@aptos-labs/ts-sdk 1.37.0 → 1.37.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (246) hide show
  1. package/dist/common/{accountAddress-DZH9Wn5l.d.ts → accountAddress-DU4ds4Bf.d.ts} +1 -1
  2. package/dist/common/cli/index.d.ts +1 -1
  3. package/dist/common/index.d.ts +2 -2
  4. package/dist/common/index.js +2 -2
  5. package/dist/common/index.js.map +1 -1
  6. package/dist/esm/{Ed25519Account-CDURCT1q.d.mts → Ed25519Account-C-AS-Kgv.d.mts} +2 -2
  7. package/dist/esm/account/AbstractKeylessAccount.d.mts +2 -2
  8. package/dist/esm/account/AbstractKeylessAccount.mjs +1 -1
  9. package/dist/esm/account/AbstractedAccount.d.mts +1 -1
  10. package/dist/esm/account/AbstractedAccount.mjs +1 -1
  11. package/dist/esm/account/Account.d.mts +1 -1
  12. package/dist/esm/account/Account.mjs +1 -1
  13. package/dist/esm/account/AccountUtils.d.mts +2 -2
  14. package/dist/esm/account/AccountUtils.mjs +1 -1
  15. package/dist/esm/account/Ed25519Account.d.mts +1 -1
  16. package/dist/esm/account/Ed25519Account.mjs +1 -1
  17. package/dist/esm/account/EphemeralKeyPair.mjs +1 -1
  18. package/dist/esm/account/FederatedKeylessAccount.d.mts +2 -2
  19. package/dist/esm/account/FederatedKeylessAccount.mjs +1 -1
  20. package/dist/esm/account/KeylessAccount.d.mts +2 -2
  21. package/dist/esm/account/KeylessAccount.mjs +1 -1
  22. package/dist/esm/account/MultiEd25519Account.d.mts +1 -1
  23. package/dist/esm/account/MultiEd25519Account.mjs +1 -1
  24. package/dist/esm/account/MultiKeyAccount.d.mts +2 -2
  25. package/dist/esm/account/MultiKeyAccount.mjs +1 -1
  26. package/dist/esm/account/SingleKeyAccount.d.mts +1 -1
  27. package/dist/esm/account/SingleKeyAccount.mjs +1 -1
  28. package/dist/esm/account/index.d.mts +2 -2
  29. package/dist/esm/account/index.mjs +1 -1
  30. package/dist/esm/account/utils.mjs +1 -1
  31. package/dist/esm/api/account/abstraction.mjs +1 -1
  32. package/dist/esm/api/account.d.mts +1 -1
  33. package/dist/esm/api/account.mjs +1 -1
  34. package/dist/esm/api/ans.d.mts +1 -1
  35. package/dist/esm/api/ans.mjs +1 -1
  36. package/dist/esm/api/aptos.d.mts +2 -2
  37. package/dist/esm/api/aptos.mjs +1 -1
  38. package/dist/esm/api/coin.d.mts +3 -3
  39. package/dist/esm/api/coin.mjs +1 -1
  40. package/dist/esm/api/digitalAsset.d.mts +2 -2
  41. package/dist/esm/api/digitalAsset.mjs +1 -1
  42. package/dist/esm/api/event.mjs +1 -1
  43. package/dist/esm/api/experimental.mjs +1 -1
  44. package/dist/esm/api/faucet.mjs +1 -1
  45. package/dist/esm/api/fungibleAsset.d.mts +1 -1
  46. package/dist/esm/api/fungibleAsset.mjs +1 -1
  47. package/dist/esm/api/general.mjs +1 -1
  48. package/dist/esm/api/index.d.mts +2 -2
  49. package/dist/esm/api/index.mjs +1 -1
  50. package/dist/esm/api/keyless.d.mts +2 -2
  51. package/dist/esm/api/keyless.mjs +1 -1
  52. package/dist/esm/api/object.mjs +1 -1
  53. package/dist/esm/api/staking.mjs +1 -1
  54. package/dist/esm/api/table.mjs +1 -1
  55. package/dist/esm/api/transaction.d.mts +1 -1
  56. package/dist/esm/api/transaction.mjs +1 -1
  57. package/dist/esm/api/transactionSubmission/build.mjs +1 -1
  58. package/dist/esm/api/transactionSubmission/management.d.mts +1 -1
  59. package/dist/esm/api/transactionSubmission/management.mjs +1 -1
  60. package/dist/esm/api/transactionSubmission/sign.d.mts +1 -1
  61. package/dist/esm/api/transactionSubmission/sign.mjs +1 -1
  62. package/dist/esm/api/transactionSubmission/simulate.mjs +1 -1
  63. package/dist/esm/api/transactionSubmission/submit.mjs +1 -1
  64. package/dist/esm/api/utils.mjs +1 -1
  65. package/dist/esm/bcs/deserializer.mjs +1 -1
  66. package/dist/esm/bcs/index.mjs +1 -1
  67. package/dist/esm/bcs/serializable/entryFunctionBytes.mjs +1 -1
  68. package/dist/esm/bcs/serializable/fixedBytes.mjs +1 -1
  69. package/dist/esm/bcs/serializable/movePrimitives.d.mts +1 -1
  70. package/dist/esm/bcs/serializable/movePrimitives.mjs +1 -1
  71. package/dist/esm/bcs/serializable/moveStructs.mjs +1 -1
  72. package/dist/esm/bcs/serializer.mjs +1 -1
  73. package/dist/esm/{chunk-5MMTP427.mjs → chunk-2DISMLR6.mjs} +2 -2
  74. package/dist/esm/{chunk-VNUNIQAY.mjs → chunk-2RBINVFA.mjs} +2 -2
  75. package/dist/esm/{chunk-MIW45ADL.mjs → chunk-3AS5BVKL.mjs} +2 -2
  76. package/dist/esm/{chunk-TKXEVD7A.mjs → chunk-4FBUZY6C.mjs} +2 -2
  77. package/dist/esm/chunk-5WNHYEW2.mjs +2 -0
  78. package/dist/esm/{chunk-POELQOLD.mjs → chunk-6QJWFV2M.mjs} +2 -2
  79. package/dist/esm/{chunk-PDAWVDI7.mjs → chunk-7JRZLDWV.mjs} +2 -2
  80. package/dist/esm/{chunk-LGC2JORV.mjs → chunk-7WPEGMD6.mjs} +2 -2
  81. package/dist/esm/{chunk-ZD2TY5N3.mjs → chunk-BE3OXYYX.mjs} +2 -2
  82. package/dist/esm/{chunk-ZD2TY5N3.mjs.map → chunk-BE3OXYYX.mjs.map} +1 -1
  83. package/dist/esm/{chunk-A3VO773Q.mjs → chunk-BRGQM252.mjs} +2 -2
  84. package/dist/esm/{chunk-PXG3WJIU.mjs → chunk-CICJRLYU.mjs} +2 -2
  85. package/dist/esm/{chunk-RXHER6EA.mjs → chunk-CZOZTNXJ.mjs} +2 -2
  86. package/dist/esm/{chunk-PR72YXRK.mjs → chunk-DC5IVW4W.mjs} +2 -2
  87. package/dist/esm/{chunk-LBA4CTUV.mjs → chunk-DCVGWCZD.mjs} +2 -2
  88. package/dist/esm/{chunk-TTFYJM6A.mjs → chunk-DFRHNDOS.mjs} +2 -2
  89. package/dist/esm/{chunk-ERLDXTIY.mjs → chunk-DGH7NXHM.mjs} +2 -2
  90. package/dist/esm/{chunk-NZXPT44W.mjs → chunk-DH32UXHB.mjs} +2 -2
  91. package/dist/esm/chunk-EXXY72UN.mjs +2 -0
  92. package/dist/esm/{chunk-3IGJ2IMB.mjs → chunk-F2GWK4YJ.mjs} +2 -2
  93. package/dist/esm/{chunk-LS3IDL2N.mjs → chunk-FU65NEDT.mjs} +2 -2
  94. package/dist/esm/{chunk-HHWJHOFZ.mjs → chunk-H3NZHL45.mjs} +2 -2
  95. package/dist/esm/{chunk-7VEWPUCH.mjs → chunk-HEYMZZRE.mjs} +2 -2
  96. package/dist/esm/{chunk-ANTUWHYB.mjs → chunk-KIMU5PYJ.mjs} +2 -2
  97. package/dist/esm/{chunk-BSH7B2QT.mjs → chunk-L5C44K6H.mjs} +2 -2
  98. package/dist/esm/{chunk-HRHICHDX.mjs → chunk-M7W6FZ5Z.mjs} +2 -2
  99. package/dist/esm/chunk-NDXMDJV4.mjs +2 -0
  100. package/dist/esm/{chunk-GPG64UZT.mjs.map → chunk-NDXMDJV4.mjs.map} +1 -1
  101. package/dist/esm/{chunk-6J64BOS7.mjs → chunk-P5CIZZDK.mjs} +2 -2
  102. package/dist/esm/{chunk-EYLZD4JU.mjs → chunk-SZYA6IG4.mjs} +2 -2
  103. package/dist/esm/{chunk-JG4T5BDZ.mjs → chunk-TORMKDQG.mjs} +2 -2
  104. package/dist/esm/{chunk-RIINVEZA.mjs → chunk-UQKQH5C7.mjs} +2 -2
  105. package/dist/esm/chunk-URNCRLHO.mjs +4 -0
  106. package/dist/esm/{chunk-7H44HTYE.mjs.map → chunk-URNCRLHO.mjs.map} +1 -1
  107. package/dist/esm/{chunk-YHKWV7NV.mjs → chunk-V5IPL4SJ.mjs} +2 -2
  108. package/dist/esm/{chunk-6374Q7AG.mjs → chunk-YVRPD7Z6.mjs} +2 -2
  109. package/dist/esm/{chunk-YHJHXLYS.mjs → chunk-ZKOF4KST.mjs} +2 -2
  110. package/dist/esm/cli/index.mjs +1 -1
  111. package/dist/esm/cli/localNode.mjs +1 -1
  112. package/dist/esm/client/core.mjs +1 -1
  113. package/dist/esm/client/get.mjs +1 -1
  114. package/dist/esm/client/index.mjs +1 -1
  115. package/dist/esm/client/post.mjs +1 -1
  116. package/dist/esm/core/account/index.mjs +1 -1
  117. package/dist/esm/core/account/utils/address.mjs +1 -1
  118. package/dist/esm/core/account/utils/index.mjs +1 -1
  119. package/dist/esm/core/accountAddress.mjs +1 -1
  120. package/dist/esm/core/authenticationKey.mjs +1 -1
  121. package/dist/esm/core/crypto/abstraction.mjs +1 -1
  122. package/dist/esm/core/crypto/ed25519.d.mts +1 -1
  123. package/dist/esm/core/crypto/ed25519.mjs +1 -1
  124. package/dist/esm/core/crypto/ephemeral.mjs +1 -1
  125. package/dist/esm/core/crypto/federatedKeyless.d.mts +1 -1
  126. package/dist/esm/core/crypto/federatedKeyless.mjs +1 -1
  127. package/dist/esm/core/crypto/index.d.mts +1 -1
  128. package/dist/esm/core/crypto/index.mjs +1 -1
  129. package/dist/esm/core/crypto/keyless.d.mts +1 -1
  130. package/dist/esm/core/crypto/keyless.mjs +1 -1
  131. package/dist/esm/core/crypto/multiEd25519.mjs +1 -1
  132. package/dist/esm/core/crypto/multiKey.mjs +1 -1
  133. package/dist/esm/core/crypto/privateKey.mjs +1 -1
  134. package/dist/esm/core/crypto/proof.mjs +1 -1
  135. package/dist/esm/core/crypto/publicKey.mjs +1 -1
  136. package/dist/esm/core/crypto/secp256k1.d.mts +1 -1
  137. package/dist/esm/core/crypto/secp256k1.mjs +1 -1
  138. package/dist/esm/core/crypto/signature.mjs +1 -1
  139. package/dist/esm/core/crypto/singleKey.mjs +1 -1
  140. package/dist/esm/core/index.d.mts +1 -1
  141. package/dist/esm/core/index.mjs +1 -1
  142. package/dist/esm/errors/index.mjs +1 -1
  143. package/dist/esm/{federatedKeyless-J5bdbbLQ.d.mts → federatedKeyless-DVfVovSR.d.mts} +2 -2
  144. package/dist/esm/index.d.mts +2 -2
  145. package/dist/esm/index.mjs +1 -1
  146. package/dist/esm/internal/abstraction.d.mts +1 -1
  147. package/dist/esm/internal/abstraction.mjs +1 -1
  148. package/dist/esm/internal/account.d.mts +1 -1
  149. package/dist/esm/internal/account.mjs +1 -1
  150. package/dist/esm/internal/ans.d.mts +2 -2
  151. package/dist/esm/internal/ans.mjs +1 -1
  152. package/dist/esm/internal/coin.d.mts +4 -4
  153. package/dist/esm/internal/coin.mjs +1 -1
  154. package/dist/esm/internal/digitalAsset.d.mts +2 -2
  155. package/dist/esm/internal/digitalAsset.mjs +1 -1
  156. package/dist/esm/internal/event.mjs +1 -1
  157. package/dist/esm/internal/experimental.mjs +1 -1
  158. package/dist/esm/internal/faucet.mjs +1 -1
  159. package/dist/esm/internal/fungibleAsset.d.mts +1 -1
  160. package/dist/esm/internal/fungibleAsset.mjs +1 -1
  161. package/dist/esm/internal/general.mjs +1 -1
  162. package/dist/esm/internal/keyless.d.mts +2 -2
  163. package/dist/esm/internal/keyless.mjs +1 -1
  164. package/dist/esm/internal/object.mjs +1 -1
  165. package/dist/esm/internal/staking.mjs +1 -1
  166. package/dist/esm/internal/table.mjs +1 -1
  167. package/dist/esm/internal/transaction.mjs +1 -1
  168. package/dist/esm/internal/transactionSubmission.d.mts +1 -1
  169. package/dist/esm/internal/transactionSubmission.mjs +1 -1
  170. package/dist/esm/internal/utils/index.mjs +1 -1
  171. package/dist/esm/internal/utils/utils.mjs +1 -1
  172. package/dist/esm/internal/view.mjs +1 -1
  173. package/dist/esm/transactions/authenticator/account.mjs +1 -1
  174. package/dist/esm/transactions/authenticator/index.mjs +1 -1
  175. package/dist/esm/transactions/authenticator/transaction.mjs +1 -1
  176. package/dist/esm/transactions/index.mjs +1 -1
  177. package/dist/esm/transactions/instances/chainId.mjs +1 -1
  178. package/dist/esm/transactions/instances/identifier.mjs +1 -1
  179. package/dist/esm/transactions/instances/index.mjs +1 -1
  180. package/dist/esm/transactions/instances/moduleId.mjs +1 -1
  181. package/dist/esm/transactions/instances/multiAgentTransaction.mjs +1 -1
  182. package/dist/esm/transactions/instances/rawTransaction.mjs +1 -1
  183. package/dist/esm/transactions/instances/rotationProofChallenge.mjs +1 -1
  184. package/dist/esm/transactions/instances/signedTransaction.mjs +1 -1
  185. package/dist/esm/transactions/instances/simpleTransaction.mjs +1 -1
  186. package/dist/esm/transactions/instances/transactionPayload.d.mts +1 -1
  187. package/dist/esm/transactions/instances/transactionPayload.mjs +1 -1
  188. package/dist/esm/transactions/management/accountSequenceNumber.d.mts +1 -1
  189. package/dist/esm/transactions/management/accountSequenceNumber.mjs +1 -1
  190. package/dist/esm/transactions/management/index.d.mts +1 -1
  191. package/dist/esm/transactions/management/index.mjs +1 -1
  192. package/dist/esm/transactions/management/transactionWorker.d.mts +1 -1
  193. package/dist/esm/transactions/management/transactionWorker.mjs +1 -1
  194. package/dist/esm/transactions/scriptComposer/index.mjs +1 -1
  195. package/dist/esm/transactions/transactionBuilder/helpers.mjs +1 -1
  196. package/dist/esm/transactions/transactionBuilder/index.mjs +1 -1
  197. package/dist/esm/transactions/transactionBuilder/remoteAbi.mjs +1 -1
  198. package/dist/esm/transactions/transactionBuilder/signingMessage.mjs +1 -1
  199. package/dist/esm/transactions/transactionBuilder/transactionBuilder.mjs +1 -1
  200. package/dist/esm/transactions/typeTag/index.mjs +1 -1
  201. package/dist/esm/transactions/typeTag/parser.mjs +1 -1
  202. package/dist/esm/transactions/types.d.mts +1 -1
  203. package/dist/esm/types/index.mjs +1 -1
  204. package/dist/esm/types/indexer.d.mts +1 -1
  205. package/dist/esm/utils/helpers.mjs +1 -1
  206. package/dist/esm/utils/index.mjs +1 -1
  207. package/dist/esm/utils/normalizeBundle.mjs +1 -1
  208. package/dist/esm/version.d.mts +1 -1
  209. package/dist/esm/version.mjs +1 -1
  210. package/package.json +3 -3
  211. package/src/version.ts +1 -1
  212. package/dist/esm/chunk-2V636AYW.mjs +0 -2
  213. package/dist/esm/chunk-7H44HTYE.mjs +0 -4
  214. package/dist/esm/chunk-BMPHQ3E7.mjs +0 -2
  215. package/dist/esm/chunk-GPG64UZT.mjs +0 -2
  216. /package/dist/esm/{chunk-5MMTP427.mjs.map → chunk-2DISMLR6.mjs.map} +0 -0
  217. /package/dist/esm/{chunk-VNUNIQAY.mjs.map → chunk-2RBINVFA.mjs.map} +0 -0
  218. /package/dist/esm/{chunk-MIW45ADL.mjs.map → chunk-3AS5BVKL.mjs.map} +0 -0
  219. /package/dist/esm/{chunk-TKXEVD7A.mjs.map → chunk-4FBUZY6C.mjs.map} +0 -0
  220. /package/dist/esm/{chunk-BMPHQ3E7.mjs.map → chunk-5WNHYEW2.mjs.map} +0 -0
  221. /package/dist/esm/{chunk-POELQOLD.mjs.map → chunk-6QJWFV2M.mjs.map} +0 -0
  222. /package/dist/esm/{chunk-PDAWVDI7.mjs.map → chunk-7JRZLDWV.mjs.map} +0 -0
  223. /package/dist/esm/{chunk-LGC2JORV.mjs.map → chunk-7WPEGMD6.mjs.map} +0 -0
  224. /package/dist/esm/{chunk-A3VO773Q.mjs.map → chunk-BRGQM252.mjs.map} +0 -0
  225. /package/dist/esm/{chunk-PXG3WJIU.mjs.map → chunk-CICJRLYU.mjs.map} +0 -0
  226. /package/dist/esm/{chunk-RXHER6EA.mjs.map → chunk-CZOZTNXJ.mjs.map} +0 -0
  227. /package/dist/esm/{chunk-PR72YXRK.mjs.map → chunk-DC5IVW4W.mjs.map} +0 -0
  228. /package/dist/esm/{chunk-LBA4CTUV.mjs.map → chunk-DCVGWCZD.mjs.map} +0 -0
  229. /package/dist/esm/{chunk-TTFYJM6A.mjs.map → chunk-DFRHNDOS.mjs.map} +0 -0
  230. /package/dist/esm/{chunk-ERLDXTIY.mjs.map → chunk-DGH7NXHM.mjs.map} +0 -0
  231. /package/dist/esm/{chunk-NZXPT44W.mjs.map → chunk-DH32UXHB.mjs.map} +0 -0
  232. /package/dist/esm/{chunk-2V636AYW.mjs.map → chunk-EXXY72UN.mjs.map} +0 -0
  233. /package/dist/esm/{chunk-3IGJ2IMB.mjs.map → chunk-F2GWK4YJ.mjs.map} +0 -0
  234. /package/dist/esm/{chunk-LS3IDL2N.mjs.map → chunk-FU65NEDT.mjs.map} +0 -0
  235. /package/dist/esm/{chunk-HHWJHOFZ.mjs.map → chunk-H3NZHL45.mjs.map} +0 -0
  236. /package/dist/esm/{chunk-7VEWPUCH.mjs.map → chunk-HEYMZZRE.mjs.map} +0 -0
  237. /package/dist/esm/{chunk-ANTUWHYB.mjs.map → chunk-KIMU5PYJ.mjs.map} +0 -0
  238. /package/dist/esm/{chunk-BSH7B2QT.mjs.map → chunk-L5C44K6H.mjs.map} +0 -0
  239. /package/dist/esm/{chunk-HRHICHDX.mjs.map → chunk-M7W6FZ5Z.mjs.map} +0 -0
  240. /package/dist/esm/{chunk-6J64BOS7.mjs.map → chunk-P5CIZZDK.mjs.map} +0 -0
  241. /package/dist/esm/{chunk-EYLZD4JU.mjs.map → chunk-SZYA6IG4.mjs.map} +0 -0
  242. /package/dist/esm/{chunk-JG4T5BDZ.mjs.map → chunk-TORMKDQG.mjs.map} +0 -0
  243. /package/dist/esm/{chunk-RIINVEZA.mjs.map → chunk-UQKQH5C7.mjs.map} +0 -0
  244. /package/dist/esm/{chunk-YHKWV7NV.mjs.map → chunk-V5IPL4SJ.mjs.map} +0 -0
  245. /package/dist/esm/{chunk-6374Q7AG.mjs.map → chunk-YVRPD7Z6.mjs.map} +0 -0
  246. /package/dist/esm/{chunk-YHJHXLYS.mjs.map → chunk-ZKOF4KST.mjs.map} +0 -0
@@ -1,9 +1,9 @@
1
- "use strict";Object.defineProperty(exports, "__esModule", {value: true}); function _interopRequireWildcard(obj) { if (obj && obj.__esModule) { return obj; } else { var newObj = {}; if (obj != null) { for (var key in obj) { if (Object.prototype.hasOwnProperty.call(obj, key)) { newObj[key] = obj[key]; } } } newObj.default = obj; return newObj; } } function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; } function _nullishCoalesce(lhs, rhsFn) { if (lhs != null) { return lhs; } else { return rhsFn(); } } function _optionalChain(ops) { let lastAccessLHS = undefined; let value = ops[0]; let i = 1; while (i < ops.length) { const op = ops[i]; const fn = ops[i + 1]; i += 2; if ((op === 'optionalAccess' || op === 'optionalCall') && value == null) { return undefined; } if (op === 'access' || op === 'optionalAccess') { lastAccessLHS = value; value = fn(value); } else if (op === 'call' || op === 'optionalCall') { value = fn((...args) => value.call(lastAccessLHS, ...args)); lastAccessLHS = undefined; } } return value; } function _optionalChainDelete(ops) { const result = _optionalChain(ops); return result == null ? true : result; }var _chunkMVCKMP5Ujs = require('./chunk-MVCKMP5U.js');var R=class n{constructor(e){this.buffer=new ArrayBuffer(e.length),new Uint8Array(this.buffer).set(e,0),this.offset=0}static fromHex(e){let t=_chunkMVCKMP5Ujs.j.hexInputToUint8Array(e);return new n(t)}read(e){if(this.offset+e>this.buffer.byteLength)throw new Error("Reached to the end of buffer");let t=this.buffer.slice(this.offset,this.offset+e);return this.offset+=e,t}remaining(){return this.buffer.byteLength-this.offset}deserializeStr(){let e=this.deserializeBytes();return new TextDecoder().decode(e)}deserializeOptionStr(){return this.deserializeOption("string")}deserializeOption(e,t){if(this.deserializeBool()){if(e==="string")return this.deserializeStr();if(e==="bytes")return this.deserializeBytes();if(e==="fixedBytes"){if(t===void 0)throw new Error("Fixed bytes length not provided");return this.deserializeFixedBytes(t)}return this.deserialize(e)}}deserializeBytes(){let e=this.deserializeUleb128AsU32();return new Uint8Array(this.read(e))}deserializeFixedBytes(e){return new Uint8Array(this.read(e))}deserializeBool(){let e=new Uint8Array(this.read(1))[0];if(e!==1&&e!==0)throw new Error("Invalid boolean value");return e===1}deserializeU8(){return new DataView(this.read(1)).getUint8(0)}deserializeU16(){return new DataView(this.read(2)).getUint16(0,!0)}deserializeU32(){return new DataView(this.read(4)).getUint32(0,!0)}deserializeU64(){let e=this.deserializeU32(),t=this.deserializeU32();return BigInt(BigInt(t)<<BigInt(32)|BigInt(e))}deserializeU128(){let e=this.deserializeU64(),t=this.deserializeU64();return BigInt(t<<BigInt(64)|e)}deserializeU256(){let e=this.deserializeU128(),t=this.deserializeU128();return BigInt(t<<BigInt(128)|e)}deserializeUleb128AsU32(){let e=BigInt(0),t=0;for(;e<_chunkMVCKMP5Ujs.d;){let r=this.deserializeU8();if(e|=BigInt(r&127)<<BigInt(t),!(r&128))break;t+=7}if(e>_chunkMVCKMP5Ujs.d)throw new Error("Overflow while parsing uleb128-encoded uint32 value");return Number(e)}deserialize(e){return e.deserialize(this)}deserializeVector(e){let t=this.deserializeUleb128AsU32(),r=new Array;for(let i=0;i<t;i+=1)r.push(this.deserialize(e));return r}};var Ee=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array()}serialize(e){e.serializeFixedBytes(this.value)}serializeForEntryFunction(e){e.serialize(this)}serializeForScriptFunction(e){e.serialize(this)}static deserialize(e,t){let r=e.deserializeFixedBytes(t);return new n(r)}};var rr=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=new Ee(e)}serialize(e){e.serialize(this.value)}serializeForEntryFunction(e){e.serializeU32AsUleb128(this.value.value.length),e.serialize(this)}static deserialize(e,t){let r=Ee.deserialize(e,t);return new n(r.value)}};var N=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.n.call(void 0, e),this.value=e}serialize(e){e.serializeBool(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(5),e.serialize(this)}deserialize(e){return new fe(e.deserializeU256())}static deserialize(e){return new n(e.deserializeBool())}},Y= exports.U8 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.b),this.value=e}serialize(e){e.serializeU8(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(0),e.serialize(this)}static deserialize(e){return new n(e.deserializeU8())}},Pe= exports.U16 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.c),this.value=e}serialize(e){e.serializeU16(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(6),e.serialize(this)}static deserialize(e){return new n(e.deserializeU16())}},_e= exports.U32 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.d),this.value=e}serialize(e){e.serializeU32(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(7),e.serialize(this)}static deserialize(e){return new n(e.deserializeU32())}},Q= exports.U64 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.e),this.value=BigInt(e)}serialize(e){e.serializeU64(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(1),e.serialize(this)}static deserialize(e){return new n(e.deserializeU64())}},xe= exports.U128 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.f),this.value=BigInt(e)}serialize(e){e.serializeU128(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(2),e.serialize(this)}static deserialize(e){return new n(e.deserializeU128())}},fe= exports.U256 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.g),this.value=BigInt(e)}serialize(e){e.serializeU256(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(8),e.serialize(this)}static deserialize(e){return new n(e.deserializeU256())}};var S=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.values=e}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){if(this.values[0]!==void 0&&!(this.values[0]instanceof Y)){new fn(this.bcsToBytes()).serializeForScriptFunction(e);return}e.serializeU32AsUleb128(4),e.serialize(this)}static U8(e){let t;if(Array.isArray(e)&&e.length===0)t=[];else if(Array.isArray(e)&&typeof e[0]=="number")t=e;else if(typeof e=="string"){let r=_chunkMVCKMP5Ujs.j.fromHexInput(e);t=Array.from(r.toUint8Array())}else if(e instanceof Uint8Array)t=Array.from(e);else throw new Error("Invalid input type, must be an number[], Uint8Array, or hex string");return new n(t.map(r=>new Y(r)))}static U16(e){return new n(e.map(t=>new Pe(t)))}static U32(e){return new n(e.map(t=>new _e(t)))}static U64(e){return new n(e.map(t=>new Q(t)))}static U128(e){return new n(e.map(t=>new xe(t)))}static U256(e){return new n(e.map(t=>new fe(t)))}static Bool(e){return new n(e.map(t=>new N(t)))}static MoveString(e){return new n(e.map(t=>new x(t)))}serialize(e){e.serializeVector(this.values)}static deserialize(e,t){let r=e.deserializeUleb128AsU32(),i=new Array;for(let o=0;o<r;o+=1)i.push(t.deserialize(e));return new n(i)}},fn= exports.Serialized =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array()}serialize(e){e.serializeBytes(this.value)}serializeForEntryFunction(e){this.serialize(e)}serializeForScriptFunction(e){e.serializeU32AsUleb128(9),this.serialize(e)}static deserialize(e){return new n(e.deserializeBytes())}toMoveVector(e){let t=new R(this.bcsToBytes());t.deserializeUleb128AsU32();let r=t.deserializeVector(e);return new S(r)}},x= exports.MoveString =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=e}serialize(e){e.serializeStr(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){let r=new TextEncoder().encode(this.value);S.U8(r).serializeForScriptFunction(e)}static deserialize(e){return new n(e.deserializeStr())}},Z= exports.MoveOption =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),typeof e<"u"&&e!==null?this.vec=new S([e]):this.vec=new S([]),[this.value]=this.vec.values}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}unwrap(){if(this.isSome())return this.vec.values[0];throw new Error("Called unwrap on a MoveOption with no value")}isSome(){return this.vec.values.length===1}serialize(e){this.vec.serialize(e)}static U8(e){return new n(e!=null?new Y(e):void 0)}static U16(e){return new n(e!=null?new Pe(e):void 0)}static U32(e){return new n(e!=null?new _e(e):void 0)}static U64(e){return new n(e!=null?new Q(e):void 0)}static U128(e){return new n(e!=null?new xe(e):void 0)}static U256(e){return new n(e!=null?new fe(e):void 0)}static Bool(e){return new n(e!=null?new N(e):void 0)}static MoveString(e){return new n(e!=null?new x(e):void 0)}static deserialize(e,t){let r=S.deserialize(e,t);return new n(r.values[0])}};var _sha3 = require('@noble/hashes/sha3');var ut=class ut extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{data:t}=e,r=_chunkMVCKMP5Ujs.j.fromHexInput(t);if(r.toUint8Array().length!==ut.LENGTH)throw new Error(`Authentication Key length should be ${ut.LENGTH}`);this.data=r}serialize(e){e.serializeFixedBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeFixedBytes(ut.LENGTH);return new ut({data:t})}toUint8Array(){return this.data.toUint8Array()}static fromSchemeAndBytes(e){let{scheme:t,input:r}=e,i=_chunkMVCKMP5Ujs.j.fromHexInput(r).toUint8Array(),o=new Uint8Array([...i,t]),s=_sha3.sha3_256.create();s.update(o);let a=s.digest();return new ut({data:a})}static fromPublicKeyAndScheme(e){let{publicKey:t}=e;return t.authKey()}static fromPublicKey(e){let{publicKey:t}=e;return t.authKey()}derivedAddress(){return new (0, _chunkMVCKMP5Ujs.Z)(this.data.toUint8Array())}};ut.LENGTH=32;var B=ut;var St=class extends _chunkMVCKMP5Ujs.l{toUint8Array(){return this.bcsToBytes()}toString(){let e=this.toUint8Array();return _chunkMVCKMP5Ujs.j.fromHexInput(e).toString()}},oe= exports.AccountPublicKey =class extends St{};var M=class extends _chunkMVCKMP5Ujs.l{toUint8Array(){return this.bcsToBytes()}toString(){let e=this.toUint8Array();return _chunkMVCKMP5Ujs.j.fromHexInput(e).toString()}};var An=class n extends M{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e)}serialize(e){e.serializeBytes(this.value.toUint8Array())}static deserialize(e){return new n(e.deserializeBytes())}},ir= exports.AbstractPublicKey =class extends oe{constructor(e){super(),this.accountAddress=e}authKey(){return new B({data:this.accountAddress.toUint8Array()})}verifySignature(e){throw new Error("This function is not implemented for AbstractPublicKey.")}async verifySignatureAsync(e){throw new Error("This function is not implemented for AbstractPublicKey.")}serialize(e){throw new Error("This function is not implemented for AbstractPublicKey.")}};var _ed25519 = require('@noble/curves/ed25519');var _hmac = require('@noble/hashes/hmac');var _sha512 = require('@noble/hashes/sha512');var _bip39 = require('@scure/bip39'); var mo = _interopRequireWildcard(_bip39);var yc=/^m\/44'\/637'\/[0-9]+'\/[0-9]+'\/[0-9]+'?$/,fc= exports.APTOS_BIP44_REGEX =/^m\/44'\/637'\/[0-9]+'\/[0-9]+\/[0-9]+$/,Ac= exports.KeyType =(e=>(e.ED25519="ed25519 seed",e))(Ac||{}),yo= exports.HARDENED_OFFSET =2147483648;function fo(n){return fc.test(n)}function Ao(n){return yc.test(n)}var ei=(n,e)=>{let t=_hmac.hmac.create(_sha512.sha512,n).update(e).digest();return{key:t.slice(0,32),chainCode:t.slice(32)}},ho= exports.CKDPriv =({key:n,chainCode:e},t)=>{let r=new ArrayBuffer(4);new DataView(r).setUint32(0,t);let i=new Uint8Array(r),o=new Uint8Array([0]),s=new Uint8Array([...o,...n,...i]);return ei(e,s)},hc=n=>n.replace(/'/g,""),To= exports.splitPath =n=>n.split("/").slice(1).map(hc),or= exports.mnemonicToSeed =n=>{let e=n.trim().split(/\s+/).map(t=>t.toLowerCase()).join(" ");return mo.mnemonicToSeedSync(e)};var hn=class hn{static formatPrivateKey(e,t){let r=hn.AIP80_PREFIXES[t],i=e;return typeof i=="string"&&i.startsWith(r)&&(i=i.split("-")[2]),`${r}${_chunkMVCKMP5Ujs.j.fromHexInput(i).toString()}`}static parseHexInput(e,t,r){let i,o=hn.AIP80_PREFIXES[t];if(typeof e=="string")if(!r&&!e.startsWith(o))i=_chunkMVCKMP5Ujs.j.fromHexInput(e),r!==!1&&console.warn("[Aptos SDK] It is recommended that private keys are AIP-80 compliant (https://github.com/aptos-foundation/AIPs/blob/main/aips/aip-80.md). You can fix the private key by formatting it with `PrivateKey.formatPrivateKey(privateKey: string, type: 'ed25519' | 'secp256k1'): string`.");else if(e.startsWith(o))i=_chunkMVCKMP5Ujs.j.fromHexString(e.split("-")[2]);else throw r?new Error("Invalid HexString input while parsing private key. Must AIP-80 compliant string."):new Error("Invalid HexString input while parsing private key.");else i=_chunkMVCKMP5Ujs.j.fromHexInput(e);return i}};hn.AIP80_PREFIXES={ed25519:"ed25519-priv-",secp256k1:"secp256k1-priv-"};var pt=hn;var qt=n=>typeof n=="string"?_chunkMVCKMP5Ujs.j.isValid(n).valid?n:new TextEncoder().encode(n):n;var ti=[237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16];function Tc(n){let e=n.toUint8Array().slice(32);for(let t=ti.length-1;t>=0;t-=1){if(e[t]<ti[t])return!0;if(e[t]>ti[t])return!1}return!1}var dt=class dt extends oe{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==dt.LENGTH)throw new Error(`PublicKey length should be ${dt.LENGTH}`);this.key=t}verifySignature(e){let{message:t,signature:r}=e;if(!Tc(r))return!1;let i=qt(t),o=_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array(),s=r.toUint8Array(),a=this.key.toUint8Array();return _ed25519.ed25519.verify(s,o,a)}async verifySignatureAsync(e){return this.verifySignature(e)}authKey(){return B.fromSchemeAndBytes({scheme:0,input:this.toUint8Array()})}toUint8Array(){return this.key.toUint8Array()}serialize(e){e.serializeBytes(this.key.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new dt(t)}static isPublicKey(e){return e instanceof dt}static isInstance(e){return"key"in e&&_optionalChain([e, 'access', _2 => _2.key, 'optionalAccess', _3 => _3.data, 'optionalAccess', _4 => _4.length])===dt.LENGTH}};dt.LENGTH=32;var I=dt,Ae=class Ae extends _chunkMVCKMP5Ujs.l{constructor(e,t){super();let r=pt.parseHexInput(e,"ed25519",t);if(r.toUint8Array().length!==Ae.LENGTH)throw new Error(`PrivateKey length should be ${Ae.LENGTH}`);this.signingKey=r}static generate(){let e=_ed25519.ed25519.utils.randomPrivateKey();return new Ae(e,!1)}static fromDerivationPath(e,t){if(!Ao(e))throw new Error(`Invalid derivation path ${e}`);return Ae.fromDerivationPathInner(e,or(t))}static fromDerivationPathInner(e,t,r=yo){let{key:i,chainCode:o}=ei(Ae.SLIP_0010_SEED,t),s=To(e).map(c=>parseInt(c,10)),{key:a}=s.reduce((c,p)=>ho(c,p+r),{key:i,chainCode:o});return new Ae(a,!1)}publicKey(){let e=_ed25519.ed25519.getPublicKey(this.signingKey.toUint8Array());return new I(e)}sign(e){let t=qt(e),r=_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array(),i=_ed25519.ed25519.sign(r,this.signingKey.toUint8Array());return new K(i)}toUint8Array(){return this.signingKey.toUint8Array()}toString(){return this.toHexString()}toHexString(){return this.signingKey.toString()}toAIP80String(){return pt.formatPrivateKey(this.signingKey.toString(),"ed25519")}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new Ae(t,!1)}static isPrivateKey(e){return e instanceof Ae}};Ae.LENGTH=32,Ae.SLIP_0010_SEED="ed25519 seed";var q=Ae,$t=class $t extends M{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==$t.LENGTH)throw new Error(`Signature length should be ${$t.LENGTH}`);this.data=t}toUint8Array(){return this.data.toUint8Array()}serialize(e){e.serializeBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new $t(t)}};$t.LENGTH=64;var K=$t;var lt=class n extends St{constructor(e){super();let t=e.constructor.name;switch(t){case I.name:this.publicKey=e,this.variant=0;break;default:throw new Error(`Unsupported key for EphemeralPublicKey - ${t}`)}}verifySignature(e){let{message:t,signature:r}=e;return this.publicKey.verifySignature({message:t,signature:r.signature})}async verifySignatureAsync(e){return this.verifySignature(e)}serialize(e){if(this.publicKey instanceof I)e.serializeU32AsUleb128(0),this.publicKey.serialize(e);else throw new Error("Unknown public key type")}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(I.deserialize(e));default:throw new Error(`Unknown variant index for EphemeralPublicKey: ${t}`)}}static isPublicKey(e){return e instanceof n}},Ue= exports.EphemeralSignature =class n extends M{constructor(e){super();let t=e.constructor.name;switch(t){case K.name:this.signature=e;break;default:throw new Error(`Unsupported signature for EphemeralSignature - ${t}`)}}static fromHex(e){let t=_chunkMVCKMP5Ujs.j.fromHexInput(e),r=new R(t.toUint8Array());return n.deserialize(r)}serialize(e){if(this.signature instanceof K)e.serializeU32AsUleb128(0),this.signature.serialize(e);else throw new Error("Unknown signature type")}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(K.deserialize(e));default:throw new Error(`Unknown variant index for EphemeralSignature: ${t}`)}}};var _jwtdecode = require('jwt-decode');var _poseidonlite = require('poseidon-lite');var ni=[_poseidonlite.poseidon1,_poseidonlite.poseidon2,_poseidonlite.poseidon3,_poseidonlite.poseidon4,_poseidonlite.poseidon5,_poseidonlite.poseidon6,_poseidonlite.poseidon7,_poseidonlite.poseidon8,_poseidonlite.poseidon9,_poseidonlite.poseidon10,_poseidonlite.poseidon11,_poseidonlite.poseidon12,_poseidonlite.poseidon13,_poseidonlite.poseidon14,_poseidonlite.poseidon15,_poseidonlite.poseidon16],wo=31,zc=16,bo=(zc-1)*wo;function ke(n,e){let r=new TextEncoder().encode(n);return Fc(r,e)}function Fc(n,e){if(n.length>e)throw new Error(`Inputted bytes of length ${n} is longer than ${e}`);let t=Tn(n,e);return Pt(t)}function Oc(n,e){if(n.length>e)throw new Error(`Input bytes of length ${n} is longer than ${e}`);let t=Mc(n,e);return Gc(t)}function Tn(n,e){if(n.length>e)throw new Error(`Input bytes of length ${n} is longer than ${e}`);return Oc(n,e).concat([BigInt(n.length)])}function Gc(n){if(n.length>bo)throw new Error(`Can't pack more than ${bo}. Was given ${n.length} bytes`);return Bc(n,wo).map(e=>Et(e))}function Bc(n,e){let t=[];for(let r=0;r<n.length;r+=e)t.push(n.subarray(r,r+e));return t}function Et(n){let e=BigInt(0);for(let t=n.length-1;t>=0;t-=1)e=e<<BigInt(8)|BigInt(n[t]);return e}function ri(n,e){let t=BigInt(n),r=new Uint8Array(e);for(let i=0;i<e;i+=1)r[i]=Number(t&BigInt(255)),t>>=BigInt(8);return r}function Mc(n,e){if(e<n.length)throw new Error("Padded size must be greater than or equal to the input array size.");let t=new Uint8Array(e);t.set(n);for(let r=n.length;r<e;r+=1)t[r]=0;return t}function Pt(n){if(n.length>ni.length)throw new Error(`Unable to hash input of length ${n.length}. Max input length is ${ni.length}`);return ni[n.length-1](n)}var ar=class extends _chunkMVCKMP5Ujs.l{};var ii="1.37.0";var So={mainnet:"https://api.mainnet.aptoslabs.com/v1/graphql",testnet:"https://api.testnet.aptoslabs.com/v1/graphql",devnet:"https://api.devnet.aptoslabs.com/v1/graphql",local:"http://127.0.0.1:8090/v1/graphql"},Eo= exports.NetworkToNodeAPI ={mainnet:"https://api.mainnet.aptoslabs.com/v1",testnet:"https://api.testnet.aptoslabs.com/v1",devnet:"https://api.devnet.aptoslabs.com/v1",local:"http://127.0.0.1:8080/v1"},Po= exports.NetworkToFaucetAPI ={devnet:"https://faucet.devnet.aptoslabs.com",local:"http://127.0.0.1:8081"},oi= exports.NetworkToPepperAPI ={mainnet:"https://api.mainnet.aptoslabs.com/keyless/pepper/v0",testnet:"https://api.testnet.aptoslabs.com/keyless/pepper/v0",devnet:"https://api.devnet.aptoslabs.com/keyless/pepper/v0",local:"https://api.devnet.aptoslabs.com/keyless/pepper/v0"},si= exports.NetworkToProverAPI ={mainnet:"https://api.mainnet.aptoslabs.com/keyless/prover/v0",testnet:"https://api.testnet.aptoslabs.com/keyless/prover/v0",devnet:"https://api.devnet.aptoslabs.com/keyless/prover/v0",local:"https://api.devnet.aptoslabs.com/keyless/prover/v0"},ai= exports.Network =(o=>(o.MAINNET="mainnet",o.TESTNET="testnet",o.DEVNET="devnet",o.LOCAL="local",o.CUSTOM="custom",o))(ai||{}),ci= exports.NetworkToChainId ={mainnet:1,testnet:2,local:4},Rl= exports.NetworkToNetworkName ={mainnet:"mainnet",testnet:"testnet",devnet:"devnet",local:"local",custom:"custom"};var _t=(o=>(o.FULLNODE="Fullnode",o.INDEXER="Indexer",o.FAUCET="Faucet",o.PEPPER="Pepper",o.PROVER="Prover",o))(_t||{}),_o= exports.DEFAULT_MAX_GAS_AMOUNT =2e5,xo= exports.DEFAULT_TXN_EXP_SEC_FROM_NOW =20,cr= exports.DEFAULT_TXN_TIMEOUT_SEC =20,xt= exports.APTOS_COIN ="0x1::aptos_coin::AptosCoin",Io= exports.APTOS_FA ="0x000000000000000000000000000000000000000000000000000000000000000a",Co= exports.RAW_TRANSACTION_SALT ="APTOS::RawTransaction",ui= exports.RAW_TRANSACTION_WITH_DATA_SALT ="APTOS::RawTransactionWithData",He= exports.ProcessorType =(c=>(c.ACCOUNT_TRANSACTION_PROCESSOR="account_transactions_processor",c.DEFAULT="default_processor",c.EVENTS_PROCESSOR="events_processor",c.FUNGIBLE_ASSET_PROCESSOR="fungible_asset_processor",c.STAKE_PROCESSOR="stake_processor",c.TOKEN_V2_PROCESSOR="token_v2_processor",c.USER_TRANSACTION_PROCESSOR="user_transaction_processor",c.OBJECT_PROCESSOR="objects_processor",c))(He||{}),vo= exports.FIREBASE_AUTH_ISS_PATTERN =/^https:\/\/securetoken\.google\.com\/[a-zA-Z0-9-_]+$/;function Ko(n,e){let t=e.bcsToBytes(),r=new R(t);return n.deserialize(r)}var Vc=(s=>(s[s.API_ERROR=0]="API_ERROR",s[s.EXTERNAL_API_ERROR=1]="EXTERNAL_API_ERROR",s[s.SESSION_EXPIRED=2]="SESSION_EXPIRED",s[s.INVALID_STATE=3]="INVALID_STATE",s[s.INVALID_SIGNATURE=4]="INVALID_SIGNATURE",s[s.UNKNOWN=5]="UNKNOWN",s))(Vc||{}),Hc= exports.KeylessErrorResolutionTip =(p=>(p.REAUTHENTICATE="Re-authentiate to continue using your keyless account",p.REAUTHENTICATE_UNSURE="Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support",p.UPDATE_REQUEST_PARAMS="Update the invalid request parameters and reauthenticate.",p.RATE_LIMIT_EXCEEDED="Cache the keyless account and reuse it to avoid making too many requests. Keyless accounts are valid until either the EphemeralKeyPair expires, when the JWK is rotated, or when the proof verifying key is changed, whichever comes soonest.",p.SERVER_ERROR="Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p.CALL_PRECHECK="Call `await account.checkKeylessAccountValidity()` to wait for asyncronous changes and check for account validity before signing or serializing.",p.REINSTANTIATE="Try instantiating the account again. Avoid manipulating the account object directly",p.JOIN_SUPPORT_GROUP="For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p.UNKNOWN="Error unknown. For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p))(Hc||{}),ur= exports.KeylessErrorType =(y=>(y[y.EPHEMERAL_KEY_PAIR_EXPIRED=0]="EPHEMERAL_KEY_PAIR_EXPIRED",y[y.PROOF_NOT_FOUND=1]="PROOF_NOT_FOUND",y[y.ASYNC_PROOF_FETCH_FAILED=2]="ASYNC_PROOF_FETCH_FAILED",y[y.INVALID_PROOF_VERIFICATION_FAILED=3]="INVALID_PROOF_VERIFICATION_FAILED",y[y.INVALID_PROOF_VERIFICATION_KEY_NOT_FOUND=4]="INVALID_PROOF_VERIFICATION_KEY_NOT_FOUND",y[y.INVALID_JWT_SIG=5]="INVALID_JWT_SIG",y[y.INVALID_JWT_JWK_NOT_FOUND=6]="INVALID_JWT_JWK_NOT_FOUND",y[y.INVALID_JWT_ISS_NOT_RECOGNIZED=7]="INVALID_JWT_ISS_NOT_RECOGNIZED",y[y.INVALID_JWT_FEDERATED_ISS_NOT_SUPPORTED=8]="INVALID_JWT_FEDERATED_ISS_NOT_SUPPORTED",y[y.INVALID_TW_SIG_VERIFICATION_FAILED=9]="INVALID_TW_SIG_VERIFICATION_FAILED",y[y.INVALID_TW_SIG_PUBLIC_KEY_NOT_FOUND=10]="INVALID_TW_SIG_PUBLIC_KEY_NOT_FOUND",y[y.INVALID_EXPIRY_HORIZON=11]="INVALID_EXPIRY_HORIZON",y[y.JWT_PARSING_ERROR=12]="JWT_PARSING_ERROR",y[y.JWK_FETCH_FAILED=13]="JWK_FETCH_FAILED",y[y.JWK_FETCH_FAILED_FEDERATED=14]="JWK_FETCH_FAILED_FEDERATED",y[y.RATE_LIMIT_EXCEEDED=15]="RATE_LIMIT_EXCEEDED",y[y.PEPPER_SERVICE_INTERNAL_ERROR=16]="PEPPER_SERVICE_INTERNAL_ERROR",y[y.PEPPER_SERVICE_BAD_REQUEST=17]="PEPPER_SERVICE_BAD_REQUEST",y[y.PEPPER_SERVICE_OTHER=18]="PEPPER_SERVICE_OTHER",y[y.PROVER_SERVICE_INTERNAL_ERROR=19]="PROVER_SERVICE_INTERNAL_ERROR",y[y.PROVER_SERVICE_BAD_REQUEST=20]="PROVER_SERVICE_BAD_REQUEST",y[y.PROVER_SERVICE_OTHER=21]="PROVER_SERVICE_OTHER",y[y.FULL_NODE_CONFIG_LOOKUP_ERROR=22]="FULL_NODE_CONFIG_LOOKUP_ERROR",y[y.FULL_NODE_VERIFICATION_KEY_LOOKUP_ERROR=23]="FULL_NODE_VERIFICATION_KEY_LOOKUP_ERROR",y[y.FULL_NODE_JWKS_LOOKUP_ERROR=24]="FULL_NODE_JWKS_LOOKUP_ERROR",y[y.FULL_NODE_OTHER=25]="FULL_NODE_OTHER",y[y.SIGNATURE_TYPE_INVALID=26]="SIGNATURE_TYPE_INVALID",y[y.SIGNATURE_EXPIRED=27]="SIGNATURE_EXPIRED",y[y.MAX_EXPIRY_HORIZON_EXCEEDED=28]="MAX_EXPIRY_HORIZON_EXCEEDED",y[y.EPHEMERAL_SIGNATURE_VERIFICATION_FAILED=29]="EPHEMERAL_SIGNATURE_VERIFICATION_FAILED",y[y.TRAINING_WHEELS_SIGNATURE_MISSING=30]="TRAINING_WHEELS_SIGNATURE_MISSING",y[y.TRAINING_WHEELS_SIGNATURE_VERIFICATION_FAILED=31]="TRAINING_WHEELS_SIGNATURE_VERIFICATION_FAILED",y[y.PROOF_VERIFICATION_FAILED=32]="PROOF_VERIFICATION_FAILED",y[y.UNKNOWN=33]="UNKNOWN",y))(ur||{}),Ro={0:["The ephemeral keypair has expired.",2,"Re-authentiate to continue using your keyless account"],1:["The required proof could not be found.",3,"Call `await account.checkKeylessAccountValidity()` to wait for asyncronous changes and check for account validity before signing or serializing."],2:["The required proof failed to fetch.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],3:["The provided proof is invalid.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],4:["The verification key used to authenticate was updated.",2,"Re-authentiate to continue using your keyless account"],5:["The JWK was found, but JWT failed verification",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],6:["The JWK required to verify the JWT could not be found. The JWK may have been rotated out.",2,"Re-authentiate to continue using your keyless account"],7:["The JWT issuer is not recognized.",3,"Update the invalid request parameters and reauthenticate."],8:["The JWT issuer is not supported by the Federated Keyless ",0,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],9:["The training wheels signature is invalid.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],10:["The public key used to verify the training wheels signature was not found.",2,"Re-authentiate to continue using your keyless account"],11:["The expiry horizon is invalid.",2,"Re-authentiate to continue using your keyless account"],13:["Failed to fetch JWKS.",1,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],14:["Failed to fetch JWKS for Federated Keyless provider.",1,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],15:["Rate limit exceeded. Too many requests in a short period.",0,"Cache the keyless account and reuse it to avoid making too many requests. Keyless accounts are valid until either the EphemeralKeyPair expires, when the JWK is rotated, or when the proof verifying key is changed, whichever comes soonest."],16:["Internal error from Pepper service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],17:["Bad request sent to Pepper service.",0,"Update the invalid request parameters and reauthenticate."],18:["Unknown error from Pepper service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],19:["Internal error from Prover service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],20:["Bad request sent to Prover service.",0,"Update the invalid request parameters and reauthenticate."],21:["Unknown error from Prover service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],12:["Error when parsing JWT. This should never happen. Join https://t.me/+h5CN-W35yUFiYzkx for support",3,"Try instantiating the account again. Avoid manipulating the account object directly"],22:["Error when looking up on-chain keyless configuration.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],23:["Error when looking up on-chain verification key.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],24:["Error when looking up on-chain JWKS.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],25:["Unknown error from full node.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],26:["The signature is not a valid Keyless signature.",4,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],27:["The ephemeral key pair used to sign the message has expired.",4,"Re-authentiate to continue using your keyless account"],28:["The expiry horizon on the signature exceeds the maximum allowed value.",4,"Re-authentiate to continue using your keyless account"],29:["Failed to verify the ephemeral signature with the ephemeral public key.",4,"Re-authentiate to continue using your keyless account"],30:["The training wheels signature is missing but is required by the Keyless configuration.",4,"Re-authentiate to continue using your keyless account"],31:["Failed to verify the training wheels signature with the training wheels public key.",4,"Re-authentiate to continue using your keyless account"],32:["The proof verification failed.",4,"Re-authentiate to continue using your keyless account"],33:["An unknown error has occurred.",5,"Error unknown. For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"]},P= exports.KeylessError =class n extends Error{constructor(e){let{innerError:t,category:r,resolutionTip:i,type:o,message:s=Ro[o][0],details:a}=e;super(s),this.name="KeylessError",this.innerError=t,this.category=r,this.resolutionTip=i,this.type=o,this.details=a,this.message=n.constructMessage(s,i,t,a)}static constructMessage(e,t,r,i){let o=`
1
+ "use strict";Object.defineProperty(exports, "__esModule", {value: true}); function _interopRequireWildcard(obj) { if (obj && obj.__esModule) { return obj; } else { var newObj = {}; if (obj != null) { for (var key in obj) { if (Object.prototype.hasOwnProperty.call(obj, key)) { newObj[key] = obj[key]; } } } newObj.default = obj; return newObj; } } function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; } function _nullishCoalesce(lhs, rhsFn) { if (lhs != null) { return lhs; } else { return rhsFn(); } } function _optionalChain(ops) { let lastAccessLHS = undefined; let value = ops[0]; let i = 1; while (i < ops.length) { const op = ops[i]; const fn = ops[i + 1]; i += 2; if ((op === 'optionalAccess' || op === 'optionalCall') && value == null) { return undefined; } if (op === 'access' || op === 'optionalAccess') { lastAccessLHS = value; value = fn(value); } else if (op === 'call' || op === 'optionalCall') { value = fn((...args) => value.call(lastAccessLHS, ...args)); lastAccessLHS = undefined; } } return value; } function _optionalChainDelete(ops) { const result = _optionalChain(ops); return result == null ? true : result; }var _chunkMVCKMP5Ujs = require('./chunk-MVCKMP5U.js');var R=class n{constructor(e){this.buffer=new ArrayBuffer(e.length),new Uint8Array(this.buffer).set(e,0),this.offset=0}static fromHex(e){let t=_chunkMVCKMP5Ujs.j.hexInputToUint8Array(e);return new n(t)}read(e){if(this.offset+e>this.buffer.byteLength)throw new Error("Reached to the end of buffer");let t=this.buffer.slice(this.offset,this.offset+e);return this.offset+=e,t}remaining(){return this.buffer.byteLength-this.offset}deserializeStr(){let e=this.deserializeBytes();return new TextDecoder().decode(e)}deserializeOptionStr(){return this.deserializeOption("string")}deserializeOption(e,t){if(this.deserializeBool()){if(e==="string")return this.deserializeStr();if(e==="bytes")return this.deserializeBytes();if(e==="fixedBytes"){if(t===void 0)throw new Error("Fixed bytes length not provided");return this.deserializeFixedBytes(t)}return this.deserialize(e)}}deserializeBytes(){let e=this.deserializeUleb128AsU32();return new Uint8Array(this.read(e))}deserializeFixedBytes(e){return new Uint8Array(this.read(e))}deserializeBool(){let e=new Uint8Array(this.read(1))[0];if(e!==1&&e!==0)throw new Error("Invalid boolean value");return e===1}deserializeU8(){return new DataView(this.read(1)).getUint8(0)}deserializeU16(){return new DataView(this.read(2)).getUint16(0,!0)}deserializeU32(){return new DataView(this.read(4)).getUint32(0,!0)}deserializeU64(){let e=this.deserializeU32(),t=this.deserializeU32();return BigInt(BigInt(t)<<BigInt(32)|BigInt(e))}deserializeU128(){let e=this.deserializeU64(),t=this.deserializeU64();return BigInt(t<<BigInt(64)|e)}deserializeU256(){let e=this.deserializeU128(),t=this.deserializeU128();return BigInt(t<<BigInt(128)|e)}deserializeUleb128AsU32(){let e=BigInt(0),t=0;for(;e<_chunkMVCKMP5Ujs.d;){let r=this.deserializeU8();if(e|=BigInt(r&127)<<BigInt(t),(r&128)===0)break;t+=7}if(e>_chunkMVCKMP5Ujs.d)throw new Error("Overflow while parsing uleb128-encoded uint32 value");return Number(e)}deserialize(e){return e.deserialize(this)}deserializeVector(e){let t=this.deserializeUleb128AsU32(),r=new Array;for(let i=0;i<t;i+=1)r.push(this.deserialize(e));return r}};var Ee=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array()}serialize(e){e.serializeFixedBytes(this.value)}serializeForEntryFunction(e){e.serialize(this)}serializeForScriptFunction(e){e.serialize(this)}static deserialize(e,t){let r=e.deserializeFixedBytes(t);return new n(r)}};var rr=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=new Ee(e)}serialize(e){e.serialize(this.value)}serializeForEntryFunction(e){e.serializeU32AsUleb128(this.value.value.length),e.serialize(this)}static deserialize(e,t){let r=Ee.deserialize(e,t);return new n(r.value)}};var N=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.n.call(void 0, e),this.value=e}serialize(e){e.serializeBool(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(5),e.serialize(this)}deserialize(e){return new fe(e.deserializeU256())}static deserialize(e){return new n(e.deserializeBool())}},Y= exports.U8 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.b),this.value=e}serialize(e){e.serializeU8(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(0),e.serialize(this)}static deserialize(e){return new n(e.deserializeU8())}},Pe= exports.U16 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.c),this.value=e}serialize(e){e.serializeU16(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(6),e.serialize(this)}static deserialize(e){return new n(e.deserializeU16())}},_e= exports.U32 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,0,_chunkMVCKMP5Ujs.d),this.value=e}serialize(e){e.serializeU32(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(7),e.serialize(this)}static deserialize(e){return new n(e.deserializeU32())}},Q= exports.U64 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.e),this.value=BigInt(e)}serialize(e){e.serializeU64(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(1),e.serialize(this)}static deserialize(e){return new n(e.deserializeU64())}},xe= exports.U128 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.f),this.value=BigInt(e)}serialize(e){e.serializeU128(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(2),e.serialize(this)}static deserialize(e){return new n(e.deserializeU128())}},fe= exports.U256 =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),_chunkMVCKMP5Ujs.p.call(void 0, e,BigInt(0),_chunkMVCKMP5Ujs.g),this.value=BigInt(e)}serialize(e){e.serializeU256(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){e.serializeU32AsUleb128(8),e.serialize(this)}static deserialize(e){return new n(e.deserializeU256())}};var S=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.values=e}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){if(this.values[0]!==void 0&&!(this.values[0]instanceof Y)){new fn(this.bcsToBytes()).serializeForScriptFunction(e);return}e.serializeU32AsUleb128(4),e.serialize(this)}static U8(e){let t;if(Array.isArray(e)&&e.length===0)t=[];else if(Array.isArray(e)&&typeof e[0]=="number")t=e;else if(typeof e=="string"){let r=_chunkMVCKMP5Ujs.j.fromHexInput(e);t=Array.from(r.toUint8Array())}else if(e instanceof Uint8Array)t=Array.from(e);else throw new Error("Invalid input type, must be an number[], Uint8Array, or hex string");return new n(t.map(r=>new Y(r)))}static U16(e){return new n(e.map(t=>new Pe(t)))}static U32(e){return new n(e.map(t=>new _e(t)))}static U64(e){return new n(e.map(t=>new Q(t)))}static U128(e){return new n(e.map(t=>new xe(t)))}static U256(e){return new n(e.map(t=>new fe(t)))}static Bool(e){return new n(e.map(t=>new N(t)))}static MoveString(e){return new n(e.map(t=>new x(t)))}serialize(e){e.serializeVector(this.values)}static deserialize(e,t){let r=e.deserializeUleb128AsU32(),i=new Array;for(let o=0;o<r;o+=1)i.push(t.deserialize(e));return new n(i)}},fn= exports.Serialized =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array()}serialize(e){e.serializeBytes(this.value)}serializeForEntryFunction(e){this.serialize(e)}serializeForScriptFunction(e){e.serializeU32AsUleb128(9),this.serialize(e)}static deserialize(e){return new n(e.deserializeBytes())}toMoveVector(e){let t=new R(this.bcsToBytes());t.deserializeUleb128AsU32();let r=t.deserializeVector(e);return new S(r)}},x= exports.MoveString =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.value=e}serialize(e){e.serializeStr(this.value)}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}serializeForScriptFunction(e){let r=new TextEncoder().encode(this.value);S.U8(r).serializeForScriptFunction(e)}static deserialize(e){return new n(e.deserializeStr())}},Z= exports.MoveOption =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),typeof e<"u"&&e!==null?this.vec=new S([e]):this.vec=new S([]),[this.value]=this.vec.values}serializeForEntryFunction(e){let t=this.bcsToBytes();e.serializeBytes(t)}unwrap(){if(this.isSome())return this.vec.values[0];throw new Error("Called unwrap on a MoveOption with no value")}isSome(){return this.vec.values.length===1}serialize(e){this.vec.serialize(e)}static U8(e){return new n(e!=null?new Y(e):void 0)}static U16(e){return new n(e!=null?new Pe(e):void 0)}static U32(e){return new n(e!=null?new _e(e):void 0)}static U64(e){return new n(e!=null?new Q(e):void 0)}static U128(e){return new n(e!=null?new xe(e):void 0)}static U256(e){return new n(e!=null?new fe(e):void 0)}static Bool(e){return new n(e!=null?new N(e):void 0)}static MoveString(e){return new n(e!=null?new x(e):void 0)}static deserialize(e,t){let r=S.deserialize(e,t);return new n(r.values[0])}};var _sha3 = require('@noble/hashes/sha3');var ut=class ut extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{data:t}=e,r=_chunkMVCKMP5Ujs.j.fromHexInput(t);if(r.toUint8Array().length!==ut.LENGTH)throw new Error(`Authentication Key length should be ${ut.LENGTH}`);this.data=r}serialize(e){e.serializeFixedBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeFixedBytes(ut.LENGTH);return new ut({data:t})}toUint8Array(){return this.data.toUint8Array()}static fromSchemeAndBytes(e){let{scheme:t,input:r}=e,i=_chunkMVCKMP5Ujs.j.fromHexInput(r).toUint8Array(),o=new Uint8Array([...i,t]),s=_sha3.sha3_256.create();s.update(o);let a=s.digest();return new ut({data:a})}static fromPublicKeyAndScheme(e){let{publicKey:t}=e;return t.authKey()}static fromPublicKey(e){let{publicKey:t}=e;return t.authKey()}derivedAddress(){return new (0, _chunkMVCKMP5Ujs.Z)(this.data.toUint8Array())}};ut.LENGTH=32;var B=ut;var St=class extends _chunkMVCKMP5Ujs.l{toUint8Array(){return this.bcsToBytes()}toString(){let e=this.toUint8Array();return _chunkMVCKMP5Ujs.j.fromHexInput(e).toString()}},oe= exports.AccountPublicKey =class extends St{};var M=class extends _chunkMVCKMP5Ujs.l{toUint8Array(){return this.bcsToBytes()}toString(){let e=this.toUint8Array();return _chunkMVCKMP5Ujs.j.fromHexInput(e).toString()}};var An=class n extends M{constructor(e){super(),this.value=_chunkMVCKMP5Ujs.j.fromHexInput(e)}serialize(e){e.serializeBytes(this.value.toUint8Array())}static deserialize(e){return new n(e.deserializeBytes())}},ir= exports.AbstractPublicKey =class extends oe{constructor(e){super(),this.accountAddress=e}authKey(){return new B({data:this.accountAddress.toUint8Array()})}verifySignature(e){throw new Error("This function is not implemented for AbstractPublicKey.")}async verifySignatureAsync(e){throw new Error("This function is not implemented for AbstractPublicKey.")}serialize(e){throw new Error("This function is not implemented for AbstractPublicKey.")}};var _ed25519 = require('@noble/curves/ed25519');var _hmac = require('@noble/hashes/hmac');var _sha512 = require('@noble/hashes/sha512');var _bip39 = require('@scure/bip39'); var mo = _interopRequireWildcard(_bip39);var yc=/^m\/44'\/637'\/[0-9]+'\/[0-9]+'\/[0-9]+'?$/,fc= exports.APTOS_BIP44_REGEX =/^m\/44'\/637'\/[0-9]+'\/[0-9]+\/[0-9]+$/,Ac= exports.KeyType =(e=>(e.ED25519="ed25519 seed",e))(Ac||{}),yo= exports.HARDENED_OFFSET =2147483648;function fo(n){return fc.test(n)}function Ao(n){return yc.test(n)}var ei=(n,e)=>{let t=_hmac.hmac.create(_sha512.sha512,n).update(e).digest();return{key:t.slice(0,32),chainCode:t.slice(32)}},ho= exports.CKDPriv =({key:n,chainCode:e},t)=>{let r=new ArrayBuffer(4);new DataView(r).setUint32(0,t);let i=new Uint8Array(r),o=new Uint8Array([0]),s=new Uint8Array([...o,...n,...i]);return ei(e,s)},hc=n=>n.replace(/'/g,""),To= exports.splitPath =n=>n.split("/").slice(1).map(hc),or= exports.mnemonicToSeed =n=>{let e=n.trim().split(/\s+/).map(t=>t.toLowerCase()).join(" ");return mo.mnemonicToSeedSync(e)};var hn=class hn{static formatPrivateKey(e,t){let r=hn.AIP80_PREFIXES[t],i=e;return typeof i=="string"&&i.startsWith(r)&&(i=i.split("-")[2]),`${r}${_chunkMVCKMP5Ujs.j.fromHexInput(i).toString()}`}static parseHexInput(e,t,r){let i,o=hn.AIP80_PREFIXES[t];if(typeof e=="string")if(!r&&!e.startsWith(o))i=_chunkMVCKMP5Ujs.j.fromHexInput(e),r!==!1&&console.warn("[Aptos SDK] It is recommended that private keys are AIP-80 compliant (https://github.com/aptos-foundation/AIPs/blob/main/aips/aip-80.md). You can fix the private key by formatting it with `PrivateKey.formatPrivateKey(privateKey: string, type: 'ed25519' | 'secp256k1'): string`.");else if(e.startsWith(o))i=_chunkMVCKMP5Ujs.j.fromHexString(e.split("-")[2]);else throw r?new Error("Invalid HexString input while parsing private key. Must AIP-80 compliant string."):new Error("Invalid HexString input while parsing private key.");else i=_chunkMVCKMP5Ujs.j.fromHexInput(e);return i}};hn.AIP80_PREFIXES={ed25519:"ed25519-priv-",secp256k1:"secp256k1-priv-"};var pt=hn;var qt=n=>typeof n=="string"?_chunkMVCKMP5Ujs.j.isValid(n).valid?n:new TextEncoder().encode(n):n;var ti=[237,211,245,92,26,99,18,88,214,156,247,162,222,249,222,20,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,16];function Tc(n){let e=n.toUint8Array().slice(32);for(let t=ti.length-1;t>=0;t-=1){if(e[t]<ti[t])return!0;if(e[t]>ti[t])return!1}return!1}var dt=class dt extends oe{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==dt.LENGTH)throw new Error(`PublicKey length should be ${dt.LENGTH}`);this.key=t}verifySignature(e){let{message:t,signature:r}=e;if(!Tc(r))return!1;let i=qt(t),o=_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array(),s=r.toUint8Array(),a=this.key.toUint8Array();return _ed25519.ed25519.verify(s,o,a)}async verifySignatureAsync(e){return this.verifySignature(e)}authKey(){return B.fromSchemeAndBytes({scheme:0,input:this.toUint8Array()})}toUint8Array(){return this.key.toUint8Array()}serialize(e){e.serializeBytes(this.key.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new dt(t)}static isPublicKey(e){return e instanceof dt}static isInstance(e){return"key"in e&&_optionalChain([e, 'access', _2 => _2.key, 'optionalAccess', _3 => _3.data, 'optionalAccess', _4 => _4.length])===dt.LENGTH}};dt.LENGTH=32;var I=dt,Ae=class Ae extends _chunkMVCKMP5Ujs.l{constructor(e,t){super();let r=pt.parseHexInput(e,"ed25519",t);if(r.toUint8Array().length!==Ae.LENGTH)throw new Error(`PrivateKey length should be ${Ae.LENGTH}`);this.signingKey=r}static generate(){let e=_ed25519.ed25519.utils.randomPrivateKey();return new Ae(e,!1)}static fromDerivationPath(e,t){if(!Ao(e))throw new Error(`Invalid derivation path ${e}`);return Ae.fromDerivationPathInner(e,or(t))}static fromDerivationPathInner(e,t,r=yo){let{key:i,chainCode:o}=ei(Ae.SLIP_0010_SEED,t),s=To(e).map(c=>parseInt(c,10)),{key:a}=s.reduce((c,p)=>ho(c,p+r),{key:i,chainCode:o});return new Ae(a,!1)}publicKey(){let e=_ed25519.ed25519.getPublicKey(this.signingKey.toUint8Array());return new I(e)}sign(e){let t=qt(e),r=_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array(),i=_ed25519.ed25519.sign(r,this.signingKey.toUint8Array());return new K(i)}toUint8Array(){return this.signingKey.toUint8Array()}toString(){return this.toHexString()}toHexString(){return this.signingKey.toString()}toAIP80String(){return pt.formatPrivateKey(this.signingKey.toString(),"ed25519")}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new Ae(t,!1)}static isPrivateKey(e){return e instanceof Ae}};Ae.LENGTH=32,Ae.SLIP_0010_SEED="ed25519 seed";var q=Ae,$t=class $t extends M{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==$t.LENGTH)throw new Error(`Signature length should be ${$t.LENGTH}`);this.data=t}toUint8Array(){return this.data.toUint8Array()}serialize(e){e.serializeBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new $t(t)}};$t.LENGTH=64;var K=$t;var lt=class n extends St{constructor(e){super();let t=e.constructor.name;switch(t){case I.name:this.publicKey=e,this.variant=0;break;default:throw new Error(`Unsupported key for EphemeralPublicKey - ${t}`)}}verifySignature(e){let{message:t,signature:r}=e;return this.publicKey.verifySignature({message:t,signature:r.signature})}async verifySignatureAsync(e){return this.verifySignature(e)}serialize(e){if(this.publicKey instanceof I)e.serializeU32AsUleb128(0),this.publicKey.serialize(e);else throw new Error("Unknown public key type")}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(I.deserialize(e));default:throw new Error(`Unknown variant index for EphemeralPublicKey: ${t}`)}}static isPublicKey(e){return e instanceof n}},Ue= exports.EphemeralSignature =class n extends M{constructor(e){super();let t=e.constructor.name;switch(t){case K.name:this.signature=e;break;default:throw new Error(`Unsupported signature for EphemeralSignature - ${t}`)}}static fromHex(e){let t=_chunkMVCKMP5Ujs.j.fromHexInput(e),r=new R(t.toUint8Array());return n.deserialize(r)}serialize(e){if(this.signature instanceof K)e.serializeU32AsUleb128(0),this.signature.serialize(e);else throw new Error("Unknown signature type")}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(K.deserialize(e));default:throw new Error(`Unknown variant index for EphemeralSignature: ${t}`)}}};var _jwtdecode = require('jwt-decode');var _poseidonlite = require('poseidon-lite');var ni=[_poseidonlite.poseidon1,_poseidonlite.poseidon2,_poseidonlite.poseidon3,_poseidonlite.poseidon4,_poseidonlite.poseidon5,_poseidonlite.poseidon6,_poseidonlite.poseidon7,_poseidonlite.poseidon8,_poseidonlite.poseidon9,_poseidonlite.poseidon10,_poseidonlite.poseidon11,_poseidonlite.poseidon12,_poseidonlite.poseidon13,_poseidonlite.poseidon14,_poseidonlite.poseidon15,_poseidonlite.poseidon16],wo=31,zc=16,bo=(zc-1)*wo;function ke(n,e){let r=new TextEncoder().encode(n);return Fc(r,e)}function Fc(n,e){if(n.length>e)throw new Error(`Inputted bytes of length ${n} is longer than ${e}`);let t=Tn(n,e);return Pt(t)}function Oc(n,e){if(n.length>e)throw new Error(`Input bytes of length ${n} is longer than ${e}`);let t=Mc(n,e);return Gc(t)}function Tn(n,e){if(n.length>e)throw new Error(`Input bytes of length ${n} is longer than ${e}`);return Oc(n,e).concat([BigInt(n.length)])}function Gc(n){if(n.length>bo)throw new Error(`Can't pack more than ${bo}. Was given ${n.length} bytes`);return Bc(n,wo).map(e=>Et(e))}function Bc(n,e){let t=[];for(let r=0;r<n.length;r+=e)t.push(n.subarray(r,r+e));return t}function Et(n){let e=BigInt(0);for(let t=n.length-1;t>=0;t-=1)e=e<<BigInt(8)|BigInt(n[t]);return e}function ri(n,e){let t=BigInt(n),r=new Uint8Array(e);for(let i=0;i<e;i+=1)r[i]=Number(t&BigInt(255)),t>>=BigInt(8);return r}function Mc(n,e){if(e<n.length)throw new Error("Padded size must be greater than or equal to the input array size.");let t=new Uint8Array(e);t.set(n);for(let r=n.length;r<e;r+=1)t[r]=0;return t}function Pt(n){if(n.length>ni.length)throw new Error(`Unable to hash input of length ${n.length}. Max input length is ${ni.length}`);return ni[n.length-1](n)}var ar=class extends _chunkMVCKMP5Ujs.l{};var ii="1.37.1";var So={mainnet:"https://api.mainnet.aptoslabs.com/v1/graphql",testnet:"https://api.testnet.aptoslabs.com/v1/graphql",devnet:"https://api.devnet.aptoslabs.com/v1/graphql",local:"http://127.0.0.1:8090/v1/graphql"},Eo= exports.NetworkToNodeAPI ={mainnet:"https://api.mainnet.aptoslabs.com/v1",testnet:"https://api.testnet.aptoslabs.com/v1",devnet:"https://api.devnet.aptoslabs.com/v1",local:"http://127.0.0.1:8080/v1"},Po= exports.NetworkToFaucetAPI ={devnet:"https://faucet.devnet.aptoslabs.com",local:"http://127.0.0.1:8081"},oi= exports.NetworkToPepperAPI ={mainnet:"https://api.mainnet.aptoslabs.com/keyless/pepper/v0",testnet:"https://api.testnet.aptoslabs.com/keyless/pepper/v0",devnet:"https://api.devnet.aptoslabs.com/keyless/pepper/v0",local:"https://api.devnet.aptoslabs.com/keyless/pepper/v0"},si= exports.NetworkToProverAPI ={mainnet:"https://api.mainnet.aptoslabs.com/keyless/prover/v0",testnet:"https://api.testnet.aptoslabs.com/keyless/prover/v0",devnet:"https://api.devnet.aptoslabs.com/keyless/prover/v0",local:"https://api.devnet.aptoslabs.com/keyless/prover/v0"},ai= exports.Network =(o=>(o.MAINNET="mainnet",o.TESTNET="testnet",o.DEVNET="devnet",o.LOCAL="local",o.CUSTOM="custom",o))(ai||{}),ci= exports.NetworkToChainId ={mainnet:1,testnet:2,local:4},Rl= exports.NetworkToNetworkName ={mainnet:"mainnet",testnet:"testnet",devnet:"devnet",local:"local",custom:"custom"};var _t=(o=>(o.FULLNODE="Fullnode",o.INDEXER="Indexer",o.FAUCET="Faucet",o.PEPPER="Pepper",o.PROVER="Prover",o))(_t||{}),_o= exports.DEFAULT_MAX_GAS_AMOUNT =2e5,xo= exports.DEFAULT_TXN_EXP_SEC_FROM_NOW =20,cr= exports.DEFAULT_TXN_TIMEOUT_SEC =20,xt= exports.APTOS_COIN ="0x1::aptos_coin::AptosCoin",Io= exports.APTOS_FA ="0x000000000000000000000000000000000000000000000000000000000000000a",Co= exports.RAW_TRANSACTION_SALT ="APTOS::RawTransaction",ui= exports.RAW_TRANSACTION_WITH_DATA_SALT ="APTOS::RawTransactionWithData",He= exports.ProcessorType =(c=>(c.ACCOUNT_TRANSACTION_PROCESSOR="account_transactions_processor",c.DEFAULT="default_processor",c.EVENTS_PROCESSOR="events_processor",c.FUNGIBLE_ASSET_PROCESSOR="fungible_asset_processor",c.STAKE_PROCESSOR="stake_processor",c.TOKEN_V2_PROCESSOR="token_v2_processor",c.USER_TRANSACTION_PROCESSOR="user_transaction_processor",c.OBJECT_PROCESSOR="objects_processor",c))(He||{}),vo= exports.FIREBASE_AUTH_ISS_PATTERN =/^https:\/\/securetoken\.google\.com\/[a-zA-Z0-9-_]+$/;function Ko(n,e){let t=e.bcsToBytes(),r=new R(t);return n.deserialize(r)}var Vc=(s=>(s[s.API_ERROR=0]="API_ERROR",s[s.EXTERNAL_API_ERROR=1]="EXTERNAL_API_ERROR",s[s.SESSION_EXPIRED=2]="SESSION_EXPIRED",s[s.INVALID_STATE=3]="INVALID_STATE",s[s.INVALID_SIGNATURE=4]="INVALID_SIGNATURE",s[s.UNKNOWN=5]="UNKNOWN",s))(Vc||{}),Hc= exports.KeylessErrorResolutionTip =(p=>(p.REAUTHENTICATE="Re-authentiate to continue using your keyless account",p.REAUTHENTICATE_UNSURE="Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support",p.UPDATE_REQUEST_PARAMS="Update the invalid request parameters and reauthenticate.",p.RATE_LIMIT_EXCEEDED="Cache the keyless account and reuse it to avoid making too many requests. Keyless accounts are valid until either the EphemeralKeyPair expires, when the JWK is rotated, or when the proof verifying key is changed, whichever comes soonest.",p.SERVER_ERROR="Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p.CALL_PRECHECK="Call `await account.checkKeylessAccountValidity()` to wait for asyncronous changes and check for account validity before signing or serializing.",p.REINSTANTIATE="Try instantiating the account again. Avoid manipulating the account object directly",p.JOIN_SUPPORT_GROUP="For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p.UNKNOWN="Error unknown. For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx",p))(Hc||{}),ur= exports.KeylessErrorType =(y=>(y[y.EPHEMERAL_KEY_PAIR_EXPIRED=0]="EPHEMERAL_KEY_PAIR_EXPIRED",y[y.PROOF_NOT_FOUND=1]="PROOF_NOT_FOUND",y[y.ASYNC_PROOF_FETCH_FAILED=2]="ASYNC_PROOF_FETCH_FAILED",y[y.INVALID_PROOF_VERIFICATION_FAILED=3]="INVALID_PROOF_VERIFICATION_FAILED",y[y.INVALID_PROOF_VERIFICATION_KEY_NOT_FOUND=4]="INVALID_PROOF_VERIFICATION_KEY_NOT_FOUND",y[y.INVALID_JWT_SIG=5]="INVALID_JWT_SIG",y[y.INVALID_JWT_JWK_NOT_FOUND=6]="INVALID_JWT_JWK_NOT_FOUND",y[y.INVALID_JWT_ISS_NOT_RECOGNIZED=7]="INVALID_JWT_ISS_NOT_RECOGNIZED",y[y.INVALID_JWT_FEDERATED_ISS_NOT_SUPPORTED=8]="INVALID_JWT_FEDERATED_ISS_NOT_SUPPORTED",y[y.INVALID_TW_SIG_VERIFICATION_FAILED=9]="INVALID_TW_SIG_VERIFICATION_FAILED",y[y.INVALID_TW_SIG_PUBLIC_KEY_NOT_FOUND=10]="INVALID_TW_SIG_PUBLIC_KEY_NOT_FOUND",y[y.INVALID_EXPIRY_HORIZON=11]="INVALID_EXPIRY_HORIZON",y[y.JWT_PARSING_ERROR=12]="JWT_PARSING_ERROR",y[y.JWK_FETCH_FAILED=13]="JWK_FETCH_FAILED",y[y.JWK_FETCH_FAILED_FEDERATED=14]="JWK_FETCH_FAILED_FEDERATED",y[y.RATE_LIMIT_EXCEEDED=15]="RATE_LIMIT_EXCEEDED",y[y.PEPPER_SERVICE_INTERNAL_ERROR=16]="PEPPER_SERVICE_INTERNAL_ERROR",y[y.PEPPER_SERVICE_BAD_REQUEST=17]="PEPPER_SERVICE_BAD_REQUEST",y[y.PEPPER_SERVICE_OTHER=18]="PEPPER_SERVICE_OTHER",y[y.PROVER_SERVICE_INTERNAL_ERROR=19]="PROVER_SERVICE_INTERNAL_ERROR",y[y.PROVER_SERVICE_BAD_REQUEST=20]="PROVER_SERVICE_BAD_REQUEST",y[y.PROVER_SERVICE_OTHER=21]="PROVER_SERVICE_OTHER",y[y.FULL_NODE_CONFIG_LOOKUP_ERROR=22]="FULL_NODE_CONFIG_LOOKUP_ERROR",y[y.FULL_NODE_VERIFICATION_KEY_LOOKUP_ERROR=23]="FULL_NODE_VERIFICATION_KEY_LOOKUP_ERROR",y[y.FULL_NODE_JWKS_LOOKUP_ERROR=24]="FULL_NODE_JWKS_LOOKUP_ERROR",y[y.FULL_NODE_OTHER=25]="FULL_NODE_OTHER",y[y.SIGNATURE_TYPE_INVALID=26]="SIGNATURE_TYPE_INVALID",y[y.SIGNATURE_EXPIRED=27]="SIGNATURE_EXPIRED",y[y.MAX_EXPIRY_HORIZON_EXCEEDED=28]="MAX_EXPIRY_HORIZON_EXCEEDED",y[y.EPHEMERAL_SIGNATURE_VERIFICATION_FAILED=29]="EPHEMERAL_SIGNATURE_VERIFICATION_FAILED",y[y.TRAINING_WHEELS_SIGNATURE_MISSING=30]="TRAINING_WHEELS_SIGNATURE_MISSING",y[y.TRAINING_WHEELS_SIGNATURE_VERIFICATION_FAILED=31]="TRAINING_WHEELS_SIGNATURE_VERIFICATION_FAILED",y[y.PROOF_VERIFICATION_FAILED=32]="PROOF_VERIFICATION_FAILED",y[y.UNKNOWN=33]="UNKNOWN",y))(ur||{}),Ro={0:["The ephemeral keypair has expired.",2,"Re-authentiate to continue using your keyless account"],1:["The required proof could not be found.",3,"Call `await account.checkKeylessAccountValidity()` to wait for asyncronous changes and check for account validity before signing or serializing."],2:["The required proof failed to fetch.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],3:["The provided proof is invalid.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],4:["The verification key used to authenticate was updated.",2,"Re-authentiate to continue using your keyless account"],5:["The JWK was found, but JWT failed verification",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],6:["The JWK required to verify the JWT could not be found. The JWK may have been rotated out.",2,"Re-authentiate to continue using your keyless account"],7:["The JWT issuer is not recognized.",3,"Update the invalid request parameters and reauthenticate."],8:["The JWT issuer is not supported by the Federated Keyless ",0,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],9:["The training wheels signature is invalid.",3,"Try re-authentiating. If the error persists join the telegram group at https://t.me/+h5CN-W35yUFiYzkx for further support"],10:["The public key used to verify the training wheels signature was not found.",2,"Re-authentiate to continue using your keyless account"],11:["The expiry horizon is invalid.",2,"Re-authentiate to continue using your keyless account"],13:["Failed to fetch JWKS.",1,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],14:["Failed to fetch JWKS for Federated Keyless provider.",1,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],15:["Rate limit exceeded. Too many requests in a short period.",0,"Cache the keyless account and reuse it to avoid making too many requests. Keyless accounts are valid until either the EphemeralKeyPair expires, when the JWK is rotated, or when the proof verifying key is changed, whichever comes soonest."],16:["Internal error from Pepper service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],17:["Bad request sent to Pepper service.",0,"Update the invalid request parameters and reauthenticate."],18:["Unknown error from Pepper service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],19:["Internal error from Prover service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],20:["Bad request sent to Prover service.",0,"Update the invalid request parameters and reauthenticate."],21:["Unknown error from Prover service.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],12:["Error when parsing JWT. This should never happen. Join https://t.me/+h5CN-W35yUFiYzkx for support",3,"Try instantiating the account again. Avoid manipulating the account object directly"],22:["Error when looking up on-chain keyless configuration.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],23:["Error when looking up on-chain verification key.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],24:["Error when looking up on-chain JWKS.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],25:["Unknown error from full node.",0,"Try again later. See aptosApiError error for more context. For additional support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],26:["The signature is not a valid Keyless signature.",4,"For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"],27:["The ephemeral key pair used to sign the message has expired.",4,"Re-authentiate to continue using your keyless account"],28:["The expiry horizon on the signature exceeds the maximum allowed value.",4,"Re-authentiate to continue using your keyless account"],29:["Failed to verify the ephemeral signature with the ephemeral public key.",4,"Re-authentiate to continue using your keyless account"],30:["The training wheels signature is missing but is required by the Keyless configuration.",4,"Re-authentiate to continue using your keyless account"],31:["Failed to verify the training wheels signature with the training wheels public key.",4,"Re-authentiate to continue using your keyless account"],32:["The proof verification failed.",4,"Re-authentiate to continue using your keyless account"],33:["An unknown error has occurred.",5,"Error unknown. For support join the telegram group at https://t.me/+h5CN-W35yUFiYzkx"]},P= exports.KeylessError =class n extends Error{constructor(e){let{innerError:t,category:r,resolutionTip:i,type:o,message:s=Ro[o][0],details:a}=e;super(s),this.name="KeylessError",this.innerError=t,this.category=r,this.resolutionTip=i,this.type=o,this.details=a,this.message=n.constructMessage(s,i,t,a)}static constructMessage(e,t,r,i){let o=`
2
2
  Message: ${e}`;return i&&(o+=`
3
3
  Details: ${i}`),r instanceof ee?o+=`
4
4
  AptosApiError: ${r.message}`:r!==void 0&&(o+=`
5
5
  Error: ${_chunkMVCKMP5Ujs.ca.call(void 0, r)}`),o+=`
6
- KeylessErrorResolutionTip: ${t}`,o}static fromErrorType(e){let{error:t,type:r,details:i}=e,[o,s,a]=Ro[r];return new n({message:o,details:i,innerError:t,category:s,resolutionTip:a,type:r})}},ee= exports.AptosApiError =class extends Error{constructor({apiType:e,aptosRequest:t,aptosResponse:r}){super(Lc({apiType:e,aptosRequest:t,aptosResponse:r})),this.name="AptosApiError",this.url=r.url,this.status=r.status,this.statusText=r.statusText,this.data=r.data,this.request=t}};function Lc({apiType:n,aptosRequest:e,aptosResponse:t}){let r=_optionalChain([t, 'access', _5 => _5.headers, 'optionalAccess', _6 => _6.traceparent, 'optionalAccess', _7 => _7.split, 'call', _8 => _8("-"), 'access', _9 => _9[1]]),i=r?`(trace_id:${r}) `:"",o=`Request to [${n}]: ${e.method} ${_nullishCoalesce(t.url, () => (e.url))} ${i}failed with`;return n==="Indexer"&&_optionalChain([t, 'access', _10 => _10.data, 'optionalAccess', _11 => _11.errors, 'optionalAccess', _12 => _12[0], 'optionalAccess', _13 => _13.message])!=null?`${o}: ${t.data.errors[0].message}`:_optionalChain([t, 'access', _14 => _14.data, 'optionalAccess', _15 => _15.message])!=null&&_optionalChain([t, 'access', _16 => _16.data, 'optionalAccess', _17 => _17.error_code])!=null?`${o}: ${JSON.stringify(t.data)}`:`${o} status: ${t.statusText}(code:${t.status}) and response body: ${qc(t.data)}`}var pi=400;function qc(n){let e=JSON.stringify(n);return e.length<=pi?e:`truncated(original_size:${e.length}): ${e.slice(0,pi/2)}...${e.slice(-pi/2)}`}async function $c(n,e){let{url:t,method:r,body:i,contentType:o,params:s,overrides:a,originMethod:c}=n,p={..._optionalChain([a, 'optionalAccess', _18 => _18.HEADERS]),"x-aptos-client":`aptos-typescript-sdk/${ii}`,"content-type":_nullishCoalesce(o, () => ("application/json")),"x-aptos-typescript-sdk-origin-method":c};return _optionalChain([a, 'optionalAccess', _19 => _19.AUTH_TOKEN])&&(p.Authorization=`Bearer ${_optionalChain([a, 'optionalAccess', _20 => _20.AUTH_TOKEN])}`),_optionalChain([a, 'optionalAccess', _21 => _21.API_KEY])&&(p.Authorization=`Bearer ${_optionalChain([a, 'optionalAccess', _22 => _22.API_KEY])}`),e.provider({url:t,method:r,body:i,params:s,headers:p,overrides:a})}async function Wc(n,e){if(e.binaryProvider===void 0)throw new Error("Binary provider is not provided");let{url:t,method:r,body:i,contentType:o,acceptType:s,params:a,overrides:c,originMethod:p}=n,l={..._optionalChain([c, 'optionalAccess', _23 => _23.HEADERS]),"x-aptos-client":`aptos-typescript-sdk/${ii}`,"content-type":_nullishCoalesce(o, () => ("application/json")),accept:_nullishCoalesce(s, () => ("application/x-bcs")),"x-aptos-typescript-sdk-origin-method":p};return _optionalChain([c, 'optionalAccess', _24 => _24.AUTH_TOKEN])&&(l.Authorization=`Bearer ${_optionalChain([c, 'optionalAccess', _25 => _25.AUTH_TOKEN])}`),_optionalChain([c, 'optionalAccess', _26 => _26.API_KEY])&&(l.Authorization=`Bearer ${_optionalChain([c, 'optionalAccess', _27 => _27.API_KEY])}`),e.binaryProvider({acceptType:"application/x-bcs",url:t,method:r,body:i,params:a,headers:l,overrides:c})}async function pr(n,e,t){let{url:r,path:i}=n,o=i?`${r}/${i}`:r,s=await $c({...n,url:o},e.client),a={status:s.status,statusText:_nullishCoalesce(s.statusText, () => ("No status text provided")),data:s.data,headers:s.headers,config:s.config,request:s.request,url:o};if(a.status===401)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(t==="Indexer"){let c=a.data;if(c.errors)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});a.data=c.data}else if((t==="Pepper"||t==="Prover")&&a.status>=400)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(a.status>=200&&a.status<300)return a;throw new ee({apiType:t,aptosRequest:n,aptosResponse:a})}async function dr(n,e,t){let{url:r,path:i}=n,o=i?`${r}/${i}`:r,s=await Wc({...n,url:o},e.client),a={status:s.status,statusText:_nullishCoalesce(s.statusText, () => ("No status text provided")),data:s.data,headers:s.headers,config:s.config,request:s.request,url:o};if(a.status===401)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(t==="Indexer"){let c=a.data;if(c.errors)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});a.data=c.data}else if((t==="Pepper"||t==="Prover")&&a.status>=400)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(a.status>=200&&a.status<300)return a;throw new ee({apiType:t,aptosRequest:n,aptosResponse:a})}async function lr(n){let{aptosConfig:e,overrides:t,params:r,contentType:i,acceptType:o,path:s,originMethod:a,type:c}=n,p=e.getRequestUrl(c);return pr({url:p,method:"GET",originMethod:a,path:s,contentType:i,acceptType:o,params:r,overrides:{...e.clientConfig,...t}},e,n.type)}async function Qc(n){let{aptosConfig:e,overrides:t,params:r,contentType:i,acceptType:o,path:s,originMethod:a,type:c}=n,p=e.getRequestUrl(c);return dr({url:p,method:"GET",originMethod:a,path:s,contentType:i,acceptType:o,params:r,overrides:{...e.clientConfig,...t}},e,n.type)}async function V(n){let{aptosConfig:e}=n;return lr({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _28 => _28.clientConfig, 'optionalAccess', _29 => _29.HEADERS]),..._optionalChain([e, 'access', _30 => _30.fullnodeConfig, 'optionalAccess', _31 => _31.HEADERS])}}})}async function ig(n){let{aptosConfig:e}=n;return Qc({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _32 => _32.clientConfig, 'optionalAccess', _33 => _33.HEADERS]),..._optionalChain([e, 'access', _34 => _34.fullnodeConfig, 'optionalAccess', _35 => _35.HEADERS])}}})}async function og(n){return lr({...n,type:"Pepper"})}async function gr(n){let e=new Array(0),t,r=n.params;do{let i=await lr({type:"Fullnode",aptosConfig:n.aptosConfig,originMethod:n.originMethod,path:n.path,params:r,overrides:n.overrides});t=i.headers["x-aptos-cursor"],delete i.headers,e.push(...i.data),r.start=t}while(t!=null);return e}async function di(n){let e=new Array(0),t,r=n.params,i=r.limit;do{let{response:o,cursor:s}=await mr({...n});if(t=s,e.push(...o.data),_optionalChain([n, 'optionalAccess', _36 => _36.params])&&(n.params.start=t),i!==void 0){let a=i-e.length;if(a<=0)break;r.limit=a}}while(t!=null);return e}async function mr(n){let e,t={};typeof _optionalChain([n, 'access', _37 => _37.params, 'optionalAccess', _38 => _38.cursor])=="string"&&(t.start=n.params.cursor),typeof _optionalChain([n, 'access', _39 => _39.params, 'optionalAccess', _40 => _40.limit])=="number"&&(t.limit=n.params.limit);let r=await lr({type:"Fullnode",aptosConfig:n.aptosConfig,originMethod:n.originMethod,path:n.path,params:t,overrides:n.overrides});return e=r.headers["x-aptos-cursor"],{response:r,cursor:e}}async function bn(n){let{type:e,originMethod:t,path:r,body:i,acceptType:o,contentType:s,params:a,aptosConfig:c,overrides:p}=n,l=c.getRequestUrl(e);return pr({url:l,method:"POST",originMethod:t,path:r,body:i,contentType:s,acceptType:o,params:a,overrides:p},c,n.type)}async function jc(n){let{type:e,originMethod:t,path:r,body:i,acceptType:o,contentType:s,params:a,aptosConfig:c,overrides:p}=n,l=c.getRequestUrl(e);return dr({url:l,method:"POST",originMethod:t,path:r,body:i,contentType:s,acceptType:o,params:a,overrides:p},c,n.type)}async function gt(n){let{aptosConfig:e}=n;return bn({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _41 => _41.clientConfig, 'optionalAccess', _42 => _42.HEADERS]),..._optionalChain([e, 'access', _43 => _43.fullnodeConfig, 'optionalAccess', _44 => _44.HEADERS])}}})}async function Uo(n){let{aptosConfig:e}=n;return jc({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _45 => _45.clientConfig, 'optionalAccess', _46 => _46.HEADERS]),..._optionalChain([e, 'access', _47 => _47.fullnodeConfig, 'optionalAccess', _48 => _48.HEADERS])}}})}async function ko(n){let{aptosConfig:e}=n;return bn({...n,type:"Indexer",overrides:{...e.clientConfig,...e.indexerConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _49 => _49.clientConfig, 'optionalAccess', _50 => _50.HEADERS]),..._optionalChain([e, 'access', _51 => _51.indexerConfig, 'optionalAccess', _52 => _52.HEADERS])}}})}async function Do(n){let{aptosConfig:e}=n,t={...e,clientConfig:{...e.clientConfig}};return _optionalChainDelete([t, 'optionalAccess', _53 => _53.clientConfig, 'optionalAccess', _54 => delete _54.API_KEY]),bn({...n,type:"Faucet",overrides:{...t.clientConfig,...t.faucetConfig,...n.overrides,HEADERS:{..._optionalChain([t, 'access', _55 => _55.clientConfig, 'optionalAccess', _56 => _56.HEADERS]),..._optionalChain([t, 'access', _57 => _57.faucetConfig, 'optionalAccess', _58 => _58.HEADERS])}}})}async function No(n){return bn({...n,type:"Pepper"})}async function zo(n){return bn({...n,type:"Prover"})}var li=new Map;function De(n,e,t){return async(...r)=>{if(li.has(e)){let{value:o,timestamp:s}=li.get(e);if(t===void 0||Date.now()-s<=t)return o}let i=await n(...r);return li.set(e,{value:i,timestamp:Date.now()}),i}}var _bn254 = require('@noble/curves/bn254');var _utils = require('@noble/curves/abstract/utils');var _jsbase64 = require('js-base64');var Zc=1e7,gi= exports.MAX_AUD_VAL_BYTES =120,eu= exports.MAX_UID_KEY_BYTES =30,tu= exports.MAX_UID_VAL_BYTES =330,nu= exports.MAX_ISS_VAL_BYTES =120,ru= exports.MAX_EXTRA_FIELD_BYTES =350,iu= exports.MAX_JWT_HEADER_B64_BYTES =300,ou= exports.MAX_COMMITED_EPK_BYTES =93,Ne=class Ne extends oe{constructor(e,t){super();let r=_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array();if(r.length!==Ne.ID_COMMITMENT_LENGTH)throw new Error(`Id Commitment length in bytes should be ${Ne.ID_COMMITMENT_LENGTH}`);this.iss=e,this.idCommitment=r}authKey(){let e=new _chunkMVCKMP5Ujs.m;return e.serializeU32AsUleb128(3),e.serializeFixedBytes(this.bcsToBytes()),B.fromSchemeAndBytes({scheme:2,input:e.toUint8Array()})}verifySignature(e){try{return yr({...e,publicKey:this}),!0}catch(t){if(t instanceof P)return!1;throw t}}async verifySignatureAsync(e){return Ti({...e,publicKey:this})}serialize(e){e.serializeStr(this.iss),e.serializeBytes(this.idCommitment)}static deserialize(e){let t=e.deserializeStr(),r=e.deserializeBytes();return new Ne(t,r)}static load(e){let t=e.deserializeStr(),r=e.deserializeBytes();return new Ne(t,r)}static isPublicKey(e){return e instanceof Ne}static create(e){return Fo(e),new Ne(e.iss,Fo(e))}static fromJwtAndPepper(e){let{jwt:t,pepper:r,uidKey:i="sub"}=e,o=_jwtdecode.jwtDecode.call(void 0, t);if(typeof o.iss!="string")throw new Error("iss was not found");if(typeof o.aud!="string")throw new Error("aud was not found or an array of values");let s=o[i];return Ne.create({iss:o.iss,uidKey:i,uidVal:s,aud:o.aud,pepper:r})}static isInstance(e){return"iss"in e&&typeof e.iss=="string"&&"idCommitment"in e&&e.idCommitment instanceof Uint8Array}};Ne.ID_COMMITMENT_LENGTH=32;var U=Ne;async function Ti(n){let{aptosConfig:e,publicKey:t,message:r,signature:i,jwk:o,keylessConfig:s=await jt({aptosConfig:e}),options:a}=n;try{if(!(i instanceof he))throw P.fromErrorType({type:26,details:"Not a keyless signature"});return yr({message:r,publicKey:t,signature:i,jwk:o||await bi({aptosConfig:e,publicKey:t,kid:i.getJwkKid()}),keylessConfig:s}),!0}catch(c){if(_optionalChain([a, 'optionalAccess', _59 => _59.throwErrorWithReason]))throw c;return!1}}function yr(n){let{publicKey:e,message:t,signature:r,keylessConfig:i,jwk:o}=n,{verificationKey:s,maxExpHorizonSecs:a,trainingWheelsPubkey:c}=i;if(!(r instanceof he))throw P.fromErrorType({type:26,details:"Not a keyless signature"});if(!(r.ephemeralCertificate.signature instanceof pe))throw P.fromErrorType({type:26,details:"Unsupported ephemeral certificate variant"});let p=r.ephemeralCertificate.signature;if(!(p.proof.proof instanceof mt))throw P.fromErrorType({type:26,details:"Unsupported proof variant for ZeroKnowledgeSig"});let l=p.proof.proof;if(r.expiryDateSecs<_chunkMVCKMP5Ujs.da.call(void 0, ))throw P.fromErrorType({type:27,details:"The expiryDateSecs is in the past"});if(p.expHorizonSecs>a)throw P.fromErrorType({type:28});if(!r.ephemeralPublicKey.verifySignature({message:t,signature:r.ephemeralSignature}))throw P.fromErrorType({type:29});let h=su({publicKey:e,signature:r,jwk:o,keylessConfig:i});if(!s.verifyProof({publicInputsHash:h,groth16Proof:l}))throw P.fromErrorType({type:32});if(c){if(!p.trainingWheelsSignature)throw P.fromErrorType({type:30});let d=new yi(l,h);if(!c.verifySignature({message:d.hash(),signature:p.trainingWheelsSignature}))throw P.fromErrorType({type:31})}}function su(n){let{publicKey:e,signature:t,jwk:r,keylessConfig:i}=n,o=e instanceof U?e:e.keylessPublicKey;if(!(t.ephemeralCertificate.signature instanceof pe))throw new Error("Signature is not a ZeroKnowledgeSig");let s=t.ephemeralCertificate.signature,a=[];return a.push(...Tn(t.ephemeralPublicKey.toUint8Array(),i.maxCommitedEpkBytes)),a.push(Et(o.idCommitment)),a.push(t.expiryDateSecs),a.push(s.expHorizonSecs),a.push(ke(o.iss,i.maxIssValBytes)),s.extraField?(a.push(1n),a.push(ke(s.extraField,i.maxExtraFieldBytes))):(a.push(0n),a.push(ke(" ",i.maxExtraFieldBytes))),a.push(ke(_jsbase64.encode.call(void 0, t.jwtHeader,!0)+".",i.maxJwtHeaderB64Bytes)),a.push(r.toScalar()),s.overrideAudVal?(a.push(ke(s.overrideAudVal,gi)),a.push(1n)):(a.push(ke("",gi)),a.push(0n)),Pt(a)}async function bi(n){let{aptosConfig:e,publicKey:t,kid:r}=n,i=t instanceof U?t:t.keylessPublicKey,{iss:o}=i,s,a=t instanceof te?t.jwkAddress:void 0;try{s=await uu({aptosConfig:e,jwkAddr:a})}catch(l){throw P.fromErrorType({type:24,error:l,details:`Failed to fetch ${a?"Federated":"Patched"}JWKs ${a?`for address ${a}`:"0x1"}`})}let c=s.get(o);if(c===void 0)throw P.fromErrorType({type:7,details:`JWKs for issuer ${o} not found.`});let p=c.find(l=>l.kid===r);if(p===void 0)throw P.fromErrorType({type:6,details:`JWK with kid '${r}' for issuer '${o}' not found.`});return p}function Fo(n){let{uidKey:e,uidVal:t,aud:r,pepper:i}=n,o=[Et(_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array()),ke(r,gi),ke(t,tu),ke(e,eu)];return ri(Pt(o),U.ID_COMMITMENT_LENGTH)}var he=class n extends M{constructor(e){super();let{jwtHeader:t,ephemeralCertificate:r,expiryDateSecs:i,ephemeralPublicKey:o,ephemeralSignature:s}=e;this.jwtHeader=t,this.ephemeralCertificate=r,this.expiryDateSecs=i,this.ephemeralPublicKey=o,this.ephemeralSignature=s}getJwkKid(){return du(this.jwtHeader).kid}serialize(e){this.ephemeralCertificate.serialize(e),e.serializeStr(this.jwtHeader),e.serializeU64(this.expiryDateSecs),this.ephemeralPublicKey.serialize(e),this.ephemeralSignature.serialize(e)}static deserialize(e){let t=Wt.deserialize(e),r=e.deserializeStr(),i=e.deserializeU64(),o=lt.deserialize(e),s=Ue.deserialize(e);return new n({jwtHeader:r,expiryDateSecs:Number(i),ephemeralCertificate:t,ephemeralPublicKey:o,ephemeralSignature:s})}static getSimulationSignature(){return new n({jwtHeader:"{}",ephemeralCertificate:new Wt(new pe({proof:new Qt(new mt({a:new Uint8Array(32),b:new Uint8Array(64),c:new Uint8Array(32)}),0),expHorizonSecs:0}),0),expiryDateSecs:0,ephemeralPublicKey:new lt(new I(new Uint8Array(32))),ephemeralSignature:new Ue(new K(new Uint8Array(64)))})}static isSignature(e){return e instanceof n}},Wt= exports.EphemeralCertificate =class n extends M{constructor(e,t){super(),this.signature=e,this.variant=t}toUint8Array(){return this.signature.toUint8Array()}serialize(e){e.serializeU32AsUleb128(this.variant),this.signature.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(pe.deserialize(e),t);default:throw new Error(`Unknown variant index for EphemeralCertificate: ${t}`)}}},wn=class wn extends _chunkMVCKMP5Ujs.l{constructor(e){if(super(),this.data=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array(),this.data.length!==32)throw new Error("Input needs to be 32 bytes")}serialize(e){e.serializeFixedBytes(this.data)}static deserialize(e){let t=e.deserializeFixedBytes(32);return new wn(t)}toArray(){let e=this.toProjectivePoint();return[e.x.toString(),e.y.toString(),e.pz.toString()]}toProjectivePoint(){let e=new Uint8Array(this.data);e.reverse();let t=(e[0]&128)>>7,{Fp:r}=_bn254.bn254.fields,i=r.create(mi(e)),o=r.sqrt(r.add(r.pow(i,3n),wn.B)),s=r.neg(o),a=o>s==(t===1)?o:s;return _bn254.bn254.G1.ProjectivePoint.fromAffine({x:i,y:a})}};wn.B=_bn254.bn254.fields.Fp.create(3n);var Le=wn;function mi(n){if(n.length!==32)throw new Error("Input should be 32 bytes");let e=new Uint8Array(n);return e[0]=e[0]&63,_utils.bytesToNumberBE.call(void 0, e)}var Sn=class Sn extends _chunkMVCKMP5Ujs.l{constructor(e){if(super(),this.data=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array(),this.data.length!==64)throw new Error("Input needs to be 64 bytes")}serialize(e){e.serializeFixedBytes(this.data)}static deserialize(e){let t=e.deserializeFixedBytes(64);return new Sn(t)}toArray(){let e=this.toProjectivePoint();return[[e.x.c0.toString(),e.x.c1.toString()],[e.y.c0.toString(),e.y.c1.toString()],[e.pz.c0.toString(),e.pz.c1.toString()]]}toProjectivePoint(){let e=new Uint8Array(this.data),t=e.slice(0,32).reverse(),r=e.slice(32,64).reverse(),i=(r[0]&128)>>7,{Fp2:o}=_bn254.bn254.fields,s=o.fromBigTuple([mi(t),mi(r)]),a=o.sqrt(o.add(o.pow(s,3n),Sn.B)),c=o.neg(a),l=(a.c1>c.c1||a.c1===c.c1&&a.c0>c.c0)===(i===1)?a:c;return _bn254.bn254.G2.ProjectivePoint.fromAffine({x:s,y:l})}};Sn.B=_bn254.bn254.fields.Fp2.fromBigTuple([19485874751759354771024239261021720505790618469301721065564631296452457478373n,266929791119991161246907387137283842545076965332900288569378510910307636690n]);var It=Sn,mt= exports.Groth16Zkp =class n extends ar{constructor(e){super();let{a:t,b:r,c:i}=e;this.a=new Le(t),this.b=new It(r),this.c=new Le(i)}serialize(e){this.a.serialize(e),this.b.serialize(e),this.c.serialize(e)}static deserialize(e){let t=Le.deserialize(e).bcsToBytes(),r=It.deserialize(e).bcsToBytes(),i=Le.deserialize(e).bcsToBytes();return new n({a:t,b:r,c:i})}toSnarkJsJson(){return{protocol:"groth16",curve:"bn128",pi_a:this.a.toArray(),pi_b:this.b.toArray(),pi_c:this.c.toArray()}}},yi= exports.Groth16ProofAndStatement =class n extends _chunkMVCKMP5Ujs.l{constructor(t,r){super();this.domainSeparator="APTOS::Groth16ProofAndStatement";if(this.proof=t,this.publicInputsHash=typeof r=="bigint"?ri(r,32):_chunkMVCKMP5Ujs.j.fromHexInput(r).toUint8Array(),this.publicInputsHash.length!==32)throw new Error("Invalid public inputs hash")}serialize(t){this.proof.serialize(t),t.serializeFixedBytes(this.publicInputsHash)}static deserialize(t){return new n(mt.deserialize(t),t.deserializeFixedBytes(32))}hash(){return yt(this.bcsToBytes(),this.domainSeparator)}},Qt= exports.ZkProof =class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.proof=e,this.variant=t}serialize(e){e.serializeU32AsUleb128(this.variant),this.proof.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(mt.deserialize(e),t);default:throw new Error(`Unknown variant index for ZkProof: ${t}`)}}},pe= exports.ZeroKnowledgeSig =class n extends M{constructor(e){super();let{proof:t,expHorizonSecs:r,trainingWheelsSignature:i,extraField:o,overrideAudVal:s}=e;this.proof=t,this.expHorizonSecs=r,this.trainingWheelsSignature=i,this.extraField=o,this.overrideAudVal=s}static fromBytes(e){return n.deserialize(new R(e))}serialize(e){this.proof.serialize(e),e.serializeU64(this.expHorizonSecs),e.serializeOption(this.extraField),e.serializeOption(this.overrideAudVal),e.serializeOption(this.trainingWheelsSignature)}static deserialize(e){let t=Qt.deserialize(e),r=Number(e.deserializeU64()),i=e.deserializeOption("string"),o=e.deserializeOption("string"),s=e.deserializeOption(Ue);return new n({proof:t,expHorizonSecs:r,trainingWheelsSignature:s,extraField:i,overrideAudVal:o})}},fi= exports.KeylessConfiguration =class n{constructor(e){let{verificationKey:t,trainingWheelsPubkey:r,maxExpHorizonSecs:i=Zc,maxExtraFieldBytes:o=ru,maxJwtHeaderB64Bytes:s=iu,maxIssValBytes:a=nu,maxCommitedEpkBytes:c=ou}=e;this.verificationKey=t,this.maxExpHorizonSecs=i,r&&(this.trainingWheelsPubkey=new lt(new I(r))),this.maxExtraFieldBytes=o,this.maxJwtHeaderB64Bytes=s,this.maxIssValBytes=a,this.maxCommitedEpkBytes=c}static create(e,t){return new n({verificationKey:new Ai({alphaG1:e.alpha_g1,betaG2:e.beta_g2,deltaG2:e.delta_g2,gammaAbcG1:e.gamma_abc_g1,gammaG2:e.gamma_g2}),maxExpHorizonSecs:Number(t.max_exp_horizon_secs),trainingWheelsPubkey:t.training_wheels_pubkey.vec[0],maxExtraFieldBytes:t.max_extra_field_bytes,maxJwtHeaderB64Bytes:t.max_jwt_header_b64_bytes,maxIssValBytes:t.max_iss_val_bytes,maxCommitedEpkBytes:t.max_commited_epk_bytes})}},Ai= exports.Groth16VerificationKey =class n{constructor(e){let{alphaG1:t,betaG2:r,deltaG2:i,gammaAbcG1:o,gammaG2:s}=e;this.alphaG1=new Le(t),this.betaG2=new It(r),this.deltaG2=new It(i),this.gammaAbcG1=[new Le(o[0]),new Le(o[1])],this.gammaG2=new It(s)}hash(){let e=new _chunkMVCKMP5Ujs.m;return this.serialize(e),_sha3.sha3_256.create().update(e.toUint8Array()).digest()}serialize(e){this.alphaG1.serialize(e),this.betaG2.serialize(e),this.deltaG2.serialize(e),this.gammaAbcG1[0].serialize(e),this.gammaAbcG1[1].serialize(e),this.gammaG2.serialize(e)}static fromGroth16VerificationKeyResponse(e){return new n({alphaG1:e.alpha_g1,betaG2:e.beta_g2,deltaG2:e.delta_g2,gammaAbcG1:e.gamma_abc_g1,gammaG2:e.gamma_g2})}verifyProof(e){let{publicInputsHash:t,groth16Proof:r}=e;try{let i=r.a.toProjectivePoint(),o=r.b.toProjectivePoint(),s=r.c.toProjectivePoint(),a=this.alphaG1.toProjectivePoint(),c=this.betaG2.toProjectivePoint(),p=this.gammaG2.toProjectivePoint(),l=this.deltaG2.toProjectivePoint(),h=this.gammaAbcG1.map(at=>at.toProjectivePoint()),{Fp12:d}=_bn254.bn254.fields,g=h[0].add(h[1].multiply(t)),b=_bn254.bn254.pairing(g,p),v=_bn254.bn254.pairing(i,o),W=_bn254.bn254.pairing(a,c),Me=_bn254.bn254.pairing(s,l),st=d.mul(W,d.mul(b,Me));return d.eql(v,st)}catch(i){throw P.fromErrorType({type:32,error:i,details:"Error encountered when checking zero knowledge relation"})}}toSnarkJsJson(){return{protocol:"groth16",curve:"bn128",nPublic:1,vk_alpha_1:this.alphaG1.toArray(),vk_beta_2:this.betaG2.toArray(),vk_gamma_2:this.gammaG2.toArray(),vk_delta_2:this.deltaG2.toArray(),IC:this.gammaAbcG1.map(e=>e.toArray())}}};async function jt(n){let{aptosConfig:e}=n;try{return await De(async()=>{let[t,r]=await Promise.all([au(n),cu(n)]);return fi.create(r,t)},`keyless-configuration-${e.network}`,1e3*60*5)()}catch(t){throw t instanceof P?t:P.fromErrorType({type:25,error:t})}}function qe(n){let{jwt:e,uidKey:t="sub"}=n,r;try{r=_jwtdecode.jwtDecode.call(void 0, e)}catch(o){throw P.fromErrorType({type:12,details:`Failed to parse JWT - ${_chunkMVCKMP5Ujs.ca.call(void 0, o)}`})}if(typeof r.iss!="string")throw P.fromErrorType({type:12,details:"JWT is missing 'iss' in the payload. This should never happen."});if(typeof r.aud!="string")throw P.fromErrorType({type:12,details:"JWT is missing 'aud' in the payload or 'aud' is an array of values."});let i=r[t];return{iss:r.iss,aud:r.aud,uidVal:i}}async function au(n){let{aptosConfig:e,options:t}=n,r="0x1::keyless_account::Configuration";try{let{data:i}=await V({aptosConfig:e,originMethod:"getKeylessConfigurationResource",path:`accounts/${_chunkMVCKMP5Ujs.Z.from("0x1").toString()}/resource/${r}`,params:{ledger_version:_optionalChain([t, 'optionalAccess', _60 => _60.ledgerVersion])}});return i.data}catch(i){throw P.fromErrorType({type:22,error:i})}}async function cu(n){let{aptosConfig:e,options:t}=n,r="0x1::keyless_account::Groth16VerificationKey";try{let{data:i}=await V({aptosConfig:e,originMethod:"getGroth16VerificationKeyResource",path:`accounts/${_chunkMVCKMP5Ujs.Z.from("0x1").toString()}/resource/${r}`,params:{ledger_version:_optionalChain([t, 'optionalAccess', _61 => _61.ledgerVersion])}});return i.data}catch(i){throw P.fromErrorType({type:23,error:i})}}async function uu(n){let{aptosConfig:e,jwkAddr:t,options:r}=n,i;if(t){let s="0x1::jwks::FederatedJWKs",{data:a}=await V({aptosConfig:e,originMethod:"getKeylessJWKs",path:`accounts/${_chunkMVCKMP5Ujs.Z.from(t).toString()}/resource/${s}`,params:{ledger_version:_optionalChain([r, 'optionalAccess', _62 => _62.ledgerVersion])}});i=a}else{let s="0x1::jwks::PatchedJWKs",{data:a}=await V({aptosConfig:e,originMethod:"getKeylessJWKs",path:`accounts/0x1/resource/${s}`,params:{ledger_version:_optionalChain([r, 'optionalAccess', _63 => _63.ledgerVersion])}});i=a}let o=new Map;for(let s of i.data.jwks.entries){let a=[];for(let c of s.jwks){let{data:p}=c.variant,l=new R(_chunkMVCKMP5Ujs.j.fromHexInput(p).toUint8Array()),h=hi.deserialize(l);a.push(h)}o.set(_chunkMVCKMP5Ujs.k.call(void 0, s.issuer),a)}return o}var hi=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{kid:t,kty:r,alg:i,e:o,n:s}=e;this.kid=t,this.kty=r,this.alg=i,this.e=o,this.n=s}serialize(e){e.serializeStr(this.kid),e.serializeStr(this.kty),e.serializeStr(this.alg),e.serializeStr(this.e),e.serializeStr(this.n)}static fromMoveStruct(e){let{data:t}=e.variant,r=new R(_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array());return n.deserialize(r)}toScalar(){if(this.alg!=="RS256")throw P.fromErrorType({type:32,details:"Failed to convert JWK to scalar when calculating the public inputs hash. Only RSA 256 is supported currently"});let e=_chunkMVCKMP5Ujs.ga.call(void 0, this.n),r=pu(e.reverse()).map(i=>Et(i));return r.push(256n),Pt(r)}static deserialize(e){let t=e.deserializeStr(),r=e.deserializeStr(),i=e.deserializeStr(),o=e.deserializeStr(),s=e.deserializeStr();return new n({kid:t,kty:r,alg:i,n:s,e:o})}};function pu(n){let e=[];for(let t=0;t<n.length;t+=24){let r=n.slice(t,Math.min(t+24,n.length));if(r.length<24){let i=new Uint8Array(24);i.set(r),e.push(i)}else e.push(r)}return e}function du(n){try{let e=JSON.parse(n);if(e.kid===void 0)throw new Error("JWT header missing kid");return e}catch (e2){throw new Error("Failed to parse JWT header.")}}var te=class n extends oe{constructor(e,t){super(),this.jwkAddress=_chunkMVCKMP5Ujs.Z.from(e),this.keylessPublicKey=t}authKey(){let e=new _chunkMVCKMP5Ujs.m;return e.serializeU32AsUleb128(4),e.serializeFixedBytes(this.bcsToBytes()),B.fromSchemeAndBytes({scheme:2,input:e.toUint8Array()})}verifySignature(e){try{return yr({...e,publicKey:this}),!0}catch (e3){return!1}}serialize(e){this.jwkAddress.serialize(e),this.keylessPublicKey.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=U.deserialize(e);return new n(t,r)}static isPublicKey(e){return e instanceof n}async verifySignatureAsync(e){return Ti({...e,publicKey:this})}static create(e){return new n(e.jwkAddress,U.create(e))}static fromJwtAndPepper(e){return new n(e.jwkAddress,U.fromJwtAndPepper(e))}static isInstance(e){return"jwkAddress"in e&&e.jwkAddress instanceof _chunkMVCKMP5Ujs.Z&&"keylessPublicKey"in e&&e.keylessPublicKey instanceof U}};var _secp256k1 = require('@noble/curves/secp256k1');var _bip32 = require('@scure/bip32');var Ce=class Ce extends St{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e),{length:r}=t.toUint8Array();if(r===Ce.LENGTH)this.key=t;else if(r===Ce.COMPRESSED_LENGTH){let i=_secp256k1.secp256k1.ProjectivePoint.fromHex(t.toUint8Array());this.key=_chunkMVCKMP5Ujs.j.fromHexInput(i.toRawBytes(!1))}else throw new Error(`PublicKey length should be ${Ce.LENGTH} or ${Ce.COMPRESSED_LENGTH}, received ${r}`)}verifySignature(e){let{message:t,signature:r}=e,i=qt(t),o=_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array(),s=_sha3.sha3_256.call(void 0, o),a=r.toUint8Array();return _secp256k1.secp256k1.verify(a,s,this.key.toUint8Array(),{lowS:!0})}async verifySignatureAsync(e){return this.verifySignature(e)}toUint8Array(){return this.key.toUint8Array()}serialize(e){e.serializeBytes(this.key.toUint8Array())}deserialize(e){let t=e.deserializeBytes();return new Ct(t)}static deserialize(e){let t=e.deserializeBytes();return new Ce(t)}static isPublicKey(e){return e instanceof Ce}static isInstance(e){return"key"in e&&_optionalChain([e, 'access', _64 => _64.key, 'optionalAccess', _65 => _65.data, 'optionalAccess', _66 => _66.length])===Ce.LENGTH}};Ce.LENGTH=65,Ce.COMPRESSED_LENGTH=33;var $e=Ce,ze=class ze extends _chunkMVCKMP5Ujs.l{constructor(e,t){super();let r=pt.parseHexInput(e,"secp256k1",t);if(r.toUint8Array().length!==ze.LENGTH)throw new Error(`PrivateKey length should be ${ze.LENGTH}`);this.key=r}static generate(){let e=_secp256k1.secp256k1.utils.randomPrivateKey();return new ze(e,!1)}static fromDerivationPath(e,t){if(!fo(e))throw new Error(`Invalid derivation path ${e}`);return ze.fromDerivationPathInner(e,or(t))}static fromDerivationPathInner(e,t){let{privateKey:r}=_bip32.HDKey.fromMasterSeed(t).derive(e);if(r===null)throw new Error("Invalid key");return new ze(r,!1)}sign(e){let t=qt(e),r=_chunkMVCKMP5Ujs.j.fromHexInput(t),i=_sha3.sha3_256.call(void 0, r.toUint8Array()),o=_secp256k1.secp256k1.sign(i,this.key.toUint8Array(),{lowS:!0});return new Ct(o.toCompactRawBytes())}publicKey(){let e=_secp256k1.secp256k1.getPublicKey(this.key.toUint8Array(),!1);return new $e(e)}toUint8Array(){return this.key.toUint8Array()}toString(){return this.toHexString()}toHexString(){return this.key.toString()}toAIP80String(){return pt.formatPrivateKey(this.key.toString(),"secp256k1")}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new ze(t,!1)}static isPrivateKey(e){return e instanceof ze}};ze.LENGTH=32;var We=ze,Jt=class Jt extends M{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==Jt.LENGTH)throw new Error(`Signature length should be ${Jt.LENGTH}, received ${t.toUint8Array().length}`);this.data=t}toUint8Array(){return this.data.toUint8Array()}serialize(e){e.serializeBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new Jt(t)}};Jt.LENGTH=64;var Ct=Jt;var z=class n extends oe{constructor(e){if(super(),this.publicKey=e,e instanceof I)this.variant=0;else if(e instanceof $e)this.variant=1;else if(e instanceof U)this.variant=3;else if(e instanceof te)this.variant=4;else throw new Error("Unsupported public key type")}verifySignature(e){let{message:t,signature:r}=e;if(this.publicKey instanceof U)throw new Error("Use verifySignatureAsync to verify Keyless signatures");return this.publicKey.verifySignature({message:t,signature:r.signature})}async verifySignatureAsync(e){if(!(e.signature instanceof H)){if(_optionalChain([e, 'access', _67 => _67.options, 'optionalAccess', _68 => _68.throwErrorWithReason]))throw new Error("Signature must be an instance of AnySignature");return!1}return await this.publicKey.verifySignatureAsync({...e,signature:e.signature.signature})}authKey(){return B.fromSchemeAndBytes({scheme:2,input:this.toUint8Array()})}toUint8Array(){return this.bcsToBytes()}serialize(e){e.serializeU32AsUleb128(this.variant),this.publicKey.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=I.deserialize(e);break;case 1:r=$e.deserialize(e);break;case 3:r=U.deserialize(e);break;case 4:r=te.deserialize(e);break;default:throw new Error(`Unknown variant index for AnyPublicKey: ${t}`)}return new n(r)}static isPublicKey(e){return e instanceof n}isEd25519(){return this.publicKey instanceof I}isSecp256k1PublicKey(){return this.publicKey instanceof $e}static isInstance(e){return"publicKey"in e&&"variant"in e}},H= exports.AnySignature =class n extends M{constructor(e){if(super(),this.signature=e,e instanceof K)this.variant=0;else if(e instanceof Ct)this.variant=1;else if(e instanceof he)this.variant=3;else throw new Error("Unsupported signature type")}toUint8Array(){return console.warn("[Aptos SDK] Calls to AnySignature.toUint8Array() will soon return the underlying signature bytes. Use AnySignature.bcsToBytes() instead."),this.bcsToBytes()}serialize(e){e.serializeU32AsUleb128(this.variant),this.signature.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=K.deserialize(e);break;case 1:r=Ct.deserialize(e);break;case 3:r=he.deserialize(e);break;default:throw new Error(`Unknown variant index for AnySignature: ${t}`)}return new n(r)}static isInstance(e){return"signature"in e&&typeof e.signature=="object"&&e.signature!==null&&"toUint8Array"in e.signature}};function gu(n){let e=n;return e-=e>>1&1431655765,e=(e&858993459)+(e>>2&858993459),(e+(e>>4)&252645135)*16843009>>24}var Pn=class extends oe{constructor(e){super(),this.publicKeys=e.publicKeys}createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach((s,a)=>{if(a+1>this.publicKeys.length)throw new Error(`Signature index ${a+1} is out of public keys range, ${this.publicKeys.length}.`);if(o.has(s))throw new Error(`Duplicate bit ${s} detected.`);o.add(s);let c=Math.floor(s/8),p=i[c];p|=r>>s%8,i[c]=p}),i}getIndex(e){let t=this.publicKeys.findIndex(r=>r.toString()===e.toString());if(t!==-1)return t;throw new Error(`Public key ${e} not found in multi key set ${this.publicKeys}`)}},Fe= exports.MultiKey =class n extends Pn{constructor(e){let{publicKeys:t,signaturesRequired:r}=e;if(super({publicKeys:t}),r<1)throw new Error("The number of required signatures needs to be greater than 0");if(t.length<r)throw new Error(`Provided ${t.length} public keys is smaller than the ${r} required signatures`);this.publicKeys=t.map(i=>i instanceof z?i:new z(i)),this.signaturesRequired=r}verifySignature(e){let{message:t,signature:r}=e;if(r.signatures.length!==this.signaturesRequired)throw new Error("The number of signatures does not match the number of required signatures");let i=r.bitMapToSignerIndices();for(let o=0;o<r.signatures.length;o+=1){let s=r.signatures[o];if(!this.publicKeys[i[o]].verifySignature({message:t,signature:s}))return!1}return!0}async verifySignatureAsync(e){let{signature:t}=e;try{if(!(t instanceof Oe))throw new Error("Signature is not a MultiKeySignature");if(t.signatures.length!==this.signaturesRequired)throw new Error("The number of signatures does not match the number of required signatures");let r=t.bitMapToSignerIndices();for(let i=0;i<t.signatures.length;i+=1){let o=t.signatures[i];if(!await this.publicKeys[r[i]].verifySignatureAsync({...e,signature:o}))return!1}return!0}catch(r){if(_optionalChain([e, 'access', _69 => _69.options, 'optionalAccess', _70 => _70.throwErrorWithReason]))throw r;return!1}}authKey(){return B.fromSchemeAndBytes({scheme:3,input:this.toUint8Array()})}serialize(e){e.serializeVector(this.publicKeys),e.serializeU8(this.signaturesRequired)}static deserialize(e){let t=e.deserializeVector(z),r=e.deserializeU8();return new n({publicKeys:t,signaturesRequired:r})}getIndex(e){let t=e instanceof z?e:new z(e);return super.getIndex(t)}static isInstance(e){return"publicKeys"in e&&"signaturesRequired"in e}},de=class de extends M{constructor(e){super();let{signatures:t,bitmap:r}=e;if(t.length>de.MAX_SIGNATURES_SUPPORTED)throw new Error(`The number of signatures cannot be greater than ${de.MAX_SIGNATURES_SUPPORTED}`);if(this.signatures=t.map(o=>o instanceof H?o:new H(o)),!(r instanceof Uint8Array))this.bitmap=de.createBitmap({bits:r});else{if(r.length!==de.BITMAP_LEN)throw new Error(`"bitmap" length should be ${de.BITMAP_LEN}`);this.bitmap=r}let i=this.bitmap.reduce((o,s)=>o+gu(s),0);if(i!==this.signatures.length)throw new Error(`Expecting ${i} signatures from the bitmap, but got ${this.signatures.length}`)}static createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach(s=>{if(s>=de.MAX_SIGNATURES_SUPPORTED)throw new Error(`Cannot have a signature larger than ${de.MAX_SIGNATURES_SUPPORTED-1}.`);if(o.has(s))throw new Error("Duplicate bits detected.");o.add(s);let a=Math.floor(s/8),c=i[a];c|=r>>s%8,i[a]=c}),i}bitMapToSignerIndices(){let e=[];for(let t=0;t<this.bitmap.length;t+=1){let r=this.bitmap[t];for(let i=0;i<8;i+=1)r&128>>i&&e.push(t*8+i)}return e}serialize(e){e.serializeVector(this.signatures),e.serializeBytes(this.bitmap)}static deserialize(e){let t=e.deserializeVector(H),r=e.deserializeBytes();return new de({signatures:t,bitmap:r})}};de.BITMAP_LEN=4,de.MAX_SIGNATURES_SUPPORTED=de.BITMAP_LEN*8;var Oe=de;var Te=class Te extends Pn{constructor(e){let{publicKeys:t,threshold:r}=e;if(super({publicKeys:t}),t.length>Te.MAX_KEYS||t.length<Te.MIN_KEYS)throw new Error(`Must have between ${Te.MIN_KEYS} and ${Te.MAX_KEYS} public keys, inclusive`);if(r<Te.MIN_THRESHOLD||r>t.length)throw new Error(`Threshold must be between ${Te.MIN_THRESHOLD} and ${t.length}, inclusive`);this.publicKeys=t,this.threshold=r}verifySignature(e){let{message:t,signature:r}=e;if(!(r instanceof Qe))return!1;let i=[];for(let o=0;o<4;o+=1)for(let s=0;s<8;s+=1)if((r.bitmap[o]&1<<7-s)!==0){let c=o*8+s;i.push(c)}if(i.length!==r.signatures.length)throw new Error("Bitmap and signatures length mismatch");if(i.length<this.threshold)throw new Error("Not enough signatures");for(let o=0;o<i.length;o+=1)if(!this.publicKeys[i[o]].verifySignature({message:t,signature:r.signatures[o]}))return!1;return!0}async verifySignatureAsync(e){return this.verifySignature(e)}authKey(){return B.fromSchemeAndBytes({scheme:1,input:this.toUint8Array()})}toUint8Array(){let e=new Uint8Array(this.publicKeys.length*I.LENGTH+1);return this.publicKeys.forEach((t,r)=>{e.set(t.toUint8Array(),r*I.LENGTH)}),e[this.publicKeys.length*I.LENGTH]=this.threshold,e}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes(),r=t[t.length-1],i=[];for(let o=0;o<t.length-1;o+=I.LENGTH){let s=o;i.push(new I(t.subarray(s,s+I.LENGTH)))}return new Te({publicKeys:i,threshold:r})}getIndex(e){return super.getIndex(e)}};Te.MAX_KEYS=32,Te.MIN_KEYS=2,Te.MIN_THRESHOLD=1;var Xt=Te,le=class le extends M{constructor(e){super();let{signatures:t,bitmap:r}=e;if(t.length>le.MAX_SIGNATURES_SUPPORTED)throw new Error(`The number of signatures cannot be greater than ${le.MAX_SIGNATURES_SUPPORTED}`);if(this.signatures=t,!(r instanceof Uint8Array))this.bitmap=le.createBitmap({bits:r});else{if(r.length!==le.BITMAP_LEN)throw new Error(`"bitmap" length should be ${le.BITMAP_LEN}`);this.bitmap=r}}toUint8Array(){let e=new Uint8Array(this.signatures.length*K.LENGTH+le.BITMAP_LEN);return this.signatures.forEach((t,r)=>{e.set(t.toUint8Array(),r*K.LENGTH)}),e.set(this.bitmap,this.signatures.length*K.LENGTH),e}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes(),r=t.subarray(t.length-4),i=[];for(let o=0;o<t.length-r.length;o+=K.LENGTH){let s=o;i.push(new K(t.subarray(s,s+K.LENGTH)))}return new le({signatures:i,bitmap:r})}static createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach((s,a)=>{if(s>=le.MAX_SIGNATURES_SUPPORTED)throw new Error(`Cannot have a signature larger than ${le.MAX_SIGNATURES_SUPPORTED-1}.`);if(o.has(s))throw new Error("Duplicate bits detected.");if(a>0&&s<=t[a-1])throw new Error("The bits need to be sorted in ascending order.");o.add(s);let c=Math.floor(s/8),p=i[c];p|=r>>s%8,i[c]=p}),i}};le.MAX_SIGNATURES_SUPPORTED=32,le.BITMAP_LEN=4;var Qe=le;var j=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return ve.load(e);case 1:return je.load(e);case 2:return se.load(e);case 3:return Ge.load(e);case 4:return Yt.load(e);case 5:return _n.load(e);default:throw new Error(`Unknown variant index for AccountAuthenticator: ${t}`)}}isEd25519(){return this instanceof ve}isMultiEd25519(){return this instanceof je}isSingleKey(){return this instanceof se}isMultiKey(){return this instanceof Ge}},ve= exports.AccountAuthenticatorEd25519 =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(0),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=I.deserialize(e),r=K.deserialize(e);return new n(t,r)}},je= exports.AccountAuthenticatorMultiEd25519 =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(1),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=Xt.deserialize(e),r=Qe.deserialize(e);return new n(t,r)}},se= exports.AccountAuthenticatorSingleKey =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(2),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=z.deserialize(e),r=H.deserialize(e);return new n(t,r)}},Ge= exports.AccountAuthenticatorMultiKey =class n extends j{constructor(e,t){super(),this.public_keys=e,this.signatures=t}serialize(e){e.serializeU32AsUleb128(3),this.public_keys.serialize(e),this.signatures.serialize(e)}static load(e){let t=Fe.deserialize(e),r=Oe.deserialize(e);return new n(t,r)}},Yt= exports.AccountAuthenticatorNoAccountAuthenticator =class n extends j{serialize(e){e.serializeU32AsUleb128(4)}static load(e){return new n}},_n= exports.AccountAuthenticatorAbstraction =class n extends j{constructor(e,t,r){if(super(),!_chunkMVCKMP5Ujs.ma.call(void 0, e))throw new Error(`Invalid function info ${e} passed into AccountAuthenticatorAbstraction`);this.functionInfo=e,this.authenticator=_chunkMVCKMP5Ujs.j.fromHexInput(r),this.signingMessageDigest=_chunkMVCKMP5Ujs.j.fromHexInput(_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array())}serialize(e){e.serializeU32AsUleb128(5);let{moduleAddress:t,moduleName:r,functionName:i}=_chunkMVCKMP5Ujs.la.call(void 0, this.functionInfo);_chunkMVCKMP5Ujs.Z.fromString(t).serialize(e),e.serializeStr(r),e.serializeStr(i),e.serializeU32AsUleb128(0),e.serializeBytes(this.signingMessageDigest.toUint8Array()),e.serializeFixedBytes(this.authenticator.toUint8Array())}static load(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeStr(),i=e.deserializeStr(),o=e.deserializeUleb128AsU32();if(o===0){let s=e.deserializeBytes(),a=e.deserializeFixedBytes(e.remaining());return new n(`${t}::${r}::${i}`,s,a)}throw new Error(`Unknown variant index for AccountAuthenticatorAbstraction: ${o}`)}};var Zt=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.chainId=e}serialize(e){e.serializeU8(this.chainId)}static deserialize(e){let t=e.deserializeU8();return new n(t)}};var k=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.identifier=e}serialize(e){e.serializeStr(this.identifier)}static deserialize(e){let t=e.deserializeStr();return new n(t)}};var xn=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.address=e,this.name=t}static fromStr(e){let t=e.split("::");if(t.length!==2)throw new Error("Invalid module id.");return new n(_chunkMVCKMP5Ujs.Z.fromString(t[0]),new k(t[1]))}serialize(e){this.address.serialize(e),this.name.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e);return new n(t,r)}};var O=class n extends _chunkMVCKMP5Ujs.l{deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e),i=k.deserialize(e),o=e.deserializeVector(n);return new Be(t,r,i,o)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return L.load(e);case 1:return ge.load(e);case 2:return J.load(e);case 3:return Ye.load(e);case 4:return F.load(e);case 5:return vt.load(e);case 6:return C.load(e);case 7:return A.load(e);case 8:return Je.load(e);case 9:return Xe.load(e);case 10:return Ze.load(e);case 255:return G.load(e);default:throw new Error(`Unknown variant index for TypeTag: ${t}`)}}isBool(){return this instanceof L}isAddress(){return this instanceof F}isGeneric(){return this instanceof G}isSigner(){return this instanceof vt}isVector(){return this instanceof C}isStruct(){return this instanceof A}isU8(){return this instanceof ge}isU16(){return this instanceof Je}isU32(){return this instanceof Xe}isU64(){return this instanceof J}isU128(){return this instanceof Ye}isU256(){return this instanceof Ze}isPrimitive(){return this instanceof vt||this instanceof F||this instanceof L||this instanceof ge||this instanceof Je||this instanceof Xe||this instanceof J||this instanceof Ye||this instanceof Ze}},L= exports.TypeTagBool =class n extends O{toString(){return"bool"}serialize(e){e.serializeU32AsUleb128(0)}static load(e){return new n}},ge= exports.TypeTagU8 =class n extends O{toString(){return"u8"}serialize(e){e.serializeU32AsUleb128(1)}static load(e){return new n}},Je= exports.TypeTagU16 =class n extends O{toString(){return"u16"}serialize(e){e.serializeU32AsUleb128(8)}static load(e){return new n}},Xe= exports.TypeTagU32 =class n extends O{toString(){return"u32"}serialize(e){e.serializeU32AsUleb128(9)}static load(e){return new n}},J= exports.TypeTagU64 =class n extends O{toString(){return"u64"}serialize(e){e.serializeU32AsUleb128(2)}static load(e){return new n}},Ye= exports.TypeTagU128 =class n extends O{toString(){return"u128"}serialize(e){e.serializeU32AsUleb128(3)}static load(e){return new n}},Ze= exports.TypeTagU256 =class n extends O{toString(){return"u256"}serialize(e){e.serializeU32AsUleb128(10)}static load(e){return new n}},F= exports.TypeTagAddress =class n extends O{toString(){return"address"}serialize(e){e.serializeU32AsUleb128(4)}static load(e){return new n}},vt= exports.TypeTagSigner =class n extends O{toString(){return"signer"}serialize(e){e.serializeU32AsUleb128(5)}static load(e){return new n}},fr= exports.TypeTagReference =class n extends O{constructor(t){super();this.value=t}toString(){return`&${this.value.toString()}`}serialize(t){t.serializeU32AsUleb128(254)}static load(t){let r=O.deserialize(t);return new n(r)}},G= exports.TypeTagGeneric =class n extends O{constructor(t){super();this.value=t;if(t<0)throw new Error("Generic type parameter index cannot be negative")}toString(){return`T${this.value}`}serialize(t){t.serializeU32AsUleb128(255),t.serializeU32(this.value)}static load(t){let r=t.deserializeU32();return new n(r)}},C= exports.TypeTagVector =class n extends O{constructor(t){super();this.value=t}toString(){return`vector<${this.value.toString()}>`}static u8(){return new n(new ge)}serialize(t){t.serializeU32AsUleb128(6),this.value.serialize(t)}static load(t){let r=O.deserialize(t);return new n(r)}},A= exports.TypeTagStruct =class n extends O{constructor(t){super();this.value=t}toString(){let t="";return this.value.typeArgs.length>0&&(t=`<${this.value.typeArgs.map(r=>r.toString()).join(", ")}>`),`${this.value.address.toString()}::${this.value.moduleName.identifier}::${this.value.name.identifier}${t}`}serialize(t){t.serializeU32AsUleb128(7),this.value.serialize(t)}static load(t){let r=Be.deserialize(t);return new n(r)}isTypeTag(t,r,i){return this.value.moduleName.identifier===r&&this.value.name.identifier===i&&this.value.address.equals(t)}isString(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"string","String")}isOption(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"option","Option")}isObject(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"object","Object")}isDelegationKey(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"permissioned_delegation","DelegationKey")}isRateLimiter(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"rate_limiter","RateLimiter")}},Be= exports.StructTag =class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r,i){super(),this.address=e,this.moduleName=t,this.name=r,this.typeArgs=i}serialize(e){e.serialize(this.address),e.serialize(this.moduleName),e.serialize(this.name),e.serializeVector(this.typeArgs)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e),i=k.deserialize(e),o=e.deserializeVector(O);return new n(t,r,i,o)}};function Yy(){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("aptos_coin"),new k("AptosCoin"),[])}function _(){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("string"),new k("String"),[])}function Zy(n){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("option"),new k("Option"),[n])}function me(n){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("object"),new k("Object"),[n])}function mu(n){let e=n.deserializeUleb128AsU32();switch(e){case 0:return Y.deserialize(n);case 1:return Q.deserialize(n);case 2:return xe.deserialize(n);case 3:return _chunkMVCKMP5Ujs.Z.deserialize(n);case 4:return S.deserialize(n,Y);case 5:return N.deserialize(n);case 6:return Pe.deserialize(n);case 7:return _e.deserialize(n);case 8:return fe.deserialize(n);case 9:return fn.deserialize(n);default:throw new Error(`Unknown variant index for ScriptTransactionArgument: ${e}`)}}var Kt=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return Rt.load(e);case 2:return In.load(e);case 3:return Cn.load(e);default:throw new Error(`Unknown variant index for TransactionPayload: ${t}`)}}},Rt= exports.TransactionPayloadScript =class n extends Kt{constructor(e){super(),this.script=e}serialize(e){e.serializeU32AsUleb128(0),this.script.serialize(e)}static load(e){let t=vn.deserialize(e);return new n(t)}},In= exports.TransactionPayloadEntryFunction =class n extends Kt{constructor(e){super(),this.entryFunction=e}serialize(e){e.serializeU32AsUleb128(2),this.entryFunction.serialize(e)}static load(e){let t=Ut.deserialize(e);return new n(t)}},Cn= exports.TransactionPayloadMultiSig =class n extends Kt{constructor(e){super(),this.multiSig=e}serialize(e){e.serializeU32AsUleb128(3),this.multiSig.serialize(e)}static load(e){let t=Kn.deserialize(e);return new n(t)}},Ut= exports.EntryFunction =class n{constructor(e,t,r,i){this.module_name=e,this.function_name=t,this.type_args=r,this.args=i}static build(e,t,r,i){return new n(xn.fromStr(e),new k(t),r,i)}serialize(e){this.module_name.serialize(e),this.function_name.serialize(e),e.serializeVector(this.type_args),e.serializeU32AsUleb128(this.args.length),this.args.forEach(t=>{t.serializeForEntryFunction(e)})}static deserialize(e){let t=xn.deserialize(e),r=k.deserialize(e),i=e.deserializeVector(O),o=e.deserializeUleb128AsU32(),s=new Array;for(let a=0;a<o;a+=1){let c=e.deserializeUleb128AsU32(),p=rr.deserialize(e,c);s.push(p)}return new n(t,r,i,s)}},vn= exports.Script =class n{constructor(e,t,r){this.bytecode=e,this.type_args=t,this.args=r}serialize(e){e.serializeBytes(this.bytecode),e.serializeVector(this.type_args),e.serializeU32AsUleb128(this.args.length),this.args.forEach(t=>{t.serializeForScriptFunction(e)})}static deserialize(e){let t=e.deserializeBytes(),r=e.deserializeVector(O),i=e.deserializeUleb128AsU32(),o=new Array;for(let s=0;s<i;s+=1){let a=mu(e);o.push(a)}return new n(t,r,o)}},Kn= exports.MultiSig =class n{constructor(e,t){this.multisig_address=e,this.transaction_payload=t}serialize(e){this.multisig_address.serialize(e),this.transaction_payload===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.transaction_payload.serialize(e))}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeBool(),i;return r&&(i=Rn.deserialize(e)),new n(t,i)}},Rn= exports.MultiSigTransactionPayload =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.transaction_payload=e}serialize(e){e.serializeU32AsUleb128(0),this.transaction_payload.serialize(e)}static deserialize(e){return e.deserializeUleb128AsU32(),new n(Ut.deserialize(e))}};var be=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r,i,o,s,a){super(),this.sender=e,this.sequence_number=t,this.payload=r,this.max_gas_amount=i,this.gas_unit_price=o,this.expiration_timestamp_secs=s,this.chain_id=a}serialize(e){this.sender.serialize(e),e.serializeU64(this.sequence_number),this.payload.serialize(e),e.serializeU64(this.max_gas_amount),e.serializeU64(this.gas_unit_price),e.serializeU64(this.expiration_timestamp_secs),this.chain_id.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeU64(),i=Kt.deserialize(e),o=e.deserializeU64(),s=e.deserializeU64(),a=e.deserializeU64(),c=Zt.deserialize(e);return new n(t,r,i,o,s,a,c)}},Ar= exports.RawTransactionWithData =class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return kt.load(e);case 1:return Dt.load(e);default:throw new Error(`Unknown variant index for RawTransactionWithData: ${t}`)}}},kt= exports.MultiAgentRawTransaction =class n extends Ar{constructor(e,t){super(),this.raw_txn=e,this.secondary_signer_addresses=t}serialize(e){e.serializeU32AsUleb128(0),this.raw_txn.serialize(e),e.serializeVector(this.secondary_signer_addresses)}static load(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z);return new n(t,r)}},Dt= exports.FeePayerRawTransaction =class n extends Ar{constructor(e,t,r){super(),this.raw_txn=e,this.secondary_signer_addresses=t,this.fee_payer_address=r}serialize(e){e.serializeU32AsUleb128(1),this.raw_txn.serialize(e),e.serializeVector(this.secondary_signer_addresses),this.fee_payer_address.serialize(e)}static load(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=_chunkMVCKMP5Ujs.Z.deserialize(e);return new n(t,r,i)}};var hr=class extends _chunkMVCKMP5Ujs.l{constructor(t){super();this.accountAddress=_chunkMVCKMP5Ujs.Z.ONE;this.moduleName=new x("account");this.structName=new x("RotationProofChallenge");this.sequenceNumber=new Q(t.sequenceNumber),this.originator=t.originator,this.currentAuthKey=t.currentAuthKey,this.newPublicKey=S.U8(t.newPublicKey.toUint8Array())}serialize(t){t.serialize(this.accountAddress),t.serialize(this.moduleName),t.serialize(this.structName),t.serialize(this.sequenceNumber),t.serialize(this.originator),t.serialize(this.currentAuthKey),t.serialize(this.newPublicKey)}};var et=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return Nt.load(e);case 1:return en.load(e);case 2:return zt.load(e);case 3:return Ft.load(e);case 4:return ft.load(e);default:throw new Error(`Unknown variant index for TransactionAuthenticator: ${t}`)}}isEd25519(){return this instanceof Nt}isMultiEd25519(){return this instanceof en}isMultiAgent(){return this instanceof zt}isFeePayer(){return this instanceof Ft}isSingleSender(){return this instanceof ft}},Nt= exports.TransactionAuthenticatorEd25519 =class n extends et{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(0),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=I.deserialize(e),r=K.deserialize(e);return new n(t,r)}},en= exports.TransactionAuthenticatorMultiEd25519 =class n extends et{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(1),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=Xt.deserialize(e),r=Qe.deserialize(e);return new n(t,r)}},zt= exports.TransactionAuthenticatorMultiAgent =class n extends et{constructor(e,t,r){super(),this.sender=e,this.secondary_signer_addresses=t,this.secondary_signers=r}serialize(e){e.serializeU32AsUleb128(2),this.sender.serialize(e),e.serializeVector(this.secondary_signer_addresses),e.serializeVector(this.secondary_signers)}static load(e){let t=j.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeVector(j);return new n(t,r,i)}},Ft= exports.TransactionAuthenticatorFeePayer =class n extends et{constructor(e,t,r,i){super(),this.sender=e,this.secondary_signer_addresses=t,this.secondary_signers=r,this.fee_payer=i}serialize(e){e.serializeU32AsUleb128(3),this.sender.serialize(e),e.serializeVector(this.secondary_signer_addresses),e.serializeVector(this.secondary_signers),this.fee_payer.address.serialize(e),this.fee_payer.authenticator.serialize(e)}static load(e){let t=j.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeVector(j),o=_chunkMVCKMP5Ujs.Z.deserialize(e),s=j.deserialize(e),a={address:o,authenticator:s};return new n(t,r,i,a)}},ft= exports.TransactionAuthenticatorSingleSender =class n extends et{constructor(e){super(),this.sender=e}serialize(e){e.serializeU32AsUleb128(4),this.sender.serialize(e)}static load(e){let t=j.deserialize(e);return new n(t)}};var tt=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.raw_txn=e,this.authenticator=t}serialize(e){this.raw_txn.serialize(e),this.authenticator.serialize(e)}static deserialize(e){let t=be.deserialize(e),r=et.deserialize(e);return new n(t,r)}};var tn=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.rawTransaction=e,this.feePayerAddress=t}serialize(e){this.rawTransaction.serialize(e),this.feePayerAddress===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.feePayerAddress.serialize(e))}static deserialize(e){let t=be.deserialize(e),r=e.deserializeBool(),i;return r&&(i=_chunkMVCKMP5Ujs.Z.deserialize(e)),new n(t,i)}};var Tr=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r){super(),this.rawTransaction=e,this.feePayerAddress=r,this.secondarySignerAddresses=t}serialize(e){this.rawTransaction.serialize(e),e.serializeVector(this.secondarySignerAddresses),this.feePayerAddress===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.feePayerAddress.serialize(e))}static deserialize(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeBool(),o;return i&&(o=_chunkMVCKMP5Ujs.Z.deserialize(e)),new n(t,r,o)}};function br(n){return n.feePayerAddress?new Dt(n.rawTransaction,_nullishCoalesce(n.secondarySignerAddresses, () => ([])),n.feePayerAddress):n.secondarySignerAddresses?new kt(n.rawTransaction,n.secondarySignerAddresses):n.rawTransaction}function yt(n,e){let t=_sha3.sha3_256.create();if(!e.startsWith("APTOS::"))throw new Error(`Domain separator needs to start with 'APTOS::'. Provided - ${e}`);t.update(e);let r=t.digest(),i=n,o=new Uint8Array(r.length+i.length);return o.set(r),o.set(i,r.length),o}function dA(n){return yt(n.bcsToBytes(),`APTOS::${n.constructor.name}`)}function Ke(n){let e=br(n);return n.feePayerAddress?yt(e.bcsToBytes(),ui):n.secondarySignerAddresses?yt(e.bcsToBytes(),ui):yt(e.bcsToBytes(),Co)}var ae=class n{constructor(e){this.signingScheme=0;let{privateKey:t,address:r}=e;this.privateKey=t,this.publicKey=t.publicKey(),this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress()}static generate(){let e=q.generate();return new n({privateKey:e})}static fromDerivationPath(e){let{path:t,mnemonic:r}=e,i=q.fromDerivationPath(t,r);return new n({privateKey:i})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new ve(this.publicKey,this.privateKey.sign(e))}signTransactionWithAuthenticator(e){return new ve(this.publicKey,this.signTransaction(e))}sign(e){return this.privateKey.sign(e)}signTransaction(e){return this.sign(Ke(e))}};function wi(n){return typeof n=="object"&&n!==null&&"getAnyPublicKey"in n&&typeof n.getAnyPublicKey=="function"}var we=class n{constructor(e){this.signingScheme=2;let{privateKey:t,address:r}=e;this.privateKey=t,this.publicKey=new z(t.publicKey()),this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress()}getAnyPublicKey(){return this.publicKey}static generate(e={}){let{scheme:t=0}=e,r;switch(t){case 0:r=q.generate();break;case 2:r=We.generate();break;default:throw new Error(`Unsupported signature scheme ${t}`)}return new n({privateKey:r})}static fromDerivationPath(e){let{scheme:t=0,path:r,mnemonic:i}=e,o;switch(t){case 0:o=q.fromDerivationPath(r,i);break;case 2:o=We.fromDerivationPath(r,i);break;default:throw new Error(`Unsupported signature scheme ${t}`)}return new n({privateKey:o})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new se(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new se(this.publicKey,this.signTransaction(e))}sign(e){return new H(this.privateKey.sign(e))}signTransaction(e){return this.sign(Ke(e))}static fromEd25519Account(e){return new n({privateKey:e.privateKey,address:e.accountAddress})}};var nt=class{static generate(e={}){let{scheme:t=0,legacy:r=!0}=e;return t===0&&r?ae.generate():we.generate({scheme:t})}static fromPrivateKey(e){let{privateKey:t,address:r,legacy:i=!0}=e;return t instanceof q&&i?new ae({privateKey:t,address:r}):new we({privateKey:t,address:r})}static fromPrivateKeyAndAddress(e){return this.fromPrivateKey(e)}static fromDerivationPath(e){let{scheme:t=0,mnemonic:r,path:i,legacy:o=!0}=e;return t===0&&o?ae.fromDerivationPath({mnemonic:r,path:i}):we.fromDerivationPath({scheme:t,mnemonic:r,path:i})}static authKey(e){let{publicKey:t}=e;return t.authKey()}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync(e)}};var _utils3 = require('@noble/hashes/utils');var Au=1209600,nn=class nn extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{privateKey:t,expiryDateSecs:r,blinder:i}=e;this.privateKey=t,this.publicKey=new lt(t.publicKey()),this.expiryDateSecs=r||_chunkMVCKMP5Ujs.ea.call(void 0, _chunkMVCKMP5Ujs.da.call(void 0, )+Au),this.blinder=i!==void 0?_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array():hu();let o=Tn(this.publicKey.bcsToBytes(),93);o.push(BigInt(this.expiryDateSecs)),o.push(Et(this.blinder));let s=Pt(o);this.nonce=s.toString()}getPublicKey(){return this.publicKey}isExpired(){return Math.floor(Date.now()/1e3)>this.expiryDateSecs}serialize(e){e.serializeU32AsUleb128(this.publicKey.variant),e.serializeBytes(this.privateKey.toUint8Array()),e.serializeU64(this.expiryDateSecs),e.serializeFixedBytes(this.blinder)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=q.deserialize(e);break;default:throw new Error(`Unknown variant index for EphemeralPublicKey: ${t}`)}let i=e.deserializeU64(),o=e.deserializeFixedBytes(31);return new nn({privateKey:r,expiryDateSecs:Number(i),blinder:o})}static fromBytes(e){return nn.deserialize(new R(e))}static generate(e){let t;switch(_optionalChain([e, 'optionalAccess', _71 => _71.scheme])){case 0:default:t=q.generate()}return new nn({privateKey:t,expiryDateSecs:_optionalChain([e, 'optionalAccess', _72 => _72.expiryDateSecs])})}sign(e){if(this.isExpired())throw new Error("EphemeralKeyPair has expired");return new Ue(this.privateKey.sign(e))}};nn.BLINDER_LENGTH=31;var Ot=nn;function hu(){return _utils3.randomBytes.call(void 0, Ot.BLINDER_LENGTH)}var _eventemitter3 = require('eventemitter3'); var _eventemitter32 = _interopRequireDefault(_eventemitter3);function Sr(n){return n!=null&&typeof n.checkKeylessAccountValidity=="function"}var rn=class rn extends _chunkMVCKMP5Ujs.l{constructor(t){super();this.signingScheme=2;let{address:r,ephemeralKeyPair:i,publicKey:o,uidKey:s,uidVal:a,aud:c,pepper:p,proof:l,proofFetchCallback:h,jwt:d,verificationKeyHash:g}=t;if(this.ephemeralKeyPair=i,this.publicKey=o,this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress(),this.uidKey=s,this.uidVal=a,this.aud=c,this.jwt=d,this.emitter=new _eventemitter32.default,this.proofOrPromise=l,l instanceof pe)this.proof=l;else{if(h===void 0)throw new Error("Must provide callback for async proof fetch");this.emitter.on("proofFetchFinish",async v=>{await h(v),this.emitter.removeAllListeners()}),this.init(l)}let b=_chunkMVCKMP5Ujs.j.fromHexInput(p).toUint8Array();if(b.length!==rn.PEPPER_LENGTH)throw new Error(`Pepper length in bytes should be ${rn.PEPPER_LENGTH}`);if(this.pepper=b,g!==void 0){if(_chunkMVCKMP5Ujs.j.hexInputToUint8Array(g).length!==32)throw new Error("verificationKeyHash must be 32 bytes");this.verificationKeyHash=_chunkMVCKMP5Ujs.j.hexInputToUint8Array(g)}}getAnyPublicKey(){return new z(this.publicKey)}async init(t){try{this.proof=await t,this.emitter.emit("proofFetchFinish",{status:"Success"})}catch(r){r instanceof Error?this.emitter.emit("proofFetchFinish",{status:"Failed",error:r.toString()}):this.emitter.emit("proofFetchFinish",{status:"Failed",error:"Unknown"})}}serialize(t){if(this.accountAddress.serialize(t),t.serializeStr(this.jwt),t.serializeStr(this.uidKey),t.serializeFixedBytes(this.pepper),this.ephemeralKeyPair.serialize(t),this.proof===void 0)throw new Error("Cannot serialize - proof undefined");this.proof.serialize(t),t.serializeOption(this.verificationKeyHash,32)}static partialDeserialize(t){let r=_chunkMVCKMP5Ujs.Z.deserialize(t),i=t.deserializeStr(),o=t.deserializeStr(),s=t.deserializeFixedBytes(31),a=Ot.deserialize(t),c=pe.deserialize(t),p=t.deserializeOption("fixedBytes",32);return{address:r,jwt:i,uidKey:o,pepper:s,ephemeralKeyPair:a,proof:c,verificationKeyHash:p}}isExpired(){return this.ephemeralKeyPair.isExpired()}signWithAuthenticator(t){let r=new H(this.sign(t)),i=new z(this.publicKey);return new se(i,r)}signTransactionWithAuthenticator(t){let r=new H(this.signTransaction(t)),i=new z(this.publicKey);return new se(i,r)}async waitForProofFetch(){this.proofOrPromise instanceof Promise&&await this.proofOrPromise}async checkKeylessAccountValidity(t){if(this.isExpired())throw P.fromErrorType({type:0});if(await this.waitForProofFetch(),this.proof===void 0)throw P.fromErrorType({type:2});let r=_jwtdecode.jwtDecode.call(void 0, this.jwt,{header:!0});if(r.kid===void 0)throw P.fromErrorType({type:12,details:"checkKeylessAccountValidity failed. JWT is missing 'kid' in header. This should never happen."});if(this.verificationKeyHash!==void 0){let{verificationKey:i}=await jt({aptosConfig:t});if(_chunkMVCKMP5Ujs.j.hexInputToString(i.hash())!==_chunkMVCKMP5Ujs.j.hexInputToString(this.verificationKeyHash))throw P.fromErrorType({type:4})}else console.warn("[Aptos SDK] The verification key hash was not set. Proof may be invalid if the verification key has rotated.");await rn.fetchJWK({aptosConfig:t,publicKey:this.publicKey,kid:r.kid})}sign(t){let{expiryDateSecs:r}=this.ephemeralKeyPair;if(this.isExpired())throw P.fromErrorType({type:0});if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let i=this.ephemeralKeyPair.getPublicKey(),o=this.ephemeralKeyPair.sign(t);return new he({jwtHeader:_chunkMVCKMP5Ujs.fa.call(void 0, this.jwt.split(".")[0]),ephemeralCertificate:new Wt(this.proof,0),expiryDateSecs:r,ephemeralPublicKey:i,ephemeralSignature:o})}signTransaction(t){if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let r=br(t),o=new wr(r,this.proof.proof).hash();return this.sign(o)}getSigningMessage(t){if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let r=br(t);return new wr(r,this.proof.proof).hash()}verifySignature(t){return this.publicKey.verifySignature(t)}async verifySignatureAsync(t){return this.publicKey.verifySignatureAsync({...t})}static async fetchJWK(t){return bi(t)}};rn.PEPPER_LENGTH=31;var ye=rn,wr= exports.TransactionAndProof =class extends _chunkMVCKMP5Ujs.l{constructor(t,r){super();this.domainSeparator="APTOS::TransactionAndProof";this.transaction=t,this.proof=r}serialize(t){t.serializeFixedBytes(this.transaction.bcsToBytes()),t.serializeOption(this.proof)}hash(){return yt(this.bcsToBytes(),this.domainSeparator)}};var rt=class n extends ye{constructor(e){let t=U.create(e);super({publicKey:t,...e}),this.publicKey=t}serialize(e){super.serialize(e)}static deserialize(e){let{address:t,proof:r,ephemeralKeyPair:i,jwt:o,uidKey:s,pepper:a,verificationKeyHash:c}=ye.partialDeserialize(e),{iss:p,aud:l,uidVal:h}=qe({jwt:o,uidKey:s});return new n({address:t,proof:r,ephemeralKeyPair:i,iss:p,uidKey:s,uidVal:h,aud:l,pepper:a,jwt:o,verificationKeyHash:c})}static fromBytes(e){return n.deserialize(new R(_chunkMVCKMP5Ujs.j.hexInputToUint8Array(e)))}static create(e){let{address:t,proof:r,jwt:i,ephemeralKeyPair:o,pepper:s,uidKey:a="sub",proofFetchCallback:c,verificationKey:p}=e,{iss:l,aud:h,uidVal:d}=qe({jwt:i,uidKey:a});return new n({address:t,proof:r,ephemeralKeyPair:o,iss:l,uidKey:a,uidVal:d,aud:h,pepper:s,jwt:i,proofFetchCallback:c,verificationKeyHash:p?p.hash():void 0})}};var Gt=class n extends ye{constructor(e){let t=te.create(e);super({publicKey:t,...e}),this.publicKey=t,this.audless=_nullishCoalesce(e.audless, () => (!1))}serialize(e){super.serialize(e),this.publicKey.jwkAddress.serialize(e)}static deserialize(e){let{address:t,proof:r,ephemeralKeyPair:i,jwt:o,uidKey:s,pepper:a,verificationKeyHash:c}=ye.partialDeserialize(e),p=_chunkMVCKMP5Ujs.Z.deserialize(e),{iss:l,aud:h,uidVal:d}=qe({jwt:o,uidKey:s});return new n({address:t,proof:r,ephemeralKeyPair:i,iss:l,uidKey:s,uidVal:d,aud:h,pepper:a,jwt:o,verificationKeyHash:c,jwkAddress:p})}static fromBytes(e){return n.deserialize(R.fromHex(e))}static create(e){let{address:t,proof:r,jwt:i,ephemeralKeyPair:o,pepper:s,jwkAddress:a,uidKey:c="sub",proofFetchCallback:p,verificationKey:l}=e,{iss:h,aud:d,uidVal:g}=qe({jwt:i,uidKey:c});return new n({address:t,proof:r,ephemeralKeyPair:o,iss:h,uidKey:c,uidVal:g,aud:d,pepper:s,jwkAddress:_chunkMVCKMP5Ujs.Z.from(a),jwt:i,proofFetchCallback:p,verificationKeyHash:l?l.hash():void 0})}};var Un=class n{constructor(e){this.signingScheme=3;let{multiKey:t,address:r}=e,i=e.signers.map(a=>a instanceof ae?we.fromEd25519Account(a):a);if(t.signaturesRequired>i.length)throw new Error(`Not enough signers provided to satisfy the required signatures. Need ${t.signaturesRequired} signers, but only ${i.length} provided`);if(t.signaturesRequired<i.length)throw new Error(`More signers provided than required. Need ${t.signaturesRequired} signers, but ${i.length} provided`);this.publicKey=t,this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress();let o=[];for(let a of i)o.push(this.publicKey.getIndex(a.getAnyPublicKey()));let s=i.map((a,c)=>[a,o[c]]);s.sort((a,c)=>a[1]-c[1]),this.signers=s.map(a=>a[0]),this.signerIndicies=s.map(a=>a[1]),this.signaturesBitmap=this.publicKey.createBitmap({bits:o})}static fromPublicKeysAndSigners(e){let{address:t,publicKeys:r,signaturesRequired:i,signers:o}=e,s=new Fe({publicKeys:r,signaturesRequired:i});return new n({multiKey:s,signers:o,address:t})}static isMultiKeySigner(e){return e instanceof n}signWithAuthenticator(e){return new Ge(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new Ge(this.publicKey,this.signTransaction(e))}async waitForProofFetch(){let t=this.signers.filter(r=>r instanceof ye).map(async r=>r.waitForProofFetch());await Promise.all(t)}async checkKeylessAccountValidity(e){let r=this.signers.filter(i=>i instanceof ye).map(i=>i.checkKeylessAccountValidity(e));await Promise.all(r)}sign(e){let t=[];for(let r of this.signers)t.push(r.sign(e));return new Oe({signatures:t,bitmap:this.signaturesBitmap})}signTransaction(e){let t=[];for(let r of this.signers)t.push(r.signTransaction(e));return new Oe({signatures:t,bitmap:this.signaturesBitmap})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return await this.publicKey.verifySignatureAsync(e)}};var Er=class{constructor(e){this.signingScheme=1;let{signers:t,publicKey:r,address:i}=e;if(this.publicKey=r,this.accountAddress=i?_chunkMVCKMP5Ujs.Z.from(i):this.publicKey.authKey().derivedAddress(),r.threshold>t.length)throw new Error(`Not enough signers provided to satisfy the required signatures. Need ${r.threshold} signers, but only ${t.length} provided`);if(r.threshold<t.length)throw new Error(`More signers provided than required. Need ${r.threshold} signers, but ${t.length} provided`);let o=[];for(let a of t)o.push(this.publicKey.getIndex(a.publicKey()));let s=t.map((a,c)=>[a,o[c]]);s.sort((a,c)=>a[1]-c[1]),this.signers=s.map(a=>a[0]),this.signerIndices=s.map(a=>a[1]),this.signaturesBitmap=this.publicKey.createBitmap({bits:o})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new je(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new je(this.publicKey,this.signTransaction(e))}sign(e){let t=[];for(let r of this.signers)t.push(r.sign(e));return new Qe({signatures:t,bitmap:this.signaturesBitmap})}signTransaction(e){return this.sign(Ke(e))}};function Bo(n){let e=n.deserializeUleb128AsU32();if(!Object.values(_chunkMVCKMP5Ujs.U).includes(e))throw new Error(`Deserialization of Account failed: SigningScheme variant ${e} is invalid`);return{address:_chunkMVCKMP5Ujs.Z.deserialize(n),signingScheme:e}}function Mo(n,e){if(e.serializeStr(n.jwt),e.serializeStr(n.uidKey),e.serializeFixedBytes(n.pepper),n.ephemeralKeyPair.serialize(e),n.proof===void 0)throw new Error("Cannot serialize - proof undefined");n.proof.serialize(e),e.serializeOption(n.verificationKeyHash,32)}function Vo(n){let e=n.deserializeStr(),t=n.deserializeStr(),r=n.deserializeFixedBytes(31),i=Ot.deserialize(n),o=pe.deserialize(n),s=n.deserializeOption("fixedBytes",32);return{jwt:e,uidKey:t,pepper:r,ephemeralKeyPair:i,proof:o,verificationKeyHash:s}}var Ho;(h=>{function n(d){let g=new _chunkMVCKMP5Ujs.m;switch(g.serializeU32AsUleb128(d.signingScheme),d.accountAddress.serialize(g),d.signingScheme){case 0:return d.privateKey.serialize(g),g.toUint8Array();case 2:{if(!wi(d))throw new Error("Account is not a SingleKeySigner");let b=d.getAnyPublicKey();switch(g.serializeU32AsUleb128(b.variant),b.variant){case 3:return Mo(d,g),g.toUint8Array();case 4:{let v=d;return Mo(v,g),v.publicKey.jwkAddress.serialize(g),g.serializeBool(v.audless),g.toUint8Array()}case 1:case 0:return d.privateKey.serialize(g),g.toUint8Array();default:throw new Error(`Invalid public key variant: ${b.variant}`)}}case 3:{let b=d;return b.publicKey.serialize(g),g.serializeU32AsUleb128(b.signers.length),b.signers.forEach(v=>{g.serializeFixedBytes(n(v))}),g.toUint8Array()}default:throw new Error(`Deserialization of Account failed: invalid signingScheme value ${d.signingScheme}`)}}h.toBytes=n;function e(d){return _chunkMVCKMP5Ujs.j.hexInputToStringWithoutPrefix(n(d))}h.toHexStringWithoutPrefix=e;function t(d){return _chunkMVCKMP5Ujs.j.hexInputToString(n(d))}h.toHexString=t;function r(d){let{address:g,signingScheme:b}=Bo(d);switch(b){case 0:{let v=q.deserialize(d);return new ae({privateKey:v,address:g})}case 2:{let v=d.deserializeUleb128AsU32();switch(v){case 0:{let W=q.deserialize(d);return new we({privateKey:W,address:g})}case 1:{let W=We.deserialize(d);return new we({privateKey:W,address:g})}case 3:{let W=Vo(d),Me=qe(W);return new rt({...W,...Me})}case 4:{let W=Vo(d),Me=_chunkMVCKMP5Ujs.Z.deserialize(d),st=d.deserializeBool(),at=qe(W);return new Gt({...W,...at,jwkAddress:Me,audless:st})}default:throw new Error(`Unsupported public key variant ${v}`)}}case 3:{let v=Fe.deserialize(d),W=d.deserializeUleb128AsU32(),Me=new Array;for(let st=0;st<W;st+=1){let at=r(d);if(!wi(at)&&!(at instanceof ae))throw new Error("Deserialization of MultiKeyAccount failed. Signer is not a SingleKeySigner or Ed25519Account");Me.push(at)}return new Un({multiKey:v,signers:Me,address:g})}default:throw new Error(`Deserialization of Account failed: invalid signingScheme value ${b}`)}}h.deserialize=r;function i(d){let g=p(d);if(!(g instanceof rt))throw new Error("Deserialization of KeylessAccount failed");return g}h.keylessAccountFromHex=i;function o(d){let g=p(d);if(!(g instanceof Gt))throw new Error("Deserialization of FederatedKeylessAccount failed");return g}h.federatedKeylessAccountFromHex=o;function s(d){let g=p(d);if(!(g instanceof Un))throw new Error("Deserialization of MultiKeyAccount failed");return g}h.multiKeyAccountFromHex=s;function a(d){let g=p(d);if(!(g instanceof we))throw new Error("Deserialization of SingleKeyAccount failed");return g}h.singleKeyAccountFromHex=a;function c(d){let g=p(d);if(!(g instanceof ae))throw new Error("Deserialization of Ed25519Account failed");return g}h.ed25519AccountFromHex=c;function p(d){return r(R.fromHex(d))}h.fromHex=p;function l(d){return p(d)}h.fromBytes=l})(Ho||(Ho= exports.AccountUtils ={}));var qo=class n extends nt{constructor({signer:t,accountAddress:r,authenticationFunction:i}){super();this.signingScheme=2;if(!_chunkMVCKMP5Ujs.ma.call(void 0, i))throw new Error(`Invalid authentication function ${i} passed into AbstractedAccount`);this.authenticationFunction=i,this.accountAddress=r,this.publicKey=new ir(this.accountAddress),this.sign=o=>new An(t(o))}static fromPermissionedSigner({signer:t,accountAddress:r}){return new n({signer:i=>{let o=new _chunkMVCKMP5Ujs.m;return t.publicKey.serialize(o),t.sign(i).serialize(o),o.toUint8Array()},accountAddress:_nullishCoalesce(r, () => (t.accountAddress)),authenticationFunction:"0x1::permissioned_delegation::authenticate"})}signWithAuthenticator(t){return new _n(this.authenticationFunction,_sha3.sha3_256.call(void 0, t),this.sign(_sha3.sha3_256.call(void 0, t)).toUint8Array())}signTransactionWithAuthenticator(t){return this.signWithAuthenticator(Ke(t))}signTransaction(t){return this.sign(Ke(t))}setSigner(t){this.sign=r=>new An(t(r))}};var wu=`
6
+ KeylessErrorResolutionTip: ${t}`,o}static fromErrorType(e){let{error:t,type:r,details:i}=e,[o,s,a]=Ro[r];return new n({message:o,details:i,innerError:t,category:s,resolutionTip:a,type:r})}},ee= exports.AptosApiError =class extends Error{constructor({apiType:e,aptosRequest:t,aptosResponse:r}){super(Lc({apiType:e,aptosRequest:t,aptosResponse:r})),this.name="AptosApiError",this.url=r.url,this.status=r.status,this.statusText=r.statusText,this.data=r.data,this.request=t}};function Lc({apiType:n,aptosRequest:e,aptosResponse:t}){let r=_optionalChain([t, 'access', _5 => _5.headers, 'optionalAccess', _6 => _6.traceparent, 'optionalAccess', _7 => _7.split, 'call', _8 => _8("-"), 'access', _9 => _9[1]]),i=r?`(trace_id:${r}) `:"",o=`Request to [${n}]: ${e.method} ${_nullishCoalesce(t.url, () => (e.url))} ${i}failed with`;return n==="Indexer"&&_optionalChain([t, 'access', _10 => _10.data, 'optionalAccess', _11 => _11.errors, 'optionalAccess', _12 => _12[0], 'optionalAccess', _13 => _13.message])!=null?`${o}: ${t.data.errors[0].message}`:_optionalChain([t, 'access', _14 => _14.data, 'optionalAccess', _15 => _15.message])!=null&&_optionalChain([t, 'access', _16 => _16.data, 'optionalAccess', _17 => _17.error_code])!=null?`${o}: ${JSON.stringify(t.data)}`:`${o} status: ${t.statusText}(code:${t.status}) and response body: ${qc(t.data)}`}var pi=400;function qc(n){let e=JSON.stringify(n);return e.length<=pi?e:`truncated(original_size:${e.length}): ${e.slice(0,pi/2)}...${e.slice(-pi/2)}`}async function $c(n,e){let{url:t,method:r,body:i,contentType:o,params:s,overrides:a,originMethod:c}=n,p={..._optionalChain([a, 'optionalAccess', _18 => _18.HEADERS]),"x-aptos-client":`aptos-typescript-sdk/${ii}`,"content-type":_nullishCoalesce(o, () => ("application/json")),"x-aptos-typescript-sdk-origin-method":c};return _optionalChain([a, 'optionalAccess', _19 => _19.AUTH_TOKEN])&&(p.Authorization=`Bearer ${_optionalChain([a, 'optionalAccess', _20 => _20.AUTH_TOKEN])}`),_optionalChain([a, 'optionalAccess', _21 => _21.API_KEY])&&(p.Authorization=`Bearer ${_optionalChain([a, 'optionalAccess', _22 => _22.API_KEY])}`),e.provider({url:t,method:r,body:i,params:s,headers:p,overrides:a})}async function Wc(n,e){if(e.binaryProvider===void 0)throw new Error("Binary provider is not provided");let{url:t,method:r,body:i,contentType:o,acceptType:s,params:a,overrides:c,originMethod:p}=n,l={..._optionalChain([c, 'optionalAccess', _23 => _23.HEADERS]),"x-aptos-client":`aptos-typescript-sdk/${ii}`,"content-type":_nullishCoalesce(o, () => ("application/json")),accept:_nullishCoalesce(s, () => ("application/x-bcs")),"x-aptos-typescript-sdk-origin-method":p};return _optionalChain([c, 'optionalAccess', _24 => _24.AUTH_TOKEN])&&(l.Authorization=`Bearer ${_optionalChain([c, 'optionalAccess', _25 => _25.AUTH_TOKEN])}`),_optionalChain([c, 'optionalAccess', _26 => _26.API_KEY])&&(l.Authorization=`Bearer ${_optionalChain([c, 'optionalAccess', _27 => _27.API_KEY])}`),e.binaryProvider({acceptType:"application/x-bcs",url:t,method:r,body:i,params:a,headers:l,overrides:c})}async function pr(n,e,t){let{url:r,path:i}=n,o=i?`${r}/${i}`:r,s=await $c({...n,url:o},e.client),a={status:s.status,statusText:_nullishCoalesce(s.statusText, () => ("No status text provided")),data:s.data,headers:s.headers,config:s.config,request:s.request,url:o};if(a.status===401)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(t==="Indexer"){let c=a.data;if(c.errors)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});a.data=c.data}else if((t==="Pepper"||t==="Prover")&&a.status>=400)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(a.status>=200&&a.status<300)return a;throw new ee({apiType:t,aptosRequest:n,aptosResponse:a})}async function dr(n,e,t){let{url:r,path:i}=n,o=i?`${r}/${i}`:r,s=await Wc({...n,url:o},e.client),a={status:s.status,statusText:_nullishCoalesce(s.statusText, () => ("No status text provided")),data:s.data,headers:s.headers,config:s.config,request:s.request,url:o};if(a.status===401)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(t==="Indexer"){let c=a.data;if(c.errors)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});a.data=c.data}else if((t==="Pepper"||t==="Prover")&&a.status>=400)throw new ee({apiType:t,aptosRequest:n,aptosResponse:a});if(a.status>=200&&a.status<300)return a;throw new ee({apiType:t,aptosRequest:n,aptosResponse:a})}async function lr(n){let{aptosConfig:e,overrides:t,params:r,contentType:i,acceptType:o,path:s,originMethod:a,type:c}=n,p=e.getRequestUrl(c);return pr({url:p,method:"GET",originMethod:a,path:s,contentType:i,acceptType:o,params:r,overrides:{...e.clientConfig,...t}},e,n.type)}async function Qc(n){let{aptosConfig:e,overrides:t,params:r,contentType:i,acceptType:o,path:s,originMethod:a,type:c}=n,p=e.getRequestUrl(c);return dr({url:p,method:"GET",originMethod:a,path:s,contentType:i,acceptType:o,params:r,overrides:{...e.clientConfig,...t}},e,n.type)}async function V(n){let{aptosConfig:e}=n;return lr({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _28 => _28.clientConfig, 'optionalAccess', _29 => _29.HEADERS]),..._optionalChain([e, 'access', _30 => _30.fullnodeConfig, 'optionalAccess', _31 => _31.HEADERS])}}})}async function ig(n){let{aptosConfig:e}=n;return Qc({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _32 => _32.clientConfig, 'optionalAccess', _33 => _33.HEADERS]),..._optionalChain([e, 'access', _34 => _34.fullnodeConfig, 'optionalAccess', _35 => _35.HEADERS])}}})}async function og(n){return lr({...n,type:"Pepper"})}async function gr(n){let e=new Array(0),t,r=n.params;do{let i=await lr({type:"Fullnode",aptosConfig:n.aptosConfig,originMethod:n.originMethod,path:n.path,params:r,overrides:n.overrides});t=i.headers["x-aptos-cursor"],delete i.headers,e.push(...i.data),r.start=t}while(t!=null);return e}async function di(n){let e=new Array(0),t,r=n.params,i=r.limit;do{let{response:o,cursor:s}=await mr({...n});if(t=s,e.push(...o.data),_optionalChain([n, 'optionalAccess', _36 => _36.params])&&(n.params.start=t),i!==void 0){let a=i-e.length;if(a<=0)break;r.limit=a}}while(t!=null);return e}async function mr(n){let e,t={};typeof _optionalChain([n, 'access', _37 => _37.params, 'optionalAccess', _38 => _38.cursor])=="string"&&(t.start=n.params.cursor),typeof _optionalChain([n, 'access', _39 => _39.params, 'optionalAccess', _40 => _40.limit])=="number"&&(t.limit=n.params.limit);let r=await lr({type:"Fullnode",aptosConfig:n.aptosConfig,originMethod:n.originMethod,path:n.path,params:t,overrides:n.overrides});return e=r.headers["x-aptos-cursor"],{response:r,cursor:e}}async function bn(n){let{type:e,originMethod:t,path:r,body:i,acceptType:o,contentType:s,params:a,aptosConfig:c,overrides:p}=n,l=c.getRequestUrl(e);return pr({url:l,method:"POST",originMethod:t,path:r,body:i,contentType:s,acceptType:o,params:a,overrides:p},c,n.type)}async function jc(n){let{type:e,originMethod:t,path:r,body:i,acceptType:o,contentType:s,params:a,aptosConfig:c,overrides:p}=n,l=c.getRequestUrl(e);return dr({url:l,method:"POST",originMethod:t,path:r,body:i,contentType:s,acceptType:o,params:a,overrides:p},c,n.type)}async function gt(n){let{aptosConfig:e}=n;return bn({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _41 => _41.clientConfig, 'optionalAccess', _42 => _42.HEADERS]),..._optionalChain([e, 'access', _43 => _43.fullnodeConfig, 'optionalAccess', _44 => _44.HEADERS])}}})}async function Uo(n){let{aptosConfig:e}=n;return jc({...n,type:"Fullnode",overrides:{...e.clientConfig,...e.fullnodeConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _45 => _45.clientConfig, 'optionalAccess', _46 => _46.HEADERS]),..._optionalChain([e, 'access', _47 => _47.fullnodeConfig, 'optionalAccess', _48 => _48.HEADERS])}}})}async function ko(n){let{aptosConfig:e}=n;return bn({...n,type:"Indexer",overrides:{...e.clientConfig,...e.indexerConfig,...n.overrides,HEADERS:{..._optionalChain([e, 'access', _49 => _49.clientConfig, 'optionalAccess', _50 => _50.HEADERS]),..._optionalChain([e, 'access', _51 => _51.indexerConfig, 'optionalAccess', _52 => _52.HEADERS])}}})}async function Do(n){let{aptosConfig:e}=n,t={...e,clientConfig:{...e.clientConfig}};return _optionalChainDelete([t, 'optionalAccess', _53 => _53.clientConfig, 'optionalAccess', _54 => delete _54.API_KEY]),bn({...n,type:"Faucet",overrides:{...t.clientConfig,...t.faucetConfig,...n.overrides,HEADERS:{..._optionalChain([t, 'access', _55 => _55.clientConfig, 'optionalAccess', _56 => _56.HEADERS]),..._optionalChain([t, 'access', _57 => _57.faucetConfig, 'optionalAccess', _58 => _58.HEADERS])}}})}async function No(n){return bn({...n,type:"Pepper"})}async function zo(n){return bn({...n,type:"Prover"})}var li=new Map;function De(n,e,t){return async(...r)=>{if(li.has(e)){let{value:o,timestamp:s}=li.get(e);if(t===void 0||Date.now()-s<=t)return o}let i=await n(...r);return li.set(e,{value:i,timestamp:Date.now()}),i}}var _bn254 = require('@noble/curves/bn254');var _utils = require('@noble/curves/abstract/utils');var _jsbase64 = require('js-base64');var Zc=1e7,gi= exports.MAX_AUD_VAL_BYTES =120,eu= exports.MAX_UID_KEY_BYTES =30,tu= exports.MAX_UID_VAL_BYTES =330,nu= exports.MAX_ISS_VAL_BYTES =120,ru= exports.MAX_EXTRA_FIELD_BYTES =350,iu= exports.MAX_JWT_HEADER_B64_BYTES =300,ou= exports.MAX_COMMITED_EPK_BYTES =93,Ne=class Ne extends oe{constructor(e,t){super();let r=_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array();if(r.length!==Ne.ID_COMMITMENT_LENGTH)throw new Error(`Id Commitment length in bytes should be ${Ne.ID_COMMITMENT_LENGTH}`);this.iss=e,this.idCommitment=r}authKey(){let e=new _chunkMVCKMP5Ujs.m;return e.serializeU32AsUleb128(3),e.serializeFixedBytes(this.bcsToBytes()),B.fromSchemeAndBytes({scheme:2,input:e.toUint8Array()})}verifySignature(e){try{return yr({...e,publicKey:this}),!0}catch(t){if(t instanceof P)return!1;throw t}}async verifySignatureAsync(e){return Ti({...e,publicKey:this})}serialize(e){e.serializeStr(this.iss),e.serializeBytes(this.idCommitment)}static deserialize(e){let t=e.deserializeStr(),r=e.deserializeBytes();return new Ne(t,r)}static load(e){let t=e.deserializeStr(),r=e.deserializeBytes();return new Ne(t,r)}static isPublicKey(e){return e instanceof Ne}static create(e){return Fo(e),new Ne(e.iss,Fo(e))}static fromJwtAndPepper(e){let{jwt:t,pepper:r,uidKey:i="sub"}=e,o=_jwtdecode.jwtDecode.call(void 0, t);if(typeof o.iss!="string")throw new Error("iss was not found");if(typeof o.aud!="string")throw new Error("aud was not found or an array of values");let s=o[i];return Ne.create({iss:o.iss,uidKey:i,uidVal:s,aud:o.aud,pepper:r})}static isInstance(e){return"iss"in e&&typeof e.iss=="string"&&"idCommitment"in e&&e.idCommitment instanceof Uint8Array}};Ne.ID_COMMITMENT_LENGTH=32;var U=Ne;async function Ti(n){let{aptosConfig:e,publicKey:t,message:r,signature:i,jwk:o,keylessConfig:s=await jt({aptosConfig:e}),options:a}=n;try{if(!(i instanceof he))throw P.fromErrorType({type:26,details:"Not a keyless signature"});return yr({message:r,publicKey:t,signature:i,jwk:o||await bi({aptosConfig:e,publicKey:t,kid:i.getJwkKid()}),keylessConfig:s}),!0}catch(c){if(_optionalChain([a, 'optionalAccess', _59 => _59.throwErrorWithReason]))throw c;return!1}}function yr(n){let{publicKey:e,message:t,signature:r,keylessConfig:i,jwk:o}=n,{verificationKey:s,maxExpHorizonSecs:a,trainingWheelsPubkey:c}=i;if(!(r instanceof he))throw P.fromErrorType({type:26,details:"Not a keyless signature"});if(!(r.ephemeralCertificate.signature instanceof pe))throw P.fromErrorType({type:26,details:"Unsupported ephemeral certificate variant"});let p=r.ephemeralCertificate.signature;if(!(p.proof.proof instanceof mt))throw P.fromErrorType({type:26,details:"Unsupported proof variant for ZeroKnowledgeSig"});let l=p.proof.proof;if(r.expiryDateSecs<_chunkMVCKMP5Ujs.da.call(void 0, ))throw P.fromErrorType({type:27,details:"The expiryDateSecs is in the past"});if(p.expHorizonSecs>a)throw P.fromErrorType({type:28});if(!r.ephemeralPublicKey.verifySignature({message:t,signature:r.ephemeralSignature}))throw P.fromErrorType({type:29});let h=su({publicKey:e,signature:r,jwk:o,keylessConfig:i});if(!s.verifyProof({publicInputsHash:h,groth16Proof:l}))throw P.fromErrorType({type:32});if(c){if(!p.trainingWheelsSignature)throw P.fromErrorType({type:30});let d=new yi(l,h);if(!c.verifySignature({message:d.hash(),signature:p.trainingWheelsSignature}))throw P.fromErrorType({type:31})}}function su(n){let{publicKey:e,signature:t,jwk:r,keylessConfig:i}=n,o=e instanceof U?e:e.keylessPublicKey;if(!(t.ephemeralCertificate.signature instanceof pe))throw new Error("Signature is not a ZeroKnowledgeSig");let s=t.ephemeralCertificate.signature,a=[];return a.push(...Tn(t.ephemeralPublicKey.toUint8Array(),i.maxCommitedEpkBytes)),a.push(Et(o.idCommitment)),a.push(t.expiryDateSecs),a.push(s.expHorizonSecs),a.push(ke(o.iss,i.maxIssValBytes)),s.extraField?(a.push(1n),a.push(ke(s.extraField,i.maxExtraFieldBytes))):(a.push(0n),a.push(ke(" ",i.maxExtraFieldBytes))),a.push(ke(_jsbase64.encode.call(void 0, t.jwtHeader,!0)+".",i.maxJwtHeaderB64Bytes)),a.push(r.toScalar()),s.overrideAudVal?(a.push(ke(s.overrideAudVal,gi)),a.push(1n)):(a.push(ke("",gi)),a.push(0n)),Pt(a)}async function bi(n){let{aptosConfig:e,publicKey:t,kid:r}=n,i=t instanceof U?t:t.keylessPublicKey,{iss:o}=i,s,a=t instanceof te?t.jwkAddress:void 0;try{s=await uu({aptosConfig:e,jwkAddr:a})}catch(l){throw P.fromErrorType({type:24,error:l,details:`Failed to fetch ${a?"Federated":"Patched"}JWKs ${a?`for address ${a}`:"0x1"}`})}let c=s.get(o);if(c===void 0)throw P.fromErrorType({type:7,details:`JWKs for issuer ${o} not found.`});let p=c.find(l=>l.kid===r);if(p===void 0)throw P.fromErrorType({type:6,details:`JWK with kid '${r}' for issuer '${o}' not found.`});return p}function Fo(n){let{uidKey:e,uidVal:t,aud:r,pepper:i}=n,o=[Et(_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array()),ke(r,gi),ke(t,tu),ke(e,eu)];return ri(Pt(o),U.ID_COMMITMENT_LENGTH)}var he=class n extends M{constructor(e){super();let{jwtHeader:t,ephemeralCertificate:r,expiryDateSecs:i,ephemeralPublicKey:o,ephemeralSignature:s}=e;this.jwtHeader=t,this.ephemeralCertificate=r,this.expiryDateSecs=i,this.ephemeralPublicKey=o,this.ephemeralSignature=s}getJwkKid(){return du(this.jwtHeader).kid}serialize(e){this.ephemeralCertificate.serialize(e),e.serializeStr(this.jwtHeader),e.serializeU64(this.expiryDateSecs),this.ephemeralPublicKey.serialize(e),this.ephemeralSignature.serialize(e)}static deserialize(e){let t=Wt.deserialize(e),r=e.deserializeStr(),i=e.deserializeU64(),o=lt.deserialize(e),s=Ue.deserialize(e);return new n({jwtHeader:r,expiryDateSecs:Number(i),ephemeralCertificate:t,ephemeralPublicKey:o,ephemeralSignature:s})}static getSimulationSignature(){return new n({jwtHeader:"{}",ephemeralCertificate:new Wt(new pe({proof:new Qt(new mt({a:new Uint8Array(32),b:new Uint8Array(64),c:new Uint8Array(32)}),0),expHorizonSecs:0}),0),expiryDateSecs:0,ephemeralPublicKey:new lt(new I(new Uint8Array(32))),ephemeralSignature:new Ue(new K(new Uint8Array(64)))})}static isSignature(e){return e instanceof n}},Wt= exports.EphemeralCertificate =class n extends M{constructor(e,t){super(),this.signature=e,this.variant=t}toUint8Array(){return this.signature.toUint8Array()}serialize(e){e.serializeU32AsUleb128(this.variant),this.signature.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(pe.deserialize(e),t);default:throw new Error(`Unknown variant index for EphemeralCertificate: ${t}`)}}},wn=class wn extends _chunkMVCKMP5Ujs.l{constructor(e){if(super(),this.data=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array(),this.data.length!==32)throw new Error("Input needs to be 32 bytes")}serialize(e){e.serializeFixedBytes(this.data)}static deserialize(e){let t=e.deserializeFixedBytes(32);return new wn(t)}toArray(){let e=this.toProjectivePoint();return[e.x.toString(),e.y.toString(),e.pz.toString()]}toProjectivePoint(){let e=new Uint8Array(this.data);e.reverse();let t=(e[0]&128)>>7,{Fp:r}=_bn254.bn254.fields,i=r.create(mi(e)),o=r.sqrt(r.add(r.pow(i,3n),wn.B)),s=r.neg(o),a=o>s==(t===1)?o:s;return _bn254.bn254.G1.ProjectivePoint.fromAffine({x:i,y:a})}};wn.B=_bn254.bn254.fields.Fp.create(3n);var Le=wn;function mi(n){if(n.length!==32)throw new Error("Input should be 32 bytes");let e=new Uint8Array(n);return e[0]=e[0]&63,_utils.bytesToNumberBE.call(void 0, e)}var Sn=class Sn extends _chunkMVCKMP5Ujs.l{constructor(e){if(super(),this.data=_chunkMVCKMP5Ujs.j.fromHexInput(e).toUint8Array(),this.data.length!==64)throw new Error("Input needs to be 64 bytes")}serialize(e){e.serializeFixedBytes(this.data)}static deserialize(e){let t=e.deserializeFixedBytes(64);return new Sn(t)}toArray(){let e=this.toProjectivePoint();return[[e.x.c0.toString(),e.x.c1.toString()],[e.y.c0.toString(),e.y.c1.toString()],[e.pz.c0.toString(),e.pz.c1.toString()]]}toProjectivePoint(){let e=new Uint8Array(this.data),t=e.slice(0,32).reverse(),r=e.slice(32,64).reverse(),i=(r[0]&128)>>7,{Fp2:o}=_bn254.bn254.fields,s=o.fromBigTuple([mi(t),mi(r)]),a=o.sqrt(o.add(o.pow(s,3n),Sn.B)),c=o.neg(a),l=(a.c1>c.c1||a.c1===c.c1&&a.c0>c.c0)===(i===1)?a:c;return _bn254.bn254.G2.ProjectivePoint.fromAffine({x:s,y:l})}};Sn.B=_bn254.bn254.fields.Fp2.fromBigTuple([19485874751759354771024239261021720505790618469301721065564631296452457478373n,266929791119991161246907387137283842545076965332900288569378510910307636690n]);var It=Sn,mt= exports.Groth16Zkp =class n extends ar{constructor(e){super();let{a:t,b:r,c:i}=e;this.a=new Le(t),this.b=new It(r),this.c=new Le(i)}serialize(e){this.a.serialize(e),this.b.serialize(e),this.c.serialize(e)}static deserialize(e){let t=Le.deserialize(e).bcsToBytes(),r=It.deserialize(e).bcsToBytes(),i=Le.deserialize(e).bcsToBytes();return new n({a:t,b:r,c:i})}toSnarkJsJson(){return{protocol:"groth16",curve:"bn128",pi_a:this.a.toArray(),pi_b:this.b.toArray(),pi_c:this.c.toArray()}}},yi= exports.Groth16ProofAndStatement =class n extends _chunkMVCKMP5Ujs.l{constructor(t,r){super();this.domainSeparator="APTOS::Groth16ProofAndStatement";if(this.proof=t,this.publicInputsHash=typeof r=="bigint"?ri(r,32):_chunkMVCKMP5Ujs.j.fromHexInput(r).toUint8Array(),this.publicInputsHash.length!==32)throw new Error("Invalid public inputs hash")}serialize(t){this.proof.serialize(t),t.serializeFixedBytes(this.publicInputsHash)}static deserialize(t){return new n(mt.deserialize(t),t.deserializeFixedBytes(32))}hash(){return yt(this.bcsToBytes(),this.domainSeparator)}},Qt= exports.ZkProof =class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.proof=e,this.variant=t}serialize(e){e.serializeU32AsUleb128(this.variant),this.proof.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return new n(mt.deserialize(e),t);default:throw new Error(`Unknown variant index for ZkProof: ${t}`)}}},pe= exports.ZeroKnowledgeSig =class n extends M{constructor(e){super();let{proof:t,expHorizonSecs:r,trainingWheelsSignature:i,extraField:o,overrideAudVal:s}=e;this.proof=t,this.expHorizonSecs=r,this.trainingWheelsSignature=i,this.extraField=o,this.overrideAudVal=s}static fromBytes(e){return n.deserialize(new R(e))}serialize(e){this.proof.serialize(e),e.serializeU64(this.expHorizonSecs),e.serializeOption(this.extraField),e.serializeOption(this.overrideAudVal),e.serializeOption(this.trainingWheelsSignature)}static deserialize(e){let t=Qt.deserialize(e),r=Number(e.deserializeU64()),i=e.deserializeOption("string"),o=e.deserializeOption("string"),s=e.deserializeOption(Ue);return new n({proof:t,expHorizonSecs:r,trainingWheelsSignature:s,extraField:i,overrideAudVal:o})}},fi= exports.KeylessConfiguration =class n{constructor(e){let{verificationKey:t,trainingWheelsPubkey:r,maxExpHorizonSecs:i=Zc,maxExtraFieldBytes:o=ru,maxJwtHeaderB64Bytes:s=iu,maxIssValBytes:a=nu,maxCommitedEpkBytes:c=ou}=e;this.verificationKey=t,this.maxExpHorizonSecs=i,r&&(this.trainingWheelsPubkey=new lt(new I(r))),this.maxExtraFieldBytes=o,this.maxJwtHeaderB64Bytes=s,this.maxIssValBytes=a,this.maxCommitedEpkBytes=c}static create(e,t){return new n({verificationKey:new Ai({alphaG1:e.alpha_g1,betaG2:e.beta_g2,deltaG2:e.delta_g2,gammaAbcG1:e.gamma_abc_g1,gammaG2:e.gamma_g2}),maxExpHorizonSecs:Number(t.max_exp_horizon_secs),trainingWheelsPubkey:t.training_wheels_pubkey.vec[0],maxExtraFieldBytes:t.max_extra_field_bytes,maxJwtHeaderB64Bytes:t.max_jwt_header_b64_bytes,maxIssValBytes:t.max_iss_val_bytes,maxCommitedEpkBytes:t.max_commited_epk_bytes})}},Ai= exports.Groth16VerificationKey =class n{constructor(e){let{alphaG1:t,betaG2:r,deltaG2:i,gammaAbcG1:o,gammaG2:s}=e;this.alphaG1=new Le(t),this.betaG2=new It(r),this.deltaG2=new It(i),this.gammaAbcG1=[new Le(o[0]),new Le(o[1])],this.gammaG2=new It(s)}hash(){let e=new _chunkMVCKMP5Ujs.m;return this.serialize(e),_sha3.sha3_256.create().update(e.toUint8Array()).digest()}serialize(e){this.alphaG1.serialize(e),this.betaG2.serialize(e),this.deltaG2.serialize(e),this.gammaAbcG1[0].serialize(e),this.gammaAbcG1[1].serialize(e),this.gammaG2.serialize(e)}static fromGroth16VerificationKeyResponse(e){return new n({alphaG1:e.alpha_g1,betaG2:e.beta_g2,deltaG2:e.delta_g2,gammaAbcG1:e.gamma_abc_g1,gammaG2:e.gamma_g2})}verifyProof(e){let{publicInputsHash:t,groth16Proof:r}=e;try{let i=r.a.toProjectivePoint(),o=r.b.toProjectivePoint(),s=r.c.toProjectivePoint(),a=this.alphaG1.toProjectivePoint(),c=this.betaG2.toProjectivePoint(),p=this.gammaG2.toProjectivePoint(),l=this.deltaG2.toProjectivePoint(),h=this.gammaAbcG1.map(at=>at.toProjectivePoint()),{Fp12:d}=_bn254.bn254.fields,g=h[0].add(h[1].multiply(t)),b=_bn254.bn254.pairing(g,p),v=_bn254.bn254.pairing(i,o),W=_bn254.bn254.pairing(a,c),Me=_bn254.bn254.pairing(s,l),st=d.mul(W,d.mul(b,Me));return d.eql(v,st)}catch(i){throw P.fromErrorType({type:32,error:i,details:"Error encountered when checking zero knowledge relation"})}}toSnarkJsJson(){return{protocol:"groth16",curve:"bn128",nPublic:1,vk_alpha_1:this.alphaG1.toArray(),vk_beta_2:this.betaG2.toArray(),vk_gamma_2:this.gammaG2.toArray(),vk_delta_2:this.deltaG2.toArray(),IC:this.gammaAbcG1.map(e=>e.toArray())}}};async function jt(n){let{aptosConfig:e}=n;try{return await De(async()=>{let[t,r]=await Promise.all([au(n),cu(n)]);return fi.create(r,t)},`keyless-configuration-${e.network}`,1e3*60*5)()}catch(t){throw t instanceof P?t:P.fromErrorType({type:25,error:t})}}function qe(n){let{jwt:e,uidKey:t="sub"}=n,r;try{r=_jwtdecode.jwtDecode.call(void 0, e)}catch(o){throw P.fromErrorType({type:12,details:`Failed to parse JWT - ${_chunkMVCKMP5Ujs.ca.call(void 0, o)}`})}if(typeof r.iss!="string")throw P.fromErrorType({type:12,details:"JWT is missing 'iss' in the payload. This should never happen."});if(typeof r.aud!="string")throw P.fromErrorType({type:12,details:"JWT is missing 'aud' in the payload or 'aud' is an array of values."});let i=r[t];return{iss:r.iss,aud:r.aud,uidVal:i}}async function au(n){let{aptosConfig:e,options:t}=n,r="0x1::keyless_account::Configuration";try{let{data:i}=await V({aptosConfig:e,originMethod:"getKeylessConfigurationResource",path:`accounts/${_chunkMVCKMP5Ujs.Z.from("0x1").toString()}/resource/${r}`,params:{ledger_version:_optionalChain([t, 'optionalAccess', _60 => _60.ledgerVersion])}});return i.data}catch(i){throw P.fromErrorType({type:22,error:i})}}async function cu(n){let{aptosConfig:e,options:t}=n,r="0x1::keyless_account::Groth16VerificationKey";try{let{data:i}=await V({aptosConfig:e,originMethod:"getGroth16VerificationKeyResource",path:`accounts/${_chunkMVCKMP5Ujs.Z.from("0x1").toString()}/resource/${r}`,params:{ledger_version:_optionalChain([t, 'optionalAccess', _61 => _61.ledgerVersion])}});return i.data}catch(i){throw P.fromErrorType({type:23,error:i})}}async function uu(n){let{aptosConfig:e,jwkAddr:t,options:r}=n,i;if(t){let s="0x1::jwks::FederatedJWKs",{data:a}=await V({aptosConfig:e,originMethod:"getKeylessJWKs",path:`accounts/${_chunkMVCKMP5Ujs.Z.from(t).toString()}/resource/${s}`,params:{ledger_version:_optionalChain([r, 'optionalAccess', _62 => _62.ledgerVersion])}});i=a}else{let s="0x1::jwks::PatchedJWKs",{data:a}=await V({aptosConfig:e,originMethod:"getKeylessJWKs",path:`accounts/0x1/resource/${s}`,params:{ledger_version:_optionalChain([r, 'optionalAccess', _63 => _63.ledgerVersion])}});i=a}let o=new Map;for(let s of i.data.jwks.entries){let a=[];for(let c of s.jwks){let{data:p}=c.variant,l=new R(_chunkMVCKMP5Ujs.j.fromHexInput(p).toUint8Array()),h=hi.deserialize(l);a.push(h)}o.set(_chunkMVCKMP5Ujs.k.call(void 0, s.issuer),a)}return o}var hi=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{kid:t,kty:r,alg:i,e:o,n:s}=e;this.kid=t,this.kty=r,this.alg=i,this.e=o,this.n=s}serialize(e){e.serializeStr(this.kid),e.serializeStr(this.kty),e.serializeStr(this.alg),e.serializeStr(this.e),e.serializeStr(this.n)}static fromMoveStruct(e){let{data:t}=e.variant,r=new R(_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array());return n.deserialize(r)}toScalar(){if(this.alg!=="RS256")throw P.fromErrorType({type:32,details:"Failed to convert JWK to scalar when calculating the public inputs hash. Only RSA 256 is supported currently"});let e=_chunkMVCKMP5Ujs.ga.call(void 0, this.n),r=pu(e.reverse()).map(i=>Et(i));return r.push(256n),Pt(r)}static deserialize(e){let t=e.deserializeStr(),r=e.deserializeStr(),i=e.deserializeStr(),o=e.deserializeStr(),s=e.deserializeStr();return new n({kid:t,kty:r,alg:i,n:s,e:o})}};function pu(n){let e=[];for(let t=0;t<n.length;t+=24){let r=n.slice(t,Math.min(t+24,n.length));if(r.length<24){let i=new Uint8Array(24);i.set(r),e.push(i)}else e.push(r)}return e}function du(n){try{let e=JSON.parse(n);if(e.kid===void 0)throw new Error("JWT header missing kid");return e}catch (e2){throw new Error("Failed to parse JWT header.")}}var te=class n extends oe{constructor(e,t){super(),this.jwkAddress=_chunkMVCKMP5Ujs.Z.from(e),this.keylessPublicKey=t}authKey(){let e=new _chunkMVCKMP5Ujs.m;return e.serializeU32AsUleb128(4),e.serializeFixedBytes(this.bcsToBytes()),B.fromSchemeAndBytes({scheme:2,input:e.toUint8Array()})}verifySignature(e){try{return yr({...e,publicKey:this}),!0}catch (e3){return!1}}serialize(e){this.jwkAddress.serialize(e),this.keylessPublicKey.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=U.deserialize(e);return new n(t,r)}static isPublicKey(e){return e instanceof n}async verifySignatureAsync(e){return Ti({...e,publicKey:this})}static create(e){return new n(e.jwkAddress,U.create(e))}static fromJwtAndPepper(e){return new n(e.jwkAddress,U.fromJwtAndPepper(e))}static isInstance(e){return"jwkAddress"in e&&e.jwkAddress instanceof _chunkMVCKMP5Ujs.Z&&"keylessPublicKey"in e&&e.keylessPublicKey instanceof U}};var _secp256k1 = require('@noble/curves/secp256k1');var _bip32 = require('@scure/bip32');var Ce=class Ce extends St{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e),{length:r}=t.toUint8Array();if(r===Ce.LENGTH)this.key=t;else if(r===Ce.COMPRESSED_LENGTH){let i=_secp256k1.secp256k1.ProjectivePoint.fromHex(t.toUint8Array());this.key=_chunkMVCKMP5Ujs.j.fromHexInput(i.toRawBytes(!1))}else throw new Error(`PublicKey length should be ${Ce.LENGTH} or ${Ce.COMPRESSED_LENGTH}, received ${r}`)}verifySignature(e){let{message:t,signature:r}=e,i=qt(t),o=_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array(),s=_sha3.sha3_256.call(void 0, o),a=r.toUint8Array();return _secp256k1.secp256k1.verify(a,s,this.key.toUint8Array(),{lowS:!0})}async verifySignatureAsync(e){return this.verifySignature(e)}toUint8Array(){return this.key.toUint8Array()}serialize(e){e.serializeBytes(this.key.toUint8Array())}deserialize(e){let t=e.deserializeBytes();return new Ct(t)}static deserialize(e){let t=e.deserializeBytes();return new Ce(t)}static isPublicKey(e){return e instanceof Ce}static isInstance(e){return"key"in e&&_optionalChain([e, 'access', _64 => _64.key, 'optionalAccess', _65 => _65.data, 'optionalAccess', _66 => _66.length])===Ce.LENGTH}};Ce.LENGTH=65,Ce.COMPRESSED_LENGTH=33;var $e=Ce,ze=class ze extends _chunkMVCKMP5Ujs.l{constructor(e,t){super();let r=pt.parseHexInput(e,"secp256k1",t);if(r.toUint8Array().length!==ze.LENGTH)throw new Error(`PrivateKey length should be ${ze.LENGTH}`);this.key=r}static generate(){let e=_secp256k1.secp256k1.utils.randomPrivateKey();return new ze(e,!1)}static fromDerivationPath(e,t){if(!fo(e))throw new Error(`Invalid derivation path ${e}`);return ze.fromDerivationPathInner(e,or(t))}static fromDerivationPathInner(e,t){let{privateKey:r}=_bip32.HDKey.fromMasterSeed(t).derive(e);if(r===null)throw new Error("Invalid key");return new ze(r,!1)}sign(e){let t=qt(e),r=_chunkMVCKMP5Ujs.j.fromHexInput(t),i=_sha3.sha3_256.call(void 0, r.toUint8Array()),o=_secp256k1.secp256k1.sign(i,this.key.toUint8Array(),{lowS:!0});return new Ct(o.toCompactRawBytes())}publicKey(){let e=_secp256k1.secp256k1.getPublicKey(this.key.toUint8Array(),!1);return new $e(e)}toUint8Array(){return this.key.toUint8Array()}toString(){return this.toHexString()}toHexString(){return this.key.toString()}toAIP80String(){return pt.formatPrivateKey(this.key.toString(),"secp256k1")}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new ze(t,!1)}static isPrivateKey(e){return e instanceof ze}};ze.LENGTH=32;var We=ze,Jt=class Jt extends M{constructor(e){super();let t=_chunkMVCKMP5Ujs.j.fromHexInput(e);if(t.toUint8Array().length!==Jt.LENGTH)throw new Error(`Signature length should be ${Jt.LENGTH}, received ${t.toUint8Array().length}`);this.data=t}toUint8Array(){return this.data.toUint8Array()}serialize(e){e.serializeBytes(this.data.toUint8Array())}static deserialize(e){let t=e.deserializeBytes();return new Jt(t)}};Jt.LENGTH=64;var Ct=Jt;var z=class n extends oe{constructor(e){if(super(),this.publicKey=e,e instanceof I)this.variant=0;else if(e instanceof $e)this.variant=1;else if(e instanceof U)this.variant=3;else if(e instanceof te)this.variant=4;else throw new Error("Unsupported public key type")}verifySignature(e){let{message:t,signature:r}=e;if(this.publicKey instanceof U)throw new Error("Use verifySignatureAsync to verify Keyless signatures");return this.publicKey.verifySignature({message:t,signature:r.signature})}async verifySignatureAsync(e){if(!(e.signature instanceof H)){if(_optionalChain([e, 'access', _67 => _67.options, 'optionalAccess', _68 => _68.throwErrorWithReason]))throw new Error("Signature must be an instance of AnySignature");return!1}return await this.publicKey.verifySignatureAsync({...e,signature:e.signature.signature})}authKey(){return B.fromSchemeAndBytes({scheme:2,input:this.toUint8Array()})}toUint8Array(){return this.bcsToBytes()}serialize(e){e.serializeU32AsUleb128(this.variant),this.publicKey.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=I.deserialize(e);break;case 1:r=$e.deserialize(e);break;case 3:r=U.deserialize(e);break;case 4:r=te.deserialize(e);break;default:throw new Error(`Unknown variant index for AnyPublicKey: ${t}`)}return new n(r)}static isPublicKey(e){return e instanceof n}isEd25519(){return this.publicKey instanceof I}isSecp256k1PublicKey(){return this.publicKey instanceof $e}static isInstance(e){return"publicKey"in e&&"variant"in e}},H= exports.AnySignature =class n extends M{constructor(e){if(super(),this.signature=e,e instanceof K)this.variant=0;else if(e instanceof Ct)this.variant=1;else if(e instanceof he)this.variant=3;else throw new Error("Unsupported signature type")}toUint8Array(){return console.warn("[Aptos SDK] Calls to AnySignature.toUint8Array() will soon return the underlying signature bytes. Use AnySignature.bcsToBytes() instead."),this.bcsToBytes()}serialize(e){e.serializeU32AsUleb128(this.variant),this.signature.serialize(e)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=K.deserialize(e);break;case 1:r=Ct.deserialize(e);break;case 3:r=he.deserialize(e);break;default:throw new Error(`Unknown variant index for AnySignature: ${t}`)}return new n(r)}static isInstance(e){return"signature"in e&&typeof e.signature=="object"&&e.signature!==null&&"toUint8Array"in e.signature}};function gu(n){let e=n;return e-=e>>1&1431655765,e=(e&858993459)+(e>>2&858993459),(e+(e>>4)&252645135)*16843009>>24}var Pn=class extends oe{constructor(e){super(),this.publicKeys=e.publicKeys}createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach((s,a)=>{if(a+1>this.publicKeys.length)throw new Error(`Signature index ${a+1} is out of public keys range, ${this.publicKeys.length}.`);if(o.has(s))throw new Error(`Duplicate bit ${s} detected.`);o.add(s);let c=Math.floor(s/8),p=i[c];p|=r>>s%8,i[c]=p}),i}getIndex(e){let t=this.publicKeys.findIndex(r=>r.toString()===e.toString());if(t!==-1)return t;throw new Error(`Public key ${e} not found in multi key set ${this.publicKeys}`)}},Fe= exports.MultiKey =class n extends Pn{constructor(e){let{publicKeys:t,signaturesRequired:r}=e;if(super({publicKeys:t}),r<1)throw new Error("The number of required signatures needs to be greater than 0");if(t.length<r)throw new Error(`Provided ${t.length} public keys is smaller than the ${r} required signatures`);this.publicKeys=t.map(i=>i instanceof z?i:new z(i)),this.signaturesRequired=r}verifySignature(e){let{message:t,signature:r}=e;if(r.signatures.length!==this.signaturesRequired)throw new Error("The number of signatures does not match the number of required signatures");let i=r.bitMapToSignerIndices();for(let o=0;o<r.signatures.length;o+=1){let s=r.signatures[o];if(!this.publicKeys[i[o]].verifySignature({message:t,signature:s}))return!1}return!0}async verifySignatureAsync(e){let{signature:t}=e;try{if(!(t instanceof Oe))throw new Error("Signature is not a MultiKeySignature");if(t.signatures.length!==this.signaturesRequired)throw new Error("The number of signatures does not match the number of required signatures");let r=t.bitMapToSignerIndices();for(let i=0;i<t.signatures.length;i+=1){let o=t.signatures[i];if(!await this.publicKeys[r[i]].verifySignatureAsync({...e,signature:o}))return!1}return!0}catch(r){if(_optionalChain([e, 'access', _69 => _69.options, 'optionalAccess', _70 => _70.throwErrorWithReason]))throw r;return!1}}authKey(){return B.fromSchemeAndBytes({scheme:3,input:this.toUint8Array()})}serialize(e){e.serializeVector(this.publicKeys),e.serializeU8(this.signaturesRequired)}static deserialize(e){let t=e.deserializeVector(z),r=e.deserializeU8();return new n({publicKeys:t,signaturesRequired:r})}getIndex(e){let t=e instanceof z?e:new z(e);return super.getIndex(t)}static isInstance(e){return"publicKeys"in e&&"signaturesRequired"in e}},de=class de extends M{constructor(e){super();let{signatures:t,bitmap:r}=e;if(t.length>de.MAX_SIGNATURES_SUPPORTED)throw new Error(`The number of signatures cannot be greater than ${de.MAX_SIGNATURES_SUPPORTED}`);if(this.signatures=t.map(o=>o instanceof H?o:new H(o)),!(r instanceof Uint8Array))this.bitmap=de.createBitmap({bits:r});else{if(r.length!==de.BITMAP_LEN)throw new Error(`"bitmap" length should be ${de.BITMAP_LEN}`);this.bitmap=r}let i=this.bitmap.reduce((o,s)=>o+gu(s),0);if(i!==this.signatures.length)throw new Error(`Expecting ${i} signatures from the bitmap, but got ${this.signatures.length}`)}static createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach(s=>{if(s>=de.MAX_SIGNATURES_SUPPORTED)throw new Error(`Cannot have a signature larger than ${de.MAX_SIGNATURES_SUPPORTED-1}.`);if(o.has(s))throw new Error("Duplicate bits detected.");o.add(s);let a=Math.floor(s/8),c=i[a];c|=r>>s%8,i[a]=c}),i}bitMapToSignerIndices(){let e=[];for(let t=0;t<this.bitmap.length;t+=1){let r=this.bitmap[t];for(let i=0;i<8;i+=1)(r&128>>i)!==0&&e.push(t*8+i)}return e}serialize(e){e.serializeVector(this.signatures),e.serializeBytes(this.bitmap)}static deserialize(e){let t=e.deserializeVector(H),r=e.deserializeBytes();return new de({signatures:t,bitmap:r})}};de.BITMAP_LEN=4,de.MAX_SIGNATURES_SUPPORTED=de.BITMAP_LEN*8;var Oe=de;var Te=class Te extends Pn{constructor(e){let{publicKeys:t,threshold:r}=e;if(super({publicKeys:t}),t.length>Te.MAX_KEYS||t.length<Te.MIN_KEYS)throw new Error(`Must have between ${Te.MIN_KEYS} and ${Te.MAX_KEYS} public keys, inclusive`);if(r<Te.MIN_THRESHOLD||r>t.length)throw new Error(`Threshold must be between ${Te.MIN_THRESHOLD} and ${t.length}, inclusive`);this.publicKeys=t,this.threshold=r}verifySignature(e){let{message:t,signature:r}=e;if(!(r instanceof Qe))return!1;let i=[];for(let o=0;o<4;o+=1)for(let s=0;s<8;s+=1)if((r.bitmap[o]&1<<7-s)!==0){let c=o*8+s;i.push(c)}if(i.length!==r.signatures.length)throw new Error("Bitmap and signatures length mismatch");if(i.length<this.threshold)throw new Error("Not enough signatures");for(let o=0;o<i.length;o+=1)if(!this.publicKeys[i[o]].verifySignature({message:t,signature:r.signatures[o]}))return!1;return!0}async verifySignatureAsync(e){return this.verifySignature(e)}authKey(){return B.fromSchemeAndBytes({scheme:1,input:this.toUint8Array()})}toUint8Array(){let e=new Uint8Array(this.publicKeys.length*I.LENGTH+1);return this.publicKeys.forEach((t,r)=>{e.set(t.toUint8Array(),r*I.LENGTH)}),e[this.publicKeys.length*I.LENGTH]=this.threshold,e}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes(),r=t[t.length-1],i=[];for(let o=0;o<t.length-1;o+=I.LENGTH){let s=o;i.push(new I(t.subarray(s,s+I.LENGTH)))}return new Te({publicKeys:i,threshold:r})}getIndex(e){return super.getIndex(e)}};Te.MAX_KEYS=32,Te.MIN_KEYS=2,Te.MIN_THRESHOLD=1;var Xt=Te,le=class le extends M{constructor(e){super();let{signatures:t,bitmap:r}=e;if(t.length>le.MAX_SIGNATURES_SUPPORTED)throw new Error(`The number of signatures cannot be greater than ${le.MAX_SIGNATURES_SUPPORTED}`);if(this.signatures=t,!(r instanceof Uint8Array))this.bitmap=le.createBitmap({bits:r});else{if(r.length!==le.BITMAP_LEN)throw new Error(`"bitmap" length should be ${le.BITMAP_LEN}`);this.bitmap=r}}toUint8Array(){let e=new Uint8Array(this.signatures.length*K.LENGTH+le.BITMAP_LEN);return this.signatures.forEach((t,r)=>{e.set(t.toUint8Array(),r*K.LENGTH)}),e.set(this.bitmap,this.signatures.length*K.LENGTH),e}serialize(e){e.serializeBytes(this.toUint8Array())}static deserialize(e){let t=e.deserializeBytes(),r=t.subarray(t.length-4),i=[];for(let o=0;o<t.length-r.length;o+=K.LENGTH){let s=o;i.push(new K(t.subarray(s,s+K.LENGTH)))}return new le({signatures:i,bitmap:r})}static createBitmap(e){let{bits:t}=e,r=128,i=new Uint8Array([0,0,0,0]),o=new Set;return t.forEach((s,a)=>{if(s>=le.MAX_SIGNATURES_SUPPORTED)throw new Error(`Cannot have a signature larger than ${le.MAX_SIGNATURES_SUPPORTED-1}.`);if(o.has(s))throw new Error("Duplicate bits detected.");if(a>0&&s<=t[a-1])throw new Error("The bits need to be sorted in ascending order.");o.add(s);let c=Math.floor(s/8),p=i[c];p|=r>>s%8,i[c]=p}),i}};le.MAX_SIGNATURES_SUPPORTED=32,le.BITMAP_LEN=4;var Qe=le;var j=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return ve.load(e);case 1:return je.load(e);case 2:return se.load(e);case 3:return Ge.load(e);case 4:return Yt.load(e);case 5:return _n.load(e);default:throw new Error(`Unknown variant index for AccountAuthenticator: ${t}`)}}isEd25519(){return this instanceof ve}isMultiEd25519(){return this instanceof je}isSingleKey(){return this instanceof se}isMultiKey(){return this instanceof Ge}},ve= exports.AccountAuthenticatorEd25519 =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(0),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=I.deserialize(e),r=K.deserialize(e);return new n(t,r)}},je= exports.AccountAuthenticatorMultiEd25519 =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(1),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=Xt.deserialize(e),r=Qe.deserialize(e);return new n(t,r)}},se= exports.AccountAuthenticatorSingleKey =class n extends j{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(2),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=z.deserialize(e),r=H.deserialize(e);return new n(t,r)}},Ge= exports.AccountAuthenticatorMultiKey =class n extends j{constructor(e,t){super(),this.public_keys=e,this.signatures=t}serialize(e){e.serializeU32AsUleb128(3),this.public_keys.serialize(e),this.signatures.serialize(e)}static load(e){let t=Fe.deserialize(e),r=Oe.deserialize(e);return new n(t,r)}},Yt= exports.AccountAuthenticatorNoAccountAuthenticator =class n extends j{serialize(e){e.serializeU32AsUleb128(4)}static load(e){return new n}},_n= exports.AccountAuthenticatorAbstraction =class n extends j{constructor(e,t,r){if(super(),!_chunkMVCKMP5Ujs.ma.call(void 0, e))throw new Error(`Invalid function info ${e} passed into AccountAuthenticatorAbstraction`);this.functionInfo=e,this.authenticator=_chunkMVCKMP5Ujs.j.fromHexInput(r),this.signingMessageDigest=_chunkMVCKMP5Ujs.j.fromHexInput(_chunkMVCKMP5Ujs.j.fromHexInput(t).toUint8Array())}serialize(e){e.serializeU32AsUleb128(5);let{moduleAddress:t,moduleName:r,functionName:i}=_chunkMVCKMP5Ujs.la.call(void 0, this.functionInfo);_chunkMVCKMP5Ujs.Z.fromString(t).serialize(e),e.serializeStr(r),e.serializeStr(i),e.serializeU32AsUleb128(0),e.serializeBytes(this.signingMessageDigest.toUint8Array()),e.serializeFixedBytes(this.authenticator.toUint8Array())}static load(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeStr(),i=e.deserializeStr(),o=e.deserializeUleb128AsU32();if(o===0){let s=e.deserializeBytes(),a=e.deserializeFixedBytes(e.remaining());return new n(`${t}::${r}::${i}`,s,a)}throw new Error(`Unknown variant index for AccountAuthenticatorAbstraction: ${o}`)}};var Zt=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.chainId=e}serialize(e){e.serializeU8(this.chainId)}static deserialize(e){let t=e.deserializeU8();return new n(t)}};var k=class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.identifier=e}serialize(e){e.serializeStr(this.identifier)}static deserialize(e){let t=e.deserializeStr();return new n(t)}};var xn=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.address=e,this.name=t}static fromStr(e){let t=e.split("::");if(t.length!==2)throw new Error("Invalid module id.");return new n(_chunkMVCKMP5Ujs.Z.fromString(t[0]),new k(t[1]))}serialize(e){this.address.serialize(e),this.name.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e);return new n(t,r)}};var O=class n extends _chunkMVCKMP5Ujs.l{deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e),i=k.deserialize(e),o=e.deserializeVector(n);return new Be(t,r,i,o)}static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return L.load(e);case 1:return ge.load(e);case 2:return J.load(e);case 3:return Ye.load(e);case 4:return F.load(e);case 5:return vt.load(e);case 6:return C.load(e);case 7:return A.load(e);case 8:return Je.load(e);case 9:return Xe.load(e);case 10:return Ze.load(e);case 255:return G.load(e);default:throw new Error(`Unknown variant index for TypeTag: ${t}`)}}isBool(){return this instanceof L}isAddress(){return this instanceof F}isGeneric(){return this instanceof G}isSigner(){return this instanceof vt}isVector(){return this instanceof C}isStruct(){return this instanceof A}isU8(){return this instanceof ge}isU16(){return this instanceof Je}isU32(){return this instanceof Xe}isU64(){return this instanceof J}isU128(){return this instanceof Ye}isU256(){return this instanceof Ze}isPrimitive(){return this instanceof vt||this instanceof F||this instanceof L||this instanceof ge||this instanceof Je||this instanceof Xe||this instanceof J||this instanceof Ye||this instanceof Ze}},L= exports.TypeTagBool =class n extends O{toString(){return"bool"}serialize(e){e.serializeU32AsUleb128(0)}static load(e){return new n}},ge= exports.TypeTagU8 =class n extends O{toString(){return"u8"}serialize(e){e.serializeU32AsUleb128(1)}static load(e){return new n}},Je= exports.TypeTagU16 =class n extends O{toString(){return"u16"}serialize(e){e.serializeU32AsUleb128(8)}static load(e){return new n}},Xe= exports.TypeTagU32 =class n extends O{toString(){return"u32"}serialize(e){e.serializeU32AsUleb128(9)}static load(e){return new n}},J= exports.TypeTagU64 =class n extends O{toString(){return"u64"}serialize(e){e.serializeU32AsUleb128(2)}static load(e){return new n}},Ye= exports.TypeTagU128 =class n extends O{toString(){return"u128"}serialize(e){e.serializeU32AsUleb128(3)}static load(e){return new n}},Ze= exports.TypeTagU256 =class n extends O{toString(){return"u256"}serialize(e){e.serializeU32AsUleb128(10)}static load(e){return new n}},F= exports.TypeTagAddress =class n extends O{toString(){return"address"}serialize(e){e.serializeU32AsUleb128(4)}static load(e){return new n}},vt= exports.TypeTagSigner =class n extends O{toString(){return"signer"}serialize(e){e.serializeU32AsUleb128(5)}static load(e){return new n}},fr= exports.TypeTagReference =class n extends O{constructor(t){super();this.value=t}toString(){return`&${this.value.toString()}`}serialize(t){t.serializeU32AsUleb128(254)}static load(t){let r=O.deserialize(t);return new n(r)}},G= exports.TypeTagGeneric =class n extends O{constructor(t){super();this.value=t;if(t<0)throw new Error("Generic type parameter index cannot be negative")}toString(){return`T${this.value}`}serialize(t){t.serializeU32AsUleb128(255),t.serializeU32(this.value)}static load(t){let r=t.deserializeU32();return new n(r)}},C= exports.TypeTagVector =class n extends O{constructor(t){super();this.value=t}toString(){return`vector<${this.value.toString()}>`}static u8(){return new n(new ge)}serialize(t){t.serializeU32AsUleb128(6),this.value.serialize(t)}static load(t){let r=O.deserialize(t);return new n(r)}},A= exports.TypeTagStruct =class n extends O{constructor(t){super();this.value=t}toString(){let t="";return this.value.typeArgs.length>0&&(t=`<${this.value.typeArgs.map(r=>r.toString()).join(", ")}>`),`${this.value.address.toString()}::${this.value.moduleName.identifier}::${this.value.name.identifier}${t}`}serialize(t){t.serializeU32AsUleb128(7),this.value.serialize(t)}static load(t){let r=Be.deserialize(t);return new n(r)}isTypeTag(t,r,i){return this.value.moduleName.identifier===r&&this.value.name.identifier===i&&this.value.address.equals(t)}isString(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"string","String")}isOption(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"option","Option")}isObject(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"object","Object")}isDelegationKey(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"permissioned_delegation","DelegationKey")}isRateLimiter(){return this.isTypeTag(_chunkMVCKMP5Ujs.Z.ONE,"rate_limiter","RateLimiter")}},Be= exports.StructTag =class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r,i){super(),this.address=e,this.moduleName=t,this.name=r,this.typeArgs=i}serialize(e){e.serialize(this.address),e.serialize(this.moduleName),e.serialize(this.name),e.serializeVector(this.typeArgs)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=k.deserialize(e),i=k.deserialize(e),o=e.deserializeVector(O);return new n(t,r,i,o)}};function Yy(){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("aptos_coin"),new k("AptosCoin"),[])}function _(){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("string"),new k("String"),[])}function Zy(n){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("option"),new k("Option"),[n])}function me(n){return new Be(_chunkMVCKMP5Ujs.Z.ONE,new k("object"),new k("Object"),[n])}function mu(n){let e=n.deserializeUleb128AsU32();switch(e){case 0:return Y.deserialize(n);case 1:return Q.deserialize(n);case 2:return xe.deserialize(n);case 3:return _chunkMVCKMP5Ujs.Z.deserialize(n);case 4:return S.deserialize(n,Y);case 5:return N.deserialize(n);case 6:return Pe.deserialize(n);case 7:return _e.deserialize(n);case 8:return fe.deserialize(n);case 9:return fn.deserialize(n);default:throw new Error(`Unknown variant index for ScriptTransactionArgument: ${e}`)}}var Kt=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return Rt.load(e);case 2:return In.load(e);case 3:return Cn.load(e);default:throw new Error(`Unknown variant index for TransactionPayload: ${t}`)}}},Rt= exports.TransactionPayloadScript =class n extends Kt{constructor(e){super(),this.script=e}serialize(e){e.serializeU32AsUleb128(0),this.script.serialize(e)}static load(e){let t=vn.deserialize(e);return new n(t)}},In= exports.TransactionPayloadEntryFunction =class n extends Kt{constructor(e){super(),this.entryFunction=e}serialize(e){e.serializeU32AsUleb128(2),this.entryFunction.serialize(e)}static load(e){let t=Ut.deserialize(e);return new n(t)}},Cn= exports.TransactionPayloadMultiSig =class n extends Kt{constructor(e){super(),this.multiSig=e}serialize(e){e.serializeU32AsUleb128(3),this.multiSig.serialize(e)}static load(e){let t=Kn.deserialize(e);return new n(t)}},Ut= exports.EntryFunction =class n{constructor(e,t,r,i){this.module_name=e,this.function_name=t,this.type_args=r,this.args=i}static build(e,t,r,i){return new n(xn.fromStr(e),new k(t),r,i)}serialize(e){this.module_name.serialize(e),this.function_name.serialize(e),e.serializeVector(this.type_args),e.serializeU32AsUleb128(this.args.length),this.args.forEach(t=>{t.serializeForEntryFunction(e)})}static deserialize(e){let t=xn.deserialize(e),r=k.deserialize(e),i=e.deserializeVector(O),o=e.deserializeUleb128AsU32(),s=new Array;for(let a=0;a<o;a+=1){let c=e.deserializeUleb128AsU32(),p=rr.deserialize(e,c);s.push(p)}return new n(t,r,i,s)}},vn= exports.Script =class n{constructor(e,t,r){this.bytecode=e,this.type_args=t,this.args=r}serialize(e){e.serializeBytes(this.bytecode),e.serializeVector(this.type_args),e.serializeU32AsUleb128(this.args.length),this.args.forEach(t=>{t.serializeForScriptFunction(e)})}static deserialize(e){let t=e.deserializeBytes(),r=e.deserializeVector(O),i=e.deserializeUleb128AsU32(),o=new Array;for(let s=0;s<i;s+=1){let a=mu(e);o.push(a)}return new n(t,r,o)}},Kn= exports.MultiSig =class n{constructor(e,t){this.multisig_address=e,this.transaction_payload=t}serialize(e){this.multisig_address.serialize(e),this.transaction_payload===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.transaction_payload.serialize(e))}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeBool(),i;return r&&(i=Rn.deserialize(e)),new n(t,i)}},Rn= exports.MultiSigTransactionPayload =class n extends _chunkMVCKMP5Ujs.l{constructor(e){super(),this.transaction_payload=e}serialize(e){e.serializeU32AsUleb128(0),this.transaction_payload.serialize(e)}static deserialize(e){return e.deserializeUleb128AsU32(),new n(Ut.deserialize(e))}};var be=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r,i,o,s,a){super(),this.sender=e,this.sequence_number=t,this.payload=r,this.max_gas_amount=i,this.gas_unit_price=o,this.expiration_timestamp_secs=s,this.chain_id=a}serialize(e){this.sender.serialize(e),e.serializeU64(this.sequence_number),this.payload.serialize(e),e.serializeU64(this.max_gas_amount),e.serializeU64(this.gas_unit_price),e.serializeU64(this.expiration_timestamp_secs),this.chain_id.serialize(e)}static deserialize(e){let t=_chunkMVCKMP5Ujs.Z.deserialize(e),r=e.deserializeU64(),i=Kt.deserialize(e),o=e.deserializeU64(),s=e.deserializeU64(),a=e.deserializeU64(),c=Zt.deserialize(e);return new n(t,r,i,o,s,a,c)}},Ar= exports.RawTransactionWithData =class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return kt.load(e);case 1:return Dt.load(e);default:throw new Error(`Unknown variant index for RawTransactionWithData: ${t}`)}}},kt= exports.MultiAgentRawTransaction =class n extends Ar{constructor(e,t){super(),this.raw_txn=e,this.secondary_signer_addresses=t}serialize(e){e.serializeU32AsUleb128(0),this.raw_txn.serialize(e),e.serializeVector(this.secondary_signer_addresses)}static load(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z);return new n(t,r)}},Dt= exports.FeePayerRawTransaction =class n extends Ar{constructor(e,t,r){super(),this.raw_txn=e,this.secondary_signer_addresses=t,this.fee_payer_address=r}serialize(e){e.serializeU32AsUleb128(1),this.raw_txn.serialize(e),e.serializeVector(this.secondary_signer_addresses),this.fee_payer_address.serialize(e)}static load(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=_chunkMVCKMP5Ujs.Z.deserialize(e);return new n(t,r,i)}};var hr=class extends _chunkMVCKMP5Ujs.l{constructor(t){super();this.accountAddress=_chunkMVCKMP5Ujs.Z.ONE;this.moduleName=new x("account");this.structName=new x("RotationProofChallenge");this.sequenceNumber=new Q(t.sequenceNumber),this.originator=t.originator,this.currentAuthKey=t.currentAuthKey,this.newPublicKey=S.U8(t.newPublicKey.toUint8Array())}serialize(t){t.serialize(this.accountAddress),t.serialize(this.moduleName),t.serialize(this.structName),t.serialize(this.sequenceNumber),t.serialize(this.originator),t.serialize(this.currentAuthKey),t.serialize(this.newPublicKey)}};var et=class extends _chunkMVCKMP5Ujs.l{static deserialize(e){let t=e.deserializeUleb128AsU32();switch(t){case 0:return Nt.load(e);case 1:return en.load(e);case 2:return zt.load(e);case 3:return Ft.load(e);case 4:return ft.load(e);default:throw new Error(`Unknown variant index for TransactionAuthenticator: ${t}`)}}isEd25519(){return this instanceof Nt}isMultiEd25519(){return this instanceof en}isMultiAgent(){return this instanceof zt}isFeePayer(){return this instanceof Ft}isSingleSender(){return this instanceof ft}},Nt= exports.TransactionAuthenticatorEd25519 =class n extends et{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(0),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=I.deserialize(e),r=K.deserialize(e);return new n(t,r)}},en= exports.TransactionAuthenticatorMultiEd25519 =class n extends et{constructor(e,t){super(),this.public_key=e,this.signature=t}serialize(e){e.serializeU32AsUleb128(1),this.public_key.serialize(e),this.signature.serialize(e)}static load(e){let t=Xt.deserialize(e),r=Qe.deserialize(e);return new n(t,r)}},zt= exports.TransactionAuthenticatorMultiAgent =class n extends et{constructor(e,t,r){super(),this.sender=e,this.secondary_signer_addresses=t,this.secondary_signers=r}serialize(e){e.serializeU32AsUleb128(2),this.sender.serialize(e),e.serializeVector(this.secondary_signer_addresses),e.serializeVector(this.secondary_signers)}static load(e){let t=j.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeVector(j);return new n(t,r,i)}},Ft= exports.TransactionAuthenticatorFeePayer =class n extends et{constructor(e,t,r,i){super(),this.sender=e,this.secondary_signer_addresses=t,this.secondary_signers=r,this.fee_payer=i}serialize(e){e.serializeU32AsUleb128(3),this.sender.serialize(e),e.serializeVector(this.secondary_signer_addresses),e.serializeVector(this.secondary_signers),this.fee_payer.address.serialize(e),this.fee_payer.authenticator.serialize(e)}static load(e){let t=j.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeVector(j),o=_chunkMVCKMP5Ujs.Z.deserialize(e),s=j.deserialize(e),a={address:o,authenticator:s};return new n(t,r,i,a)}},ft= exports.TransactionAuthenticatorSingleSender =class n extends et{constructor(e){super(),this.sender=e}serialize(e){e.serializeU32AsUleb128(4),this.sender.serialize(e)}static load(e){let t=j.deserialize(e);return new n(t)}};var tt=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.raw_txn=e,this.authenticator=t}serialize(e){this.raw_txn.serialize(e),this.authenticator.serialize(e)}static deserialize(e){let t=be.deserialize(e),r=et.deserialize(e);return new n(t,r)}};var tn=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t){super(),this.rawTransaction=e,this.feePayerAddress=t}serialize(e){this.rawTransaction.serialize(e),this.feePayerAddress===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.feePayerAddress.serialize(e))}static deserialize(e){let t=be.deserialize(e),r=e.deserializeBool(),i;return r&&(i=_chunkMVCKMP5Ujs.Z.deserialize(e)),new n(t,i)}};var Tr=class n extends _chunkMVCKMP5Ujs.l{constructor(e,t,r){super(),this.rawTransaction=e,this.feePayerAddress=r,this.secondarySignerAddresses=t}serialize(e){this.rawTransaction.serialize(e),e.serializeVector(this.secondarySignerAddresses),this.feePayerAddress===void 0?e.serializeBool(!1):(e.serializeBool(!0),this.feePayerAddress.serialize(e))}static deserialize(e){let t=be.deserialize(e),r=e.deserializeVector(_chunkMVCKMP5Ujs.Z),i=e.deserializeBool(),o;return i&&(o=_chunkMVCKMP5Ujs.Z.deserialize(e)),new n(t,r,o)}};function br(n){return n.feePayerAddress?new Dt(n.rawTransaction,_nullishCoalesce(n.secondarySignerAddresses, () => ([])),n.feePayerAddress):n.secondarySignerAddresses?new kt(n.rawTransaction,n.secondarySignerAddresses):n.rawTransaction}function yt(n,e){let t=_sha3.sha3_256.create();if(!e.startsWith("APTOS::"))throw new Error(`Domain separator needs to start with 'APTOS::'. Provided - ${e}`);t.update(e);let r=t.digest(),i=n,o=new Uint8Array(r.length+i.length);return o.set(r),o.set(i,r.length),o}function dA(n){return yt(n.bcsToBytes(),`APTOS::${n.constructor.name}`)}function Ke(n){let e=br(n);return n.feePayerAddress?yt(e.bcsToBytes(),ui):n.secondarySignerAddresses?yt(e.bcsToBytes(),ui):yt(e.bcsToBytes(),Co)}var ae=class n{constructor(e){this.signingScheme=0;let{privateKey:t,address:r}=e;this.privateKey=t,this.publicKey=t.publicKey(),this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress()}static generate(){let e=q.generate();return new n({privateKey:e})}static fromDerivationPath(e){let{path:t,mnemonic:r}=e,i=q.fromDerivationPath(t,r);return new n({privateKey:i})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new ve(this.publicKey,this.privateKey.sign(e))}signTransactionWithAuthenticator(e){return new ve(this.publicKey,this.signTransaction(e))}sign(e){return this.privateKey.sign(e)}signTransaction(e){return this.sign(Ke(e))}};function wi(n){return typeof n=="object"&&n!==null&&"getAnyPublicKey"in n&&typeof n.getAnyPublicKey=="function"}var we=class n{constructor(e){this.signingScheme=2;let{privateKey:t,address:r}=e;this.privateKey=t,this.publicKey=new z(t.publicKey()),this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress()}getAnyPublicKey(){return this.publicKey}static generate(e={}){let{scheme:t=0}=e,r;switch(t){case 0:r=q.generate();break;case 2:r=We.generate();break;default:throw new Error(`Unsupported signature scheme ${t}`)}return new n({privateKey:r})}static fromDerivationPath(e){let{scheme:t=0,path:r,mnemonic:i}=e,o;switch(t){case 0:o=q.fromDerivationPath(r,i);break;case 2:o=We.fromDerivationPath(r,i);break;default:throw new Error(`Unsupported signature scheme ${t}`)}return new n({privateKey:o})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new se(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new se(this.publicKey,this.signTransaction(e))}sign(e){return new H(this.privateKey.sign(e))}signTransaction(e){return this.sign(Ke(e))}static fromEd25519Account(e){return new n({privateKey:e.privateKey,address:e.accountAddress})}};var nt=class{static generate(e={}){let{scheme:t=0,legacy:r=!0}=e;return t===0&&r?ae.generate():we.generate({scheme:t})}static fromPrivateKey(e){let{privateKey:t,address:r,legacy:i=!0}=e;return t instanceof q&&i?new ae({privateKey:t,address:r}):new we({privateKey:t,address:r})}static fromPrivateKeyAndAddress(e){return this.fromPrivateKey(e)}static fromDerivationPath(e){let{scheme:t=0,mnemonic:r,path:i,legacy:o=!0}=e;return t===0&&o?ae.fromDerivationPath({mnemonic:r,path:i}):we.fromDerivationPath({scheme:t,mnemonic:r,path:i})}static authKey(e){let{publicKey:t}=e;return t.authKey()}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync(e)}};var _utils3 = require('@noble/hashes/utils');var Au=1209600,nn=class nn extends _chunkMVCKMP5Ujs.l{constructor(e){super();let{privateKey:t,expiryDateSecs:r,blinder:i}=e;this.privateKey=t,this.publicKey=new lt(t.publicKey()),this.expiryDateSecs=r||_chunkMVCKMP5Ujs.ea.call(void 0, _chunkMVCKMP5Ujs.da.call(void 0, )+Au),this.blinder=i!==void 0?_chunkMVCKMP5Ujs.j.fromHexInput(i).toUint8Array():hu();let o=Tn(this.publicKey.bcsToBytes(),93);o.push(BigInt(this.expiryDateSecs)),o.push(Et(this.blinder));let s=Pt(o);this.nonce=s.toString()}getPublicKey(){return this.publicKey}isExpired(){return Math.floor(Date.now()/1e3)>this.expiryDateSecs}serialize(e){e.serializeU32AsUleb128(this.publicKey.variant),e.serializeBytes(this.privateKey.toUint8Array()),e.serializeU64(this.expiryDateSecs),e.serializeFixedBytes(this.blinder)}static deserialize(e){let t=e.deserializeUleb128AsU32(),r;switch(t){case 0:r=q.deserialize(e);break;default:throw new Error(`Unknown variant index for EphemeralPublicKey: ${t}`)}let i=e.deserializeU64(),o=e.deserializeFixedBytes(31);return new nn({privateKey:r,expiryDateSecs:Number(i),blinder:o})}static fromBytes(e){return nn.deserialize(new R(e))}static generate(e){let t;switch(_optionalChain([e, 'optionalAccess', _71 => _71.scheme])){case 0:default:t=q.generate()}return new nn({privateKey:t,expiryDateSecs:_optionalChain([e, 'optionalAccess', _72 => _72.expiryDateSecs])})}sign(e){if(this.isExpired())throw new Error("EphemeralKeyPair has expired");return new Ue(this.privateKey.sign(e))}};nn.BLINDER_LENGTH=31;var Ot=nn;function hu(){return _utils3.randomBytes.call(void 0, Ot.BLINDER_LENGTH)}var _eventemitter3 = require('eventemitter3'); var _eventemitter32 = _interopRequireDefault(_eventemitter3);function Sr(n){return n!=null&&typeof n.checkKeylessAccountValidity=="function"}var rn=class rn extends _chunkMVCKMP5Ujs.l{constructor(t){super();this.signingScheme=2;let{address:r,ephemeralKeyPair:i,publicKey:o,uidKey:s,uidVal:a,aud:c,pepper:p,proof:l,proofFetchCallback:h,jwt:d,verificationKeyHash:g}=t;if(this.ephemeralKeyPair=i,this.publicKey=o,this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress(),this.uidKey=s,this.uidVal=a,this.aud=c,this.jwt=d,this.emitter=new _eventemitter32.default,this.proofOrPromise=l,l instanceof pe)this.proof=l;else{if(h===void 0)throw new Error("Must provide callback for async proof fetch");this.emitter.on("proofFetchFinish",async v=>{await h(v),this.emitter.removeAllListeners()}),this.init(l)}let b=_chunkMVCKMP5Ujs.j.fromHexInput(p).toUint8Array();if(b.length!==rn.PEPPER_LENGTH)throw new Error(`Pepper length in bytes should be ${rn.PEPPER_LENGTH}`);if(this.pepper=b,g!==void 0){if(_chunkMVCKMP5Ujs.j.hexInputToUint8Array(g).length!==32)throw new Error("verificationKeyHash must be 32 bytes");this.verificationKeyHash=_chunkMVCKMP5Ujs.j.hexInputToUint8Array(g)}}getAnyPublicKey(){return new z(this.publicKey)}async init(t){try{this.proof=await t,this.emitter.emit("proofFetchFinish",{status:"Success"})}catch(r){r instanceof Error?this.emitter.emit("proofFetchFinish",{status:"Failed",error:r.toString()}):this.emitter.emit("proofFetchFinish",{status:"Failed",error:"Unknown"})}}serialize(t){if(this.accountAddress.serialize(t),t.serializeStr(this.jwt),t.serializeStr(this.uidKey),t.serializeFixedBytes(this.pepper),this.ephemeralKeyPair.serialize(t),this.proof===void 0)throw new Error("Cannot serialize - proof undefined");this.proof.serialize(t),t.serializeOption(this.verificationKeyHash,32)}static partialDeserialize(t){let r=_chunkMVCKMP5Ujs.Z.deserialize(t),i=t.deserializeStr(),o=t.deserializeStr(),s=t.deserializeFixedBytes(31),a=Ot.deserialize(t),c=pe.deserialize(t),p=t.deserializeOption("fixedBytes",32);return{address:r,jwt:i,uidKey:o,pepper:s,ephemeralKeyPair:a,proof:c,verificationKeyHash:p}}isExpired(){return this.ephemeralKeyPair.isExpired()}signWithAuthenticator(t){let r=new H(this.sign(t)),i=new z(this.publicKey);return new se(i,r)}signTransactionWithAuthenticator(t){let r=new H(this.signTransaction(t)),i=new z(this.publicKey);return new se(i,r)}async waitForProofFetch(){this.proofOrPromise instanceof Promise&&await this.proofOrPromise}async checkKeylessAccountValidity(t){if(this.isExpired())throw P.fromErrorType({type:0});if(await this.waitForProofFetch(),this.proof===void 0)throw P.fromErrorType({type:2});let r=_jwtdecode.jwtDecode.call(void 0, this.jwt,{header:!0});if(r.kid===void 0)throw P.fromErrorType({type:12,details:"checkKeylessAccountValidity failed. JWT is missing 'kid' in header. This should never happen."});if(this.verificationKeyHash!==void 0){let{verificationKey:i}=await jt({aptosConfig:t});if(_chunkMVCKMP5Ujs.j.hexInputToString(i.hash())!==_chunkMVCKMP5Ujs.j.hexInputToString(this.verificationKeyHash))throw P.fromErrorType({type:4})}else console.warn("[Aptos SDK] The verification key hash was not set. Proof may be invalid if the verification key has rotated.");await rn.fetchJWK({aptosConfig:t,publicKey:this.publicKey,kid:r.kid})}sign(t){let{expiryDateSecs:r}=this.ephemeralKeyPair;if(this.isExpired())throw P.fromErrorType({type:0});if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let i=this.ephemeralKeyPair.getPublicKey(),o=this.ephemeralKeyPair.sign(t);return new he({jwtHeader:_chunkMVCKMP5Ujs.fa.call(void 0, this.jwt.split(".")[0]),ephemeralCertificate:new Wt(this.proof,0),expiryDateSecs:r,ephemeralPublicKey:i,ephemeralSignature:o})}signTransaction(t){if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let r=br(t),o=new wr(r,this.proof.proof).hash();return this.sign(o)}getSigningMessage(t){if(this.proof===void 0)throw P.fromErrorType({type:1,details:"Proof not found - make sure to call `await account.checkKeylessAccountValidity()` before signing."});let r=br(t);return new wr(r,this.proof.proof).hash()}verifySignature(t){return this.publicKey.verifySignature(t)}async verifySignatureAsync(t){return this.publicKey.verifySignatureAsync({...t})}static async fetchJWK(t){return bi(t)}};rn.PEPPER_LENGTH=31;var ye=rn,wr= exports.TransactionAndProof =class extends _chunkMVCKMP5Ujs.l{constructor(t,r){super();this.domainSeparator="APTOS::TransactionAndProof";this.transaction=t,this.proof=r}serialize(t){t.serializeFixedBytes(this.transaction.bcsToBytes()),t.serializeOption(this.proof)}hash(){return yt(this.bcsToBytes(),this.domainSeparator)}};var rt=class n extends ye{constructor(e){let t=U.create(e);super({publicKey:t,...e}),this.publicKey=t}serialize(e){super.serialize(e)}static deserialize(e){let{address:t,proof:r,ephemeralKeyPair:i,jwt:o,uidKey:s,pepper:a,verificationKeyHash:c}=ye.partialDeserialize(e),{iss:p,aud:l,uidVal:h}=qe({jwt:o,uidKey:s});return new n({address:t,proof:r,ephemeralKeyPair:i,iss:p,uidKey:s,uidVal:h,aud:l,pepper:a,jwt:o,verificationKeyHash:c})}static fromBytes(e){return n.deserialize(new R(_chunkMVCKMP5Ujs.j.hexInputToUint8Array(e)))}static create(e){let{address:t,proof:r,jwt:i,ephemeralKeyPair:o,pepper:s,uidKey:a="sub",proofFetchCallback:c,verificationKey:p}=e,{iss:l,aud:h,uidVal:d}=qe({jwt:i,uidKey:a});return new n({address:t,proof:r,ephemeralKeyPair:o,iss:l,uidKey:a,uidVal:d,aud:h,pepper:s,jwt:i,proofFetchCallback:c,verificationKeyHash:p?p.hash():void 0})}};var Gt=class n extends ye{constructor(e){let t=te.create(e);super({publicKey:t,...e}),this.publicKey=t,this.audless=_nullishCoalesce(e.audless, () => (!1))}serialize(e){super.serialize(e),this.publicKey.jwkAddress.serialize(e)}static deserialize(e){let{address:t,proof:r,ephemeralKeyPair:i,jwt:o,uidKey:s,pepper:a,verificationKeyHash:c}=ye.partialDeserialize(e),p=_chunkMVCKMP5Ujs.Z.deserialize(e),{iss:l,aud:h,uidVal:d}=qe({jwt:o,uidKey:s});return new n({address:t,proof:r,ephemeralKeyPair:i,iss:l,uidKey:s,uidVal:d,aud:h,pepper:a,jwt:o,verificationKeyHash:c,jwkAddress:p})}static fromBytes(e){return n.deserialize(R.fromHex(e))}static create(e){let{address:t,proof:r,jwt:i,ephemeralKeyPair:o,pepper:s,jwkAddress:a,uidKey:c="sub",proofFetchCallback:p,verificationKey:l}=e,{iss:h,aud:d,uidVal:g}=qe({jwt:i,uidKey:c});return new n({address:t,proof:r,ephemeralKeyPair:o,iss:h,uidKey:c,uidVal:g,aud:d,pepper:s,jwkAddress:_chunkMVCKMP5Ujs.Z.from(a),jwt:i,proofFetchCallback:p,verificationKeyHash:l?l.hash():void 0})}};var Un=class n{constructor(e){this.signingScheme=3;let{multiKey:t,address:r}=e,i=e.signers.map(a=>a instanceof ae?we.fromEd25519Account(a):a);if(t.signaturesRequired>i.length)throw new Error(`Not enough signers provided to satisfy the required signatures. Need ${t.signaturesRequired} signers, but only ${i.length} provided`);if(t.signaturesRequired<i.length)throw new Error(`More signers provided than required. Need ${t.signaturesRequired} signers, but ${i.length} provided`);this.publicKey=t,this.accountAddress=r?_chunkMVCKMP5Ujs.Z.from(r):this.publicKey.authKey().derivedAddress();let o=[];for(let a of i)o.push(this.publicKey.getIndex(a.getAnyPublicKey()));let s=i.map((a,c)=>[a,o[c]]);s.sort((a,c)=>a[1]-c[1]),this.signers=s.map(a=>a[0]),this.signerIndicies=s.map(a=>a[1]),this.signaturesBitmap=this.publicKey.createBitmap({bits:o})}static fromPublicKeysAndSigners(e){let{address:t,publicKeys:r,signaturesRequired:i,signers:o}=e,s=new Fe({publicKeys:r,signaturesRequired:i});return new n({multiKey:s,signers:o,address:t})}static isMultiKeySigner(e){return e instanceof n}signWithAuthenticator(e){return new Ge(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new Ge(this.publicKey,this.signTransaction(e))}async waitForProofFetch(){let t=this.signers.filter(r=>r instanceof ye).map(async r=>r.waitForProofFetch());await Promise.all(t)}async checkKeylessAccountValidity(e){let r=this.signers.filter(i=>i instanceof ye).map(i=>i.checkKeylessAccountValidity(e));await Promise.all(r)}sign(e){let t=[];for(let r of this.signers)t.push(r.sign(e));return new Oe({signatures:t,bitmap:this.signaturesBitmap})}signTransaction(e){let t=[];for(let r of this.signers)t.push(r.signTransaction(e));return new Oe({signatures:t,bitmap:this.signaturesBitmap})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return await this.publicKey.verifySignatureAsync(e)}};var Er=class{constructor(e){this.signingScheme=1;let{signers:t,publicKey:r,address:i}=e;if(this.publicKey=r,this.accountAddress=i?_chunkMVCKMP5Ujs.Z.from(i):this.publicKey.authKey().derivedAddress(),r.threshold>t.length)throw new Error(`Not enough signers provided to satisfy the required signatures. Need ${r.threshold} signers, but only ${t.length} provided`);if(r.threshold<t.length)throw new Error(`More signers provided than required. Need ${r.threshold} signers, but ${t.length} provided`);let o=[];for(let a of t)o.push(this.publicKey.getIndex(a.publicKey()));let s=t.map((a,c)=>[a,o[c]]);s.sort((a,c)=>a[1]-c[1]),this.signers=s.map(a=>a[0]),this.signerIndices=s.map(a=>a[1]),this.signaturesBitmap=this.publicKey.createBitmap({bits:o})}verifySignature(e){return this.publicKey.verifySignature(e)}async verifySignatureAsync(e){return this.publicKey.verifySignatureAsync({...e,signature:e.signature})}signWithAuthenticator(e){return new je(this.publicKey,this.sign(e))}signTransactionWithAuthenticator(e){return new je(this.publicKey,this.signTransaction(e))}sign(e){let t=[];for(let r of this.signers)t.push(r.sign(e));return new Qe({signatures:t,bitmap:this.signaturesBitmap})}signTransaction(e){return this.sign(Ke(e))}};function Bo(n){let e=n.deserializeUleb128AsU32();if(!Object.values(_chunkMVCKMP5Ujs.U).includes(e))throw new Error(`Deserialization of Account failed: SigningScheme variant ${e} is invalid`);return{address:_chunkMVCKMP5Ujs.Z.deserialize(n),signingScheme:e}}function Mo(n,e){if(e.serializeStr(n.jwt),e.serializeStr(n.uidKey),e.serializeFixedBytes(n.pepper),n.ephemeralKeyPair.serialize(e),n.proof===void 0)throw new Error("Cannot serialize - proof undefined");n.proof.serialize(e),e.serializeOption(n.verificationKeyHash,32)}function Vo(n){let e=n.deserializeStr(),t=n.deserializeStr(),r=n.deserializeFixedBytes(31),i=Ot.deserialize(n),o=pe.deserialize(n),s=n.deserializeOption("fixedBytes",32);return{jwt:e,uidKey:t,pepper:r,ephemeralKeyPair:i,proof:o,verificationKeyHash:s}}var Ho;(h=>{function n(d){let g=new _chunkMVCKMP5Ujs.m;switch(g.serializeU32AsUleb128(d.signingScheme),d.accountAddress.serialize(g),d.signingScheme){case 0:return d.privateKey.serialize(g),g.toUint8Array();case 2:{if(!wi(d))throw new Error("Account is not a SingleKeySigner");let b=d.getAnyPublicKey();switch(g.serializeU32AsUleb128(b.variant),b.variant){case 3:return Mo(d,g),g.toUint8Array();case 4:{let v=d;return Mo(v,g),v.publicKey.jwkAddress.serialize(g),g.serializeBool(v.audless),g.toUint8Array()}case 1:case 0:return d.privateKey.serialize(g),g.toUint8Array();default:throw new Error(`Invalid public key variant: ${b.variant}`)}}case 3:{let b=d;return b.publicKey.serialize(g),g.serializeU32AsUleb128(b.signers.length),b.signers.forEach(v=>{g.serializeFixedBytes(n(v))}),g.toUint8Array()}default:throw new Error(`Deserialization of Account failed: invalid signingScheme value ${d.signingScheme}`)}}h.toBytes=n;function e(d){return _chunkMVCKMP5Ujs.j.hexInputToStringWithoutPrefix(n(d))}h.toHexStringWithoutPrefix=e;function t(d){return _chunkMVCKMP5Ujs.j.hexInputToString(n(d))}h.toHexString=t;function r(d){let{address:g,signingScheme:b}=Bo(d);switch(b){case 0:{let v=q.deserialize(d);return new ae({privateKey:v,address:g})}case 2:{let v=d.deserializeUleb128AsU32();switch(v){case 0:{let W=q.deserialize(d);return new we({privateKey:W,address:g})}case 1:{let W=We.deserialize(d);return new we({privateKey:W,address:g})}case 3:{let W=Vo(d),Me=qe(W);return new rt({...W,...Me})}case 4:{let W=Vo(d),Me=_chunkMVCKMP5Ujs.Z.deserialize(d),st=d.deserializeBool(),at=qe(W);return new Gt({...W,...at,jwkAddress:Me,audless:st})}default:throw new Error(`Unsupported public key variant ${v}`)}}case 3:{let v=Fe.deserialize(d),W=d.deserializeUleb128AsU32(),Me=new Array;for(let st=0;st<W;st+=1){let at=r(d);if(!wi(at)&&!(at instanceof ae))throw new Error("Deserialization of MultiKeyAccount failed. Signer is not a SingleKeySigner or Ed25519Account");Me.push(at)}return new Un({multiKey:v,signers:Me,address:g})}default:throw new Error(`Deserialization of Account failed: invalid signingScheme value ${b}`)}}h.deserialize=r;function i(d){let g=p(d);if(!(g instanceof rt))throw new Error("Deserialization of KeylessAccount failed");return g}h.keylessAccountFromHex=i;function o(d){let g=p(d);if(!(g instanceof Gt))throw new Error("Deserialization of FederatedKeylessAccount failed");return g}h.federatedKeylessAccountFromHex=o;function s(d){let g=p(d);if(!(g instanceof Un))throw new Error("Deserialization of MultiKeyAccount failed");return g}h.multiKeyAccountFromHex=s;function a(d){let g=p(d);if(!(g instanceof we))throw new Error("Deserialization of SingleKeyAccount failed");return g}h.singleKeyAccountFromHex=a;function c(d){let g=p(d);if(!(g instanceof ae))throw new Error("Deserialization of Ed25519Account failed");return g}h.ed25519AccountFromHex=c;function p(d){return r(R.fromHex(d))}h.fromHex=p;function l(d){return p(d)}h.fromBytes=l})(Ho||(Ho= exports.AccountUtils ={}));var qo=class n extends nt{constructor({signer:t,accountAddress:r,authenticationFunction:i}){super();this.signingScheme=2;if(!_chunkMVCKMP5Ujs.ma.call(void 0, i))throw new Error(`Invalid authentication function ${i} passed into AbstractedAccount`);this.authenticationFunction=i,this.accountAddress=r,this.publicKey=new ir(this.accountAddress),this.sign=o=>new An(t(o))}static fromPermissionedSigner({signer:t,accountAddress:r}){return new n({signer:i=>{let o=new _chunkMVCKMP5Ujs.m;return t.publicKey.serialize(o),t.sign(i).serialize(o),o.toUint8Array()},accountAddress:_nullishCoalesce(r, () => (t.accountAddress)),authenticationFunction:"0x1::permissioned_delegation::authenticate"})}signWithAuthenticator(t){return new _n(this.authenticationFunction,_sha3.sha3_256.call(void 0, t),this.sign(_sha3.sha3_256.call(void 0, t)).toUint8Array())}signTransactionWithAuthenticator(t){return this.signWithAuthenticator(Ke(t))}signTransaction(t){return this.sign(Ke(t))}setSigner(t){this.sign=r=>new An(t(r))}};var wu=`
7
7
  fragment TokenActivitiesFields on token_activities_v2 {
8
8
  after_value
9
9
  before_value