@rhinestone/sdk 1.4.2 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +89 -1
- package/dist/src/accounts/signing/common.d.ts +8 -2
- package/dist/src/accounts/signing/common.d.ts.map +1 -1
- package/dist/src/auth/provider.d.ts +7 -0
- package/dist/src/auth/provider.d.ts.map +1 -0
- package/dist/src/auth/provider.js +41 -0
- package/dist/src/execution/index.d.ts +3 -2
- package/dist/src/execution/index.d.ts.map +1 -1
- package/dist/src/execution/index.js +11 -9
- package/dist/src/execution/utils.d.ts +6 -2
- package/dist/src/execution/utils.d.ts.map +1 -1
- package/dist/src/execution/utils.js +33 -13
- package/dist/src/index.d.ts +1 -1
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +6 -5
- package/dist/src/jwt-server/digest.d.ts +11 -0
- package/dist/src/jwt-server/digest.d.ts.map +1 -0
- package/dist/src/jwt-server/digest.js +22 -0
- package/dist/src/jwt-server/express.d.ts +16 -0
- package/dist/src/jwt-server/express.d.ts.map +1 -0
- package/dist/src/jwt-server/express.js +24 -0
- package/dist/src/jwt-server/handlers.d.ts +10 -0
- package/dist/src/jwt-server/handlers.d.ts.map +1 -0
- package/dist/src/jwt-server/handlers.js +41 -0
- package/dist/src/jwt-server/index.d.ts +8 -0
- package/dist/src/jwt-server/index.d.ts.map +1 -0
- package/dist/src/jwt-server/index.js +18 -0
- package/dist/src/jwt-server/jcs.d.ts +12 -0
- package/dist/src/jwt-server/jcs.d.ts.map +1 -0
- package/dist/src/jwt-server/jcs.js +60 -0
- package/dist/src/jwt-server/signer.d.ts +18 -0
- package/dist/src/jwt-server/signer.d.ts.map +1 -0
- package/dist/src/jwt-server/signer.js +71 -0
- package/dist/src/jwt-server/sponsorship.d.ts +19 -0
- package/dist/src/jwt-server/sponsorship.d.ts.map +1 -0
- package/dist/src/jwt-server/sponsorship.js +56 -0
- package/dist/src/jwt-server/web.d.ts +4 -0
- package/dist/src/jwt-server/web.d.ts.map +1 -0
- package/dist/src/jwt-server/web.js +27 -0
- package/dist/src/modules/validators/smart-sessions.d.ts +1 -1
- package/dist/src/modules/validators/smart-sessions.d.ts.map +1 -1
- package/dist/src/modules/validators/smart-sessions.js +12 -3
- package/dist/src/orchestrator/client.d.ts +9 -4
- package/dist/src/orchestrator/client.d.ts.map +1 -1
- package/dist/src/orchestrator/client.js +28 -17
- package/dist/src/orchestrator/consts.d.ts +1 -1
- package/dist/src/orchestrator/consts.js +1 -1
- package/dist/src/orchestrator/index.d.ts +2 -1
- package/dist/src/orchestrator/index.d.ts.map +1 -1
- package/dist/src/orchestrator/index.js +2 -2
- package/dist/src/orchestrator/types.d.ts +5 -1
- package/dist/src/orchestrator/types.d.ts.map +1 -1
- package/dist/src/types.d.ts +27 -3
- package/dist/src/types.d.ts.map +1 -1
- package/package.json +17 -3
- package/dist/src/accounts/index.test.d.ts +0 -2
- package/dist/src/accounts/index.test.d.ts.map +0 -1
- package/dist/src/accounts/index.test.js +0 -33
- package/dist/src/accounts/json-rpc/index.test.d.ts +0 -2
- package/dist/src/accounts/json-rpc/index.test.d.ts.map +0 -1
- package/dist/src/accounts/json-rpc/index.test.js +0 -35
- package/dist/src/accounts/json-rpc/providers.test.d.ts +0 -2
- package/dist/src/accounts/json-rpc/providers.test.d.ts.map +0 -1
- package/dist/src/accounts/json-rpc/providers.test.js +0 -43
- package/dist/src/accounts/kernel.test.d.ts +0 -2
- package/dist/src/accounts/kernel.test.d.ts.map +0 -1
- package/dist/src/accounts/kernel.test.js +0 -132
- package/dist/src/accounts/nexus.test.d.ts +0 -2
- package/dist/src/accounts/nexus.test.d.ts.map +0 -1
- package/dist/src/accounts/nexus.test.js +0 -118
- package/dist/src/accounts/safe.test.d.ts +0 -2
- package/dist/src/accounts/safe.test.d.ts.map +0 -1
- package/dist/src/accounts/safe.test.js +0 -168
- package/dist/src/accounts/signing/passkeys.test.d.ts +0 -2
- package/dist/src/accounts/signing/passkeys.test.d.ts.map +0 -1
- package/dist/src/accounts/signing/passkeys.test.js +0 -88
- package/dist/src/accounts/startale.test.d.ts +0 -2
- package/dist/src/accounts/startale.test.d.ts.map +0 -1
- package/dist/src/accounts/startale.test.js +0 -189
- package/dist/src/accounts/utils.test.d.ts +0 -2
- package/dist/src/accounts/utils.test.d.ts.map +0 -1
- package/dist/src/accounts/utils.test.js +0 -49
- package/dist/src/actions/ecdsa.test.d.ts +0 -2
- package/dist/src/actions/ecdsa.test.d.ts.map +0 -1
- package/dist/src/actions/ecdsa.test.js +0 -99
- package/dist/src/actions/passkeys.test.d.ts +0 -2
- package/dist/src/actions/passkeys.test.d.ts.map +0 -1
- package/dist/src/actions/passkeys.test.js +0 -54
- package/dist/src/actions/recovery.test.d.ts +0 -2
- package/dist/src/actions/recovery.test.d.ts.map +0 -1
- package/dist/src/actions/recovery.test.js +0 -168
- package/dist/src/execution/signing.test.d.ts +0 -2
- package/dist/src/execution/signing.test.d.ts.map +0 -1
- package/dist/src/execution/signing.test.js +0 -465
- package/dist/src/execution/utils.test.d.ts +0 -2
- package/dist/src/execution/utils.test.d.ts.map +0 -1
- package/dist/src/execution/utils.test.js +0 -388
- package/dist/src/modules/index.test.d.ts +0 -2
- package/dist/src/modules/index.test.d.ts.map +0 -1
- package/dist/src/modules/index.test.js +0 -81
- package/dist/src/modules/validators/core.test.d.ts +0 -2
- package/dist/src/modules/validators/core.test.d.ts.map +0 -1
- package/dist/src/modules/validators/core.test.js +0 -101
- package/dist/src/modules/validators/policies/claim/permit2.test.d.ts +0 -2
- package/dist/src/modules/validators/policies/claim/permit2.test.d.ts.map +0 -1
- package/dist/src/modules/validators/policies/claim/permit2.test.js +0 -519
- package/dist/src/modules/validators/smart-sessions.test.d.ts +0 -2
- package/dist/src/modules/validators/smart-sessions.test.d.ts.map +0 -1
- package/dist/src/modules/validators/smart-sessions.test.js +0 -311
- package/dist/src/orchestrator/registry.test.d.ts +0 -2
- package/dist/src/orchestrator/registry.test.d.ts.map +0 -1
- package/dist/src/orchestrator/registry.test.js +0 -154
- package/dist/src/utils/index.test.d.ts +0 -2
- package/dist/src/utils/index.test.d.ts.map +0 -1
- package/dist/src/utils/index.test.js +0 -42
- package/dist/test/consts.d.ts +0 -10
- package/dist/test/consts.d.ts.map +0 -1
- package/dist/test/consts.js +0 -22
- package/dist/test/utils/utils.d.ts +0 -5
- package/dist/test/utils/utils.d.ts.map +0 -1
- package/dist/test/utils/utils.js +0 -20
|
@@ -1,388 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || (function () {
|
|
19
|
-
var ownKeys = function(o) {
|
|
20
|
-
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
21
|
-
var ar = [];
|
|
22
|
-
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
23
|
-
return ar;
|
|
24
|
-
};
|
|
25
|
-
return ownKeys(o);
|
|
26
|
-
};
|
|
27
|
-
return function (mod) {
|
|
28
|
-
if (mod && mod.__esModule) return mod;
|
|
29
|
-
var result = {};
|
|
30
|
-
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
31
|
-
__setModuleDefault(result, mod);
|
|
32
|
-
return result;
|
|
33
|
-
};
|
|
34
|
-
})();
|
|
35
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
36
|
-
const viem_1 = require("viem");
|
|
37
|
-
const chains_1 = require("viem/chains");
|
|
38
|
-
const vitest_1 = require("vitest");
|
|
39
|
-
const consts_1 = require("../../test/consts");
|
|
40
|
-
const validators = __importStar(require("../modules/validators"));
|
|
41
|
-
const validators_1 = require("../modules/validators");
|
|
42
|
-
const utils_1 = require("./utils");
|
|
43
|
-
const mockGetIntentRoute = vitest_1.vi.fn();
|
|
44
|
-
vitest_1.vi.mock('../orchestrator', () => ({
|
|
45
|
-
getOrchestrator: () => ({
|
|
46
|
-
getIntentRoute: mockGetIntentRoute,
|
|
47
|
-
}),
|
|
48
|
-
}));
|
|
49
|
-
(0, vitest_1.describe)('hashErc7739TypedDataForSolady', () => {
|
|
50
|
-
const verifierDomain = {
|
|
51
|
-
name: 'Startale',
|
|
52
|
-
version: '1.0.0',
|
|
53
|
-
chainId: 421614,
|
|
54
|
-
verifyingContract: '0xabcdefabcdefabcdefabcdefabcdefabcdefabcd',
|
|
55
|
-
salt: '0x0000000000000000000000000000000000000000000000000000000000000000',
|
|
56
|
-
};
|
|
57
|
-
(0, vitest_1.test)('simple typed data', () => {
|
|
58
|
-
const hash = (0, utils_1.hashErc7739TypedDataForSolady)({
|
|
59
|
-
domain: {
|
|
60
|
-
name: 'TestApp',
|
|
61
|
-
version: '1',
|
|
62
|
-
chainId: 421614,
|
|
63
|
-
verifyingContract: '0x1234567890abcdef1234567890abcdef12345678',
|
|
64
|
-
},
|
|
65
|
-
types: {
|
|
66
|
-
Greeting: [
|
|
67
|
-
{ name: 'text', type: 'string' },
|
|
68
|
-
{ name: 'value', type: 'uint256' },
|
|
69
|
-
],
|
|
70
|
-
},
|
|
71
|
-
primaryType: 'Greeting',
|
|
72
|
-
message: {
|
|
73
|
-
text: 'Hello',
|
|
74
|
-
value: 42n,
|
|
75
|
-
},
|
|
76
|
-
verifierDomain,
|
|
77
|
-
});
|
|
78
|
-
(0, vitest_1.expect)(hash).toEqual('0xacd2d65e9986501bb617b90505f4b527ee4eac3c29ac4fea21bb74d8e754e61b');
|
|
79
|
-
});
|
|
80
|
-
(0, vitest_1.test)('nested types', () => {
|
|
81
|
-
const hash = (0, utils_1.hashErc7739TypedDataForSolady)({
|
|
82
|
-
domain: {
|
|
83
|
-
name: 'TestApp',
|
|
84
|
-
version: '1',
|
|
85
|
-
chainId: 84532,
|
|
86
|
-
verifyingContract: '0x1234567890abcdef1234567890abcdef12345678',
|
|
87
|
-
},
|
|
88
|
-
types: {
|
|
89
|
-
Order: [
|
|
90
|
-
{ name: 'sender', type: 'address' },
|
|
91
|
-
{ name: 'amount', type: 'uint256' },
|
|
92
|
-
{ name: 'detail', type: 'Detail' },
|
|
93
|
-
],
|
|
94
|
-
Detail: [
|
|
95
|
-
{ name: 'nonce', type: 'uint256' },
|
|
96
|
-
{ name: 'deadline', type: 'uint256' },
|
|
97
|
-
],
|
|
98
|
-
},
|
|
99
|
-
primaryType: 'Order',
|
|
100
|
-
message: {
|
|
101
|
-
sender: '0xf39Fd6e51aad88F6F4ce6aB8827279cffFb92266',
|
|
102
|
-
amount: 1000000n,
|
|
103
|
-
detail: {
|
|
104
|
-
nonce: 1n,
|
|
105
|
-
deadline: 1700000000n,
|
|
106
|
-
},
|
|
107
|
-
},
|
|
108
|
-
verifierDomain: {
|
|
109
|
-
...verifierDomain,
|
|
110
|
-
chainId: 84532,
|
|
111
|
-
},
|
|
112
|
-
});
|
|
113
|
-
(0, vitest_1.expect)(hash).toEqual('0x1ea8d31e9198ac601c92ab8f54b7ff1ff41a7d4956566c1a0825a5ade5d5d045');
|
|
114
|
-
});
|
|
115
|
-
(0, vitest_1.test)('different verifier chainId produces different hash', () => {
|
|
116
|
-
const params = {
|
|
117
|
-
domain: {
|
|
118
|
-
name: 'TestApp',
|
|
119
|
-
version: '1',
|
|
120
|
-
chainId: 421614,
|
|
121
|
-
verifyingContract: '0x1234567890abcdef1234567890abcdef12345678',
|
|
122
|
-
},
|
|
123
|
-
types: {
|
|
124
|
-
Greeting: [
|
|
125
|
-
{ name: 'text', type: 'string' },
|
|
126
|
-
{ name: 'value', type: 'uint256' },
|
|
127
|
-
],
|
|
128
|
-
},
|
|
129
|
-
primaryType: 'Greeting',
|
|
130
|
-
message: {
|
|
131
|
-
text: 'Hello',
|
|
132
|
-
value: 42n,
|
|
133
|
-
},
|
|
134
|
-
};
|
|
135
|
-
const hashSameChain = (0, utils_1.hashErc7739TypedDataForSolady)({
|
|
136
|
-
...params,
|
|
137
|
-
verifierDomain,
|
|
138
|
-
});
|
|
139
|
-
const hashCrossChain = (0, utils_1.hashErc7739TypedDataForSolady)({
|
|
140
|
-
...params,
|
|
141
|
-
verifierDomain: {
|
|
142
|
-
...verifierDomain,
|
|
143
|
-
chainId: 84532,
|
|
144
|
-
},
|
|
145
|
-
});
|
|
146
|
-
(0, vitest_1.expect)(hashSameChain).not.toEqual(hashCrossChain);
|
|
147
|
-
(0, vitest_1.expect)(hashCrossChain).toEqual('0x685f60853ef1d5fcbb3021db370b6f3c1c099f1fb42f08f9ba4e6b9b7c8c941a');
|
|
148
|
-
});
|
|
149
|
-
});
|
|
150
|
-
(0, vitest_1.describe)('prepareTransactionAsIntent', () => {
|
|
151
|
-
(0, vitest_1.beforeEach)(() => {
|
|
152
|
-
mockGetIntentRoute.mockReset();
|
|
153
|
-
});
|
|
154
|
-
(0, vitest_1.test)('includes auxiliaryFunds in options when provided', async () => {
|
|
155
|
-
const auxiliaryFunds = {
|
|
156
|
-
[chains_1.arbitrum.id]: {
|
|
157
|
-
'0xaf88d065e77c8cC2239327C5EDb3A432268e5831': 500000000n,
|
|
158
|
-
},
|
|
159
|
-
};
|
|
160
|
-
mockGetIntentRoute.mockResolvedValue({
|
|
161
|
-
intentOp: {},
|
|
162
|
-
intentCost: {},
|
|
163
|
-
});
|
|
164
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
165
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
166
|
-
apiKey: 'test',
|
|
167
|
-
}, [chains_1.arbitrum], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, auxiliaryFunds, undefined, undefined);
|
|
168
|
-
(0, vitest_1.expect)(mockGetIntentRoute).toHaveBeenCalledOnce();
|
|
169
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
170
|
-
(0, vitest_1.expect)(intentInput.options.auxiliaryFunds).toEqual(auxiliaryFunds);
|
|
171
|
-
});
|
|
172
|
-
(0, vitest_1.test)('does not include auxiliaryFunds in options when not provided', async () => {
|
|
173
|
-
mockGetIntentRoute.mockResolvedValue({
|
|
174
|
-
intentOp: {},
|
|
175
|
-
intentCost: {},
|
|
176
|
-
});
|
|
177
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
178
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
179
|
-
apiKey: 'test',
|
|
180
|
-
}, [chains_1.arbitrum], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, undefined);
|
|
181
|
-
(0, vitest_1.expect)(mockGetIntentRoute).toHaveBeenCalledOnce();
|
|
182
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
183
|
-
(0, vitest_1.expect)(intentInput.options.auxiliaryFunds).toBeUndefined();
|
|
184
|
-
});
|
|
185
|
-
});
|
|
186
|
-
const makeSession = (chainId) => ({
|
|
187
|
-
chain: { id: chainId },
|
|
188
|
-
owners: {
|
|
189
|
-
type: 'ecdsa',
|
|
190
|
-
accounts: [consts_1.accountA],
|
|
191
|
-
threshold: 1,
|
|
192
|
-
},
|
|
193
|
-
});
|
|
194
|
-
(0, vitest_1.describe)('resolveSessionForChain', () => {
|
|
195
|
-
(0, vitest_1.test)('single session returns session for any chain', () => {
|
|
196
|
-
const signers = {
|
|
197
|
-
type: 'experimental_session',
|
|
198
|
-
session: makeSession(chains_1.mainnet.id),
|
|
199
|
-
};
|
|
200
|
-
const result = (0, utils_1.resolveSessionForChain)(signers, chains_1.optimism.id);
|
|
201
|
-
(0, vitest_1.expect)(result).toBeDefined();
|
|
202
|
-
(0, vitest_1.expect)(result.session).toBe(signers.session);
|
|
203
|
-
});
|
|
204
|
-
(0, vitest_1.test)('single session with enableData returns enableData', () => {
|
|
205
|
-
const enableData = {
|
|
206
|
-
userSignature: '0x00',
|
|
207
|
-
hashesAndChainIds: [],
|
|
208
|
-
sessionToEnableIndex: 0,
|
|
209
|
-
};
|
|
210
|
-
const signers = {
|
|
211
|
-
type: 'experimental_session',
|
|
212
|
-
session: makeSession(chains_1.mainnet.id),
|
|
213
|
-
enableData,
|
|
214
|
-
};
|
|
215
|
-
const result = (0, utils_1.resolveSessionForChain)(signers, chains_1.mainnet.id);
|
|
216
|
-
(0, vitest_1.expect)(result.enableData).toBe(enableData);
|
|
217
|
-
});
|
|
218
|
-
(0, vitest_1.test)('per-chain sessions returns correct session per chain', () => {
|
|
219
|
-
const mainnetSession = makeSession(chains_1.mainnet.id);
|
|
220
|
-
const optimismSession = makeSession(chains_1.optimism.id);
|
|
221
|
-
const signers = {
|
|
222
|
-
type: 'experimental_session',
|
|
223
|
-
sessions: {
|
|
224
|
-
[chains_1.mainnet.id]: { session: mainnetSession },
|
|
225
|
-
[chains_1.optimism.id]: { session: optimismSession },
|
|
226
|
-
},
|
|
227
|
-
};
|
|
228
|
-
(0, vitest_1.expect)((0, utils_1.resolveSessionForChain)(signers, chains_1.mainnet.id).session).toBe(mainnetSession);
|
|
229
|
-
(0, vitest_1.expect)((0, utils_1.resolveSessionForChain)(signers, chains_1.optimism.id).session).toBe(optimismSession);
|
|
230
|
-
});
|
|
231
|
-
(0, vitest_1.test)('per-chain sessions throws for missing chain', () => {
|
|
232
|
-
const signers = {
|
|
233
|
-
type: 'experimental_session',
|
|
234
|
-
sessions: {
|
|
235
|
-
[chains_1.mainnet.id]: { session: makeSession(chains_1.mainnet.id) },
|
|
236
|
-
},
|
|
237
|
-
};
|
|
238
|
-
(0, vitest_1.expect)(() => (0, utils_1.resolveSessionForChain)(signers, chains_1.optimism.id)).toThrow(`No session configured for chain ${chains_1.optimism.id}`);
|
|
239
|
-
});
|
|
240
|
-
});
|
|
241
|
-
// ---------------------------------------------------------------------------
|
|
242
|
-
// preClaimExecutions in routing request
|
|
243
|
-
// ---------------------------------------------------------------------------
|
|
244
|
-
const makeEnableData = () => ({
|
|
245
|
-
userSignature: `0x${'00'.repeat(65)}`,
|
|
246
|
-
hashesAndChainIds: [
|
|
247
|
-
{
|
|
248
|
-
chainId: BigInt(chains_1.base.id),
|
|
249
|
-
sessionDigest: `0x${'00'.repeat(32)}`,
|
|
250
|
-
},
|
|
251
|
-
],
|
|
252
|
-
sessionToEnableIndex: 0,
|
|
253
|
-
});
|
|
254
|
-
(0, vitest_1.describe)('prepareTransactionAsIntent — preClaimExecutions', () => {
|
|
255
|
-
let isSessionEnabledSpy;
|
|
256
|
-
(0, vitest_1.beforeEach)(() => {
|
|
257
|
-
mockGetIntentRoute.mockReset();
|
|
258
|
-
mockGetIntentRoute.mockResolvedValue({ intentOp: {}, intentCost: {} });
|
|
259
|
-
isSessionEnabledSpy = vitest_1.vi
|
|
260
|
-
.spyOn(validators, 'isSessionEnabled')
|
|
261
|
-
.mockResolvedValue(false);
|
|
262
|
-
});
|
|
263
|
-
(0, vitest_1.test)('includes dummy preclaimop in preClaimExecutions when session needs enabling', async () => {
|
|
264
|
-
const signers = {
|
|
265
|
-
type: 'experimental_session',
|
|
266
|
-
session: {
|
|
267
|
-
chain: chains_1.base,
|
|
268
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
269
|
-
actions: [
|
|
270
|
-
{
|
|
271
|
-
target: '0x1111111111111111111111111111111111111111',
|
|
272
|
-
selector: '0xdeadbeef',
|
|
273
|
-
},
|
|
274
|
-
],
|
|
275
|
-
},
|
|
276
|
-
enableData: makeEnableData(),
|
|
277
|
-
};
|
|
278
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
279
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
280
|
-
apiKey: 'test',
|
|
281
|
-
}, [chains_1.base], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, signers);
|
|
282
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
283
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions).toBeDefined();
|
|
284
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.base.id]).toHaveLength(1);
|
|
285
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.base.id][0].to).toBe(validators_1.DUMMY_PRECLAIMOP_TARGET);
|
|
286
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.base.id][0].data).toBe(validators_1.DUMMY_PRECLAIMOP_SELECTOR);
|
|
287
|
-
});
|
|
288
|
-
(0, vitest_1.test)('omits preClaimExecutions when session is already enabled', async () => {
|
|
289
|
-
isSessionEnabledSpy.mockResolvedValue(true);
|
|
290
|
-
const signers = {
|
|
291
|
-
type: 'experimental_session',
|
|
292
|
-
session: {
|
|
293
|
-
chain: chains_1.base,
|
|
294
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
295
|
-
actions: [
|
|
296
|
-
{
|
|
297
|
-
target: '0x1111111111111111111111111111111111111111',
|
|
298
|
-
selector: '0xdeadbeef',
|
|
299
|
-
},
|
|
300
|
-
],
|
|
301
|
-
},
|
|
302
|
-
enableData: makeEnableData(),
|
|
303
|
-
};
|
|
304
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
305
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
306
|
-
apiKey: 'test',
|
|
307
|
-
}, [chains_1.base], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, signers);
|
|
308
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
309
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions).toBeUndefined();
|
|
310
|
-
});
|
|
311
|
-
(0, vitest_1.test)('omits preClaimExecutions when session has no enableData', async () => {
|
|
312
|
-
const signers = {
|
|
313
|
-
type: 'experimental_session',
|
|
314
|
-
session: {
|
|
315
|
-
chain: chains_1.base,
|
|
316
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
317
|
-
actions: [
|
|
318
|
-
{
|
|
319
|
-
target: '0x1111111111111111111111111111111111111111',
|
|
320
|
-
selector: '0xdeadbeef',
|
|
321
|
-
},
|
|
322
|
-
],
|
|
323
|
-
},
|
|
324
|
-
// no enableData
|
|
325
|
-
};
|
|
326
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
327
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
328
|
-
apiKey: 'test',
|
|
329
|
-
}, [chains_1.base], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, signers);
|
|
330
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
331
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions).toBeUndefined();
|
|
332
|
-
});
|
|
333
|
-
(0, vitest_1.test)('omits preClaimExecutions when session has no explicit actions (verifyExecutions=false)', async () => {
|
|
334
|
-
const signers = {
|
|
335
|
-
type: 'experimental_session',
|
|
336
|
-
session: {
|
|
337
|
-
chain: chains_1.base,
|
|
338
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
339
|
-
// no actions → verifyExecutions defaults to false
|
|
340
|
-
},
|
|
341
|
-
enableData: makeEnableData(),
|
|
342
|
-
};
|
|
343
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
344
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
345
|
-
apiKey: 'test',
|
|
346
|
-
}, [chains_1.base], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, signers);
|
|
347
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
348
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions).toBeUndefined();
|
|
349
|
-
});
|
|
350
|
-
(0, vitest_1.test)('injects only for not-yet-enabled chains when multiple source chains', async () => {
|
|
351
|
-
// base: not enabled → gets dummy preclaimop
|
|
352
|
-
// arbitrum: already enabled → skipped
|
|
353
|
-
isSessionEnabledSpy
|
|
354
|
-
.mockResolvedValueOnce(false) // base
|
|
355
|
-
.mockResolvedValueOnce(true); // arbitrum
|
|
356
|
-
const makeSessionWithActions = (chainId) => ({
|
|
357
|
-
...makeSession(chainId),
|
|
358
|
-
actions: [
|
|
359
|
-
{
|
|
360
|
-
target: '0x1111111111111111111111111111111111111111',
|
|
361
|
-
selector: '0xdeadbeef',
|
|
362
|
-
},
|
|
363
|
-
],
|
|
364
|
-
});
|
|
365
|
-
const signers = {
|
|
366
|
-
type: 'experimental_session',
|
|
367
|
-
sessions: {
|
|
368
|
-
[chains_1.base.id]: {
|
|
369
|
-
session: makeSessionWithActions(chains_1.base.id),
|
|
370
|
-
enableData: makeEnableData(),
|
|
371
|
-
},
|
|
372
|
-
[chains_1.arbitrum.id]: {
|
|
373
|
-
session: makeSessionWithActions(chains_1.arbitrum.id),
|
|
374
|
-
enableData: makeEnableData(),
|
|
375
|
-
},
|
|
376
|
-
},
|
|
377
|
-
};
|
|
378
|
-
await (0, utils_1.prepareTransactionAsIntent)({
|
|
379
|
-
owners: { type: 'ecdsa', accounts: [consts_1.accountA], threshold: 1 },
|
|
380
|
-
apiKey: 'test',
|
|
381
|
-
}, [chains_1.base, chains_1.arbitrum], chains_1.base, [], undefined, [{ address: viem_1.zeroAddress, amount: 1n }], undefined, false, undefined, undefined, undefined, undefined, undefined, undefined, undefined, signers);
|
|
382
|
-
const intentInput = mockGetIntentRoute.mock.calls[0][0];
|
|
383
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions).toBeDefined();
|
|
384
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.base.id]).toHaveLength(1);
|
|
385
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.base.id][0].to).toBe(validators_1.DUMMY_PRECLAIMOP_TARGET);
|
|
386
|
-
(0, vitest_1.expect)(intentInput.preClaimExecutions[chains_1.arbitrum.id]).toBeUndefined();
|
|
387
|
-
});
|
|
388
|
-
});
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.test.d.ts","sourceRoot":"","sources":["../../../modules/index.test.ts"],"names":[],"mappings":""}
|
|
@@ -1,81 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const vitest_1 = require("vitest");
|
|
4
|
-
const consts_1 = require("../../test/consts");
|
|
5
|
-
const common_1 = require("./common");
|
|
6
|
-
const index_1 = require("./index");
|
|
7
|
-
(0, vitest_1.describe)('Modules', () => {
|
|
8
|
-
(0, vitest_1.describe)('Setup', () => {
|
|
9
|
-
(0, vitest_1.test)('should use ownable validator for ECDSA owners', () => {
|
|
10
|
-
const config = {
|
|
11
|
-
owners: {
|
|
12
|
-
type: 'ecdsa',
|
|
13
|
-
accounts: [consts_1.accountA],
|
|
14
|
-
threshold: 1,
|
|
15
|
-
},
|
|
16
|
-
};
|
|
17
|
-
const setup = (0, index_1.getSetup)(config);
|
|
18
|
-
(0, vitest_1.expect)(setup.validators[0].address).toBe('0x000000000013fdb5234e4e3162a810f54d9f7e98');
|
|
19
|
-
(0, vitest_1.expect)(setup.validators[0].type).toBe(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
20
|
-
});
|
|
21
|
-
(0, vitest_1.test)('should use webauthn validator for passkey owners', () => {
|
|
22
|
-
const config = {
|
|
23
|
-
owners: {
|
|
24
|
-
type: 'passkey',
|
|
25
|
-
accounts: [consts_1.passkeyAccount],
|
|
26
|
-
},
|
|
27
|
-
};
|
|
28
|
-
const setup = (0, index_1.getSetup)(config);
|
|
29
|
-
(0, vitest_1.expect)(setup.validators).toHaveLength(1);
|
|
30
|
-
(0, vitest_1.expect)(setup.validators[0].address).toBe('0x0000000000578c4cb0e472a5462da43c495c3f33');
|
|
31
|
-
(0, vitest_1.expect)(setup.validators[0].type).toBe(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
32
|
-
});
|
|
33
|
-
(0, vitest_1.test)('should use smart session validator when sessions are enabled', () => {
|
|
34
|
-
const config = {
|
|
35
|
-
owners: {
|
|
36
|
-
type: 'ecdsa',
|
|
37
|
-
accounts: [consts_1.accountA],
|
|
38
|
-
threshold: 1,
|
|
39
|
-
},
|
|
40
|
-
sessions: [
|
|
41
|
-
{
|
|
42
|
-
owners: {
|
|
43
|
-
type: 'ecdsa',
|
|
44
|
-
accounts: [consts_1.accountB],
|
|
45
|
-
threshold: 1,
|
|
46
|
-
},
|
|
47
|
-
},
|
|
48
|
-
],
|
|
49
|
-
};
|
|
50
|
-
const setup = (0, index_1.getSetup)(config);
|
|
51
|
-
const smartSessionValidator = setup.validators.find((validator) => validator.address === '0x00000000008bdaba73cd9815d79069c247eb4bda');
|
|
52
|
-
if (!smartSessionValidator) {
|
|
53
|
-
return;
|
|
54
|
-
}
|
|
55
|
-
(0, vitest_1.expect)(smartSessionValidator.type).toBe(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
56
|
-
});
|
|
57
|
-
(0, vitest_1.test)('should use smart session compatibility fallback for safe accounts with sessions', () => {
|
|
58
|
-
const config = {
|
|
59
|
-
owners: {
|
|
60
|
-
type: 'ecdsa',
|
|
61
|
-
accounts: [consts_1.accountA],
|
|
62
|
-
threshold: 1,
|
|
63
|
-
},
|
|
64
|
-
experimental_sessions: {
|
|
65
|
-
enabled: true,
|
|
66
|
-
},
|
|
67
|
-
account: {
|
|
68
|
-
type: 'safe',
|
|
69
|
-
},
|
|
70
|
-
};
|
|
71
|
-
const setup = (0, index_1.getSetup)(config);
|
|
72
|
-
const smartSessionFallback = setup.fallbacks.find((fallback) => fallback.address === '0x000000000052e9685932845660777DF43C2dC496');
|
|
73
|
-
(0, vitest_1.expect)(smartSessionFallback).toBeDefined();
|
|
74
|
-
if (!smartSessionFallback) {
|
|
75
|
-
return;
|
|
76
|
-
}
|
|
77
|
-
(0, vitest_1.expect)(smartSessionFallback.type).toBe(common_1.MODULE_TYPE_ID_FALLBACK);
|
|
78
|
-
});
|
|
79
|
-
vitest_1.test.todo('using the omni account should install the necessary modules');
|
|
80
|
-
});
|
|
81
|
-
});
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"core.test.d.ts","sourceRoot":"","sources":["../../../../modules/validators/core.test.ts"],"names":[],"mappings":""}
|
|
@@ -1,101 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
const viem_1 = require("viem");
|
|
4
|
-
const vitest_1 = require("vitest");
|
|
5
|
-
const consts_1 = require("../../../test/consts");
|
|
6
|
-
const common_1 = require("../common");
|
|
7
|
-
const core_1 = require("./core");
|
|
8
|
-
(0, vitest_1.describe)('Validators Core', () => {
|
|
9
|
-
(0, vitest_1.describe)('Validator', () => {
|
|
10
|
-
(0, vitest_1.test)('ECDSA: single address', () => {
|
|
11
|
-
const validator = (0, core_1.getValidator)({
|
|
12
|
-
type: 'ecdsa',
|
|
13
|
-
accounts: [consts_1.accountA],
|
|
14
|
-
});
|
|
15
|
-
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
16
|
-
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
17
|
-
(0, vitest_1.expect)(validator.address).toEqual('0x000000000013fdb5234e4e3162a810f54d9f7e98');
|
|
18
|
-
(0, vitest_1.expect)(validator.initData).toEqual('0x000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000001000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
19
|
-
});
|
|
20
|
-
(0, vitest_1.test)('ECDSA: two addresses', () => {
|
|
21
|
-
const validator = (0, core_1.getValidator)({
|
|
22
|
-
type: 'ecdsa',
|
|
23
|
-
accounts: [consts_1.accountA, consts_1.accountB],
|
|
24
|
-
});
|
|
25
|
-
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
26
|
-
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
27
|
-
(0, vitest_1.expect)(validator.address).toEqual('0x000000000013fdb5234e4e3162a810f54d9f7e98');
|
|
28
|
-
(0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000020000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
29
|
-
});
|
|
30
|
-
(0, vitest_1.test)('ECDSA: three addresses, custom threshold', () => {
|
|
31
|
-
const validator = (0, core_1.getValidator)({
|
|
32
|
-
type: 'ecdsa',
|
|
33
|
-
accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
|
|
34
|
-
threshold: 2,
|
|
35
|
-
});
|
|
36
|
-
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
37
|
-
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
38
|
-
(0, vitest_1.expect)(validator.address).toEqual('0x000000000013fdb5234e4e3162a810f54d9f7e98');
|
|
39
|
-
(0, vitest_1.expect)(validator.initData).toEqual('0x0000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000030000000000000000000000006092086a3dc0020cd604a68fcf5d430007d51bb7000000000000000000000000c27b7578151c5ef713c62c65db09763d57ac3596000000000000000000000000f6c02c78ded62973b43bfa523b247da099486936');
|
|
40
|
-
});
|
|
41
|
-
(0, vitest_1.test)('Passkey', () => {
|
|
42
|
-
const validator = (0, core_1.getValidator)({
|
|
43
|
-
type: 'passkey',
|
|
44
|
-
accounts: [consts_1.passkeyAccount],
|
|
45
|
-
});
|
|
46
|
-
(0, vitest_1.expect)(validator.type).toEqual(common_1.MODULE_TYPE_ID_VALIDATOR);
|
|
47
|
-
(0, vitest_1.expect)((0, viem_1.isAddress)(validator.address)).toEqual(true);
|
|
48
|
-
(0, vitest_1.expect)(validator.address).toEqual('0x0000000000578c4cb0e472a5462da43c495c3f33');
|
|
49
|
-
(0, vitest_1.expect)(validator.initData).toEqual('0x000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000001580a9af0569ad3905b26a703201b358aa0904236642ebe79b22a19d00d3737637d46f725a5427ae45a9569259bf67e1e16b187d7b3ad1ed70138c4f0409677d10000000000000000000000000000000000000000000000000000000000000000');
|
|
50
|
-
});
|
|
51
|
-
});
|
|
52
|
-
(0, vitest_1.describe)('Mock Signature', () => {
|
|
53
|
-
(0, vitest_1.test)('ECDSA: single address', () => {
|
|
54
|
-
const signature = (0, core_1.getMockSignature)({
|
|
55
|
-
type: 'ecdsa',
|
|
56
|
-
accounts: [consts_1.accountA],
|
|
57
|
-
});
|
|
58
|
-
(0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(65);
|
|
59
|
-
});
|
|
60
|
-
(0, vitest_1.test)('ECDSA: multiple addresses', () => {
|
|
61
|
-
const signature = (0, core_1.getMockSignature)({
|
|
62
|
-
type: 'ecdsa',
|
|
63
|
-
accounts: [consts_1.accountA, consts_1.accountB, consts_1.accountC],
|
|
64
|
-
});
|
|
65
|
-
(0, vitest_1.expect)((0, viem_1.size)(signature)).toEqual(3 * 65);
|
|
66
|
-
});
|
|
67
|
-
(0, vitest_1.test)('Passkey', () => {
|
|
68
|
-
const signature = (0, core_1.getMockSignature)({
|
|
69
|
-
type: 'passkey',
|
|
70
|
-
accounts: [consts_1.passkeyAccount],
|
|
71
|
-
});
|
|
72
|
-
// Should have the proper schema
|
|
73
|
-
(0, viem_1.decodeAbiParameters)([
|
|
74
|
-
{
|
|
75
|
-
type: 'bytes',
|
|
76
|
-
name: 'authenticatorData',
|
|
77
|
-
},
|
|
78
|
-
{
|
|
79
|
-
type: 'string',
|
|
80
|
-
name: 'clientDataJSON',
|
|
81
|
-
},
|
|
82
|
-
{
|
|
83
|
-
type: 'uint256',
|
|
84
|
-
name: 'challengeIndex',
|
|
85
|
-
},
|
|
86
|
-
{
|
|
87
|
-
type: 'uint256',
|
|
88
|
-
name: 'typeIndex',
|
|
89
|
-
},
|
|
90
|
-
{
|
|
91
|
-
type: 'uint256',
|
|
92
|
-
name: 'r',
|
|
93
|
-
},
|
|
94
|
-
{
|
|
95
|
-
type: 'uint256',
|
|
96
|
-
name: 's',
|
|
97
|
-
},
|
|
98
|
-
], signature);
|
|
99
|
-
});
|
|
100
|
-
});
|
|
101
|
-
});
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"permit2.test.d.ts","sourceRoot":"","sources":["../../../../../../modules/validators/policies/claim/permit2.test.ts"],"names":[],"mappings":""}
|