT,YAAY,EACZ,QAAQ,EACR,SAAS,EACT,OAAO,EACP,MAAM,EACN,mCAAmC,GACpC,CAAA"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
import { WebAuthnAccount } from 'viem/account-abstraction';
|
|
2
|
+
import { Account } from 'viem/accounts';
|
|
3
|
+
declare const accountA: Account;
|
|
4
|
+
declare const accountB: Account;
|
|
5
|
+
declare const accountC: Account;
|
|
6
|
+
declare const passkeyAccount: WebAuthnAccount;
|
|
7
|
+
declare const MOCK_API_KEY = "MOCK_KEY";
|
|
8
|
+
export { accountA, accountB, accountC, passkeyAccount, MOCK_API_KEY };
|
|
9
|
+
//# sourceMappingURL=consts.d.ts.map
|