Skip to content

Commit f57c683

Browse files
authored
Merge pull request #822 from LIT-Protocol/feature/lit-4373-js-sdk-naga-revamp-fix-import-paths-issues-for-builds
Feature/lit 4373 js sdk naga revamp fix import paths issues for builds
2 parents f1d03ce + 3918cb2 commit f57c683

39 files changed

+1991
-601
lines changed

README.md

Lines changed: 25 additions & 21 deletions
Large diffs are not rendered by default.

local-tests/setup/networkContext.json

Lines changed: 1625 additions & 377 deletions
Large diffs are not rendered by default.

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/PKPPermissionsManager.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
* ```
2727
*/
2828

29-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
29+
import { DatilContext } from '../../../../../types';
3030
import { PkpIdentifierRaw } from '../../rawContractApis/permissions/utils/resolvePkpTokenId';
3131

3232
// Import all handler functions
@@ -46,7 +46,7 @@ import { isPermittedAddressByIdentifier } from './handlers/isPermittedAddressByI
4646
import { removePermittedActionByIdentifier } from './handlers/removePermittedActionByIdentifier';
4747
import { removePermittedAddressByIdentifier } from './handlers/removePermittedAddressByIdentifier';
4848

49-
import { logger } from 'utils/logger';
49+
import { logger } from '@lit-protocol/logger';
5050
import { ScopeString } from '../../../schemas/shared/ScopeSchema';
5151
import { LitTxVoid } from '../../types';
5252
import { AuthMethod } from '../../rawContractApis/permissions/read/getPermittedAuthMethods';

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/addPermittedActionByIdentifier.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
1+
import { DatilContext } from '../../../../../../types';
22
import {
33
PkpIdentifierRaw,
44
resolvePkpTokenId,
55
} from '../../../rawContractApis/permissions/utils/resolvePkpTokenId';
66
import { addPermittedAction } from '../../../rawContractApis/permissions/write/addPermittedAction';
7-
import { isIpfsCidV0 } from 'services/lit/utils/z-validate';
7+
import { isIpfsCidV0 } from '../../../../../../../shared/utils/z-validate';
88
import { z } from 'zod';
99
import { LitTxVoid } from '../../../types';
1010
import { ScopeStringSchema } from '../../../../schemas/shared/ScopeSchema';

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/addPermittedAddressByIdentifier.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
1+
import { DatilContext } from '../../../../../../types';
22
import {
33
PkpIdentifierRaw,
44
resolvePkpTokenId,

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/getPKPsByAddress.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
// import { datilDevNetworkContext } from "services/lit/LitNetwork/vDatil/datil-dev/networkContext";
2-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
3-
import { logger } from 'utils/logger';
2+
import { DatilContext } from '../../../../../../types';
3+
import { logger } from '@lit-protocol/logger';
44
import { getAddress } from 'viem';
55
import { z } from 'zod';
66
import { getPubkeyByTokenId } from '../../../rawContractApis/pkp/read/getPubkeyByTokenId';

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/getPermissionsContext.ts

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
2-
import { logger } from 'utils/logger';
1+
import { DatilContext } from '../../../../../../types';
2+
import { logger } from '@lit-protocol/logger';
33
import { getPermittedActions } from '../../../rawContractApis/permissions/read/getPermittedActions';
44
import { getPermittedAddresses } from '../../../rawContractApis/permissions/read/getPermittedAddresses';
55
import {
@@ -71,32 +71,32 @@ export async function getPermissionsContext(
7171
}
7272

7373
// Example usage
74-
if (import.meta.main) {
75-
// const networkCtx = datilDevNetworkContext;
76-
// async function example() {
77-
// // Can use any of these identifiers:
78-
// const ctx = await getPermissionsContext(
79-
// {
80-
// tokenId:
81-
// "76136736151863037541847315168980811654782785653773679312890341037699996601290",
82-
// },
83-
// networkCtx
84-
// );
85-
// // Check current permissions
86-
// const isActionAllowed = ctx.isActionPermitted("0x1234..." as `0x${string}`);
87-
// const isAddressAllowed = ctx.isAddressPermitted(
88-
// "0x5678..." as `0x${string}`
89-
// );
90-
// const isAuthMethodAllowed = ctx.isAuthMethodPermitted(
91-
// 1, // AuthMethodType.EthWallet
92-
// "0x1234567890abcdef1234567890abcdef12345678"
93-
// );
94-
// console.log("Action permitted:", isActionAllowed);
95-
// console.log("Address permitted:", isAddressAllowed);
96-
// console.log("Auth method permitted:", isAuthMethodAllowed);
97-
// console.log("All permitted actions:", ctx.actions);
98-
// console.log("All permitted addresses:", ctx.addresses);
99-
// console.log("All permitted auth methods:", ctx.authMethods);
100-
// }
101-
// example().catch(console.error);
102-
}
74+
// if (import.meta.main) {
75+
// // const networkCtx = datilDevNetworkContext;
76+
// // async function example() {
77+
// // // Can use any of these identifiers:
78+
// // const ctx = await getPermissionsContext(
79+
// // {
80+
// // tokenId:
81+
// // "76136736151863037541847315168980811654782785653773679312890341037699996601290",
82+
// // },
83+
// // networkCtx
84+
// // );
85+
// // // Check current permissions
86+
// // const isActionAllowed = ctx.isActionPermitted("0x1234..." as `0x${string}`);
87+
// // const isAddressAllowed = ctx.isAddressPermitted(
88+
// // "0x5678..." as `0x${string}`
89+
// // );
90+
// // const isAuthMethodAllowed = ctx.isAuthMethodPermitted(
91+
// // 1, // AuthMethodType.EthWallet
92+
// // "0x1234567890abcdef1234567890abcdef12345678"
93+
// // );
94+
// // console.log("Action permitted:", isActionAllowed);
95+
// // console.log("Address permitted:", isAddressAllowed);
96+
// // console.log("Auth method permitted:", isAuthMethodAllowed);
97+
// // console.log("All permitted actions:", ctx.actions);
98+
// // console.log("All permitted addresses:", ctx.addresses);
99+
// // console.log("All permitted auth methods:", ctx.authMethods);
100+
// // }
101+
// // example().catch(console.error);
102+
// }

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/getPermittedActionsByIdentifier.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
2-
import { logger } from 'utils/logger';
1+
import { DatilContext } from '../../../../../../types';
2+
import { logger } from '@lit-protocol/logger';
33
import { getPermittedActions } from '../../../rawContractApis/permissions/read/getPermittedActions';
44
import {
55
PkpIdentifierRaw,

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/getPermittedAddressesByIdentifier.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
2-
import { logger } from 'utils/logger';
1+
import { DatilContext } from '../../../../../../types';
2+
import { logger } from '@lit-protocol/logger';
33
import { getPermittedAddresses } from '../../../rawContractApis/permissions/read/getPermittedAddresses';
44
import {
55
PkpIdentifierRaw,

packages/networks/src/lib/networks/VDatil/common/LitChainClient/apis/highLevelApis/PKPPermissionsManager/handlers/getPermittedAuthMethodScopesByIdentifier.ts

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
import { DatilContext } from 'services/lit/LitNetwork/vDatil/types';
2-
import { logger } from 'utils/logger';
1+
import { DatilContext } from '../../../../../../types';
2+
import { logger } from '@lit-protocol/logger';
33
import { getPermittedAuthMethodScopes } from '../../../rawContractApis/permissions/read/getPermittedAuthMethodScopes';
44
import {
55
PkpIdentifierRaw,
66
resolvePkpTokenId,
77
} from '../../../rawContractApis/permissions/utils/resolvePkpTokenId';
8-
import { datilDevNetworkContext } from 'services/lit/LitNetwork/vDatil/datil-dev/networkContext';
8+
import { datilDevNetworkContext } from '../../../../../../datil-dev/networkContext';
99

1010
/**
1111
* Get permitted scopes for a specific authentication method of a PKP token using various identifier types
@@ -41,22 +41,22 @@ export async function getPermittedAuthMethodScopesByIdentifier(
4141
);
4242
}
4343

44-
// Example usage when running as main
45-
if (import.meta.main) {
46-
const networkCtx = datilDevNetworkContext;
44+
// // Example usage when running as main
45+
// if (import.meta.main) {
46+
// const networkCtx = datilDevNetworkContext;
4747

48-
const res = await getPermittedAuthMethodScopesByIdentifier(
49-
{
50-
identifier: {
51-
// tokenId: "76136736151863037541847315168980811654782785653773679312890341037699996601290",
52-
// pubkey: "0x000",
53-
address: '0xef3eE1bD838aF5B36482FAe8a6Fc394C68d5Fa9F',
54-
},
55-
authMethodType: 1,
56-
authMethodId: '0x1234567890abcdef1234567890abcdef12345678',
57-
scopeId: 0,
58-
},
59-
networkCtx
60-
);
61-
console.log('permittedAuthMethodScopes', res);
62-
}
48+
// const res = await getPermittedAuthMethodScopesByIdentifier(
49+
// {
50+
// identifier: {
51+
// // tokenId: "76136736151863037541847315168980811654782785653773679312890341037699996601290",
52+
// // pubkey: "0x000",
53+
// address: '0xef3eE1bD838aF5B36482FAe8a6Fc394C68d5Fa9F',
54+
// },
55+
// authMethodType: 1,
56+
// authMethodId: '0x1234567890abcdef1234567890abcdef12345678',
57+
// scopeId: 0,
58+
// },
59+
// networkCtx
60+
// );
61+
// console.log('permittedAuthMethodScopes', res);
62+
// }

0 commit comments

Comments
 (0)