@bananalink-sdk/protocol 1.2.8 → 1.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-32OWUOZ3.js → chunk-KJ7QIHAY.js} +11 -7
- package/dist/chunk-KJ7QIHAY.js.map +1 -0
- package/dist/{chunk-VXLUSU5B.cjs → chunk-MUYKP6UQ.cjs} +63 -8
- package/dist/chunk-MUYKP6UQ.cjs.map +1 -0
- package/dist/{chunk-MCZG7QEM.cjs → chunk-NGPP7HUR.cjs} +11 -7
- package/dist/chunk-NGPP7HUR.cjs.map +1 -0
- package/dist/{chunk-LELPCIE7.js → chunk-OBJR2TL4.js} +54 -4
- package/dist/chunk-OBJR2TL4.js.map +1 -0
- package/dist/crypto/providers/noble-provider.cjs +2 -3
- package/dist/crypto/providers/noble-provider.d.cts +0 -7
- package/dist/crypto/providers/noble-provider.d.ts +0 -7
- package/dist/crypto/providers/noble-provider.js +1 -2
- package/dist/crypto/providers/node-provider.cjs +7 -29
- package/dist/crypto/providers/node-provider.cjs.map +1 -1
- package/dist/crypto/providers/node-provider.d.cts +0 -7
- package/dist/crypto/providers/node-provider.d.ts +0 -7
- package/dist/crypto/providers/node-provider.js +7 -29
- package/dist/crypto/providers/node-provider.js.map +1 -1
- package/dist/crypto/providers/quickcrypto-provider.cjs +8 -46
- package/dist/crypto/providers/quickcrypto-provider.cjs.map +1 -1
- package/dist/crypto/providers/quickcrypto-provider.d.cts +0 -9
- package/dist/crypto/providers/quickcrypto-provider.d.ts +0 -9
- package/dist/crypto/providers/quickcrypto-provider.js +7 -45
- package/dist/crypto/providers/quickcrypto-provider.js.map +1 -1
- package/dist/crypto/providers/webcrypto-provider.cjs +0 -2
- package/dist/crypto/providers/webcrypto-provider.cjs.map +1 -1
- package/dist/crypto/providers/webcrypto-provider.d.cts +0 -7
- package/dist/crypto/providers/webcrypto-provider.d.ts +0 -7
- package/dist/crypto/providers/webcrypto-provider.js +0 -2
- package/dist/crypto/providers/webcrypto-provider.js.map +1 -1
- package/dist/crypto-export.cjs +50 -51
- package/dist/crypto-export.cjs.map +1 -1
- package/dist/crypto-export.js +2 -4
- package/dist/crypto-export.js.map +1 -1
- package/dist/index.cjs +3 -4
- package/dist/index.cjs.map +1 -1
- package/dist/index.js +2 -3
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
- package/src/crypto/providers/noble-provider.ts +44 -49
- package/src/crypto/providers/node-provider.ts +18 -59
- package/src/crypto/providers/quickcrypto-provider.ts +25 -84
- package/src/crypto/providers/registry.ts +14 -9
- package/src/crypto/providers/webcrypto-provider.ts +28 -43
- package/dist/chunk-32OWUOZ3.js.map +0 -1
- package/dist/chunk-A6FLEJ7R.cjs +0 -62
- package/dist/chunk-A6FLEJ7R.cjs.map +0 -1
- package/dist/chunk-LELPCIE7.js.map +0 -1
- package/dist/chunk-MCZG7QEM.cjs.map +0 -1
- package/dist/chunk-TCVKC227.js +0 -56
- package/dist/chunk-TCVKC227.js.map +0 -1
- package/dist/chunk-VXLUSU5B.cjs.map +0 -1
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/crypto/providers/noble-provider.ts"],"names":["nobleRandomBytes"],"mappings":";;;;;;;;;AAaA,IAAM,SAAA,GAAN,MAAM,SAAA,CAAkC;AAAA,EACtC,WAAA,CACkB,MACA,IAAA,EACA,SAAA,EACA,cAAuB,IAAA,EACvB,MAAA,GAA4B,EAAC,EAC7C;AALgB,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,SAAA,GAAA,SAAA;AACA,IAAA,IAAA,CAAA,WAAA,GAAA,WAAA;AACA,IAAA,IAAA,CAAA,MAAA,GAAA,MAAA;AAAA,EACf;AACL,CAAA;AARwC,MAAA,CAAA,SAAA,EAAA,UAAA,CAAA;AAAxC,IAAM,QAAA,GAAN,SAAA;AAcO,IAAM,oBAAA,GAAN,MAAM,oBAAA,CAA8C;AAAA,EAKzD,YAAY,MAAA,EAAiB;AAJ7B,IAAA,IAAA,CAAgB,IAAA,GAAO,OAAA;AACvB,IAAA,IAAA,CAAgB,WAAA,GAAc,IAAA;AAI5B,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,uBAAuB,CAAA;AAAA,EAClE;AAAA;AAAA;AAAA;AAAA,EAKA,eAAA,GAA4C;AAC1C,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4CAA4C,CAAA;AAE/D,IAAA,IAAI;AACF,MAAA,MAAM,eAAA,GAAkB,IAAA,CAAK,KAAA,CAAM,eAAA,EAAgB;AAEnD,MAAA,MAAM,qBAAA,GAAwB,IAAA,CAAK,YAAA,CAAa,eAAA,EAAiB,KAAK,CAAA;AAEtE,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,+BAAA,EAAiC;AAAA,QAClD,iBAAiB,qBAAA,CAAsB;AAAA,OACxC,CAAA;AAED,MAAA,OAAO,QAAQ,OAAA,CAAQ;AAAA,QACrB,UAAA,EAAY,IAAI,QAAA,CAAS,eAAA,EAAiB,WAAW,WAAA,EAAa,IAAA,EAAM,CAAC,WAAW,CAAC,CAAA;AAAA,QACrF,SAAA,EAAW,IAAI,QAAA,CAAS,qBAAA,EAAuB,UAAU,WAAA,EAAa,IAAA,EAAM,EAAE;AAAA,OAC/E,CAAA;AAAA,IACH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4BAAA,EAA8B;AAAA,QAC/C,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,gBAAgB,SAAA,EAAgD;AAC9D,IAAA,MAAM,QAAA,GAAW,SAAA;AACjB,IAAA,IAAI,QAAA,CAAS,SAAS,QAAA,EAAU;AAC9B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AACA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,OAAO,KAAA,CAAM,QAAA,CAAS,IAAA,CAAK,UAAA,EAAY,SAAS,IAAA,CAAK,UAAA,GAAa,QAAA,CAAS,IAAA,CAAK,UAAU,CAAC,CAAA;AAAA,EAClI;AAAA;AAAA;AAAA;AAAA,EAKA,iBAAiB,UAAA,EAAiD;AAChE,IAAA,MAAM,QAAA,GAAW,UAAA;AACjB,IAAA,IAAI,QAAA,CAAS,SAAS,SAAA,EAAW;AAC/B,MAAA,MAAM,IAAI,MAAM,sBAAsB,CAAA;AAAA,IACxC;AACA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,OAAO,KAAA,CAAM,QAAA,CAAS,IAAA,CAAK,UAAA,EAAY,SAAS,IAAA,CAAK,UAAA,GAAa,QAAA,CAAS,IAAA,CAAK,UAAU,CAAC,CAAA;AAAA,EAClI;AAAA;AAAA;AAAA;AAAA,EAKA,gBAAgB,OAAA,EAA8C;AAC5D,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,OAAO,CAAA;AAGvC,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,MAC3C,WAAW,QAAA,CAAS,MAAA;AAAA,MACpB,eAAA,EAAiB,MAAM,IAAA,CAAK,QAAA,CAAS,MAAM,CAAA,EAAG,EAAE,CAAC,CAAA,CAAE,GAAA,CAAI,OAAK,CAAA,CAAE,QAAA,CAAS,EAAE,CAAA,CAAE,QAAA,CAAS,GAAG,GAAG,CAAC,CAAA,CAAE,IAAA,CAAK,GAAG,CAAA;AAAA,MACrG,aAAa,KAAA,CAAM,IAAA,CAAK,QAAQ,CAAA,CAAE,IAAI,CAAA,CAAA,KAAK,CAAA,CAAE,QAAA,CAAS,EAAE,EAAE,QAAA,CAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE;AAAA,KACpF,CAAA;AAGD,IAAA,IAAI;AACF,MAAA,IAAI,iBAAA;AAGJ,MAAA,IAAI,QAAA,CAAS,WAAW,EAAA,EAAI;AAE1B,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,UAC3C,WAAW,CAAA,EAAA,EAAK,QAAA,CAAS,CAAC,CAAA,CAAE,QAAA,CAAS,EAAE,CAAC,CAAA;AAAA,SACzC,CAAA;AACD,QAAA,IAAI,QAAA,CAAS,CAAC,CAAA,KAAM,CAAA,EAAM;AACxB,UAAA,MAAM,IAAI,MAAM,CAAA,+CAAA,EAAkD,QAAA,CAAS,CAAC,CAAA,CAAE,QAAA,CAAS,EAAE,CAAC,CAAA,CAAE,CAAA;AAAA,QAC9F;AACA,QAAA,iBAAA,GAAoB,QAAA;AAAA,MACtB,CAAA,MAAA,IAAW,QAAA,CAAS,MAAA,KAAW,EAAA,EAAI;AAGjC,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,UAC3C,MAAA,EAAQ;AAAA,SACT,CAAA;AACD,QAAA,iBAAA,GAAoB,IAAI,WAAW,EAAE,CAAA;AACrC,QAAA,iBAAA,CAAkB,CAAC,CAAA,GAAI,CAAA;AACvB,QAAA,iBAAA,CAAkB,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,MACnC,CAAA,MAAO;AACL,QAAA,MAAM,IAAI,KAAA,CAAM,CAAA,iDAAA,EAAoD,QAAA,CAAS,MAAM,CAAA,MAAA,CAAQ,CAAA;AAAA,MAC7F;AAEA,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,QAC7C,iBAAiB,iBAAA,CAAkB,MAAA;AAAA,QACnC,gBAAA,EAAkB,MAAM,IAAA,CAAK,iBAAA,CAAkB,MAAM,CAAA,EAAG,EAAE,CAAC,CAAA,CAAE,GAAA,CAAI,OAAK,CAAA,CAAE,QAAA,CAAS,EAAE,CAAA,CAAE,QAAA,CAAS,GAAG,GAAG,CAAC,CAAA,CAAE,IAAA,CAAK,GAAG;AAAA,OAChH,CAAA;AAGD,MAAA,MAAM,OAAA,GAAU,IAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,mBAAmB,KAAK,CAAA;AACpE,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,gCAAA,EAAkC;AAAA,QACnD;AAAA,OACD,CAAA;AAED,MAAA,IAAI,CAAC,OAAA,EAAS;AAEZ,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sDAAA,EAAwD;AAAA,UACzE,kBAAA,EAAoB;AAAA,SACrB,CAAA;AAGD,QAAA,MAAM,iBAAA,GAAoB,IAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,mBAAmB,IAAI,CAAA;AAC7E,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,kCAAA,EAAoC;AAAA,UACrD,qBAAA,EAAuB;AAAA,SACxB,CAAA;AAED,QAAA,MAAM,IAAI,MAAM,6BAA6B,CAAA;AAAA,MAC/C;AAEA,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,iBAAA,EAAmB,UAAU,WAAA,EAAa,IAAA,EAAM,EAAE,CAAC,CAAA;AAAA,IACzF,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,QAC7C,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,0BAAA,EAA6B,MAAA,CAAO,KAAK,CAAC,CAAA,CAAE,CAAA;AAAA,IAC9D;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,iBAAiB,OAAA,EAA8C;AAC7D,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,OAAO,CAAA;AAGvC,IAAA,IAAI;AACF,MAAA,IAAI,CAAC,IAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,QAAQ,CAAA,EAAG;AAC1C,QAAA,MAAM,IAAI,MAAM,oBAAoB,CAAA;AAAA,MACtC;AAAA,IACF,SAAS,KAAA,EAAO;AACd,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,2BAAA,EAA8B,MAAA,CAAO,KAAK,CAAC,CAAA,CAAE,CAAA;AAAA,IAC/D;AAEA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,QAAA,EAAU,SAAA,EAAW,WAAA,EAAa,IAAA,EAAM,CAAC,WAAW,CAAC,CAAC,CAAA;AAAA,EAC5F;AAAA;AAAA;AAAA;AAAA,EAKA,kBAAA,CAAmB,YAA2B,SAAA,EAAkD;AAC9F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,8CAA8C,CAAA;AAEjE,IAAA,MAAM,OAAA,GAAU,UAAA;AAChB,IAAA,MAAM,MAAA,GAAS,SAAA;AAEf,IAAA,IAAI,OAAA,CAAQ,SAAS,SAAA,EAAW;AAC9B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,sBAAsB,CAAA;AAC9C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4DAAA,EAA8D;AAAA,QAC/E,YAAY,OAAA,CAAQ;AAAA,OACrB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AACA,IAAA,IAAI,MAAA,CAAO,SAAS,QAAA,EAAU;AAC5B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,2DAAA,EAA6D;AAAA,QAC9E,YAAY,MAAA,CAAO;AAAA,OACpB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AAEF,MAAA,MAAM,eAAe,IAAA,CAAK,eAAA,CAAgB,QAAQ,IAAA,EAAM,MAAA,CAAO,MAAM,KAAK,CAAA;AAE1E,MAAA,MAAM,WAAA,GAAc,YAAA,CAAa,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAE5C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,oCAAA,EAAsC;AAAA,QACvD,oBAAoB,WAAA,CAAY;AAAA,OACjC,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,WAAA,EAAa,QAAA,EAAU,SAAA,EAAW,IAAA,EAAM,CAAC,SAAA,EAAW,SAAS,CAAC,CAAC,CAAA;AAAA,IACrG,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,iCAAA,EAAmC;AAAA,QACpD,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,mBAAA,CAAoB,YAAA,EAA6B,IAAA,EAAmB,IAAA,EAA2C;AAC7G,IAAA,MAAM,SAAA,GAAY,YAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAGA,IAAA,MAAM,UAAA,GAAa,IAAA,CAAK,MAAA,EAAQ,SAAA,CAAU,IAAA,EAAM,IAAI,UAAA,CAAW,IAAI,CAAA,EAAG,IAAI,UAAA,CAAW,IAAI,GAAG,EAAE,CAAA;AAE9F,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,UAAA,EAAY,QAAA,EAAU,SAAA,EAAW,IAAA,EAAM,CAAC,SAAA,EAAW,SAAS,CAAC,CAAC,CAAA;AAAA,EACpG;AAAA;AAAA;AAAA;AAAA,EAKA,YAAY,MAAA,EAA6B;AACvC,IAAA,MAAM,KAAA,GAAQA,YAAiB,MAAM,CAAA;AACrC,IAAA,OAAO,KAAA,CAAM,OAAO,KAAA,CAAM,KAAA,CAAM,YAAY,KAAA,CAAM,UAAA,GAAa,MAAM,UAAU,CAAA;AAAA,EACjF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AACpF,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0CAAA,EAA4C;AAAA,MAC7D,UAAU,IAAA,CAAK,UAAA;AAAA,MACf,QAAQ,EAAA,CAAG;AAAA,KACZ,CAAA;AAED,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sCAAA,EAAwC;AAAA,QACzD,YAAY,SAAA,CAAU;AAAA,OACvB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,SAAS,GAAA,CAAI,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,EAAE,CAAC,CAAA;AACrD,MAAA,MAAM,aAAa,MAAA,CAAO,OAAA,CAAQ,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAEtD,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAA,EAAwB;AAAA,QACzC,gBAAgB,UAAA,CAAW;AAAA,OAC5B,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,UAAA,CAAW,MAAA,CAAO,KAAA,CAAM,UAAA,CAAW,UAAA,EAAY,UAAA,CAAW,UAAA,GAAa,UAAA,CAAW,UAAU,CAAC,CAAA;AAAA,IACtH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,mBAAA,EAAqB;AAAA,QACtC,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AACpF,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0CAAA,EAA4C;AAAA,MAC7D,UAAU,IAAA,CAAK,UAAA;AAAA,MACf,QAAQ,EAAA,CAAG;AAAA,KACZ,CAAA;AAED,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sCAAA,EAAwC;AAAA,QACzD,YAAY,SAAA,CAAU;AAAA,OACvB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,SAAS,GAAA,CAAI,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,EAAE,CAAC,CAAA;AACrD,MAAA,MAAM,YAAY,MAAA,CAAO,OAAA,CAAQ,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAErD,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAA,EAAwB;AAAA,QACzC,eAAe,SAAA,CAAU;AAAA,OAC1B,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,SAAA,CAAU,MAAA,CAAO,KAAA,CAAM,SAAA,CAAU,UAAA,EAAY,SAAA,CAAU,UAAA,GAAa,SAAA,CAAU,UAAU,CAAC,CAAA;AAAA,IAClH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,mBAAA,EAAqB;AAAA,QACtC,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,YAAA,CAAa,KAAoB,IAAA,EAAyC;AACxE,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,MAAM,GAAA,GAAM,KAAK,MAAA,EAAQ,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAC7D,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,GAAA,CAAI,MAAA,CAAO,KAAA,CAAM,GAAA,CAAI,UAAA,EAAY,GAAA,CAAI,UAAA,GAAa,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,EAC1F;AAAA;AAAA;AAAA;AAAA,EAKA,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AACpF,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,WAAA,GAAc,KAAK,MAAA,EAAQ,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AACrE,MAAA,MAAM,WAAA,GAAc,IAAI,UAAA,CAAW,GAAG,CAAA;AAGtC,MAAA,IAAI,WAAA,CAAY,MAAA,KAAW,WAAA,CAAY,MAAA,EAAQ;AAC7C,QAAA,OAAO,OAAA,CAAQ,QAAQ,KAAK,CAAA;AAAA,MAC9B;AAEA,MAAA,IAAI,MAAA,GAAS,CAAA;AACb,MAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,WAAA,CAAY,QAAQ,CAAA,EAAA,EAAK;AAC3C,QAAA,MAAA,IAAU,WAAA,CAAY,CAAC,CAAA,GAAI,WAAA,CAAY,CAAC,CAAA;AAAA,MAC1C;AAEA,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,MAAA,KAAW,CAAC,CAAA;AAAA,IACrC,CAAA,CAAA,MAAQ;AACN,MAAA,OAAO,OAAA,CAAQ,QAAQ,KAAK,CAAA;AAAA,IAC9B;AAAA,EACF;AACF,CAAA;AA5V2D,MAAA,CAAA,oBAAA,EAAA,qBAAA,CAAA;AAApD,IAAM,mBAAA,GAAN;AAkWP,sBAAA,CAAuB,SAAS,CAAC,MAAA,KAAW,IAAI,mBAAA,CAAoB,MAAM,CAAC,CAAA","file":"chunk-32OWUOZ3.js","sourcesContent":["import { p256 } from '@noble/curves/nist.js';\nimport { gcm } from '@noble/ciphers/aes.js';\nimport { randomBytes as nobleRandomBytes } from '@noble/ciphers/utils.js';\nimport { hkdf } from '@noble/hashes/hkdf.js';\nimport { hmac } from '@noble/hashes/hmac.js';\nimport { sha256 } from '@noble/hashes/sha2.js';\nimport type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\nimport { registerCryptoProvider } from './registry';\n\n/**\n * Noble library implementation of CryptoKeyLike\n */\nclass NobleKey implements CryptoKeyLike {\n constructor(\n public readonly data: Uint8Array,\n public readonly type: 'public' | 'private' | 'secret',\n public readonly algorithm: string,\n public readonly extractable: boolean = true,\n public readonly usages: readonly string[] = []\n ) {}\n}\n\n/**\n * Noble cryptography implementation of CryptoProvider\n * Pure JavaScript implementation that works in all environments\n */\nexport class NobleCryptoProvider implements CryptoProvider {\n public readonly name = 'Noble';\n public readonly isAvailable = true; // Noble libraries work everywhere\n private readonly logger?: Logger;\n\n constructor(logger?: Logger) {\n this.logger = logger?.child({ component: 'NobleCryptoProvider' });\n }\n\n /**\n * Generate ECDH P-256 key pair\n */\n generateKeyPair(): Promise<ProviderKeyPair> {\n this.logger?.debug('Generating ECDH P-256 key pair using Noble');\n\n try {\n const privateKeyBytes = p256.utils.randomSecretKey();\n // Generate uncompressed public key to match WebCrypto format (65 bytes)\n const publicKeyUncompressed = p256.getPublicKey(privateKeyBytes, false); // false = uncompressed\n\n this.logger?.debug('Key pair generation completed', {\n publicKeyLength: publicKeyUncompressed.length\n });\n\n return Promise.resolve({\n privateKey: new NobleKey(privateKeyBytes, 'private', 'ECDH-P256', true, ['deriveKey']),\n publicKey: new NobleKey(publicKeyUncompressed, 'public', 'ECDH-P256', true, []),\n });\n } catch (error) {\n this.logger?.error('Key pair generation failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Export public key to ArrayBuffer (raw format)\n */\n exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const nobleKey = publicKey as NobleKey;\n if (nobleKey.type !== 'public') {\n throw new Error('Expected public key');\n }\n return Promise.resolve(nobleKey.data.buffer.slice(nobleKey.data.byteOffset, nobleKey.data.byteOffset + nobleKey.data.byteLength));\n }\n\n /**\n * Export private key to ArrayBuffer (raw format)\n */\n exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const nobleKey = privateKey as NobleKey;\n if (nobleKey.type !== 'private') {\n throw new Error('Expected private key');\n }\n return Promise.resolve(nobleKey.data.buffer.slice(nobleKey.data.byteOffset, nobleKey.data.byteOffset + nobleKey.data.byteLength));\n }\n\n /**\n * Import public key from ArrayBuffer (raw format)\n */\n importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const keyBytes = new Uint8Array(keyData);\n\n // Debug logging\n this.logger?.debug('importPublicKey called', {\n keyLength: keyBytes.length,\n keyBytesFirst20: Array.from(keyBytes.slice(0, 20)).map(b => b.toString(16).padStart(2, '0')).join(' '),\n keyBytesHex: Array.from(keyBytes).map(b => b.toString(16).padStart(2, '0')).join('')\n });\n\n // Validate public key using Noble's validation\n try {\n let processedKeyBytes: Uint8Array;\n\n // Handle different key formats\n if (keyBytes.length === 65) {\n // Already in uncompressed format (0x04 + 32 + 32)\n this.logger?.debug('Processing 65-byte key', {\n firstByte: `0x${keyBytes[0].toString(16)}`\n });\n if (keyBytes[0] !== 0x04) {\n throw new Error(`Expected uncompressed key (0x04 prefix), got 0x${keyBytes[0].toString(16)}`);\n }\n processedKeyBytes = keyBytes;\n } else if (keyBytes.length === 64) {\n // Raw format (32 + 32) - needs 0x04 prefix for Noble\n // This is the WebCrypto export format\n this.logger?.debug('Processing 64-byte key', {\n action: 'adding 0x04 prefix'\n });\n processedKeyBytes = new Uint8Array(65);\n processedKeyBytes[0] = 0x04; // Uncompressed point indicator\n processedKeyBytes.set(keyBytes, 1); // Copy the 64 bytes after the prefix\n } else {\n throw new Error(`Invalid key length: expected 64 or 65 bytes, got ${keyBytes.length} bytes`);\n }\n\n this.logger?.debug('Key processing completed', {\n processedLength: processedKeyBytes.length,\n processedFirst20: Array.from(processedKeyBytes.slice(0, 20)).map(b => b.toString(16).padStart(2, '0')).join(' ')\n });\n\n // Validate using Noble's validation\n const isValid = p256.utils.isValidPublicKey(processedKeyBytes, false); // false = allow uncompressed\n this.logger?.debug('Noble key validation completed', {\n isValid\n });\n\n if (!isValid) {\n // Try additional debugging\n this.logger?.debug('Key validation failed, trying alternative approaches', {\n originalValidation: false\n });\n\n // Try with compressed format check\n const isValidCompressed = p256.utils.isValidPublicKey(processedKeyBytes, true);\n this.logger?.debug('Alternative validation attempted', {\n compressedFormatValid: isValidCompressed\n });\n\n throw new Error('Key failed Noble validation');\n }\n\n return Promise.resolve(new NobleKey(processedKeyBytes, 'public', 'ECDH-P256', true, []));\n } catch (error) {\n this.logger?.error('Public key import failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw new Error(`Invalid P-256 public key: ${String(error)}`);\n }\n }\n\n /**\n * Import private key from ArrayBuffer (raw format)\n */\n importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const keyBytes = new Uint8Array(keyData);\n\n // Validate private key (Noble will throw if invalid)\n try {\n if (!p256.utils.isValidSecretKey(keyBytes)) {\n throw new Error('Invalid secret key');\n }\n } catch (error) {\n throw new Error(`Invalid P-256 private key: ${String(error)}`);\n }\n\n return Promise.resolve(new NobleKey(keyBytes, 'private', 'ECDH-P256', true, ['deriveKey']));\n }\n\n /**\n * Derive shared secret from ECDH key agreement\n */\n deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving shared secret using ECDH with Noble');\n\n const privKey = privateKey as NobleKey;\n const pubKey = publicKey as NobleKey;\n\n if (privKey.type !== 'private') {\n const error = new Error('Expected private key');\n this.logger?.error('Shared secret derivation failed - invalid private key type', {\n actualType: privKey.type\n });\n throw error;\n }\n if (pubKey.type !== 'public') {\n const error = new Error('Expected public key');\n this.logger?.error('Shared secret derivation failed - invalid public key type', {\n actualType: pubKey.type\n });\n throw error;\n }\n\n try {\n // Perform ECDH key agreement - return x-coordinate only to match WebCrypto\n const sharedSecret = p256.getSharedSecret(privKey.data, pubKey.data, false); // uncompressed\n // Extract only the x-coordinate (32 bytes) to match WebCrypto behavior\n const xCoordinate = sharedSecret.slice(1, 33); // Skip 0x04 prefix, take next 32 bytes\n\n this.logger?.debug('Shared secret derivation completed', {\n sharedSecretLength: xCoordinate.length\n });\n\n return Promise.resolve(new NobleKey(xCoordinate, 'secret', 'AES-GCM', true, ['encrypt', 'decrypt']));\n } catch (error) {\n this.logger?.error('Shared secret derivation failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Derive AES-GCM key from shared secret using HKDF\n */\n deriveEncryptionKey(sharedSecret: CryptoKeyLike, salt: ArrayBuffer, info: ArrayBuffer): Promise<CryptoKeyLike> {\n const secretKey = sharedSecret as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n // Perform HKDF with SHA-256\n const derivedKey = hkdf(sha256, secretKey.data, new Uint8Array(salt), new Uint8Array(info), 32); // 32 bytes = 256 bits\n\n return Promise.resolve(new NobleKey(derivedKey, 'secret', 'AES-GCM', true, ['encrypt', 'decrypt']));\n }\n\n /**\n * Generate random bytes\n */\n randomBytes(length: number): ArrayBuffer {\n const bytes = nobleRandomBytes(length);\n return bytes.buffer.slice(bytes.byteOffset, bytes.byteOffset + bytes.byteLength);\n }\n\n /**\n * Encrypt data using AES-GCM\n */\n encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Encrypting data with AES-GCM using Noble', {\n dataSize: data.byteLength,\n ivSize: iv.byteLength\n });\n\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n const error = new Error('Expected secret key');\n this.logger?.error('Encryption failed - invalid key type', {\n actualType: secretKey.type\n });\n throw error;\n }\n\n try {\n const aesGcm = gcm(secretKey.data, new Uint8Array(iv));\n const ciphertext = aesGcm.encrypt(new Uint8Array(data));\n\n this.logger?.debug('Encryption completed', {\n ciphertextSize: ciphertext.byteLength\n });\n\n return Promise.resolve(ciphertext.buffer.slice(ciphertext.byteOffset, ciphertext.byteOffset + ciphertext.byteLength));\n } catch (error) {\n this.logger?.error('Encryption failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Decrypt data using AES-GCM\n */\n decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Decrypting data with AES-GCM using Noble', {\n dataSize: data.byteLength,\n ivSize: iv.byteLength\n });\n\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n const error = new Error('Expected secret key');\n this.logger?.error('Decryption failed - invalid key type', {\n actualType: secretKey.type\n });\n throw error;\n }\n\n try {\n const aesGcm = gcm(secretKey.data, new Uint8Array(iv));\n const plaintext = aesGcm.decrypt(new Uint8Array(data));\n\n this.logger?.debug('Decryption completed', {\n plaintextSize: plaintext.byteLength\n });\n\n return Promise.resolve(plaintext.buffer.slice(plaintext.byteOffset, plaintext.byteOffset + plaintext.byteLength));\n } catch (error) {\n this.logger?.error('Decryption failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Generate HMAC-SHA256\n */\n generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n const mac = hmac(sha256, secretKey.data, new Uint8Array(data));\n return Promise.resolve(mac.buffer.slice(mac.byteOffset, mac.byteOffset + mac.byteLength));\n }\n\n /**\n * Verify HMAC-SHA256\n */\n verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n try {\n const expectedMac = hmac(sha256, secretKey.data, new Uint8Array(data));\n const providedMac = new Uint8Array(mac);\n\n // Constant-time comparison\n if (expectedMac.length !== providedMac.length) {\n return Promise.resolve(false);\n }\n\n let result = 0;\n for (let i = 0; i < expectedMac.length; i++) {\n result |= expectedMac[i] ^ providedMac[i];\n }\n\n return Promise.resolve(result === 0);\n } catch {\n return Promise.resolve(false);\n }\n }\n}\n\n/**\n * Self-register Noble provider on import\n * This allows the provider to be available when explicitly imported\n */\nregisterCryptoProvider('noble', (logger) => new NobleCryptoProvider(logger));\n\n// TypeScript module augmentation to track this provider is available\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n interface RegisteredCryptoProviders {\n noble: true;\n }\n }\n}\n"]}
|
package/dist/chunk-A6FLEJ7R.cjs
DELETED
|
@@ -1,62 +0,0 @@
|
|
|
1
|
-
'use strict';
|
|
2
|
-
|
|
3
|
-
var chunkWGEGR3DF_cjs = require('./chunk-WGEGR3DF.cjs');
|
|
4
|
-
|
|
5
|
-
// src/crypto/providers/registry.ts
|
|
6
|
-
var cryptoProviders = /* @__PURE__ */ new Map();
|
|
7
|
-
function registerCryptoProvider(type, factory) {
|
|
8
|
-
if (cryptoProviders.has(type)) {
|
|
9
|
-
return;
|
|
10
|
-
}
|
|
11
|
-
cryptoProviders.set(type, factory);
|
|
12
|
-
}
|
|
13
|
-
chunkWGEGR3DF_cjs.__name(registerCryptoProvider, "registerCryptoProvider");
|
|
14
|
-
function getCryptoProviderFactory(type) {
|
|
15
|
-
const factory = cryptoProviders.get(type);
|
|
16
|
-
if (!factory) {
|
|
17
|
-
const availableProviders = Array.from(cryptoProviders.keys()).join(", ");
|
|
18
|
-
const importHint = getImportHint(type);
|
|
19
|
-
throw new Error(
|
|
20
|
-
`Crypto provider '${type}' is not registered. ${importHint}
|
|
21
|
-
Available providers: ${availableProviders || "none"}
|
|
22
|
-
Make sure to import the provider before using it.`
|
|
23
|
-
);
|
|
24
|
-
}
|
|
25
|
-
return factory;
|
|
26
|
-
}
|
|
27
|
-
chunkWGEGR3DF_cjs.__name(getCryptoProviderFactory, "getCryptoProviderFactory");
|
|
28
|
-
function isCryptoProviderRegistered(type) {
|
|
29
|
-
return cryptoProviders.has(type);
|
|
30
|
-
}
|
|
31
|
-
chunkWGEGR3DF_cjs.__name(isCryptoProviderRegistered, "isCryptoProviderRegistered");
|
|
32
|
-
function getRegisteredCryptoProviders() {
|
|
33
|
-
return Array.from(cryptoProviders.keys());
|
|
34
|
-
}
|
|
35
|
-
chunkWGEGR3DF_cjs.__name(getRegisteredCryptoProviders, "getRegisteredCryptoProviders");
|
|
36
|
-
function clearCryptoProviderRegistry() {
|
|
37
|
-
cryptoProviders.clear();
|
|
38
|
-
}
|
|
39
|
-
chunkWGEGR3DF_cjs.__name(clearCryptoProviderRegistry, "clearCryptoProviderRegistry");
|
|
40
|
-
function getImportHint(type) {
|
|
41
|
-
switch (type) {
|
|
42
|
-
case "noble":
|
|
43
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/noble'?";
|
|
44
|
-
case "quickcrypto":
|
|
45
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/quickcrypto'?";
|
|
46
|
-
case "webcrypto":
|
|
47
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/webcrypto'?";
|
|
48
|
-
case "node":
|
|
49
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/node'?";
|
|
50
|
-
default:
|
|
51
|
-
return `Did you forget to import the '${String(type)}' provider?`;
|
|
52
|
-
}
|
|
53
|
-
}
|
|
54
|
-
chunkWGEGR3DF_cjs.__name(getImportHint, "getImportHint");
|
|
55
|
-
|
|
56
|
-
exports.clearCryptoProviderRegistry = clearCryptoProviderRegistry;
|
|
57
|
-
exports.getCryptoProviderFactory = getCryptoProviderFactory;
|
|
58
|
-
exports.getRegisteredCryptoProviders = getRegisteredCryptoProviders;
|
|
59
|
-
exports.isCryptoProviderRegistered = isCryptoProviderRegistered;
|
|
60
|
-
exports.registerCryptoProvider = registerCryptoProvider;
|
|
61
|
-
//# sourceMappingURL=chunk-A6FLEJ7R.cjs.map
|
|
62
|
-
//# sourceMappingURL=chunk-A6FLEJ7R.cjs.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/crypto/providers/registry.ts"],"names":["__name"],"mappings":";;;;;AAmBA,IAAM,eAAA,uBAAsB,GAAA,EAA+C;AAkBpE,SAAS,sBAAA,CACd,MACA,OAAA,EACM;AAEN,EAAA,IAAI,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA,EAAG;AAC7B,IAAA;AAAA,EACF;AACA,EAAA,eAAA,CAAgB,GAAA,CAAI,MAAM,OAAO,CAAA;AACnC;AATgBA,wBAAA,CAAA,sBAAA,EAAA,wBAAA,CAAA;AAkBT,SAAS,yBAAyB,IAAA,EAAiD;AACxF,EAAA,MAAM,OAAA,GAAU,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA;AAExC,EAAA,IAAI,CAAC,OAAA,EAAS;AACZ,IAAA,MAAM,kBAAA,GAAqB,MAAM,IAAA,CAAK,eAAA,CAAgB,MAAM,CAAA,CAAE,KAAK,IAAI,CAAA;AACvE,IAAA,MAAM,UAAA,GAAa,cAAc,IAAI,CAAA;AAErC,IAAA,MAAM,IAAI,KAAA;AAAA,MACR,CAAA,iBAAA,EAAoB,IAAI,CAAA,qBAAA,EAAwB,UAAU;AAAA,qBAAA,EAClC,sBAAsB,MAAM;AAAA,iDAAA;AAAA,KAEtD;AAAA,EACF;AAEA,EAAA,OAAO,OAAA;AACT;AAfgBA,wBAAA,CAAA,wBAAA,EAAA,0BAAA,CAAA;AAuBT,SAAS,2BAA2B,IAAA,EAAmC;AAC5E,EAAA,OAAO,eAAA,CAAgB,IAAI,IAAI,CAAA;AACjC;AAFgBA,wBAAA,CAAA,0BAAA,EAAA,4BAAA,CAAA;AAST,SAAS,4BAAA,GAAqD;AACnE,EAAA,OAAO,KAAA,CAAM,IAAA,CAAK,eAAA,CAAgB,IAAA,EAAM,CAAA;AAC1C;AAFgBA,wBAAA,CAAA,4BAAA,EAAA,8BAAA,CAAA;AAOT,SAAS,2BAAA,GAAoC;AAClD,EAAA,eAAA,CAAgB,KAAA,EAAM;AACxB;AAFgBA,wBAAA,CAAA,2BAAA,EAAA,6BAAA,CAAA;AAOhB,SAAS,cAAc,IAAA,EAAkC;AACvD,EAAA,QAAQ,IAAA;AAAM,IACZ,KAAK,OAAA;AACH,MAAA,OAAO,4EAAA;AAAA,IACT,KAAK,aAAA;AACH,MAAA,OAAO,kFAAA;AAAA,IACT,KAAK,WAAA;AACH,MAAA,OAAO,gFAAA;AAAA,IACT,KAAK,MAAA;AACH,MAAA,OAAO,2EAAA;AAAA,IACT;AACE,MAAA,OAAO,CAAA,8BAAA,EAAiC,MAAA,CAAO,IAAI,CAAC,CAAA,WAAA,CAAA;AAAA;AAE1D;AAbSA,wBAAA,CAAA,aAAA,EAAA,eAAA,CAAA","file":"chunk-A6FLEJ7R.cjs","sourcesContent":["/**\n * Global registry for crypto providers\n *\n * This registry allows providers to self-register when imported,\n * enabling explicit import patterns while maintaining the factory pattern\n * internally within BananaLink and BananaWallet classes.\n */\n\nimport type { CryptoProvider, CryptoProviderType } from '../../types/crypto-provider';\nimport type { Logger } from '@bananalink-sdk/logger';\n\n/**\n * Factory function type for creating crypto provider instances\n */\nexport type CryptoProviderFactory = (logger?: Logger) => CryptoProvider;\n\n/**\n * Global registry storing available crypto providers\n */\nconst cryptoProviders = new Map<CryptoProviderType, CryptoProviderFactory>();\n\n/**\n * Register a crypto provider factory\n * Called automatically when a provider module is imported\n *\n * This function is idempotent - calling it multiple times with the same type\n * will only register the provider once.\n *\n * @param type - The provider type identifier\n * @param factory - Factory function that creates provider instances\n *\n * @example\n * ```typescript\n * // In noble-provider.ts\n * registerCryptoProvider('noble', (logger) => new NobleCryptoProvider(logger));\n * ```\n */\nexport function registerCryptoProvider(\n type: CryptoProviderType,\n factory: CryptoProviderFactory\n): void {\n // Skip if already registered (idempotent)\n if (cryptoProviders.has(type)) {\n return;\n }\n cryptoProviders.set(type, factory);\n}\n\n/**\n * Get a registered crypto provider factory\n *\n * @param type - The provider type to retrieve\n * @returns The provider factory function\n * @throws Error if the provider is not registered\n */\nexport function getCryptoProviderFactory(type: CryptoProviderType): CryptoProviderFactory {\n const factory = cryptoProviders.get(type);\n\n if (!factory) {\n const availableProviders = Array.from(cryptoProviders.keys()).join(', ');\n const importHint = getImportHint(type);\n\n throw new Error(\n `Crypto provider '${type}' is not registered. ${importHint}\\n` +\n `Available providers: ${availableProviders || 'none'}\\n` +\n `Make sure to import the provider before using it.`\n );\n }\n\n return factory;\n}\n\n/**\n * Check if a crypto provider is registered\n *\n * @param type - The provider type to check\n * @returns True if the provider is registered\n */\nexport function isCryptoProviderRegistered(type: CryptoProviderType): boolean {\n return cryptoProviders.has(type);\n}\n\n/**\n * Get all registered crypto provider types\n *\n * @returns Array of registered provider types\n */\nexport function getRegisteredCryptoProviders(): CryptoProviderType[] {\n return Array.from(cryptoProviders.keys());\n}\n\n/**\n * Clear all registered providers (useful for testing)\n */\nexport function clearCryptoProviderRegistry(): void {\n cryptoProviders.clear();\n}\n\n/**\n * Get import hint for a specific provider type\n */\nfunction getImportHint(type: CryptoProviderType): string {\n switch (type) {\n case 'noble':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/noble'?\";\n case 'quickcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/quickcrypto'?\";\n case 'webcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/webcrypto'?\";\n case 'node':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/node'?\";\n default:\n return `Did you forget to import the '${String(type)}' provider?`;\n }\n}\n\n/**\n * Type augmentation for registered providers\n * This allows TypeScript to track which providers are available\n */\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n // eslint-disable-next-line @typescript-eslint/no-empty-object-type\n interface RegisteredCryptoProviders {\n // This will be augmented by each provider module\n }\n }\n}\n"]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/crypto/errors.ts","../src/crypto/providers/compliance-provider.ts","../src/crypto/context.ts","../src/crypto/utils.ts","../src/crypto/providers/factory.ts"],"names":["platform","recommendations"],"mappings":";;;;AAMO,IAAM,YAAA,GAAN,MAAM,YAAA,SAAoB,KAAA,CAAM;AAAA,EACrC,WAAA,CACE,OAAA,EACgB,IAAA,EACA,OAAA,EAChB;AACA,IAAA,KAAA,CAAM,OAAO,CAAA;AAHG,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,OAAA,GAAA,OAAA;AAGhB,IAAA,IAAA,CAAK,IAAA,GAAO,aAAA;AAGZ,IAAA,IAAI,MAAM,iBAAA,EAAmB;AAC3B,MAAA,KAAA,CAAM,iBAAA,CAAkB,IAAA,EAAM,IAAA,CAAK,WAAW,CAAA;AAAA,IAChD;AAAA,EACF;AACF,CAAA;AAduC,MAAA,CAAA,YAAA,EAAA,aAAA,CAAA;AAAhC,IAAM,WAAA,GAAN;AAoBA,IAAM,+BAAA,GAAN,MAAM,+BAAA,SAAuC,WAAA,CAAY;AAAA,EAC9D,WAAA,CACE,SACA,OAAA,EAMA;AACA,IAAA,KAAA,CAAM,OAAA,EAAS,wBAAwB,OAAO,CAAA;AAC9C,IAAA,IAAA,CAAK,IAAA,GAAO,gCAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,YAAA,GAAuB;AAErB,IAAA,IAAI,CAAC,KAAK,OAAA,EAAS;AACjB,MAAA,OAAO,IAAA,CAAK,OAAA;AAAA,IACd;AAEA,IAAA,MAAM,MAAM,IAAA,CAAK,OAAA;AAOjB,IAAA,MAAM,KAAA,GAAkB;AAAA,MACtB,IAAA,CAAK,OAAA;AAAA,MACL,EAAA;AAAA,MACA,sBAAA;AAAA,MACA,GAAG,GAAA,CAAI,kBAAA,CAAmB,IAAI,CAAA,CAAA,KAAK,CAAA,IAAA,EAAO,CAAC,CAAA,CAAE;AAAA,KAC/C;AAEA,IAAA,IAAI,GAAA,CAAI,eAAA,CAAgB,MAAA,GAAS,CAAA,EAAG;AAClC,MAAA,KAAA,CAAM,IAAA,CAAK,IAAI,kBAAkB,CAAA;AACjC,MAAA,KAAA,CAAM,IAAA,CAAK,GAAG,GAAA,CAAI,eAAA,CAAgB,IAAI,CAAA,CAAA,KAAK,CAAA,IAAA,EAAO,CAAC,CAAA,CAAE,CAAC,CAAA;AAAA,IACxD;AAGA,IAAA,IAAI,IAAI,QAAA,EAAU;AAChB,MAAA,MAAM,YAAA,GAAe,GAAA,CAAI,QAAA,CAAS,MAAA,GAC9B,SAAA,GACA,GAAA,CAAI,QAAA,CAAS,SAAA,GACX,SAAA,GACA,GAAA,CAAI,QAAA,CAAS,aAAA,GACX,cAAA,GACA,SAAA;AAER,MAAA,KAAA,CAAM,IAAA,CAAK,EAAA,EAAI,CAAA,UAAA,EAAa,YAAY,CAAA,CAAE,CAAA;AAE1C,MAAA,IAAI,GAAA,CAAI,SAAS,QAAA,EAAU;AACzB,QAAA,KAAA,CAAM,IAAA,CAAK,CAAA,IAAA,EAAO,GAAA,CAAI,QAAA,CAAS,QAAQ,CAAA,CAAE,CAAA;AAAA,MAC3C;AAEA,MAAA,IAAI,GAAA,CAAI,SAAS,SAAA,EAAW;AAC1B,QAAA,MAAM,EAAA,GAAK,IAAI,QAAA,CAAS,SAAA;AAExB,QAAA,MAAM,SAAA,GAAY,EAAA,CAAG,MAAA,GAAS,GAAA,GAAM,CAAA,EAAG,GAAG,SAAA,CAAU,CAAA,EAAG,GAAG,CAAC,CAAA,GAAA,CAAA,GAAQ,EAAA;AACnE,QAAA,KAAA,CAAM,IAAA,CAAK,CAAA,YAAA,EAAe,SAAS,CAAA,CAAE,CAAA;AAAA,MACvC;AAAA,IACF;AAEA,IAAA,OAAO,KAAA,CAAM,KAAK,IAAI,CAAA;AAAA,EACxB;AACF,CAAA;AArEgE,MAAA,CAAA,+BAAA,EAAA,gCAAA,CAAA;AAAzD,IAAM,8BAAA,GAAN;AA0EA,IAAM,6BAAA,GAAN,MAAM,6BAAA,SAAqC,WAAA,CAAY;AAAA,EAC5D,WAAA,CACE,SAAA,EACA,QAAA,EACA,MAAA,EACA;AACA,IAAA,KAAA;AAAA,MACE,CAAA,kBAAA,EAAqB,SAAS,CAAA,gCAAA,EAAmC,QAAQ,MAAM,MAAM,CAAA,CAAA;AAAA,MACrF,oBAAA;AAAA,MACA,EAAE,SAAA,EAAW,QAAA,EAAU,MAAA;AAAO,KAChC;AACA,IAAA,IAAA,CAAK,IAAA,GAAO,8BAAA;AAAA,EACd;AACF,CAAA;AAb8D,MAAA,CAAA,6BAAA,EAAA,8BAAA,CAAA;AAAvD,IAAM,4BAAA,GAAN;;;ACxDA,IAAM,yBAAA,GAAN,MAAM,yBAAA,CAAsD;AAAA,EAIjE,YAAY,MAAA,EAAiB;AAH7B,IAAA,IAAA,CAAQ,WAAmC,EAAC;AAI1C,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,qBAAqB,CAAA;AAAA,EAChE;AAAA,EAEA,SAAS,KAAA,EAAmC;AAC1C,IAAA,IAAA,CAAK,QAAA,CAAS,KAAK,KAAK,CAAA;AACxB,IAAA,IAAA,CAAK,MAAA,EAAQ,KAAK,wBAAA,EAA0B;AAAA,MAC1C,WAAW,KAAA,CAAM,SAAA;AAAA,MACjB,SAAS,KAAA,CAAM,OAAA;AAAA,MACf,WAAW,KAAA,CAAM,SAAA;AAAA,MACjB,WAAW,KAAA,CAAM;AAAA,KAClB,CAAA;AAAA,EACH;AAAA,EAEA,WAAA,GAAsC;AACpC,IAAA,OAAO,CAAC,GAAG,IAAA,CAAK,QAAQ,CAAA;AAAA,EAC1B;AAAA,EAEA,aAAA,GAAsB;AACpB,IAAA,IAAA,CAAK,WAAW,EAAC;AACjB,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,8BAA8B,CAAA;AAAA,EACnD;AACF,CAAA;AA1BmE,MAAA,CAAA,yBAAA,EAAA,0BAAA,CAAA;AAA5D,IAAM,wBAAA,GAAN;AAwDA,IAAM,yBAAA,GAAN,MAAM,yBAAA,CAAmD;AAAA,EAS9D,WAAA,CACE,kBAAA,EACA,MAAA,GAA2B,IAC3B,MAAA,EACA;AACA,IAAA,IAAA,CAAK,kBAAA,GAAqB,kBAAA;AAC1B,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,OAAA,GAAU,MAAA,CAAO,OAAA,IAAW,IAAI,yBAAyB,MAAM,CAAA;AACpE,IAAA,IAAA,CAAK,MAAA,GAAS,QAAQ,KAAA,CAAM;AAAA,MAC1B,SAAA,EAAW,0BAAA;AAAA,MACX,oBAAoB,kBAAA,CAAmB;AAAA,KACxC,CAAA;AAED,IAAA,IAAA,CAAK,IAAA,GAAO,CAAA,WAAA,EAAc,kBAAA,CAAmB,IAAI,CAAA,CAAA,CAAA;AACjD,IAAA,IAAA,CAAK,cAAc,kBAAA,CAAmB,WAAA;AAAA,EACxC;AAAA;AAAA;AAAA;AAAA,EAKQ,iBACN,SAAA,EACA,OAAA,EACA,QAAA,GAAoC,IACpC,KAAA,EACsB;AACtB,IAAA,OAAO;AAAA,MACL,SAAA;AAAA,MACA,SAAA,EAAA,iBAAW,IAAI,IAAA,EAAK,EAAE,WAAA,EAAY;AAAA,MAClC,SAAA,EAAW,KAAK,MAAA,CAAO,SAAA;AAAA,MACvB,OAAA;AAAA,MACA,KAAA;AAAA,MACA,QAAA;AAAA,MACA,GAAG;AAAA,KACL;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKQ,gBAAA,CAAiB,SAAA,EAAmB,SAAA,EAA+B,QAAA,EAAyB;AAClG,IAAA,MAAM,YAAA,GAAe,KAAK,MAAA,CAAO,eAAA;AACjC,IAAA,IAAI,CAAC,YAAA,EAAc;AAEnB,IAAA,IAAI,YAAA,CAAa,gBAAA,IAAoB,CAAC,IAAA,CAAK,OAAO,SAAA,EAAW;AAC3D,MAAA,MAAM,IAAI,MAAM,qDAAqD,CAAA;AAAA,IACvE;AAEA,IAAA,IAAI,YAAA,CAAa,WAAA,IAAe,QAAA,IAAY,QAAA,GAAW,aAAa,WAAA,EAAa;AAC/E,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,UAAA,EAAa,QAAQ,CAAA,yBAAA,EAA4B,YAAA,CAAa,WAAW,CAAA,MAAA,CAAQ,CAAA;AAAA,IACnG;AAEA,IAAA,IAAI,SAAA,IAAa,aAAa,iBAAA,EAAmB;AAC/C,MAAA,MAAM,gBAAA,GAAmB,aAAa,iBAAA,CAAkB,IAAA,CAAK,WAAS,SAAA,CAAU,QAAA,CAAS,KAAK,CAAC,CAAA;AAC/F,MAAA,IAAI,CAAC,gBAAA,EAAkB;AACrB,QAAA,MAAM,IAAI,MAAM,CAAA,sCAAA,EAAyC,YAAA,CAAa,kBAAkB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAE,CAAA;AAAA,MACtG;AAAA,IACF;AAEA,IAAA,IAAI,SAAA,IAAa,aAAa,kBAAA,EAAoB;AAChD,MAAA,MAAM,iBAAA,GAAoB,aAAa,kBAAA,CAAmB,IAAA,CAAK,WAAS,SAAA,CAAU,QAAA,CAAS,KAAK,CAAC,CAAA;AACjG,MAAA,IAAI,iBAAA,EAAmB;AACrB,QAAA,MAAM,IAAI,MAAM,CAAA,oCAAA,EAAuC,YAAA,CAAa,mBAAmB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAE,CAAA;AAAA,MACrG;AAAA,IACF;AAGA,IAAA,IAAI,SAAA,KAAc,QAAA,IAAY,YAAA,CAAa,cAAA,KAAmB,KAAA,EAAO;AACnE,MAAA,MAAM,IAAI,MAAM,8CAA8C,CAAA;AAAA,IAChE;AAEA,IAAA,IAAI,SAAA,KAAc,QAAA,IAAY,YAAA,CAAa,cAAA,KAAmB,KAAA,EAAO;AACnE,MAAA,MAAM,IAAI,MAAM,8CAA8C,CAAA;AAAA,IAChE;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,eAAA,GAA4C;AAChD,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,2CAA2C,CAAA;AAE9D,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,eAAA,EAAgB;AAE9D,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,OAAA,CAAQ,UAAA,CAAW,MAAM,CAAA;AAE7D,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,QAAQ,UAAA,CAAW,SAAA;AAAA,QAC9B,QAAA,EAAU,QAAQ,UAAA,CAAW,MAAA;AAAA,QAC7B,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,SAAA,EAAgD;AACpE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,QAAA,EAAU,SAAA,CAAU,MAAM,CAAA;AAEhD,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,gBAAgB,SAAS,CAAA;AAEvE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,SAAA,CAAU,SAAA;AAAA,QACrB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,UAAA,EAAiD;AACtE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,QAAA,EAAU,UAAA,CAAW,MAAM,CAAA;AAGjD,MAAA,IAAI,IAAA,CAAK,OAAO,gBAAA,EAAkB;AAChC,QAAA,IAAA,CAAK,MAAA,EAAQ,KAAK,8CAAA,EAAgD;AAAA,UAChE,SAAA,EAAW,KAAK,MAAA,CAAO,SAAA;AAAA,UACvB,WAAW,UAAA,CAAW;AAAA,SACvB,CAAA;AAAA,MACH;AAEA,MAAA,MAAM,OAAA,GAAU,MAAM,IAAA,CAAK,kBAAA,CAAmB,iBAAiB,UAAU,CAAA;AAEzE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAA,EAAY,KAAK,MAAA,CAAO,gBAAA;AAAA,QACxB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,UAAA,EAAY,KAAK,MAAA,CAAO,gBAAA;AAAA,QACxB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,gBAAgB,OAAA,EAA8C;AAClE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,iBAAiB,QAAQ,CAAA;AAE9B,MAAA,MAAM,GAAA,GAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,gBAAgB,OAAO,CAAA;AAEjE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,QAAA;AAAA,QACT,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAU,GAAA,CAAI,MAAA;AAAA,QACd,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,QAAA;AAAA,QACT,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,iBAAiB,OAAA,EAA8C;AACnE,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,iBAAiB,QAAQ,CAAA;AAE9B,MAAA,MAAM,GAAA,GAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,iBAAiB,OAAO,CAAA;AAElE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,OAAA,EAAS,SAAA;AAAA,QACT,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,UAAU,GAAA,CAAI,MAAA;AAAA,QACd,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,OAAA,EAAS,SAAA;AAAA,QACT,SAAS,OAAA,CAAQ,UAAA;AAAA,QACjB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,kBAAA,CAAmB,UAAA,EAA2B,SAAA,EAAkD;AACpG,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,UAAA,CAAW,MAAM,CAAA;AAErD,MAAA,MAAM,eAAe,MAAM,IAAA,CAAK,kBAAA,CAAmB,kBAAA,CAAmB,YAAY,SAAS,CAAA;AAE3F,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,MAAA;AAAA,QACX,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,YAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,SAAA,EAAW,MAAA;AAAA,QACX,WAAW,UAAA,CAAW,SAAA;AAAA,QACtB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,mBAAA,CAAoB,YAAA,EAA6B,IAAA,EAAmB,IAAA,EAA2C;AACnH,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,MAAM,gBAAgB,MAAM,IAAA,CAAK,mBAAmB,mBAAA,CAAoB,YAAA,EAAc,MAAM,IAAI,CAAA;AAEhG,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,IAAA,EAAM;AAAA,QAClE,SAAA,EAAW,MAAA;AAAA,QACX,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,aAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,kBAAkB,KAAA,EAAO;AAAA,QACnE,SAAA,EAAW,MAAA;AAAA,QACX,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,YAAY,MAAA,EAA6B;AACvC,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,MAAM,UAAA,GAAa,IAAA,CAAK,kBAAA,CAAmB,WAAA,CAAY,MAAM,CAAA;AAE7D,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,IAAA,EAAM;AAAA,QACrE,MAAA;AAAA,QACA,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,UAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,KAAA,EAAO;AAAA,QACtE,MAAA;AAAA,QACA,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAE/D,MAAA,MAAM,aAAa,MAAM,IAAA,CAAK,mBAAmB,OAAA,CAAQ,GAAA,EAAK,MAAM,EAAE,CAAA;AAEtE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,gBAAgB,UAAA,CAAW,UAAA;AAAA,QAC3B,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,UAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,YAAA,EAAc,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAE/D,MAAA,MAAM,YAAY,MAAM,IAAA,CAAK,mBAAmB,OAAA,CAAQ,GAAA,EAAK,MAAM,EAAE,CAAA;AAErE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,IAAA,EAAM;AAAA,QAC9D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,eAAe,SAAA,CAAU,UAAA;AAAA,QACzB,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,SAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,cAAc,KAAA,EAAO;AAAA,QAC/D,WAAW,GAAA,CAAI,SAAA;AAAA,QACf,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAQ,EAAA,CAAG,UAAA;AAAA,QACX,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,YAAA,CAAa,GAAA,EAAoB,IAAA,EAAyC;AAC9E,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,MAAA,EAAQ,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAEzD,MAAA,MAAM,MAAM,MAAM,IAAA,CAAK,kBAAA,CAAmB,YAAA,CAAa,KAAK,IAAI,CAAA;AAEhE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,mBAAmB,IAAA,EAAM;AAAA,QACnE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,GAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,mBAAmB,KAAA,EAAO;AAAA,QACpE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,MAAM,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AAC1F,IAAA,MAAM,SAAA,GAAY,KAAK,GAAA,EAAI;AAE3B,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,gBAAA,CAAiB,MAAA,EAAQ,GAAA,CAAI,MAAA,EAAQ,KAAK,UAAU,CAAA;AAEzD,MAAA,MAAM,UAAU,MAAM,IAAA,CAAK,mBAAmB,UAAA,CAAW,GAAA,EAAK,MAAM,GAAG,CAAA;AAEvE,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,IAAA,EAAM;AAAA,QACrE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,OAAA;AAAA,QACV,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACxB,CAAC,CAAA;AAEF,MAAA,OAAO,OAAA;AAAA,IACT,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,gBAAA,CAAiB,qBAAqB,KAAA,EAAO;AAAA,QACtE,SAAA,EAAW,aAAA;AAAA,QACX,UAAU,IAAA,CAAK,UAAA;AAAA,QACf,SAAS,GAAA,CAAI,UAAA;AAAA,QACb,QAAA,EAAU,IAAA,CAAK,GAAA,EAAI,GAAI;AAAA,OACzB,EAAG,iBAAiB,KAAA,GAAQ,KAAA,CAAM,UAAU,MAAA,CAAO,KAAK,CAAC,CAAC,CAAA;AAE1D,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,UAAA,GAAgC;AAC9B,IAAA,OAAO,IAAA,CAAK,OAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,aAAa,SAAA,EAA4C;AACvD,IAAA,MAAA,CAAO,MAAA,CAAO,IAAA,CAAK,MAAA,EAAQ,SAAS,CAAA;AACpC,IAAA,IAAA,CAAK,MAAA,EAAQ,KAAA,CAAM,kCAAA,EAAoC,SAAS,CAAA;AAAA,EAClE;AAAA;AAAA;AAAA;AAAA,EAKA,qBAAA,GAAwC;AACtC,IAAA,OAAO,IAAA,CAAK,kBAAA;AAAA,EACd;AACF,CAAA;AA9dgE,MAAA,CAAA,yBAAA,EAAA,0BAAA,CAAA;AAAzD,IAAM,wBAAA,GAAN;;;ACnDP,IAAM,qBAAA,GAAN,MAAM,qBAAA,CAAqB;AAAA,EAA3B,WAAA,GAAA;AACE,IAAA,IAAA,CAAQ,QAAA,GAAkC,IAAA;AAC1C,IAAA,IAAA,CAAQ,MAAA,GAAqC,IAAA;AAC7C,IAAA,IAAA,CAAQ,WAAA,GAAc,KAAA;AACtB,IAAA,IAAA,CAAQ,YAAA,GAAe,KAAA;AAAA,EAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASvB,UAAA,CAAW,MAAA,GAA8B,EAAC,EAAS;AACjD,IAAA,IAAI,IAAA,CAAK,WAAA,IAAe,IAAA,CAAK,QAAA,EAAU;AACrC,MAAA,MAAM,IAAI,KAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AAGA,IAAA,IAAI,MAAA,CAAO,MAAA,IAAU,MAAA,CAAO,IAAA,EAAM;AAChC,MAAA,MAAM,qBAAqB,4BAAA,EAA6B;AACxD,MAAA,IAAI,CAAC,kBAAA,CAAmB,QAAA,CAAS,MAAA,CAAO,IAAI,CAAA,EAAG;AAC7C,QAAA,MAAM,WAAW,cAAA,EAAe;AAChC,QAAA,MAAM,eAAA,GAA4B;AAAA,UAChC,CAAA,sEAAA,EAAyE,OAAO,IAAI,CAAA,CAAA,CAAA;AAAA,UACpF;AAAA,SACF;AAGA,QAAA,IAAI,MAAA,CAAO,IAAA,KAAS,aAAA,IAAiB,CAAC,SAAS,aAAA,EAAe;AAC5D,UAAA,eAAA,CAAgB,KAAK,+CAA+C,CAAA;AACpE,UAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,YAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,UACxD,CAAA,MAAA,IAAW,SAAS,SAAA,EAAW;AAC7B,YAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,UAC9D;AAAA,QACF;AAGA,QAAA,IAAI,kBAAA,CAAmB,QAAA,CAAS,OAAO,CAAA,EAAG;AACxC,UAAA,eAAA,CAAgB,KAAK,0DAA0D,CAAA;AAAA,QACjF;AAEA,QAAA,MAAM,IAAI,8BAAA;AAAA,UACR,CAAA,8BAAA,EAAiC,OAAO,IAAI,CAAA,iDAAA,CAAA;AAAA,UAC5C;AAAA,YACE,mBAAmB,MAAA,CAAO,IAAA;AAAA,YAC1B,kBAAA;AAAA,YACA,QAAA;AAAA,YACA;AAAA;AACF,SACF;AAAA,MACF;AAAA,IACF;AAEA,IAAA,IAAA,CAAK,MAAA,GAAS,MAAA;AACd,IAAA,IAAA,CAAK,QAAA,GAAW,IAAA,CAAK,cAAA,CAAe,MAAM,CAAA;AAC1C,IAAA,IAAA,CAAK,WAAA,GAAc,IAAA;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAkCA,WAAA,GAA8B;AAE5B,IAAA,IAAI,KAAK,QAAA,EAAU;AACjB,MAAA,OAAO,IAAA,CAAK,QAAA;AAAA,IACd;AAGA,IAAA,IAAI,KAAK,YAAA,EAAc;AACrB,MAAA,MAAM,IAAI,KAAA;AAAA,QACR;AAAA,OACF;AAAA,IACF;AAGA,IAAA,IAAA,CAAK,YAAA,GAAe,IAAA;AACpB,IAAA,IAAI;AACF,MAAA,IAAA,CAAK,UAAA,EAAW;AAEhB,MAAA,IAAI,CAAC,KAAK,QAAA,EAAU;AAClB,QAAA,MAAM,IAAI,MAAM,uDAAuD,CAAA;AAAA,MACzE;AACA,MAAA,OAAO,IAAA,CAAK,QAAA;AAAA,IACd,CAAA,SAAE;AACA,MAAA,IAAA,CAAK,YAAA,GAAe,KAAA;AAAA,IACtB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAQA,YAAY,QAAA,EAAgC;AAC1C,IAAA,IAAA,CAAK,QAAA,GAAW,QAAA;AAChB,IAAA,IAAA,CAAK,WAAA,GAAc,IAAA;AAAA,EACrB;AAAA;AAAA;AAAA;AAAA,EAKA,aAAA,GAAyB;AACvB,IAAA,OAAO,IAAA,CAAK,WAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,SAAA,GAAwC;AACtC,IAAA,OAAO,IAAA,CAAK,MAAA;AAAA,EACd;AAAA;AAAA;AAAA;AAAA,EAKA,KAAA,GAAc;AACZ,IAAA,IAAA,CAAK,QAAA,GAAW,IAAA;AAChB,IAAA,IAAA,CAAK,MAAA,GAAS,IAAA;AACd,IAAA,IAAA,CAAK,WAAA,GAAc,KAAA;AACnB,IAAA,IAAA,CAAK,YAAA,GAAe,KAAA;AAAA,EACtB;AAAA;AAAA;AAAA;AAAA,EAKQ,eAAe,MAAA,EAA6C;AAClE,IAAA,MAAM,eAAe,oBAAA,CAAqB,MAAA,CAAO,MAAM,MAAA,CAAO,MAAA,EAAQ,OAAO,MAAM,CAAA;AAEnF,IAAA,IAAI,MAAA,CAAO,YAAY,OAAA,EAAS;AAC9B,MAAA,OAAO,IAAI,wBAAA,CAAyB,YAAA,EAAc,MAAA,CAAO,UAAU,CAAA;AAAA,IACrE;AAEA,IAAA,OAAO,YAAA;AAAA,EACT;AAEF,CAAA;AAzK2B,MAAA,CAAA,qBAAA,EAAA,sBAAA,CAAA;AAA3B,IAAM,oBAAA,GAAN,qBAAA;AAkLO,IAAM,aAAA,GAAgB,IAAI,oBAAA;;;AC7M1B,SAAS,WAAA,CAAY,QAAgB,QAAA,EAAuC;AACjF,EAAA,MAAM,cAAA,GAAiB,QAAA,IAAY,aAAA,CAAc,WAAA,EAAY;AAC7D,EAAA,MAAM,MAAA,GAAS,cAAA,CAAe,WAAA,CAAY,MAAM,CAAA;AAChD,EAAA,OAAO,IAAI,WAAW,MAAM,CAAA;AAC9B;AAJgB,MAAA,CAAA,WAAA,EAAA,aAAA,CAAA;AAST,SAAS,oBAAoB,MAAA,EAA6B;AAC/D,EAAA,MAAM,KAAA,GAAQ,IAAI,UAAA,CAAW,MAAM,CAAA;AACnC,EAAA,IAAI,MAAA,GAAS,EAAA;AACb,EAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,KAAA,CAAM,YAAY,CAAA,EAAA,EAAK;AACzC,IAAA,MAAA,IAAU,MAAA,CAAO,YAAA,CAAa,KAAA,CAAM,CAAC,CAAC,CAAA;AAAA,EACxC;AACA,EAAA,OAAO,KAAK,MAAM,CAAA;AACpB;AAPgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAYT,SAAS,oBAAoB,MAAA,EAA6B;AAE/D,EAAA,MAAM,WAAA,GAAc,MAAA,CAAO,OAAA,CAAQ,kBAAA,EAAoB,EAAE,CAAA;AAGzD,EAAA,IAAI,YAAA,GAAe,WAAA;AACnB,EAAA,OAAO,YAAA,CAAa,MAAA,GAAS,CAAA,KAAM,CAAA,EAAG;AACpC,IAAA,YAAA,IAAgB,GAAA;AAAA,EAClB;AAEA,EAAA,IAAI;AACF,IAAA,MAAM,MAAA,GAAS,KAAK,YAAY,CAAA;AAChC,IAAA,MAAM,KAAA,GAAQ,IAAI,UAAA,CAAW,MAAA,CAAO,MAAM,CAAA;AAC1C,IAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,MAAA,CAAO,QAAQ,CAAA,EAAA,EAAK;AACtC,MAAA,KAAA,CAAM,CAAC,CAAA,GAAI,MAAA,CAAO,UAAA,CAAW,CAAC,CAAA;AAAA,IAChC;AACA,IAAA,OAAO,KAAA,CAAM,MAAA;AAAA,EACf,SAAS,KAAA,EAAO;AACd,IAAA,MAAM,IAAI,KAAA,CAAM,CAAA,gCAAA,EAAmC,KAAA,YAAiB,QAAQ,KAAA,CAAM,OAAA,GAAU,uBAAuB,CAAA,mBAAA,EAAsB,MAAA,CAAO,SAAA,CAAU,CAAA,EAAG,EAAE,CAAC,CAAA,GAAA,CAAK,CAAA;AAAA,EACvK;AACF;AApBgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAyBT,SAAS,oBAAoB,GAAA,EAA0B;AAC5D,EAAA,OAAO,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,GAAG,CAAA,CAAE,MAAA;AACvC;AAFgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAOT,SAAS,oBAAoB,MAAA,EAA6B;AAC/D,EAAA,OAAO,IAAI,WAAA,EAAY,CAAE,MAAA,CAAO,MAAM,CAAA;AACxC;AAFgB,MAAA,CAAA,mBAAA,EAAA,qBAAA,CAAA;AAoBT,SAAS,aAAA,CAAc,MAAA,GAAiB,EAAA,EAAI,QAAA,EAAmC;AACpF,EAAA,MAAM,KAAA,GAAQ,WAAA,CAAY,MAAA,EAAQ,QAAQ,CAAA;AAC1C,EAAA,OAAO,KAAA,CAAM,IAAA,CAAK,KAAA,EAAO,CAAC,SAAiB,IAAA,CAAK,QAAA,CAAS,EAAE,CAAA,CAAE,SAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE,CAAA;AACxF;AAHgB,MAAA,CAAA,aAAA,EAAA,eAAA,CAAA;AA2BT,SAAS,aAAa,QAAA,EAAmC;AAC9D,EAAA,MAAM,KAAA,GAAQ,WAAA,CAAY,EAAA,EAAI,QAAQ,CAAA;AAGtC,EAAA,KAAA,CAAM,CAAC,CAAA,GAAK,KAAA,CAAM,CAAC,IAAI,EAAA,GAAQ,EAAA;AAC/B,EAAA,KAAA,CAAM,CAAC,CAAA,GAAK,KAAA,CAAM,CAAC,IAAI,EAAA,GAAQ,GAAA;AAG/B,EAAA,MAAM,MAAM,KAAA,CAAM,IAAA,CAAK,KAAA,EAAO,CAAC,SAAiB,IAAA,CAAK,QAAA,CAAS,EAAE,CAAA,CAAE,SAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE,CAAA;AAC3F,EAAA,OAAO;AAAA,IACL,GAAA,CAAI,KAAA,CAAM,CAAA,EAAG,CAAC,CAAA;AAAA,IACd,GAAA,CAAI,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAAA,IACf,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAAA,IAChB,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE,CAAA;AAAA,IAChB,GAAA,CAAI,KAAA,CAAM,EAAA,EAAI,EAAE;AAAA,GAClB,CAAE,KAAK,GAAG,CAAA;AACZ;AAhBgB,MAAA,CAAA,YAAA,EAAA,cAAA,CAAA;AAkCT,SAAS,cAAA,GAA0C;AAExD,EAAA,MAAM,MAAA,GAAS,OAAO,OAAA,KAAY,WAAA,IAChC,QAAQ,QAAA,IAAY,IAAA,IACpB,OAAA,CAAQ,QAAA,CAAS,IAAA,IAAQ,IAAA;AAG3B,EAAA,MAAM,SAAA,GAAY,OAAO,MAAA,KAAW,WAAA,IAClC,OAAO,QAAA,KAAa,WAAA;AAGtB,EAAA,MAAM,aAAA,GAAgB,OAAO,SAAA,KAAc,WAAA,IACzC,UAAU,OAAA,KAAY,aAAA;AAGxB,EAAA,IAAI,QAAA;AACJ,EAAA,IAAI,MAAA,IAAU,OAAO,OAAA,CAAQ,QAAA,KAAa,QAAA,EAAU;AAClD,IAAA,QAAA,GAAW,OAAA,CAAQ,QAAA;AAAA,EACrB;AAGA,EAAA,IAAI,SAAA;AACJ,EAAA,IAAI,OAAO,SAAA,KAAc,WAAA,IAAe,OAAO,SAAA,CAAU,cAAc,QAAA,EAAU;AAC/E,IAAA,SAAA,GAAY,SAAA,CAAU,SAAA;AAAA,EACxB;AAEA,EAAA,OAAO;AAAA,IACL,MAAA;AAAA,IACA,SAAA;AAAA,IACA,aAAA;AAAA,IACA,QAAA;AAAA,IACA;AAAA,GACF;AACF;AAjCgB,MAAA,CAAA,cAAA,EAAA,gBAAA,CAAA;;;AChJhB,SAAS,uBAAA,CACP,mBACA,QAAA,EACU;AACV,EAAA,MAAM,kBAA4B,EAAC;AAGnC,EAAA,IAAI,sBAAsB,WAAA,EAAa;AACrC,IAAA,eAAA,CAAgB,KAAK,yDAAyD,CAAA;AAC9E,IAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,MAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,IACxD;AAAA,EACF,CAAA,MAAA,IAAW,sBAAsB,MAAA,EAAQ;AACvC,IAAA,eAAA,CAAgB,KAAK,0CAA0C,CAAA;AAC/D,IAAA,IAAI,SAAS,SAAA,EAAW;AACtB,MAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,IAC9D;AAAA,EACF,CAAA,MAAA,IAAW,sBAAsB,aAAA,EAAe;AAC9C,IAAA,eAAA,CAAgB,KAAK,+CAA+C,CAAA;AACpE,IAAA,IAAI,CAAC,SAAS,aAAA,EAAe;AAC3B,MAAA,IAAI,SAAS,MAAA,EAAQ;AACnB,QAAA,eAAA,CAAgB,KAAK,iCAAiC,CAAA;AAAA,MACxD,CAAA,MAAA,IAAW,SAAS,SAAA,EAAW;AAC7B,QAAA,eAAA,CAAgB,KAAK,uCAAuC,CAAA;AAAA,MAC9D;AAAA,IACF;AAAA,EACF;AAGA,EAAA,eAAA,CAAgB,KAAK,0DAA0D,CAAA;AAC/E,EAAA,eAAA,CAAgB,IAAA,CAAK,CAAA,sEAAA,EAAyE,iBAAiB,CAAA,CAAA,CAAG,CAAA;AAElH,EAAA,OAAO,eAAA;AACT;AAjCS,MAAA,CAAA,uBAAA,EAAA,yBAAA,CAAA;AAwDF,SAAS,oBAAA,CACd,iBAAA,EACA,MAAA,EACA,MAAA,EACgB;AAChB,EAAA,MAAM,sBAAsB,4BAAA,EAA6B;AAEzD,EAAA,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,IACxC,iBAAA;AAAA,IACA,MAAA;AAAA,IACA;AAAA,GACD,CAAA;AAGD,EAAA,IAAI,YAAA,GAA+C,iBAAA;AAGnD,EAAA,IAAI,CAAC,YAAA,EAAc;AACjB,IAAA,IAAI,mBAAA,CAAoB,WAAW,CAAA,EAAG;AACpC,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,0EAAA;AAAA,QACA;AAAA,UACE,oBAAoB,EAAC;AAAA,UACrB,eAAA,EAAiB;AAAA,YACf,oGAAA;AAAA,YACA;AAAA;AACF;AACF,OACF;AAAA,IACF,CAAA,MAAA,IAAW,mBAAA,CAAoB,MAAA,KAAW,CAAA,EAAG;AAE3C,MAAA,YAAA,GAAe,oBAAoB,CAAC,CAAA;AACpC,MAAA,MAAA,EAAQ,KAAA,CAAM,CAAA,eAAA,EAAkB,YAAY,CAAA,gCAAA,CAAkC,CAAA;AAAA,IAChF,CAAA,MAAO;AAEL,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,CAAA,sCAAA,EAAyC,oBAAoB,IAAA,CAAK,IAAI,CAAC,CAAA,2GAAA,EAElC,mBAAA,CAAoB,CAAC,CAAC,CAAA,GAAA,CAAA;AAAA,QAC3D;AAAA,UACE,kBAAA,EAAoB,mBAAA;AAAA,UACpB,eAAA,EAAiB;AAAA,YACf,CAAA,4DAAA,CAAA;AAAA,YACA,CAAA,sBAAA,EAAyB,mBAAA,CAAoB,IAAA,CAAK,IAAI,CAAC,CAAA,CAAA;AAAA,YACvD,CAAA,0DAAA;AAAA;AACF;AACF,OACF;AAAA,IACF;AAAA,EACF;AAGA,EAAA,IAAI;AACF,IAAA,MAAM,OAAA,GAAU,yBAAyB,YAAY,CAAA;AACrD,IAAA,MAAM,QAAA,GAAW,QAAQ,MAAM,CAAA;AAE/B,IAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,MAAA,EAAS,QAAA,CAAS,IAAI,CAAA,gBAAA,CAAA,EAAoB;AAAA,MACrD,YAAA;AAAA,MACA,aAAa,QAAA,CAAS;AAAA,KACvB,CAAA;AAED,IAAA,OAAO,QAAA;AAAA,EACT,SAAS,KAAA,EAAO;AAEd,IAAA,MAAM,gCAAgC,iBAAA,KAAsB,MAAA;AAC5D,IAAA,IAAI,UAAU,6BAAA,EAA+B;AAE3C,MAAA,IAAI,iBAAiB,8BAAA,EAAgC;AACnD,QAAA,MAAM,KAAA;AAAA,MACR;AAGA,MAAA,MAAMA,YAAW,cAAA,EAAe;AAChC,MAAA,MAAM,qBAAqB,4BAAA,EAA6B;AACxD,MAAA,MAAMC,gBAAAA,GAAkB,uBAAA,CAAwB,YAAA,EAAcD,SAAQ,CAAA;AAEtE,MAAA,MAAM,IAAI,8BAAA;AAAA,QACR,CAAA,8BAAA,EAAiC,YAAY,CAAA,wBAAA,EAA2B,KAAA,YAAiB,QAAQ,KAAA,CAAM,OAAA,GAAU,MAAA,CAAO,KAAK,CAAC,CAAA,CAAA;AAAA,QAC9H;AAAA,UACE,iBAAA,EAAmB,YAAA;AAAA,UACnB,kBAAA;AAAA,UACA,QAAA,EAAAA,SAAAA;AAAA,UACA,eAAA,EAAAC;AAAA;AACF,OACF;AAAA,IACF;AAGA,IAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,kBAAA,EAAqB,YAAY,CAAA,2BAAA,CAAA,EAA+B;AAAA,MAC3E,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,EAAE,OAAA,EAAS,KAAA,CAAM,OAAA,EAAQ,GAAI,EAAE,OAAA,EAAS,MAAA,CAAO,KAAK,CAAA;AAAE,KACvF,CAAA;AAGD,IAAA,KAAA,MAAW,gBAAgB,mBAAA,EAAqB;AAC9C,MAAA,IAAI,iBAAiB,YAAA,EAAc;AAEnC,MAAA,IAAI;AACF,QAAA,MAAM,OAAA,GAAU,yBAAyB,YAAY,CAAA;AACrD,QAAA,MAAM,QAAA,GAAW,QAAQ,MAAM,CAAA;AAE/B,QAAA,MAAA,EAAQ,IAAA,CAAK,CAAA,MAAA,EAAS,QAAA,CAAS,IAAI,CAAA,2BAAA,CAAA,EAA+B;AAAA,UAChE,YAAA,EAAc,YAAA;AAAA,UACd;AAAA,SACD,CAAA;AAED,QAAA,OAAO,QAAA;AAAA,MACT,SAAS,aAAA,EAAe;AACtB,QAAA,MAAA,EAAQ,KAAA,CAAM,CAAA,aAAA,EAAgB,YAAY,CAAA,QAAA,CAAA,EAAY;AAAA,UACpD,KAAA,EAAO,aAAA,YAAyB,KAAA,GAAQ,EAAE,OAAA,EAAS,aAAA,CAAc,OAAA,EAAQ,GAAI,EAAE,OAAA,EAAS,MAAA,CAAO,aAAa,CAAA;AAAE,SAC/G,CAAA;AAAA,MACH;AAAA,IACF;AAGA,IAAA,MAAM,WAAW,cAAA,EAAe;AAChC,IAAA,MAAM,eAAA,GAAkB,uBAAA,CAAwB,YAAA,EAAc,QAAQ,CAAA;AAEtE,IAAA,MAAM,IAAI,8BAAA;AAAA,MACR,qDAAqD,YAAY,CAAA,CAAA,CAAA;AAAA,MACjE;AAAA,QACE,iBAAA,EAAmB,YAAA;AAAA,QACnB,kBAAA,EAAoB,mBAAA;AAAA,QACpB,QAAA;AAAA,QACA;AAAA;AACF,KACF;AAAA,EACF;AACF;AA/HgB,MAAA,CAAA,oBAAA,EAAA,sBAAA,CAAA","file":"chunk-LELPCIE7.js","sourcesContent":["import type { CryptoProviderType, PlatformDetectionResult } from '../types/crypto-provider';\n\n/**\n * Base class for all crypto-related errors\n * Provides structured context for better debugging\n */\nexport class CryptoError extends Error {\n constructor(\n message: string,\n public readonly code: string,\n public readonly context?: Record<string, unknown>\n ) {\n super(message);\n this.name = 'CryptoError';\n\n // Maintain proper stack trace in V8 environments\n if (Error.captureStackTrace) {\n Error.captureStackTrace(this, this.constructor);\n }\n }\n}\n\n/**\n * Thrown when a requested crypto provider is not available in the current environment\n * Includes diagnostic information to help developers understand why and what alternatives exist\n */\nexport class CryptoProviderUnavailableError extends CryptoError {\n constructor(\n message: string,\n context: {\n requestedProvider?: CryptoProviderType;\n availableProviders: CryptoProviderType[];\n platform?: PlatformDetectionResult;\n recommendations: string[];\n }\n ) {\n super(message, 'PROVIDER_UNAVAILABLE', context);\n this.name = 'CryptoProviderUnavailableError';\n }\n\n /**\n * Format a developer-friendly error message with context\n * Includes available alternatives and actionable recommendations\n */\n toDevMessage(): string {\n // Guard against undefined context (defensive programming)\n if (!this.context) {\n return this.message;\n }\n\n const ctx = this.context as {\n requestedProvider?: CryptoProviderType;\n availableProviders: CryptoProviderType[];\n platform?: PlatformDetectionResult;\n recommendations: string[];\n };\n\n const lines: string[] = [\n this.message,\n '',\n 'Available providers:',\n ...ctx.availableProviders.map(p => ` - ${p}`),\n ];\n\n if (ctx.recommendations.length > 0) {\n lines.push('', 'Recommendations:');\n lines.push(...ctx.recommendations.map(r => ` - ${r}`));\n }\n\n // Add platform information if available\n if (ctx.platform) {\n const platformType = ctx.platform.isNode\n ? 'Node.js'\n : ctx.platform.isBrowser\n ? 'Browser'\n : ctx.platform.isReactNative\n ? 'React Native'\n : 'Unknown';\n\n lines.push('', `Platform: ${platformType}`);\n\n if (ctx.platform.platform) {\n lines.push(`OS: ${ctx.platform.platform}`);\n }\n\n if (ctx.platform.userAgent) {\n const ua = ctx.platform.userAgent;\n // Only truncate if longer than 100 characters\n const truncated = ua.length > 100 ? `${ua.substring(0, 100)}...` : ua;\n lines.push(`User Agent: ${truncated}`);\n }\n }\n\n return lines.join('\\n');\n }\n}\n\n/**\n * Thrown when a specific cryptographic operation is not supported by the provider\n */\nexport class CryptoCapabilityMissingError extends CryptoError {\n constructor(\n operation: string,\n provider: string,\n reason: string\n ) {\n super(\n `Crypto operation '${operation}' is not available in provider '${provider}': ${reason}`,\n 'CAPABILITY_MISSING',\n { operation, provider, reason }\n );\n this.name = 'CryptoCapabilityMissingError';\n }\n}\n","import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\n\n/**\n * Compliance audit event types\n */\nexport type ComplianceEventType =\n | 'key_generation'\n | 'key_import'\n | 'key_export'\n | 'key_derivation'\n | 'encryption'\n | 'decryption'\n | 'hmac_generation'\n | 'hmac_verification'\n | 'random_generation';\n\n/**\n * Compliance audit event\n */\nexport interface ComplianceAuditEvent {\n eventType: ComplianceEventType;\n timestamp: string;\n sessionId?: string;\n keyUsage?: readonly string[];\n dataSize?: number;\n algorithm?: string;\n success: boolean;\n error?: string;\n metadata?: Record<string, unknown>;\n}\n\n/**\n * Compliance audit logger interface\n */\nexport interface ComplianceAuditor {\n logEvent(event: ComplianceAuditEvent): void;\n getAuditLog(): ComplianceAuditEvent[];\n clearAuditLog(): void;\n}\n\n/**\n * Default compliance auditor implementation\n */\nexport class DefaultComplianceAuditor implements ComplianceAuditor {\n private auditLog: ComplianceAuditEvent[] = [];\n private readonly logger?: Logger;\n\n constructor(logger?: Logger) {\n this.logger = logger?.child({ component: 'ComplianceAuditor' });\n }\n\n logEvent(event: ComplianceAuditEvent): void {\n this.auditLog.push(event);\n this.logger?.info('Compliance audit event', {\n eventType: event.eventType,\n success: event.success,\n sessionId: event.sessionId,\n timestamp: event.timestamp\n });\n }\n\n getAuditLog(): ComplianceAuditEvent[] {\n return [...this.auditLog];\n }\n\n clearAuditLog(): void {\n this.auditLog = [];\n this.logger?.debug('Compliance audit log cleared');\n }\n}\n\n/**\n * Key usage restrictions for compliance\n */\nexport interface KeyUsageRestrictions {\n allowKeyExport?: boolean;\n allowKeyImport?: boolean;\n requiredKeyUsages?: string[];\n forbiddenKeyUsages?: string[];\n maxDataSize?: number;\n requireSessionId?: boolean;\n}\n\n/**\n * Compliance configuration\n */\nexport interface ComplianceConfig {\n enabled?: boolean;\n auditor?: ComplianceAuditor;\n keyRestrictions?: KeyUsageRestrictions;\n sessionId?: string;\n enableStrictMode?: boolean;\n strictMode?: boolean;\n}\n\n/**\n * Compliance wrapper for CryptoProvider implementations\n * Provides audit logging, key usage restrictions, and regulatory compliance features\n */\nexport class ComplianceCryptoProvider implements CryptoProvider {\n public readonly name: string;\n public readonly isAvailable: boolean;\n\n private readonly underlyingProvider: CryptoProvider;\n private readonly config: ComplianceConfig;\n private readonly auditor: ComplianceAuditor;\n private readonly logger?: Logger;\n\n constructor(\n underlyingProvider: CryptoProvider,\n config: ComplianceConfig = {},\n logger?: Logger\n ) {\n this.underlyingProvider = underlyingProvider;\n this.config = config;\n this.auditor = config.auditor || new DefaultComplianceAuditor(logger);\n this.logger = logger?.child({\n component: 'ComplianceCryptoProvider',\n underlyingProvider: underlyingProvider.name\n });\n\n this.name = `Compliance(${underlyingProvider.name})`;\n this.isAvailable = underlyingProvider.isAvailable;\n }\n\n /**\n * Create compliance audit event\n */\n private createAuditEvent(\n eventType: ComplianceEventType,\n success: boolean,\n metadata: Record<string, unknown> = {},\n error?: string\n ): ComplianceAuditEvent {\n return {\n eventType,\n timestamp: new Date().toISOString(),\n sessionId: this.config.sessionId,\n success,\n error,\n metadata,\n ...metadata\n };\n }\n\n /**\n * Validate key usage restrictions\n */\n private validateKeyUsage(operation: string, keyUsages?: readonly string[], dataSize?: number): void {\n const restrictions = this.config.keyRestrictions;\n if (!restrictions) return;\n\n if (restrictions.requireSessionId && !this.config.sessionId) {\n throw new Error('Session ID required for compliance but not provided');\n }\n\n if (restrictions.maxDataSize && dataSize && dataSize > restrictions.maxDataSize) {\n throw new Error(`Data size ${dataSize} exceeds maximum allowed ${restrictions.maxDataSize} bytes`);\n }\n\n if (keyUsages && restrictions.requiredKeyUsages) {\n const hasRequiredUsage = restrictions.requiredKeyUsages.some(usage => keyUsages.includes(usage));\n if (!hasRequiredUsage) {\n throw new Error(`Key must have one of required usages: ${restrictions.requiredKeyUsages.join(', ')}`);\n }\n }\n\n if (keyUsages && restrictions.forbiddenKeyUsages) {\n const hasForbiddenUsage = restrictions.forbiddenKeyUsages.some(usage => keyUsages.includes(usage));\n if (hasForbiddenUsage) {\n throw new Error(`Key has forbidden usage. Forbidden: ${restrictions.forbiddenKeyUsages.join(', ')}`);\n }\n }\n\n // Operation-specific restrictions\n if (operation === 'export' && restrictions.allowKeyExport === false) {\n throw new Error('Key export is forbidden by compliance policy');\n }\n\n if (operation === 'import' && restrictions.allowKeyImport === false) {\n throw new Error('Key import is forbidden by compliance policy');\n }\n }\n\n /**\n * Generate ECDH P-256 key pair with compliance audit\n */\n async generateKeyPair(): Promise<ProviderKeyPair> {\n const startTime = Date.now();\n\n try {\n this.logger?.debug('Generating key pair with compliance audit');\n\n const keyPair = await this.underlyingProvider.generateKeyPair();\n\n this.validateKeyUsage('generation', keyPair.privateKey.usages);\n\n this.auditor.logEvent(this.createAuditEvent('key_generation', true, {\n algorithm: keyPair.privateKey.algorithm,\n keyUsage: keyPair.privateKey.usages,\n duration: Date.now() - startTime\n }));\n\n return keyPair;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_generation', false, {\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Export public key with compliance audit\n */\n async exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('export', publicKey.usages);\n\n const keyData = await this.underlyingProvider.exportPublicKey(publicKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_export', true, {\n keyType: 'public',\n algorithm: publicKey.algorithm,\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }));\n\n return keyData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_export', false, {\n keyType: 'public',\n algorithm: publicKey.algorithm,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Export private key with compliance audit\n */\n async exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('export', privateKey.usages);\n\n // Extra security check for private key export\n if (this.config.enableStrictMode) {\n this.logger?.warn('Private key export in strict compliance mode', {\n sessionId: this.config.sessionId,\n algorithm: privateKey.algorithm\n });\n }\n\n const keyData = await this.underlyingProvider.exportPrivateKey(privateKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_export', true, {\n keyType: 'private',\n algorithm: privateKey.algorithm,\n keySize: keyData.byteLength,\n strictMode: this.config.enableStrictMode,\n duration: Date.now() - startTime\n }));\n\n return keyData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_export', false, {\n keyType: 'private',\n algorithm: privateKey.algorithm,\n strictMode: this.config.enableStrictMode,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Import public key with compliance audit\n */\n async importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('import');\n\n const key = await this.underlyingProvider.importPublicKey(keyData);\n\n this.auditor.logEvent(this.createAuditEvent('key_import', true, {\n keyType: 'public',\n algorithm: key.algorithm,\n keySize: keyData.byteLength,\n keyUsage: key.usages,\n duration: Date.now() - startTime\n }));\n\n return key;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_import', false, {\n keyType: 'public',\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Import private key with compliance audit\n */\n async importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('import');\n\n const key = await this.underlyingProvider.importPrivateKey(keyData);\n\n this.auditor.logEvent(this.createAuditEvent('key_import', true, {\n keyType: 'private',\n algorithm: key.algorithm,\n keySize: keyData.byteLength,\n keyUsage: key.usages,\n duration: Date.now() - startTime\n }));\n\n return key;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_import', false, {\n keyType: 'private',\n keySize: keyData.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Derive shared secret with compliance audit\n */\n async deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('derivation', privateKey.usages);\n\n const sharedSecret = await this.underlyingProvider.deriveSharedSecret(privateKey, publicKey);\n\n this.auditor.logEvent(this.createAuditEvent('key_derivation', true, {\n operation: 'ECDH',\n algorithm: privateKey.algorithm,\n duration: Date.now() - startTime\n }));\n\n return sharedSecret;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_derivation', false, {\n operation: 'ECDH',\n algorithm: privateKey.algorithm,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Derive encryption key with compliance audit\n */\n async deriveEncryptionKey(sharedSecret: CryptoKeyLike, salt: ArrayBuffer, info: ArrayBuffer): Promise<CryptoKeyLike> {\n const startTime = Date.now();\n\n try {\n const encryptionKey = await this.underlyingProvider.deriveEncryptionKey(sharedSecret, salt, info);\n\n this.auditor.logEvent(this.createAuditEvent('key_derivation', true, {\n operation: 'HKDF',\n algorithm: 'HKDF-SHA256',\n saltSize: salt.byteLength,\n infoSize: info.byteLength,\n duration: Date.now() - startTime\n }));\n\n return encryptionKey;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('key_derivation', false, {\n operation: 'HKDF',\n algorithm: 'HKDF-SHA256',\n saltSize: salt.byteLength,\n infoSize: info.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Generate random bytes with compliance audit\n */\n randomBytes(length: number): ArrayBuffer {\n const startTime = Date.now();\n\n try {\n const randomData = this.underlyingProvider.randomBytes(length);\n\n this.auditor.logEvent(this.createAuditEvent('random_generation', true, {\n length,\n duration: Date.now() - startTime\n }));\n\n return randomData;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('random_generation', false, {\n length,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Encrypt data with compliance audit\n */\n async encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('encryption', key.usages, data.byteLength);\n\n const ciphertext = await this.underlyingProvider.encrypt(key, data, iv);\n\n this.auditor.logEvent(this.createAuditEvent('encryption', true, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n ciphertextSize: ciphertext.byteLength,\n duration: Date.now() - startTime\n }));\n\n return ciphertext;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('encryption', false, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Decrypt data with compliance audit\n */\n async decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('decryption', key.usages, data.byteLength);\n\n const plaintext = await this.underlyingProvider.decrypt(key, data, iv);\n\n this.auditor.logEvent(this.createAuditEvent('decryption', true, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n plaintextSize: plaintext.byteLength,\n duration: Date.now() - startTime\n }));\n\n return plaintext;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('decryption', false, {\n algorithm: key.algorithm,\n dataSize: data.byteLength,\n ivSize: iv.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Generate HMAC with compliance audit\n */\n async generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('hmac', key.usages, data.byteLength);\n\n const mac = await this.underlyingProvider.generateHMAC(key, data);\n\n this.auditor.logEvent(this.createAuditEvent('hmac_generation', true, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n duration: Date.now() - startTime\n }));\n\n return mac;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('hmac_generation', false, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Verify HMAC with compliance audit\n */\n async verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n const startTime = Date.now();\n\n try {\n this.validateKeyUsage('hmac', key.usages, data.byteLength);\n\n const isValid = await this.underlyingProvider.verifyHMAC(key, data, mac);\n\n this.auditor.logEvent(this.createAuditEvent('hmac_verification', true, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n verified: isValid,\n duration: Date.now() - startTime\n }));\n\n return isValid;\n } catch (error) {\n this.auditor.logEvent(this.createAuditEvent('hmac_verification', false, {\n algorithm: 'HMAC-SHA256',\n dataSize: data.byteLength,\n macSize: mac.byteLength,\n duration: Date.now() - startTime\n }, error instanceof Error ? error.message : String(error)));\n\n throw error;\n }\n }\n\n /**\n * Get compliance auditor for external access\n */\n getAuditor(): ComplianceAuditor {\n return this.auditor;\n }\n\n /**\n * Update compliance configuration\n */\n updateConfig(newConfig: Partial<ComplianceConfig>): void {\n Object.assign(this.config, newConfig);\n this.logger?.debug('Compliance configuration updated', newConfig);\n }\n\n /**\n * Get underlying provider (for debugging/testing)\n */\n getUnderlyingProvider(): CryptoProvider {\n return this.underlyingProvider;\n }\n}\n","/**\n * CryptoContext - Singleton manager for the active crypto provider\n *\n * Provides a global context for crypto operations while maintaining\n * the ability to use custom providers when needed.\n *\n * @example\n * // Automatic initialization with best available provider\n * const bytes = randomBytes(32);\n *\n * @example\n * // Explicit provider configuration\n * CryptoContext.initialize({ type: 'noble' });\n * const bytes = randomBytes(32);\n *\n * @example\n * // Custom provider instance\n * const provider = new NobleCryptoProvider();\n * CryptoContext.setProvider(provider);\n */\n\nimport type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoProviderType } from '../types/crypto-provider';\nimport { createCryptoProvider, getRegisteredCryptoProviders } from './providers';\nimport { ComplianceCryptoProvider } from './providers/compliance-provider';\nimport type { ComplianceConfig } from './providers/compliance-provider';\nimport { CryptoProviderUnavailableError } from './errors';\nimport { detectPlatform } from './utils';\n\nexport interface CryptoContextConfig {\n /** Provider type to use (auto-detects if not specified) */\n type?: CryptoProviderType;\n /** Strict mode - throw if preferred provider unavailable (default: false) */\n strict?: boolean;\n /** Compliance configuration (wraps provider if enabled) */\n compliance?: ComplianceConfig;\n /** Logger instance for debug output */\n logger?: Logger;\n}\n\n/**\n * Singleton context for managing the active crypto provider\n *\n * Design rationale:\n * - Provides convenient global access to crypto operations\n * - Maintains lazy initialization for tree-shaking\n * - Allows explicit provider configuration when needed\n * - Supports both automatic and manual provider selection\n */\nclass CryptoContextManager {\n private provider: CryptoProvider | null = null;\n private config: CryptoContextConfig | null = null;\n private initialized = false;\n private initializing = false;\n\n /**\n * Initialize the crypto context with specific configuration\n *\n * @param config - Provider configuration options\n * @throws Error if already initialized (call reset() first)\n * @throws CryptoProviderUnavailableError if strict mode enabled and provider unavailable\n */\n initialize(config: CryptoContextConfig = {}): void {\n if (this.initialized && this.provider) {\n throw new Error(\n 'CryptoContext already initialized. Call CryptoContext.reset() first to reconfigure.'\n );\n }\n\n // Strict mode validation - check if provider is registered\n if (config.strict && config.type) {\n const availableProviders = getRegisteredCryptoProviders();\n if (!availableProviders.includes(config.type)) {\n const platform = detectPlatform();\n const recommendations: string[] = [\n `Import the provider: import '@bananalink-sdk/protocol/crypto/provider/${config.type}'`,\n 'Ensure the provider package is installed',\n ];\n\n // Add platform-specific recommendations\n if (config.type === 'quickcrypto' && !platform.isReactNative) {\n recommendations.push('QuickCrypto requires React Native environment');\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n } else if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n }\n\n // Add universal fallback recommendation\n if (availableProviders.includes('noble')) {\n recommendations.push(\"'noble' provider works in all environments as a fallback\");\n }\n\n throw new CryptoProviderUnavailableError(\n `Strict mode: Crypto provider '${config.type}' is not registered. Did you forget to import it?`,\n {\n requestedProvider: config.type,\n availableProviders,\n platform,\n recommendations,\n }\n );\n }\n }\n\n this.config = config;\n this.provider = this.createProvider(config);\n this.initialized = true;\n }\n\n /**\n * Get the active crypto provider\n * Automatically initializes with default config if not already initialized\n *\n * @returns The active crypto provider instance\n * @throws Error if called concurrently during initialization\n *\n * @remarks\n * This method performs lazy initialization on first call. It is NOT safe to call\n * concurrently from multiple contexts before initialization completes (e.g., from\n * Worker threads or Promise.all). For concurrent access scenarios, explicitly call\n * initialize() first to ensure the provider is ready before concurrent operations begin.\n *\n * @example\n * ```typescript\n * // Safe: Single-threaded lazy initialization\n * const provider = CryptoContext.getProvider();\n *\n * // Safe: Pre-initialize for concurrent access\n * CryptoContext.initialize({ type: 'noble' });\n * await Promise.all([\n * operation1(CryptoContext.getProvider()),\n * operation2(CryptoContext.getProvider())\n * ]);\n *\n * // Unsafe: Concurrent calls during lazy initialization\n * await Promise.all([\n * operation1(CryptoContext.getProvider()), // May throw if not initialized yet\n * operation2(CryptoContext.getProvider())\n * ]);\n * ```\n */\n getProvider(): CryptoProvider {\n // Check if already initialized\n if (this.provider) {\n return this.provider;\n }\n\n // Prevent race condition - if already initializing, throw error\n if (this.initializing) {\n throw new Error(\n 'CryptoContext initialization in progress. Avoid concurrent calls to getProvider() during initialization.'\n );\n }\n\n // Lazy initialization with defaults\n this.initializing = true;\n try {\n this.initialize();\n // After initialize(), provider is guaranteed to be set\n if (!this.provider) {\n throw new Error('CryptoContext initialization failed: provider is null');\n }\n return this.provider;\n } finally {\n this.initializing = false;\n }\n }\n\n /**\n * Set a custom provider instance\n * Useful for testing or advanced use cases\n *\n * @param provider - Custom provider instance\n */\n setProvider(provider: CryptoProvider): void {\n this.provider = provider;\n this.initialized = true;\n }\n\n /**\n * Check if context has been explicitly initialized\n */\n isInitialized(): boolean {\n return this.initialized;\n }\n\n /**\n * Get current configuration\n */\n getConfig(): CryptoContextConfig | null {\n return this.config;\n }\n\n /**\n * Reset the context (for testing or reconfiguration)\n */\n reset(): void {\n this.provider = null;\n this.config = null;\n this.initialized = false;\n this.initializing = false;\n }\n\n /**\n * Create a provider instance from configuration\n */\n private createProvider(config: CryptoContextConfig): CryptoProvider {\n const baseProvider = createCryptoProvider(config.type, config.logger, config.strict);\n\n if (config.compliance?.enabled) {\n return new ComplianceCryptoProvider(baseProvider, config.compliance);\n }\n\n return baseProvider;\n }\n\n}\n\n/**\n * Global singleton instance\n *\n * Usage:\n * - Most code should use utility functions (randomBytes, generateNonce)\n * - Advanced use cases can access CryptoContext directly\n */\nexport const CryptoContext = new CryptoContextManager();\n","import type { CryptoProvider, PlatformDetectionResult } from '../types/crypto-provider';\nimport { CryptoContext } from './context';\n\n/**\n * Generate cryptographically secure random bytes\n *\n * Uses the global CryptoContext provider (auto-initializes if needed).\n * For custom provider usage, pass a provider instance.\n *\n * @param length - Number of bytes to generate\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns Cryptographically secure random bytes\n *\n * @example\n * // Default behavior (uses CryptoContext)\n * const bytes = randomBytes(32);\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const bytes = randomBytes(32, provider);\n */\nexport function randomBytes(length: number, provider?: CryptoProvider): Uint8Array {\n const activeProvider = provider || CryptoContext.getProvider();\n const buffer = activeProvider.randomBytes(length);\n return new Uint8Array(buffer);\n}\n\n/**\n * Convert ArrayBuffer to base64 string\n */\nexport function arrayBufferToBase64(buffer: ArrayBuffer): string {\n const bytes = new Uint8Array(buffer);\n let binary = '';\n for (let i = 0; i < bytes.byteLength; i++) {\n binary += String.fromCharCode(bytes[i]);\n }\n return btoa(binary);\n}\n\n/**\n * Convert base64 string to ArrayBuffer\n */\nexport function base64ToArrayBuffer(base64: string): ArrayBuffer {\n // Sanitize the base64 string - remove any whitespace and invalid characters\n const cleanBase64 = base64.replace(/[^A-Za-z0-9+/=]/g, '');\n\n // Ensure proper padding\n let paddedBase64 = cleanBase64;\n while (paddedBase64.length % 4 !== 0) {\n paddedBase64 += '=';\n }\n\n try {\n const binary = atob(paddedBase64);\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes.buffer;\n } catch (error) {\n throw new Error(`Failed to decode base64 string: ${error instanceof Error ? error.message : 'Invalid base64 format'}. Original string: ${base64.substring(0, 50)}...`);\n }\n}\n\n/**\n * Convert string to ArrayBuffer\n */\nexport function stringToArrayBuffer(str: string): ArrayBuffer {\n return new TextEncoder().encode(str).buffer;\n}\n\n/**\n * Convert ArrayBuffer to string\n */\nexport function arrayBufferToString(buffer: ArrayBuffer): string {\n return new TextDecoder().decode(buffer);\n}\n\n/**\n * Generate a cryptographically secure nonce\n *\n * @param length - Number of bytes to generate (default: 32)\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns Hex-encoded string (2 characters per byte)\n *\n * @example\n * generateNonce() // Returns 64-char hex string (32 bytes)\n * generateNonce(16) // Returns 32-char hex string (16 bytes)\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const nonce = generateNonce(32, provider);\n */\nexport function generateNonce(length: number = 32, provider?: CryptoProvider): string {\n const bytes = randomBytes(length, provider);\n return Array.from(bytes, (byte: number) => byte.toString(16).padStart(2, '0')).join('');\n}\n\n/**\n * Generate a RFC 4122 version 4 UUID (Universally Unique Identifier)\n *\n * Uses cryptographically secure random bytes from the configured CryptoProvider.\n * This implementation is mobile-safe and works across all platforms (Browser, Node.js, React Native).\n *\n * Output format: xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx\n * where x is any hexadecimal digit and y is one of 8, 9, a, or b.\n *\n * @param provider - Optional custom provider (uses CryptoContext if not provided)\n * @returns UUID v4 string (36 characters including dashes)\n *\n * @example\n * // Default behavior (uses CryptoContext)\n * const uuid = generateUUID();\n * // Example output: \"f47ac10b-58cc-4372-a567-0e02b2c3d479\"\n *\n * @example\n * // With custom provider\n * const provider = new NobleCryptoProvider();\n * const uuid = generateUUID(provider);\n */\nexport function generateUUID(provider?: CryptoProvider): string {\n const bytes = randomBytes(16, provider);\n\n // Set version (4) and variant bits according to RFC 4122\n bytes[6] = (bytes[6] & 0x0f) | 0x40; // Version 4\n bytes[8] = (bytes[8] & 0x3f) | 0x80; // Variant 10\n\n // Convert to hex string with dashes\n const hex = Array.from(bytes, (byte: number) => byte.toString(16).padStart(2, '0')).join('');\n return [\n hex.slice(0, 8),\n hex.slice(8, 12),\n hex.slice(12, 16),\n hex.slice(16, 20),\n hex.slice(20, 32)\n ].join('-');\n}\n\n/**\n * Detect the current platform/runtime environment\n *\n * Provides information about whether code is running in Node.js, browser,\n * React Native, or other JavaScript environments.\n *\n * @returns Platform detection result with environment flags\n *\n * @example\n * const platform = detectPlatform();\n * if (platform.isNode) {\n * console.log('Running in Node.js');\n * } else if (platform.isBrowser) {\n * console.log('Running in browser');\n * }\n */\nexport function detectPlatform(): PlatformDetectionResult {\n // Check for Node.js\n const isNode = typeof process !== 'undefined' &&\n process.versions != null &&\n process.versions.node != null;\n\n // Check for browser\n const isBrowser = typeof window !== 'undefined' &&\n typeof document !== 'undefined';\n\n // Check for React Native\n const isReactNative = typeof navigator !== 'undefined' &&\n navigator.product === 'ReactNative';\n\n // Get platform identifier (Node.js only)\n let platform: string | undefined;\n if (isNode && typeof process.platform === 'string') {\n platform = process.platform;\n }\n\n // Get user agent (browser/React Native)\n let userAgent: string | undefined;\n if (typeof navigator !== 'undefined' && typeof navigator.userAgent === 'string') {\n userAgent = navigator.userAgent;\n }\n\n return {\n isNode,\n isBrowser,\n isReactNative,\n platform,\n userAgent,\n };\n}\n","import type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoProviderType } from '../../types/crypto-provider';\nimport { CryptoProviderUnavailableError } from '../errors';\nimport { detectPlatform } from '../utils';\nimport {\n getCryptoProviderFactory,\n getRegisteredCryptoProviders\n} from './registry';\n\n/**\n * Generate context-appropriate recommendations for unavailable providers\n */\nfunction generateRecommendations(\n requestedProvider: CryptoProviderType,\n platform: ReturnType<typeof detectPlatform>\n): string[] {\n const recommendations: string[] = [];\n\n // Provider-specific recommendations\n if (requestedProvider === 'webcrypto') {\n recommendations.push(\"WebCrypto requires a browser or Node.js 15+ environment\");\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n }\n } else if (requestedProvider === 'node') {\n recommendations.push(\"Node crypto requires Node.js environment\");\n if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n } else if (requestedProvider === 'quickcrypto') {\n recommendations.push(\"QuickCrypto requires React Native environment\");\n if (!platform.isReactNative) {\n if (platform.isNode) {\n recommendations.push(\"Try 'node' provider for Node.js\");\n } else if (platform.isBrowser) {\n recommendations.push(\"Try 'webcrypto' provider for browsers\");\n }\n }\n }\n\n // Universal fallback\n recommendations.push(\"'noble' provider works in all environments as a fallback\");\n recommendations.push(`Import the provider: import '@bananalink-sdk/protocol/crypto/provider/${requestedProvider}'`);\n\n return recommendations;\n}\n\n/**\n * Create a crypto provider based on type\n *\n * This factory function uses the global registry to instantiate providers.\n * Providers must be explicitly imported before they can be used.\n *\n * @param preferredProvider - Optional preferred provider type\n * @param logger - Optional logger for debug output\n * @param strict - If true, throw error if preferred provider unavailable\n * @returns The created crypto provider instance\n *\n * @example\n * ```typescript\n * // Import providers to make them available\n * import '@bananalink-sdk/protocol/crypto/provider/noble';\n * import '@bananalink-sdk/protocol/crypto/provider/webcrypto';\n *\n * // Create provider\n * const provider = createCryptoProvider('noble');\n * ```\n */\nexport function createCryptoProvider(\n preferredProvider?: CryptoProviderType,\n logger?: Logger,\n strict?: boolean\n): CryptoProvider {\n const registeredProviders = getRegisteredCryptoProviders();\n\n logger?.debug('Creating crypto provider', {\n preferredProvider,\n strict,\n registeredProviders\n });\n\n // Determine which provider to use\n let providerType: CryptoProviderType | undefined = preferredProvider;\n\n // Strict validation: If no provider specified, require exactly one registered\n if (!providerType) {\n if (registeredProviders.length === 0) {\n throw new CryptoProviderUnavailableError(\n 'No crypto providers are registered. Did you forget to import a provider?',\n {\n availableProviders: [],\n recommendations: [\n \"Import at least one crypto provider, e.g.: import '@bananalink-sdk/protocol/crypto/provider/noble'\",\n \"Noble provider is recommended as a universal fallback\"\n ]\n }\n );\n } else if (registeredProviders.length === 1) {\n // Auto-select the single registered provider\n providerType = registeredProviders[0];\n logger?.debug(`Auto-selected '${providerType}' provider (only one registered)`);\n } else {\n // Multiple registered - require explicit selection\n throw new CryptoProviderUnavailableError(\n `Multiple crypto providers registered: ${registeredProviders.join(', ')}. ` +\n `Either import only one provider OR explicitly set cryptoProvider.type. ` +\n `Example: cryptoProvider: { type: '${registeredProviders[0]}' }`,\n {\n availableProviders: registeredProviders,\n recommendations: [\n `Import only one crypto provider, or specify which one to use`,\n `Registered providers: ${registeredProviders.join(', ')}`,\n `Set cryptoProvider.type to one of the registered providers`\n ]\n }\n );\n }\n }\n\n // Try to create the provider\n try {\n const factory = getCryptoProviderFactory(providerType);\n const provider = factory(logger);\n\n logger?.info(`Using ${provider.name} crypto provider`, {\n providerType,\n isAvailable: provider.isAvailable\n });\n\n return provider;\n } catch (error) {\n // If strict mode AND user explicitly requested a specific provider, throw immediately\n const userRequestedSpecificProvider = preferredProvider !== undefined;\n if (strict && userRequestedSpecificProvider) {\n // If already a CryptoProviderUnavailableError, re-throw as-is\n if (error instanceof CryptoProviderUnavailableError) {\n throw error;\n }\n\n // Wrap generic errors with full context\n const platform = detectPlatform();\n const availableProviders = getRegisteredCryptoProviders();\n const recommendations = generateRecommendations(providerType, platform);\n\n throw new CryptoProviderUnavailableError(\n `Strict mode: Crypto provider '${providerType}' failed to initialize: ${error instanceof Error ? error.message : String(error)}`,\n {\n requestedProvider: providerType,\n availableProviders,\n platform,\n recommendations,\n }\n );\n }\n\n // Try fallback to any available provider\n logger?.warn(`Failed to create '${providerType}' provider, trying fallback`, {\n error: error instanceof Error ? { message: error.message } : { message: String(error) }\n });\n\n // Try each registered provider as fallback\n for (const fallbackType of registeredProviders) {\n if (fallbackType === providerType) continue; // Skip the one that failed\n\n try {\n const factory = getCryptoProviderFactory(fallbackType);\n const provider = factory(logger);\n\n logger?.info(`Using ${provider.name} crypto provider (fallback)`, {\n originalType: providerType,\n fallbackType\n });\n\n return provider;\n } catch (fallbackError) {\n logger?.debug(`Fallback to '${fallbackType}' failed`, {\n error: fallbackError instanceof Error ? { message: fallbackError.message } : { message: String(fallbackError) }\n });\n }\n }\n\n // If we get here, no providers worked\n const platform = detectPlatform();\n const recommendations = generateRecommendations(providerType, platform);\n\n throw new CryptoProviderUnavailableError(\n `Failed to create any crypto provider. Requested: '${providerType}'`,\n {\n requestedProvider: providerType,\n availableProviders: registeredProviders,\n platform,\n recommendations,\n }\n );\n }\n}\n\n/**\n * Export registry functions for advanced usage\n */\nexport {\n isCryptoProviderRegistered,\n getRegisteredCryptoProviders\n} from './registry';\n"]}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/crypto/providers/noble-provider.ts"],"names":["__name","p256","hkdf","sha256","nobleRandomBytes","gcm","hmac","registerCryptoProvider"],"mappings":";;;;;;;;;;;AAaA,IAAM,SAAA,GAAN,MAAM,SAAA,CAAkC;AAAA,EACtC,WAAA,CACkB,MACA,IAAA,EACA,SAAA,EACA,cAAuB,IAAA,EACvB,MAAA,GAA4B,EAAC,EAC7C;AALgB,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,IAAA,GAAA,IAAA;AACA,IAAA,IAAA,CAAA,SAAA,GAAA,SAAA;AACA,IAAA,IAAA,CAAA,WAAA,GAAA,WAAA;AACA,IAAA,IAAA,CAAA,MAAA,GAAA,MAAA;AAAA,EACf;AACL,CAAA;AARwCA,wBAAA,CAAA,SAAA,EAAA,UAAA,CAAA;AAAxC,IAAM,QAAA,GAAN,SAAA;AAcO,IAAM,oBAAA,GAAN,MAAM,oBAAA,CAA8C;AAAA,EAKzD,YAAY,MAAA,EAAiB;AAJ7B,IAAA,IAAA,CAAgB,IAAA,GAAO,OAAA;AACvB,IAAA,IAAA,CAAgB,WAAA,GAAc,IAAA;AAI5B,IAAA,IAAA,CAAK,SAAS,MAAA,EAAQ,KAAA,CAAM,EAAE,SAAA,EAAW,uBAAuB,CAAA;AAAA,EAClE;AAAA;AAAA;AAAA;AAAA,EAKA,eAAA,GAA4C;AAC1C,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4CAA4C,CAAA;AAE/D,IAAA,IAAI;AACF,MAAA,MAAM,eAAA,GAAkBC,YAAA,CAAK,KAAA,CAAM,eAAA,EAAgB;AAEnD,MAAA,MAAM,qBAAA,GAAwBA,YAAA,CAAK,YAAA,CAAa,eAAA,EAAiB,KAAK,CAAA;AAEtE,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,+BAAA,EAAiC;AAAA,QAClD,iBAAiB,qBAAA,CAAsB;AAAA,OACxC,CAAA;AAED,MAAA,OAAO,QAAQ,OAAA,CAAQ;AAAA,QACrB,UAAA,EAAY,IAAI,QAAA,CAAS,eAAA,EAAiB,WAAW,WAAA,EAAa,IAAA,EAAM,CAAC,WAAW,CAAC,CAAA;AAAA,QACrF,SAAA,EAAW,IAAI,QAAA,CAAS,qBAAA,EAAuB,UAAU,WAAA,EAAa,IAAA,EAAM,EAAE;AAAA,OAC/E,CAAA;AAAA,IACH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4BAAA,EAA8B;AAAA,QAC/C,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,gBAAgB,SAAA,EAAgD;AAC9D,IAAA,MAAM,QAAA,GAAW,SAAA;AACjB,IAAA,IAAI,QAAA,CAAS,SAAS,QAAA,EAAU;AAC9B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AACA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,OAAO,KAAA,CAAM,QAAA,CAAS,IAAA,CAAK,UAAA,EAAY,SAAS,IAAA,CAAK,UAAA,GAAa,QAAA,CAAS,IAAA,CAAK,UAAU,CAAC,CAAA;AAAA,EAClI;AAAA;AAAA;AAAA;AAAA,EAKA,iBAAiB,UAAA,EAAiD;AAChE,IAAA,MAAM,QAAA,GAAW,UAAA;AACjB,IAAA,IAAI,QAAA,CAAS,SAAS,SAAA,EAAW;AAC/B,MAAA,MAAM,IAAI,MAAM,sBAAsB,CAAA;AAAA,IACxC;AACA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,QAAA,CAAS,IAAA,CAAK,OAAO,KAAA,CAAM,QAAA,CAAS,IAAA,CAAK,UAAA,EAAY,SAAS,IAAA,CAAK,UAAA,GAAa,QAAA,CAAS,IAAA,CAAK,UAAU,CAAC,CAAA;AAAA,EAClI;AAAA;AAAA;AAAA;AAAA,EAKA,gBAAgB,OAAA,EAA8C;AAC5D,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,OAAO,CAAA;AAGvC,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,MAC3C,WAAW,QAAA,CAAS,MAAA;AAAA,MACpB,eAAA,EAAiB,MAAM,IAAA,CAAK,QAAA,CAAS,MAAM,CAAA,EAAG,EAAE,CAAC,CAAA,CAAE,GAAA,CAAI,OAAK,CAAA,CAAE,QAAA,CAAS,EAAE,CAAA,CAAE,QAAA,CAAS,GAAG,GAAG,CAAC,CAAA,CAAE,IAAA,CAAK,GAAG,CAAA;AAAA,MACrG,aAAa,KAAA,CAAM,IAAA,CAAK,QAAQ,CAAA,CAAE,IAAI,CAAA,CAAA,KAAK,CAAA,CAAE,QAAA,CAAS,EAAE,EAAE,QAAA,CAAS,CAAA,EAAG,GAAG,CAAC,CAAA,CAAE,KAAK,EAAE;AAAA,KACpF,CAAA;AAGD,IAAA,IAAI;AACF,MAAA,IAAI,iBAAA;AAGJ,MAAA,IAAI,QAAA,CAAS,WAAW,EAAA,EAAI;AAE1B,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,UAC3C,WAAW,CAAA,EAAA,EAAK,QAAA,CAAS,CAAC,CAAA,CAAE,QAAA,CAAS,EAAE,CAAC,CAAA;AAAA,SACzC,CAAA;AACD,QAAA,IAAI,QAAA,CAAS,CAAC,CAAA,KAAM,CAAA,EAAM;AACxB,UAAA,MAAM,IAAI,MAAM,CAAA,+CAAA,EAAkD,QAAA,CAAS,CAAC,CAAA,CAAE,QAAA,CAAS,EAAE,CAAC,CAAA,CAAE,CAAA;AAAA,QAC9F;AACA,QAAA,iBAAA,GAAoB,QAAA;AAAA,MACtB,CAAA,MAAA,IAAW,QAAA,CAAS,MAAA,KAAW,EAAA,EAAI;AAGjC,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,wBAAA,EAA0B;AAAA,UAC3C,MAAA,EAAQ;AAAA,SACT,CAAA;AACD,QAAA,iBAAA,GAAoB,IAAI,WAAW,EAAE,CAAA;AACrC,QAAA,iBAAA,CAAkB,CAAC,CAAA,GAAI,CAAA;AACvB,QAAA,iBAAA,CAAkB,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,MACnC,CAAA,MAAO;AACL,QAAA,MAAM,IAAI,KAAA,CAAM,CAAA,iDAAA,EAAoD,QAAA,CAAS,MAAM,CAAA,MAAA,CAAQ,CAAA;AAAA,MAC7F;AAEA,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,QAC7C,iBAAiB,iBAAA,CAAkB,MAAA;AAAA,QACnC,gBAAA,EAAkB,MAAM,IAAA,CAAK,iBAAA,CAAkB,MAAM,CAAA,EAAG,EAAE,CAAC,CAAA,CAAE,GAAA,CAAI,OAAK,CAAA,CAAE,QAAA,CAAS,EAAE,CAAA,CAAE,QAAA,CAAS,GAAG,GAAG,CAAC,CAAA,CAAE,IAAA,CAAK,GAAG;AAAA,OAChH,CAAA;AAGD,MAAA,MAAM,OAAA,GAAUA,YAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,mBAAmB,KAAK,CAAA;AACpE,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,gCAAA,EAAkC;AAAA,QACnD;AAAA,OACD,CAAA;AAED,MAAA,IAAI,CAAC,OAAA,EAAS;AAEZ,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sDAAA,EAAwD;AAAA,UACzE,kBAAA,EAAoB;AAAA,SACrB,CAAA;AAGD,QAAA,MAAM,iBAAA,GAAoBA,YAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,mBAAmB,IAAI,CAAA;AAC7E,QAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,kCAAA,EAAoC;AAAA,UACrD,qBAAA,EAAuB;AAAA,SACxB,CAAA;AAED,QAAA,MAAM,IAAI,MAAM,6BAA6B,CAAA;AAAA,MAC/C;AAEA,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,iBAAA,EAAmB,UAAU,WAAA,EAAa,IAAA,EAAM,EAAE,CAAC,CAAA;AAAA,IACzF,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0BAAA,EAA4B;AAAA,QAC7C,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,0BAAA,EAA6B,MAAA,CAAO,KAAK,CAAC,CAAA,CAAE,CAAA;AAAA,IAC9D;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,iBAAiB,OAAA,EAA8C;AAC7D,IAAA,MAAM,QAAA,GAAW,IAAI,UAAA,CAAW,OAAO,CAAA;AAGvC,IAAA,IAAI;AACF,MAAA,IAAI,CAACA,YAAA,CAAK,KAAA,CAAM,gBAAA,CAAiB,QAAQ,CAAA,EAAG;AAC1C,QAAA,MAAM,IAAI,MAAM,oBAAoB,CAAA;AAAA,MACtC;AAAA,IACF,SAAS,KAAA,EAAO;AACd,MAAA,MAAM,IAAI,KAAA,CAAM,CAAA,2BAAA,EAA8B,MAAA,CAAO,KAAK,CAAC,CAAA,CAAE,CAAA;AAAA,IAC/D;AAEA,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,QAAA,EAAU,SAAA,EAAW,WAAA,EAAa,IAAA,EAAM,CAAC,WAAW,CAAC,CAAC,CAAA;AAAA,EAC5F;AAAA;AAAA;AAAA;AAAA,EAKA,kBAAA,CAAmB,YAA2B,SAAA,EAAkD;AAC9F,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,8CAA8C,CAAA;AAEjE,IAAA,MAAM,OAAA,GAAU,UAAA;AAChB,IAAA,MAAM,MAAA,GAAS,SAAA;AAEf,IAAA,IAAI,OAAA,CAAQ,SAAS,SAAA,EAAW;AAC9B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,sBAAsB,CAAA;AAC9C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,4DAAA,EAA8D;AAAA,QAC/E,YAAY,OAAA,CAAQ;AAAA,OACrB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AACA,IAAA,IAAI,MAAA,CAAO,SAAS,QAAA,EAAU;AAC5B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,2DAAA,EAA6D;AAAA,QAC9E,YAAY,MAAA,CAAO;AAAA,OACpB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AAEF,MAAA,MAAM,eAAeA,YAAA,CAAK,eAAA,CAAgB,QAAQ,IAAA,EAAM,MAAA,CAAO,MAAM,KAAK,CAAA;AAE1E,MAAA,MAAM,WAAA,GAAc,YAAA,CAAa,KAAA,CAAM,CAAA,EAAG,EAAE,CAAA;AAE5C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,oCAAA,EAAsC;AAAA,QACvD,oBAAoB,WAAA,CAAY;AAAA,OACjC,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,WAAA,EAAa,QAAA,EAAU,SAAA,EAAW,IAAA,EAAM,CAAC,SAAA,EAAW,SAAS,CAAC,CAAC,CAAA;AAAA,IACrG,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,iCAAA,EAAmC;AAAA,QACpD,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,mBAAA,CAAoB,YAAA,EAA6B,IAAA,EAAmB,IAAA,EAA2C;AAC7G,IAAA,MAAM,SAAA,GAAY,YAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAGA,IAAA,MAAM,UAAA,GAAaC,YAAA,CAAKC,cAAA,EAAQ,SAAA,CAAU,IAAA,EAAM,IAAI,UAAA,CAAW,IAAI,CAAA,EAAG,IAAI,UAAA,CAAW,IAAI,GAAG,EAAE,CAAA;AAE9F,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,IAAI,QAAA,CAAS,UAAA,EAAY,QAAA,EAAU,SAAA,EAAW,IAAA,EAAM,CAAC,SAAA,EAAW,SAAS,CAAC,CAAC,CAAA;AAAA,EACpG;AAAA;AAAA;AAAA;AAAA,EAKA,YAAY,MAAA,EAA6B;AACvC,IAAA,MAAM,KAAA,GAAQC,qBAAiB,MAAM,CAAA;AACrC,IAAA,OAAO,KAAA,CAAM,OAAO,KAAA,CAAM,KAAA,CAAM,YAAY,KAAA,CAAM,UAAA,GAAa,MAAM,UAAU,CAAA;AAAA,EACjF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AACpF,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0CAAA,EAA4C;AAAA,MAC7D,UAAU,IAAA,CAAK,UAAA;AAAA,MACf,QAAQ,EAAA,CAAG;AAAA,KACZ,CAAA;AAED,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sCAAA,EAAwC;AAAA,QACzD,YAAY,SAAA,CAAU;AAAA,OACvB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,SAASC,UAAA,CAAI,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,EAAE,CAAC,CAAA;AACrD,MAAA,MAAM,aAAa,MAAA,CAAO,OAAA,CAAQ,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAEtD,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAA,EAAwB;AAAA,QACzC,gBAAgB,UAAA,CAAW;AAAA,OAC5B,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,UAAA,CAAW,MAAA,CAAO,KAAA,CAAM,UAAA,CAAW,UAAA,EAAY,UAAA,CAAW,UAAA,GAAa,UAAA,CAAW,UAAU,CAAC,CAAA;AAAA,IACtH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,mBAAA,EAAqB;AAAA,QACtC,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,OAAA,CAAQ,GAAA,EAAoB,IAAA,EAAmB,EAAA,EAAuC;AACpF,IAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,0CAAA,EAA4C;AAAA,MAC7D,UAAU,IAAA,CAAK,UAAA;AAAA,MACf,QAAQ,EAAA,CAAG;AAAA,KACZ,CAAA;AAED,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,KAAA,GAAQ,IAAI,KAAA,CAAM,qBAAqB,CAAA;AAC7C,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sCAAA,EAAwC;AAAA,QACzD,YAAY,SAAA,CAAU;AAAA,OACvB,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,SAASA,UAAA,CAAI,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,EAAE,CAAC,CAAA;AACrD,MAAA,MAAM,YAAY,MAAA,CAAO,OAAA,CAAQ,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAErD,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,sBAAA,EAAwB;AAAA,QACzC,eAAe,SAAA,CAAU;AAAA,OAC1B,CAAA;AAED,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,SAAA,CAAU,MAAA,CAAO,KAAA,CAAM,SAAA,CAAU,UAAA,EAAY,SAAA,CAAU,UAAA,GAAa,SAAA,CAAU,UAAU,CAAC,CAAA;AAAA,IAClH,SAAS,KAAA,EAAO;AACd,MAAA,IAAA,CAAK,MAAA,EAAQ,MAAM,mBAAA,EAAqB;AAAA,QACtC,KAAA,EAAO;AAAA,UACL,SAAS,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,OAAA,GAAU,OAAO,KAAK,CAAA;AAAA,UAC9D,KAAA,EAAO,KAAA,YAAiB,KAAA,GAAQ,KAAA,CAAM,KAAA,GAAQ;AAAA;AAChD,OACD,CAAA;AACD,MAAA,MAAM,KAAA;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKA,YAAA,CAAa,KAAoB,IAAA,EAAyC;AACxE,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,MAAM,GAAA,GAAMC,aAAKH,cAAA,EAAQ,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AAC7D,IAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,GAAA,CAAI,MAAA,CAAO,KAAA,CAAM,GAAA,CAAI,UAAA,EAAY,GAAA,CAAI,UAAA,GAAa,GAAA,CAAI,UAAU,CAAC,CAAA;AAAA,EAC1F;AAAA;AAAA;AAAA;AAAA,EAKA,UAAA,CAAW,GAAA,EAAoB,IAAA,EAAmB,GAAA,EAAoC;AACpF,IAAA,MAAM,SAAA,GAAY,GAAA;AAElB,IAAA,IAAI,SAAA,CAAU,SAAS,QAAA,EAAU;AAC/B,MAAA,MAAM,IAAI,MAAM,qBAAqB,CAAA;AAAA,IACvC;AAEA,IAAA,IAAI;AACF,MAAA,MAAM,WAAA,GAAcG,aAAKH,cAAA,EAAQ,SAAA,CAAU,MAAM,IAAI,UAAA,CAAW,IAAI,CAAC,CAAA;AACrE,MAAA,MAAM,WAAA,GAAc,IAAI,UAAA,CAAW,GAAG,CAAA;AAGtC,MAAA,IAAI,WAAA,CAAY,MAAA,KAAW,WAAA,CAAY,MAAA,EAAQ;AAC7C,QAAA,OAAO,OAAA,CAAQ,QAAQ,KAAK,CAAA;AAAA,MAC9B;AAEA,MAAA,IAAI,MAAA,GAAS,CAAA;AACb,MAAA,KAAA,IAAS,CAAA,GAAI,CAAA,EAAG,CAAA,GAAI,WAAA,CAAY,QAAQ,CAAA,EAAA,EAAK;AAC3C,QAAA,MAAA,IAAU,WAAA,CAAY,CAAC,CAAA,GAAI,WAAA,CAAY,CAAC,CAAA;AAAA,MAC1C;AAEA,MAAA,OAAO,OAAA,CAAQ,OAAA,CAAQ,MAAA,KAAW,CAAC,CAAA;AAAA,IACrC,CAAA,CAAA,MAAQ;AACN,MAAA,OAAO,OAAA,CAAQ,QAAQ,KAAK,CAAA;AAAA,IAC9B;AAAA,EACF;AACF,CAAA;AA5V2DH,wBAAA,CAAA,oBAAA,EAAA,qBAAA,CAAA;AAApD,IAAM,mBAAA,GAAN;AAkWPO,wCAAA,CAAuB,SAAS,CAAC,MAAA,KAAW,IAAI,mBAAA,CAAoB,MAAM,CAAC,CAAA","file":"chunk-MCZG7QEM.cjs","sourcesContent":["import { p256 } from '@noble/curves/nist.js';\nimport { gcm } from '@noble/ciphers/aes.js';\nimport { randomBytes as nobleRandomBytes } from '@noble/ciphers/utils.js';\nimport { hkdf } from '@noble/hashes/hkdf.js';\nimport { hmac } from '@noble/hashes/hmac.js';\nimport { sha256 } from '@noble/hashes/sha2.js';\nimport type { Logger } from '@bananalink-sdk/logger';\nimport type { CryptoProvider, CryptoKeyLike, ProviderKeyPair } from '../../types/crypto-provider';\nimport { registerCryptoProvider } from './registry';\n\n/**\n * Noble library implementation of CryptoKeyLike\n */\nclass NobleKey implements CryptoKeyLike {\n constructor(\n public readonly data: Uint8Array,\n public readonly type: 'public' | 'private' | 'secret',\n public readonly algorithm: string,\n public readonly extractable: boolean = true,\n public readonly usages: readonly string[] = []\n ) {}\n}\n\n/**\n * Noble cryptography implementation of CryptoProvider\n * Pure JavaScript implementation that works in all environments\n */\nexport class NobleCryptoProvider implements CryptoProvider {\n public readonly name = 'Noble';\n public readonly isAvailable = true; // Noble libraries work everywhere\n private readonly logger?: Logger;\n\n constructor(logger?: Logger) {\n this.logger = logger?.child({ component: 'NobleCryptoProvider' });\n }\n\n /**\n * Generate ECDH P-256 key pair\n */\n generateKeyPair(): Promise<ProviderKeyPair> {\n this.logger?.debug('Generating ECDH P-256 key pair using Noble');\n\n try {\n const privateKeyBytes = p256.utils.randomSecretKey();\n // Generate uncompressed public key to match WebCrypto format (65 bytes)\n const publicKeyUncompressed = p256.getPublicKey(privateKeyBytes, false); // false = uncompressed\n\n this.logger?.debug('Key pair generation completed', {\n publicKeyLength: publicKeyUncompressed.length\n });\n\n return Promise.resolve({\n privateKey: new NobleKey(privateKeyBytes, 'private', 'ECDH-P256', true, ['deriveKey']),\n publicKey: new NobleKey(publicKeyUncompressed, 'public', 'ECDH-P256', true, []),\n });\n } catch (error) {\n this.logger?.error('Key pair generation failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Export public key to ArrayBuffer (raw format)\n */\n exportPublicKey(publicKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const nobleKey = publicKey as NobleKey;\n if (nobleKey.type !== 'public') {\n throw new Error('Expected public key');\n }\n return Promise.resolve(nobleKey.data.buffer.slice(nobleKey.data.byteOffset, nobleKey.data.byteOffset + nobleKey.data.byteLength));\n }\n\n /**\n * Export private key to ArrayBuffer (raw format)\n */\n exportPrivateKey(privateKey: CryptoKeyLike): Promise<ArrayBuffer> {\n const nobleKey = privateKey as NobleKey;\n if (nobleKey.type !== 'private') {\n throw new Error('Expected private key');\n }\n return Promise.resolve(nobleKey.data.buffer.slice(nobleKey.data.byteOffset, nobleKey.data.byteOffset + nobleKey.data.byteLength));\n }\n\n /**\n * Import public key from ArrayBuffer (raw format)\n */\n importPublicKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const keyBytes = new Uint8Array(keyData);\n\n // Debug logging\n this.logger?.debug('importPublicKey called', {\n keyLength: keyBytes.length,\n keyBytesFirst20: Array.from(keyBytes.slice(0, 20)).map(b => b.toString(16).padStart(2, '0')).join(' '),\n keyBytesHex: Array.from(keyBytes).map(b => b.toString(16).padStart(2, '0')).join('')\n });\n\n // Validate public key using Noble's validation\n try {\n let processedKeyBytes: Uint8Array;\n\n // Handle different key formats\n if (keyBytes.length === 65) {\n // Already in uncompressed format (0x04 + 32 + 32)\n this.logger?.debug('Processing 65-byte key', {\n firstByte: `0x${keyBytes[0].toString(16)}`\n });\n if (keyBytes[0] !== 0x04) {\n throw new Error(`Expected uncompressed key (0x04 prefix), got 0x${keyBytes[0].toString(16)}`);\n }\n processedKeyBytes = keyBytes;\n } else if (keyBytes.length === 64) {\n // Raw format (32 + 32) - needs 0x04 prefix for Noble\n // This is the WebCrypto export format\n this.logger?.debug('Processing 64-byte key', {\n action: 'adding 0x04 prefix'\n });\n processedKeyBytes = new Uint8Array(65);\n processedKeyBytes[0] = 0x04; // Uncompressed point indicator\n processedKeyBytes.set(keyBytes, 1); // Copy the 64 bytes after the prefix\n } else {\n throw new Error(`Invalid key length: expected 64 or 65 bytes, got ${keyBytes.length} bytes`);\n }\n\n this.logger?.debug('Key processing completed', {\n processedLength: processedKeyBytes.length,\n processedFirst20: Array.from(processedKeyBytes.slice(0, 20)).map(b => b.toString(16).padStart(2, '0')).join(' ')\n });\n\n // Validate using Noble's validation\n const isValid = p256.utils.isValidPublicKey(processedKeyBytes, false); // false = allow uncompressed\n this.logger?.debug('Noble key validation completed', {\n isValid\n });\n\n if (!isValid) {\n // Try additional debugging\n this.logger?.debug('Key validation failed, trying alternative approaches', {\n originalValidation: false\n });\n\n // Try with compressed format check\n const isValidCompressed = p256.utils.isValidPublicKey(processedKeyBytes, true);\n this.logger?.debug('Alternative validation attempted', {\n compressedFormatValid: isValidCompressed\n });\n\n throw new Error('Key failed Noble validation');\n }\n\n return Promise.resolve(new NobleKey(processedKeyBytes, 'public', 'ECDH-P256', true, []));\n } catch (error) {\n this.logger?.error('Public key import failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw new Error(`Invalid P-256 public key: ${String(error)}`);\n }\n }\n\n /**\n * Import private key from ArrayBuffer (raw format)\n */\n importPrivateKey(keyData: ArrayBuffer): Promise<CryptoKeyLike> {\n const keyBytes = new Uint8Array(keyData);\n\n // Validate private key (Noble will throw if invalid)\n try {\n if (!p256.utils.isValidSecretKey(keyBytes)) {\n throw new Error('Invalid secret key');\n }\n } catch (error) {\n throw new Error(`Invalid P-256 private key: ${String(error)}`);\n }\n\n return Promise.resolve(new NobleKey(keyBytes, 'private', 'ECDH-P256', true, ['deriveKey']));\n }\n\n /**\n * Derive shared secret from ECDH key agreement\n */\n deriveSharedSecret(privateKey: CryptoKeyLike, publicKey: CryptoKeyLike): Promise<CryptoKeyLike> {\n this.logger?.debug('Deriving shared secret using ECDH with Noble');\n\n const privKey = privateKey as NobleKey;\n const pubKey = publicKey as NobleKey;\n\n if (privKey.type !== 'private') {\n const error = new Error('Expected private key');\n this.logger?.error('Shared secret derivation failed - invalid private key type', {\n actualType: privKey.type\n });\n throw error;\n }\n if (pubKey.type !== 'public') {\n const error = new Error('Expected public key');\n this.logger?.error('Shared secret derivation failed - invalid public key type', {\n actualType: pubKey.type\n });\n throw error;\n }\n\n try {\n // Perform ECDH key agreement - return x-coordinate only to match WebCrypto\n const sharedSecret = p256.getSharedSecret(privKey.data, pubKey.data, false); // uncompressed\n // Extract only the x-coordinate (32 bytes) to match WebCrypto behavior\n const xCoordinate = sharedSecret.slice(1, 33); // Skip 0x04 prefix, take next 32 bytes\n\n this.logger?.debug('Shared secret derivation completed', {\n sharedSecretLength: xCoordinate.length\n });\n\n return Promise.resolve(new NobleKey(xCoordinate, 'secret', 'AES-GCM', true, ['encrypt', 'decrypt']));\n } catch (error) {\n this.logger?.error('Shared secret derivation failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Derive AES-GCM key from shared secret using HKDF\n */\n deriveEncryptionKey(sharedSecret: CryptoKeyLike, salt: ArrayBuffer, info: ArrayBuffer): Promise<CryptoKeyLike> {\n const secretKey = sharedSecret as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n // Perform HKDF with SHA-256\n const derivedKey = hkdf(sha256, secretKey.data, new Uint8Array(salt), new Uint8Array(info), 32); // 32 bytes = 256 bits\n\n return Promise.resolve(new NobleKey(derivedKey, 'secret', 'AES-GCM', true, ['encrypt', 'decrypt']));\n }\n\n /**\n * Generate random bytes\n */\n randomBytes(length: number): ArrayBuffer {\n const bytes = nobleRandomBytes(length);\n return bytes.buffer.slice(bytes.byteOffset, bytes.byteOffset + bytes.byteLength);\n }\n\n /**\n * Encrypt data using AES-GCM\n */\n encrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Encrypting data with AES-GCM using Noble', {\n dataSize: data.byteLength,\n ivSize: iv.byteLength\n });\n\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n const error = new Error('Expected secret key');\n this.logger?.error('Encryption failed - invalid key type', {\n actualType: secretKey.type\n });\n throw error;\n }\n\n try {\n const aesGcm = gcm(secretKey.data, new Uint8Array(iv));\n const ciphertext = aesGcm.encrypt(new Uint8Array(data));\n\n this.logger?.debug('Encryption completed', {\n ciphertextSize: ciphertext.byteLength\n });\n\n return Promise.resolve(ciphertext.buffer.slice(ciphertext.byteOffset, ciphertext.byteOffset + ciphertext.byteLength));\n } catch (error) {\n this.logger?.error('Encryption failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Decrypt data using AES-GCM\n */\n decrypt(key: CryptoKeyLike, data: ArrayBuffer, iv: ArrayBuffer): Promise<ArrayBuffer> {\n this.logger?.debug('Decrypting data with AES-GCM using Noble', {\n dataSize: data.byteLength,\n ivSize: iv.byteLength\n });\n\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n const error = new Error('Expected secret key');\n this.logger?.error('Decryption failed - invalid key type', {\n actualType: secretKey.type\n });\n throw error;\n }\n\n try {\n const aesGcm = gcm(secretKey.data, new Uint8Array(iv));\n const plaintext = aesGcm.decrypt(new Uint8Array(data));\n\n this.logger?.debug('Decryption completed', {\n plaintextSize: plaintext.byteLength\n });\n\n return Promise.resolve(plaintext.buffer.slice(plaintext.byteOffset, plaintext.byteOffset + plaintext.byteLength));\n } catch (error) {\n this.logger?.error('Decryption failed', {\n error: {\n message: error instanceof Error ? error.message : String(error),\n stack: error instanceof Error ? error.stack : undefined\n }\n });\n throw error;\n }\n }\n\n /**\n * Generate HMAC-SHA256\n */\n generateHMAC(key: CryptoKeyLike, data: ArrayBuffer): Promise<ArrayBuffer> {\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n const mac = hmac(sha256, secretKey.data, new Uint8Array(data));\n return Promise.resolve(mac.buffer.slice(mac.byteOffset, mac.byteOffset + mac.byteLength));\n }\n\n /**\n * Verify HMAC-SHA256\n */\n verifyHMAC(key: CryptoKeyLike, data: ArrayBuffer, mac: ArrayBuffer): Promise<boolean> {\n const secretKey = key as NobleKey;\n\n if (secretKey.type !== 'secret') {\n throw new Error('Expected secret key');\n }\n\n try {\n const expectedMac = hmac(sha256, secretKey.data, new Uint8Array(data));\n const providedMac = new Uint8Array(mac);\n\n // Constant-time comparison\n if (expectedMac.length !== providedMac.length) {\n return Promise.resolve(false);\n }\n\n let result = 0;\n for (let i = 0; i < expectedMac.length; i++) {\n result |= expectedMac[i] ^ providedMac[i];\n }\n\n return Promise.resolve(result === 0);\n } catch {\n return Promise.resolve(false);\n }\n }\n}\n\n/**\n * Self-register Noble provider on import\n * This allows the provider to be available when explicitly imported\n */\nregisterCryptoProvider('noble', (logger) => new NobleCryptoProvider(logger));\n\n// TypeScript module augmentation to track this provider is available\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n interface RegisteredCryptoProviders {\n noble: true;\n }\n }\n}\n"]}
|
package/dist/chunk-TCVKC227.js
DELETED
|
@@ -1,56 +0,0 @@
|
|
|
1
|
-
import { __name } from './chunk-WCQVDF3K.js';
|
|
2
|
-
|
|
3
|
-
// src/crypto/providers/registry.ts
|
|
4
|
-
var cryptoProviders = /* @__PURE__ */ new Map();
|
|
5
|
-
function registerCryptoProvider(type, factory) {
|
|
6
|
-
if (cryptoProviders.has(type)) {
|
|
7
|
-
return;
|
|
8
|
-
}
|
|
9
|
-
cryptoProviders.set(type, factory);
|
|
10
|
-
}
|
|
11
|
-
__name(registerCryptoProvider, "registerCryptoProvider");
|
|
12
|
-
function getCryptoProviderFactory(type) {
|
|
13
|
-
const factory = cryptoProviders.get(type);
|
|
14
|
-
if (!factory) {
|
|
15
|
-
const availableProviders = Array.from(cryptoProviders.keys()).join(", ");
|
|
16
|
-
const importHint = getImportHint(type);
|
|
17
|
-
throw new Error(
|
|
18
|
-
`Crypto provider '${type}' is not registered. ${importHint}
|
|
19
|
-
Available providers: ${availableProviders || "none"}
|
|
20
|
-
Make sure to import the provider before using it.`
|
|
21
|
-
);
|
|
22
|
-
}
|
|
23
|
-
return factory;
|
|
24
|
-
}
|
|
25
|
-
__name(getCryptoProviderFactory, "getCryptoProviderFactory");
|
|
26
|
-
function isCryptoProviderRegistered(type) {
|
|
27
|
-
return cryptoProviders.has(type);
|
|
28
|
-
}
|
|
29
|
-
__name(isCryptoProviderRegistered, "isCryptoProviderRegistered");
|
|
30
|
-
function getRegisteredCryptoProviders() {
|
|
31
|
-
return Array.from(cryptoProviders.keys());
|
|
32
|
-
}
|
|
33
|
-
__name(getRegisteredCryptoProviders, "getRegisteredCryptoProviders");
|
|
34
|
-
function clearCryptoProviderRegistry() {
|
|
35
|
-
cryptoProviders.clear();
|
|
36
|
-
}
|
|
37
|
-
__name(clearCryptoProviderRegistry, "clearCryptoProviderRegistry");
|
|
38
|
-
function getImportHint(type) {
|
|
39
|
-
switch (type) {
|
|
40
|
-
case "noble":
|
|
41
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/noble'?";
|
|
42
|
-
case "quickcrypto":
|
|
43
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/quickcrypto'?";
|
|
44
|
-
case "webcrypto":
|
|
45
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/webcrypto'?";
|
|
46
|
-
case "node":
|
|
47
|
-
return "Did you forget to import '@bananalink-sdk/protocol/crypto/provider/node'?";
|
|
48
|
-
default:
|
|
49
|
-
return `Did you forget to import the '${String(type)}' provider?`;
|
|
50
|
-
}
|
|
51
|
-
}
|
|
52
|
-
__name(getImportHint, "getImportHint");
|
|
53
|
-
|
|
54
|
-
export { clearCryptoProviderRegistry, getCryptoProviderFactory, getRegisteredCryptoProviders, isCryptoProviderRegistered, registerCryptoProvider };
|
|
55
|
-
//# sourceMappingURL=chunk-TCVKC227.js.map
|
|
56
|
-
//# sourceMappingURL=chunk-TCVKC227.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"sources":["../src/crypto/providers/registry.ts"],"names":[],"mappings":";;;AAmBA,IAAM,eAAA,uBAAsB,GAAA,EAA+C;AAkBpE,SAAS,sBAAA,CACd,MACA,OAAA,EACM;AAEN,EAAA,IAAI,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA,EAAG;AAC7B,IAAA;AAAA,EACF;AACA,EAAA,eAAA,CAAgB,GAAA,CAAI,MAAM,OAAO,CAAA;AACnC;AATgB,MAAA,CAAA,sBAAA,EAAA,wBAAA,CAAA;AAkBT,SAAS,yBAAyB,IAAA,EAAiD;AACxF,EAAA,MAAM,OAAA,GAAU,eAAA,CAAgB,GAAA,CAAI,IAAI,CAAA;AAExC,EAAA,IAAI,CAAC,OAAA,EAAS;AACZ,IAAA,MAAM,kBAAA,GAAqB,MAAM,IAAA,CAAK,eAAA,CAAgB,MAAM,CAAA,CAAE,KAAK,IAAI,CAAA;AACvE,IAAA,MAAM,UAAA,GAAa,cAAc,IAAI,CAAA;AAErC,IAAA,MAAM,IAAI,KAAA;AAAA,MACR,CAAA,iBAAA,EAAoB,IAAI,CAAA,qBAAA,EAAwB,UAAU;AAAA,qBAAA,EAClC,sBAAsB,MAAM;AAAA,iDAAA;AAAA,KAEtD;AAAA,EACF;AAEA,EAAA,OAAO,OAAA;AACT;AAfgB,MAAA,CAAA,wBAAA,EAAA,0BAAA,CAAA;AAuBT,SAAS,2BAA2B,IAAA,EAAmC;AAC5E,EAAA,OAAO,eAAA,CAAgB,IAAI,IAAI,CAAA;AACjC;AAFgB,MAAA,CAAA,0BAAA,EAAA,4BAAA,CAAA;AAST,SAAS,4BAAA,GAAqD;AACnE,EAAA,OAAO,KAAA,CAAM,IAAA,CAAK,eAAA,CAAgB,IAAA,EAAM,CAAA;AAC1C;AAFgB,MAAA,CAAA,4BAAA,EAAA,8BAAA,CAAA;AAOT,SAAS,2BAAA,GAAoC;AAClD,EAAA,eAAA,CAAgB,KAAA,EAAM;AACxB;AAFgB,MAAA,CAAA,2BAAA,EAAA,6BAAA,CAAA;AAOhB,SAAS,cAAc,IAAA,EAAkC;AACvD,EAAA,QAAQ,IAAA;AAAM,IACZ,KAAK,OAAA;AACH,MAAA,OAAO,4EAAA;AAAA,IACT,KAAK,aAAA;AACH,MAAA,OAAO,kFAAA;AAAA,IACT,KAAK,WAAA;AACH,MAAA,OAAO,gFAAA;AAAA,IACT,KAAK,MAAA;AACH,MAAA,OAAO,2EAAA;AAAA,IACT;AACE,MAAA,OAAO,CAAA,8BAAA,EAAiC,MAAA,CAAO,IAAI,CAAC,CAAA,WAAA,CAAA;AAAA;AAE1D;AAbS,MAAA,CAAA,aAAA,EAAA,eAAA,CAAA","file":"chunk-TCVKC227.js","sourcesContent":["/**\n * Global registry for crypto providers\n *\n * This registry allows providers to self-register when imported,\n * enabling explicit import patterns while maintaining the factory pattern\n * internally within BananaLink and BananaWallet classes.\n */\n\nimport type { CryptoProvider, CryptoProviderType } from '../../types/crypto-provider';\nimport type { Logger } from '@bananalink-sdk/logger';\n\n/**\n * Factory function type for creating crypto provider instances\n */\nexport type CryptoProviderFactory = (logger?: Logger) => CryptoProvider;\n\n/**\n * Global registry storing available crypto providers\n */\nconst cryptoProviders = new Map<CryptoProviderType, CryptoProviderFactory>();\n\n/**\n * Register a crypto provider factory\n * Called automatically when a provider module is imported\n *\n * This function is idempotent - calling it multiple times with the same type\n * will only register the provider once.\n *\n * @param type - The provider type identifier\n * @param factory - Factory function that creates provider instances\n *\n * @example\n * ```typescript\n * // In noble-provider.ts\n * registerCryptoProvider('noble', (logger) => new NobleCryptoProvider(logger));\n * ```\n */\nexport function registerCryptoProvider(\n type: CryptoProviderType,\n factory: CryptoProviderFactory\n): void {\n // Skip if already registered (idempotent)\n if (cryptoProviders.has(type)) {\n return;\n }\n cryptoProviders.set(type, factory);\n}\n\n/**\n * Get a registered crypto provider factory\n *\n * @param type - The provider type to retrieve\n * @returns The provider factory function\n * @throws Error if the provider is not registered\n */\nexport function getCryptoProviderFactory(type: CryptoProviderType): CryptoProviderFactory {\n const factory = cryptoProviders.get(type);\n\n if (!factory) {\n const availableProviders = Array.from(cryptoProviders.keys()).join(', ');\n const importHint = getImportHint(type);\n\n throw new Error(\n `Crypto provider '${type}' is not registered. ${importHint}\\n` +\n `Available providers: ${availableProviders || 'none'}\\n` +\n `Make sure to import the provider before using it.`\n );\n }\n\n return factory;\n}\n\n/**\n * Check if a crypto provider is registered\n *\n * @param type - The provider type to check\n * @returns True if the provider is registered\n */\nexport function isCryptoProviderRegistered(type: CryptoProviderType): boolean {\n return cryptoProviders.has(type);\n}\n\n/**\n * Get all registered crypto provider types\n *\n * @returns Array of registered provider types\n */\nexport function getRegisteredCryptoProviders(): CryptoProviderType[] {\n return Array.from(cryptoProviders.keys());\n}\n\n/**\n * Clear all registered providers (useful for testing)\n */\nexport function clearCryptoProviderRegistry(): void {\n cryptoProviders.clear();\n}\n\n/**\n * Get import hint for a specific provider type\n */\nfunction getImportHint(type: CryptoProviderType): string {\n switch (type) {\n case 'noble':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/noble'?\";\n case 'quickcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/quickcrypto'?\";\n case 'webcrypto':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/webcrypto'?\";\n case 'node':\n return \"Did you forget to import '@bananalink-sdk/protocol/crypto/provider/node'?\";\n default:\n return `Did you forget to import the '${String(type)}' provider?`;\n }\n}\n\n/**\n * Type augmentation for registered providers\n * This allows TypeScript to track which providers are available\n */\ndeclare global {\n // eslint-disable-next-line @typescript-eslint/no-namespace\n namespace BananaLink {\n // eslint-disable-next-line @typescript-eslint/no-empty-object-type\n interface RegisteredCryptoProviders {\n // This will be augmented by each provider module\n }\n }\n}\n"]}
|