@bcts/frost-hubert 1.0.0-alpha.21 → 1.0.0-alpha.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/bin/frost.cjs +3 -5
- package/dist/bin/frost.cjs.map +1 -1
- package/dist/bin/frost.mjs +3 -5
- package/dist/bin/frost.mjs.map +1 -1
- package/dist/{chunk-uaV2rQ02.cjs → chunk-CZWwpsFl.cjs} +22 -32
- package/dist/{chunk-ClPoSABd.mjs → chunk-CjcI7cDX.mjs} +6 -12
- package/dist/cmd/index.cjs +40 -43
- package/dist/cmd/index.d.cts +1 -3
- package/dist/cmd/index.d.mts +1 -3
- package/dist/cmd/index.mjs +3 -6
- package/dist/{sign-D8C3HJ4B.mjs → cmd-5yLeC_QL.mjs} +16 -44
- package/dist/cmd-5yLeC_QL.mjs.map +1 -0
- package/dist/{sign-2bOp18Fs.cjs → cmd-BfZjC3Uh.cjs} +182 -210
- package/dist/cmd-BfZjC3Uh.cjs.map +1 -0
- package/dist/dkg/index.cjs +341 -7
- package/dist/dkg/index.cjs.map +1 -0
- package/dist/dkg/index.d.cts +1 -1
- package/dist/dkg/index.d.mts +1 -1
- package/dist/dkg/index.mjs +335 -2
- package/dist/dkg/index.mjs.map +1 -0
- package/dist/frost/index.cjs +8 -9
- package/dist/frost/index.cjs.map +1 -1
- package/dist/frost/index.mjs +2 -3
- package/dist/frost/index.mjs.map +1 -1
- package/dist/{index-CcvTi5EA.d.cts → index-BJlwbPYu.d.cts} +3 -3
- package/dist/{index-CcvTi5EA.d.cts.map → index-BJlwbPYu.d.cts.map} +1 -1
- package/dist/{registry-impl-CE76sTXQ.d.cts → index-BMbPgH0W.d.cts} +1 -1
- package/dist/index-BMbPgH0W.d.cts.map +1 -0
- package/dist/{group-invite-Dz1Jmiky.d.cts → index-BkqLimZT.d.mts} +2 -2
- package/dist/index-BkqLimZT.d.mts.map +1 -0
- package/dist/{group-invite-Wk9CIbHL.d.mts → index-DmxfT59Y.d.cts} +2 -2
- package/dist/index-DmxfT59Y.d.cts.map +1 -0
- package/dist/{registry-impl-BETn_lEO.d.mts → index-DoV5HFvV.d.mts} +1 -1
- package/dist/index-DoV5HFvV.d.mts.map +1 -0
- package/dist/{index-DNCPeLNM.d.mts → index-Dzm1v4_4.d.mts} +3 -3
- package/dist/{index-DNCPeLNM.d.mts.map → index-Dzm1v4_4.d.mts.map} +1 -1
- package/dist/index.cjs +64 -68
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +3 -6
- package/dist/index.d.cts.map +1 -1
- package/dist/index.d.mts +3 -6
- package/dist/index.d.mts.map +1 -1
- package/dist/index.mjs +5 -9
- package/dist/index.mjs.map +1 -1
- package/dist/registry/index.cjs +806 -13
- package/dist/registry/index.cjs.map +1 -0
- package/dist/registry/index.d.cts +1 -1
- package/dist/registry/index.d.mts +1 -1
- package/dist/registry/index.mjs +792 -2
- package/dist/registry/index.mjs.map +1 -0
- package/dist/{registry-BDnNV1Rk.mjs → registry-CgrCZ4En.mjs} +7 -10
- package/dist/{registry-BDnNV1Rk.mjs.map → registry-CgrCZ4En.mjs.map} +1 -1
- package/dist/{registry-FMU-ec5K.cjs → registry-loI1_Mh1.cjs} +28 -31
- package/dist/registry-loI1_Mh1.cjs.map +1 -0
- package/package.json +17 -17
- package/src/cmd/dkg/participant/finalize.ts +1 -1
- package/src/dkg/proposed-participant.ts +1 -2
- package/src/frost/index.ts +1 -1
- package/src/registry/owner-record.ts +1 -2
- package/src/registry/participant-record.ts +1 -2
- package/dist/group-invite-CrbOabFL.cjs +0 -368
- package/dist/group-invite-CrbOabFL.cjs.map +0 -1
- package/dist/group-invite-Dz1Jmiky.d.cts.map +0 -1
- package/dist/group-invite-RPElq-fm.mjs +0 -338
- package/dist/group-invite-RPElq-fm.mjs.map +0 -1
- package/dist/group-invite-Wk9CIbHL.d.mts.map +0 -1
- package/dist/registry-FMU-ec5K.cjs.map +0 -1
- package/dist/registry-impl-BETn_lEO.d.mts.map +0 -1
- package/dist/registry-impl-C7w4awTv.cjs +0 -865
- package/dist/registry-impl-C7w4awTv.cjs.map +0 -1
- package/dist/registry-impl-CE76sTXQ.d.cts.map +0 -1
- package/dist/registry-impl-eYXVSPwM.mjs +0 -797
- package/dist/registry-impl-eYXVSPwM.mjs.map +0 -1
- package/dist/sign-2bOp18Fs.cjs.map +0 -1
- package/dist/sign-D8C3HJ4B.mjs.map +0 -1
|
@@ -1,368 +0,0 @@
|
|
|
1
|
-
const require_chunk = require('./chunk-uaV2rQ02.cjs');
|
|
2
|
-
let _bcts_components = require("@bcts/components");
|
|
3
|
-
let _bcts_dcbor = require("@bcts/dcbor");
|
|
4
|
-
let _bcts_envelope = require("@bcts/envelope");
|
|
5
|
-
let _bcts_gstp = require("@bcts/gstp");
|
|
6
|
-
let _bcts_xid = require("@bcts/xid");
|
|
7
|
-
let _bcts_uniform_resources = require("@bcts/uniform-resources");
|
|
8
|
-
|
|
9
|
-
//#region src/dkg/proposed-participant.ts
|
|
10
|
-
/**
|
|
11
|
-
* A proposed participant in a DKG session.
|
|
12
|
-
*
|
|
13
|
-
* Port of `struct DkgProposedParticipant` from proposed_participant.rs lines 8-13.
|
|
14
|
-
*/
|
|
15
|
-
var DkgProposedParticipant = class DkgProposedParticipant {
|
|
16
|
-
_urString;
|
|
17
|
-
_envelope;
|
|
18
|
-
_document;
|
|
19
|
-
_responseArid;
|
|
20
|
-
constructor(urString, envelope, document, responseArid) {
|
|
21
|
-
this._urString = urString;
|
|
22
|
-
this._envelope = envelope;
|
|
23
|
-
this._document = document;
|
|
24
|
-
this._responseArid = responseArid;
|
|
25
|
-
}
|
|
26
|
-
/**
|
|
27
|
-
* Create a new DkgProposedParticipant from a UR string and response ARID.
|
|
28
|
-
*
|
|
29
|
-
* Port of `DkgProposedParticipant::new()` from proposed_participant.rs lines 22-26.
|
|
30
|
-
*/
|
|
31
|
-
static create(urString, responseArid) {
|
|
32
|
-
const [envelope, document] = parseXidEnvelope(urString);
|
|
33
|
-
return new DkgProposedParticipant(urString, envelope, document, responseArid);
|
|
34
|
-
}
|
|
35
|
-
/**
|
|
36
|
-
* Get the XID of this participant.
|
|
37
|
-
*
|
|
38
|
-
* Port of `DkgProposedParticipant::xid()` from proposed_participant.rs line 28.
|
|
39
|
-
*/
|
|
40
|
-
xid() {
|
|
41
|
-
return this._document.xid();
|
|
42
|
-
}
|
|
43
|
-
/**
|
|
44
|
-
* Get the XID document of this participant.
|
|
45
|
-
*
|
|
46
|
-
* Port of `DkgProposedParticipant::xid_document()` from proposed_participant.rs line 30.
|
|
47
|
-
*/
|
|
48
|
-
xidDocument() {
|
|
49
|
-
return this._document;
|
|
50
|
-
}
|
|
51
|
-
/**
|
|
52
|
-
* Get the UR string of the XID document.
|
|
53
|
-
*
|
|
54
|
-
* Port of `DkgProposedParticipant::xid_document_ur()` from proposed_participant.rs line 32.
|
|
55
|
-
*/
|
|
56
|
-
xidDocumentUr() {
|
|
57
|
-
return this._urString;
|
|
58
|
-
}
|
|
59
|
-
/**
|
|
60
|
-
* Get the envelope containing the XID document.
|
|
61
|
-
*
|
|
62
|
-
* Port of `DkgProposedParticipant::xid_document_envelope()` from proposed_participant.rs line 34.
|
|
63
|
-
*/
|
|
64
|
-
xidDocumentEnvelope() {
|
|
65
|
-
return this._envelope;
|
|
66
|
-
}
|
|
67
|
-
/**
|
|
68
|
-
* Get the response ARID for this participant.
|
|
69
|
-
*
|
|
70
|
-
* Port of `DkgProposedParticipant::response_arid()` from proposed_participant.rs line 36.
|
|
71
|
-
*/
|
|
72
|
-
responseArid() {
|
|
73
|
-
return this._responseArid;
|
|
74
|
-
}
|
|
75
|
-
/**
|
|
76
|
-
* Compare participants by XID for sorting.
|
|
77
|
-
*/
|
|
78
|
-
compareTo(other) {
|
|
79
|
-
const thisXid = this.xid().toString();
|
|
80
|
-
const otherXid = other.xid().toString();
|
|
81
|
-
return thisXid.localeCompare(otherXid);
|
|
82
|
-
}
|
|
83
|
-
};
|
|
84
|
-
/**
|
|
85
|
-
* Parse a XID envelope from a UR string.
|
|
86
|
-
*
|
|
87
|
-
* Port of `parse_xid_envelope()` from proposed_participant.rs lines 39-60.
|
|
88
|
-
*/
|
|
89
|
-
function parseXidEnvelope(input) {
|
|
90
|
-
const trimmed = input.trim();
|
|
91
|
-
if (trimmed.length === 0) throw new Error("XID document is required");
|
|
92
|
-
const ur = _bcts_uniform_resources.UR.fromURString(trimmed);
|
|
93
|
-
const urType = ur.urTypeStr();
|
|
94
|
-
if (urType !== "xid" && urType !== "envelope") throw new Error(`Expected a ur:xid document, found ur:${urType}`);
|
|
95
|
-
const envelopeCbor = ur.cbor();
|
|
96
|
-
let envelope;
|
|
97
|
-
try {
|
|
98
|
-
envelope = _bcts_envelope.Envelope.fromTaggedCbor(envelopeCbor);
|
|
99
|
-
} catch {
|
|
100
|
-
envelope = _bcts_envelope.Envelope.fromUntaggedCbor(envelopeCbor);
|
|
101
|
-
}
|
|
102
|
-
const document = _bcts_xid.XIDDocument.fromEnvelope(envelope, void 0, _bcts_xid.XIDVerifySignature.Inception);
|
|
103
|
-
return [envelope, document];
|
|
104
|
-
}
|
|
105
|
-
|
|
106
|
-
//#endregion
|
|
107
|
-
//#region src/dkg/group-invite.ts
|
|
108
|
-
/**
|
|
109
|
-
* Copyright © 2023-2026 Blockchain Commons, LLC
|
|
110
|
-
* Copyright © 2025-2026 Parity Technologies
|
|
111
|
-
*
|
|
112
|
-
*
|
|
113
|
-
* DKG Group Invite structures.
|
|
114
|
-
*
|
|
115
|
-
* Port of dkg/group_invite.rs from frost-hubert-rust.
|
|
116
|
-
*
|
|
117
|
-
* @module
|
|
118
|
-
*/
|
|
119
|
-
/**
|
|
120
|
-
* Helper to create an accepted result.
|
|
121
|
-
*/
|
|
122
|
-
function accepted() {
|
|
123
|
-
return { type: "accepted" };
|
|
124
|
-
}
|
|
125
|
-
/**
|
|
126
|
-
* Helper to create a declined result.
|
|
127
|
-
*/
|
|
128
|
-
function declined(reason) {
|
|
129
|
-
return {
|
|
130
|
-
type: "declined",
|
|
131
|
-
reason
|
|
132
|
-
};
|
|
133
|
-
}
|
|
134
|
-
/**
|
|
135
|
-
* DKG Invite - represents an invitation to participate in a DKG session.
|
|
136
|
-
*
|
|
137
|
-
* Port of `struct DkgInvite` from group_invite.rs lines 11-27.
|
|
138
|
-
*/
|
|
139
|
-
var DkgInvite = class DkgInvite {
|
|
140
|
-
_requestId;
|
|
141
|
-
_sender;
|
|
142
|
-
_groupId;
|
|
143
|
-
_date;
|
|
144
|
-
_validUntil;
|
|
145
|
-
_minSigners;
|
|
146
|
-
_charter;
|
|
147
|
-
_orderedParticipants;
|
|
148
|
-
constructor(requestId, sender, groupId, date, validUntil, minSigners, charter, orderedParticipants) {
|
|
149
|
-
this._requestId = requestId;
|
|
150
|
-
this._sender = sender;
|
|
151
|
-
this._groupId = groupId;
|
|
152
|
-
this._date = date;
|
|
153
|
-
this._validUntil = validUntil;
|
|
154
|
-
this._minSigners = minSigners;
|
|
155
|
-
this._charter = charter;
|
|
156
|
-
this._orderedParticipants = orderedParticipants;
|
|
157
|
-
}
|
|
158
|
-
/**
|
|
159
|
-
* Create a new DKG invite.
|
|
160
|
-
*
|
|
161
|
-
* Port of `DkgInvite::new()` from group_invite.rs lines 30-67.
|
|
162
|
-
*/
|
|
163
|
-
static create(requestId, sender, groupId, date, validUntil, minSigners, charter, participants, responseArids) {
|
|
164
|
-
if (participants.length !== responseArids.length) throw new Error(`Number of participants (${participants.length}) does not match number of response ARIDs (${responseArids.length})`);
|
|
165
|
-
if (minSigners < 2) throw new Error("min_signers must be at least 2");
|
|
166
|
-
const orderedParticipants = participants.map((urString, i) => DkgProposedParticipant.create(urString, responseArids[i]));
|
|
167
|
-
if (minSigners > orderedParticipants.length) throw new Error("min_signers cannot exceed number of participants");
|
|
168
|
-
orderedParticipants.sort((a, b) => a.compareTo(b));
|
|
169
|
-
return new DkgInvite(requestId, sender, groupId, date, validUntil, minSigners, charter, orderedParticipants);
|
|
170
|
-
}
|
|
171
|
-
requestId() {
|
|
172
|
-
return this._requestId;
|
|
173
|
-
}
|
|
174
|
-
sender() {
|
|
175
|
-
return this._sender;
|
|
176
|
-
}
|
|
177
|
-
groupId() {
|
|
178
|
-
return this._groupId;
|
|
179
|
-
}
|
|
180
|
-
date() {
|
|
181
|
-
return this._date;
|
|
182
|
-
}
|
|
183
|
-
validUntil() {
|
|
184
|
-
return this._validUntil;
|
|
185
|
-
}
|
|
186
|
-
minSigners() {
|
|
187
|
-
return this._minSigners;
|
|
188
|
-
}
|
|
189
|
-
charter() {
|
|
190
|
-
return this._charter;
|
|
191
|
-
}
|
|
192
|
-
participants() {
|
|
193
|
-
return this._orderedParticipants;
|
|
194
|
-
}
|
|
195
|
-
/**
|
|
196
|
-
* Create a GSTP sealed request from this invite.
|
|
197
|
-
*
|
|
198
|
-
* Port of `DkgInvite::to_request()` from group_invite.rs lines 87-121.
|
|
199
|
-
*/
|
|
200
|
-
toRequest() {
|
|
201
|
-
let request = _bcts_gstp.SealedRequest.new("dkgInvite", this.requestId(), this.sender()).withParameter("group", this.groupId()).withParameter("minSigners", BigInt(this.minSigners())).withParameter("charter", this.charter()).withDate(this.date()).withParameter("validUntil", _bcts_dcbor.CborDate.fromDatetime(this.validUntil()));
|
|
202
|
-
for (const participant of this.participants()) {
|
|
203
|
-
const xidDocumentEnvelope = participant.xidDocumentEnvelope();
|
|
204
|
-
const responseArid = participant.responseArid();
|
|
205
|
-
const encryptionKey = participant.xidDocument().encryptionKey();
|
|
206
|
-
if (encryptionKey === void 0) throw new Error("Participant XID document has no encryption key");
|
|
207
|
-
const encryptedResponseArid = _bcts_envelope.Envelope.new(responseArid).encryptToRecipients([encryptionKey]);
|
|
208
|
-
const participantEnvelope = xidDocumentEnvelope.wrap().addAssertion("response_arid", encryptedResponseArid);
|
|
209
|
-
request = request.withParameter("participant", participantEnvelope);
|
|
210
|
-
}
|
|
211
|
-
return request;
|
|
212
|
-
}
|
|
213
|
-
/**
|
|
214
|
-
* Creates a signed but unencrypted envelope for auditing/preview.
|
|
215
|
-
*
|
|
216
|
-
* Port of `DkgInvite::to_unsealed_envelope()` from group_invite.rs lines 124-139.
|
|
217
|
-
*/
|
|
218
|
-
toUnsealedEnvelope() {
|
|
219
|
-
const request = this.toRequest();
|
|
220
|
-
const signerPrivateKeys = this.sender().inceptionPrivateKeys();
|
|
221
|
-
if (signerPrivateKeys === void 0) throw new Error("Sender XID document has no inception signing key");
|
|
222
|
-
return request.toEnvelope(this.validUntil(), signerPrivateKeys, void 0);
|
|
223
|
-
}
|
|
224
|
-
/**
|
|
225
|
-
* Creates a sealed envelope encrypted to all participants.
|
|
226
|
-
*
|
|
227
|
-
* Port of `DkgInvite::to_envelope()` from group_invite.rs lines 142-166.
|
|
228
|
-
*/
|
|
229
|
-
toEnvelope() {
|
|
230
|
-
const request = this.toRequest();
|
|
231
|
-
const signerPrivateKeys = this.sender().inceptionPrivateKeys();
|
|
232
|
-
if (signerPrivateKeys === void 0) throw new Error("Sender XID document has no inception signing key");
|
|
233
|
-
const recipients = this.participants().map((p) => p.xidDocument());
|
|
234
|
-
return request.toEnvelopeForRecipients(this.validUntil(), signerPrivateKeys, recipients);
|
|
235
|
-
}
|
|
236
|
-
};
|
|
237
|
-
/**
|
|
238
|
-
* DKG Invitation - represents a received invitation from a participant's perspective.
|
|
239
|
-
*
|
|
240
|
-
* Port of `struct DkgInvitation` from group_invite.rs lines 175-186.
|
|
241
|
-
*/
|
|
242
|
-
var DkgInvitation = class DkgInvitation {
|
|
243
|
-
_responseArid;
|
|
244
|
-
_validUntil;
|
|
245
|
-
_sender;
|
|
246
|
-
_requestId;
|
|
247
|
-
_peerContinuation;
|
|
248
|
-
_minSigners;
|
|
249
|
-
_charter;
|
|
250
|
-
_groupId;
|
|
251
|
-
constructor(responseArid, validUntil, sender, requestId, peerContinuation, minSigners, charter, groupId) {
|
|
252
|
-
this._responseArid = responseArid;
|
|
253
|
-
this._validUntil = validUntil;
|
|
254
|
-
this._sender = sender;
|
|
255
|
-
this._requestId = requestId;
|
|
256
|
-
this._peerContinuation = peerContinuation;
|
|
257
|
-
this._minSigners = minSigners;
|
|
258
|
-
this._charter = charter;
|
|
259
|
-
this._groupId = groupId;
|
|
260
|
-
}
|
|
261
|
-
responseArid() {
|
|
262
|
-
return this._responseArid;
|
|
263
|
-
}
|
|
264
|
-
validUntil() {
|
|
265
|
-
return this._validUntil;
|
|
266
|
-
}
|
|
267
|
-
sender() {
|
|
268
|
-
return this._sender;
|
|
269
|
-
}
|
|
270
|
-
requestId() {
|
|
271
|
-
return this._requestId;
|
|
272
|
-
}
|
|
273
|
-
peerContinuation() {
|
|
274
|
-
return this._peerContinuation;
|
|
275
|
-
}
|
|
276
|
-
minSigners() {
|
|
277
|
-
return this._minSigners;
|
|
278
|
-
}
|
|
279
|
-
charter() {
|
|
280
|
-
return this._charter;
|
|
281
|
-
}
|
|
282
|
-
groupId() {
|
|
283
|
-
return this._groupId;
|
|
284
|
-
}
|
|
285
|
-
/**
|
|
286
|
-
* Build a GSTP response for this invitation result.
|
|
287
|
-
*
|
|
288
|
-
* Port of `DkgInvitation::to_response()` from group_invite.rs lines 207-224.
|
|
289
|
-
*/
|
|
290
|
-
toResponse(response, recipient) {
|
|
291
|
-
let base;
|
|
292
|
-
if (response.type === "accepted") base = _bcts_gstp.SealedResponse.newSuccess(this.requestId(), recipient);
|
|
293
|
-
else base = _bcts_gstp.SealedResponse.newFailure(this.requestId(), recipient).withError(response.reason);
|
|
294
|
-
return base.withPeerContinuation(this.peerContinuation());
|
|
295
|
-
}
|
|
296
|
-
/**
|
|
297
|
-
* Create a signed/encrypted GSTP envelope containing the response for the coordinator.
|
|
298
|
-
*
|
|
299
|
-
* Port of `DkgInvitation::to_envelope()` from group_invite.rs lines 228-244.
|
|
300
|
-
*/
|
|
301
|
-
toEnvelope(response, recipient) {
|
|
302
|
-
const responseObj = this.toResponse(response, recipient);
|
|
303
|
-
const signerPrivateKeys = recipient.inceptionPrivateKeys();
|
|
304
|
-
if (signerPrivateKeys === void 0) throw new Error("Recipient XID document has no signing keys");
|
|
305
|
-
const recipients = [this.sender()];
|
|
306
|
-
return responseObj.toEnvelopeForRecipients(this.validUntil(), signerPrivateKeys, recipients);
|
|
307
|
-
}
|
|
308
|
-
/**
|
|
309
|
-
* Parse a DKG invitation from an invite envelope.
|
|
310
|
-
*
|
|
311
|
-
* Port of `DkgInvitation::from_invite()` from group_invite.rs lines 255-344.
|
|
312
|
-
*/
|
|
313
|
-
static fromInvite(invite, now, expectedSender, recipient) {
|
|
314
|
-
const recipientPrivateKeys = recipient.inceptionPrivateKeys();
|
|
315
|
-
if (recipientPrivateKeys === void 0) throw new Error("Recipient XID document has no inception private keys");
|
|
316
|
-
const sealedRequest = _bcts_gstp.SealedRequest.tryFromEnvelope(invite, void 0, now, recipientPrivateKeys);
|
|
317
|
-
if (expectedSender !== void 0 && sealedRequest.sender().xid() !== expectedSender.xid()) throw new Error("Invite sender does not match expected sender");
|
|
318
|
-
if (!sealedRequest.request().function().equals(_bcts_envelope.Function.fromString("dkgInvite"))) throw new Error("Unexpected invite function");
|
|
319
|
-
const validUntil = sealedRequest.extractObjectForParameter("validUntil");
|
|
320
|
-
if (validUntil <= now) throw new Error("Invitation expired");
|
|
321
|
-
const recipientXid = recipient.xid();
|
|
322
|
-
const minSigners = sealedRequest.extractObjectForParameter("minSigners");
|
|
323
|
-
const charter = sealedRequest.extractObjectForParameter("charter");
|
|
324
|
-
const groupId = sealedRequest.extractObjectForParameter("group");
|
|
325
|
-
const participantObjects = sealedRequest.objectsForParameter("participant");
|
|
326
|
-
if (minSigners < 2) throw new Error("min_signers must be at least 2");
|
|
327
|
-
if (minSigners > participantObjects.length) throw new Error("min_signers exceeds participant count");
|
|
328
|
-
for (const participant of participantObjects) {
|
|
329
|
-
const xidDocumentEnvelope = participant.tryUnwrap();
|
|
330
|
-
if (_bcts_xid.XIDDocument.fromEnvelope(xidDocumentEnvelope, void 0, _bcts_xid.XIDVerifySignature.Inception).xid() !== recipientXid) continue;
|
|
331
|
-
return new DkgInvitation(participant.objectForPredicate("response_arid").decryptToRecipient(recipientPrivateKeys).extractSubject((cbor) => _bcts_components.ARID.fromTaggedCbor(cbor)), validUntil, sealedRequest.sender(), sealedRequest.request().id(), sealedRequest.peerContinuation(), minSigners, charter, groupId);
|
|
332
|
-
}
|
|
333
|
-
throw new Error("Recipient not found in invite");
|
|
334
|
-
}
|
|
335
|
-
};
|
|
336
|
-
|
|
337
|
-
//#endregion
|
|
338
|
-
Object.defineProperty(exports, 'DkgInvitation', {
|
|
339
|
-
enumerable: true,
|
|
340
|
-
get: function () {
|
|
341
|
-
return DkgInvitation;
|
|
342
|
-
}
|
|
343
|
-
});
|
|
344
|
-
Object.defineProperty(exports, 'DkgInvite', {
|
|
345
|
-
enumerable: true,
|
|
346
|
-
get: function () {
|
|
347
|
-
return DkgInvite;
|
|
348
|
-
}
|
|
349
|
-
});
|
|
350
|
-
Object.defineProperty(exports, 'DkgProposedParticipant', {
|
|
351
|
-
enumerable: true,
|
|
352
|
-
get: function () {
|
|
353
|
-
return DkgProposedParticipant;
|
|
354
|
-
}
|
|
355
|
-
});
|
|
356
|
-
Object.defineProperty(exports, 'accepted', {
|
|
357
|
-
enumerable: true,
|
|
358
|
-
get: function () {
|
|
359
|
-
return accepted;
|
|
360
|
-
}
|
|
361
|
-
});
|
|
362
|
-
Object.defineProperty(exports, 'declined', {
|
|
363
|
-
enumerable: true,
|
|
364
|
-
get: function () {
|
|
365
|
-
return declined;
|
|
366
|
-
}
|
|
367
|
-
});
|
|
368
|
-
//# sourceMappingURL=group-invite-CrbOabFL.cjs.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"group-invite-CrbOabFL.cjs","names":["UR","Envelope","XIDDocument","XIDVerifySignature","SealedRequest","CborDate","Envelope","SealedResponse","EnvelopeFunction","XIDDocument","XIDVerifySignature","ARID"],"sources":["../src/dkg/proposed-participant.ts","../src/dkg/group-invite.ts"],"sourcesContent":["/**\n * Copyright © 2023-2026 Blockchain Commons, LLC\n * Copyright © 2025-2026 Parity Technologies\n *\n *\n * DKG Proposed Participant.\n *\n * Port of dkg/proposed_participant.rs from frost-hubert-rust.\n *\n * @module\n */\n\nimport { type ARID, type XID } from \"@bcts/components\";\nimport { type Cbor } from \"@bcts/dcbor\";\nimport { Envelope } from \"@bcts/envelope\";\nimport { UR } from \"@bcts/uniform-resources\";\nimport { XIDDocument, XIDVerifySignature } from \"@bcts/xid\";\n\n/**\n * A proposed participant in a DKG session.\n *\n * Port of `struct DkgProposedParticipant` from proposed_participant.rs lines 8-13.\n */\nexport class DkgProposedParticipant {\n private readonly _urString: string;\n private readonly _envelope: Envelope;\n private readonly _document: XIDDocument;\n private readonly _responseArid: ARID;\n\n private constructor(\n urString: string,\n envelope: Envelope,\n document: XIDDocument,\n responseArid: ARID,\n ) {\n this._urString = urString;\n this._envelope = envelope;\n this._document = document;\n this._responseArid = responseArid;\n }\n\n /**\n * Create a new DkgProposedParticipant from a UR string and response ARID.\n *\n * Port of `DkgProposedParticipant::new()` from proposed_participant.rs lines 22-26.\n */\n static create(urString: string, responseArid: ARID): DkgProposedParticipant {\n const [envelope, document] = parseXidEnvelope(urString);\n return new DkgProposedParticipant(urString, envelope, document, responseArid);\n }\n\n /**\n * Get the XID of this participant.\n *\n * Port of `DkgProposedParticipant::xid()` from proposed_participant.rs line 28.\n */\n xid(): XID {\n return this._document.xid();\n }\n\n /**\n * Get the XID document of this participant.\n *\n * Port of `DkgProposedParticipant::xid_document()` from proposed_participant.rs line 30.\n */\n xidDocument(): XIDDocument {\n return this._document;\n }\n\n /**\n * Get the UR string of the XID document.\n *\n * Port of `DkgProposedParticipant::xid_document_ur()` from proposed_participant.rs line 32.\n */\n xidDocumentUr(): string {\n return this._urString;\n }\n\n /**\n * Get the envelope containing the XID document.\n *\n * Port of `DkgProposedParticipant::xid_document_envelope()` from proposed_participant.rs line 34.\n */\n xidDocumentEnvelope(): Envelope {\n return this._envelope;\n }\n\n /**\n * Get the response ARID for this participant.\n *\n * Port of `DkgProposedParticipant::response_arid()` from proposed_participant.rs line 36.\n */\n responseArid(): ARID {\n return this._responseArid;\n }\n\n /**\n * Compare participants by XID for sorting.\n */\n compareTo(other: DkgProposedParticipant): number {\n const thisXid = this.xid().toString();\n const otherXid = other.xid().toString();\n return thisXid.localeCompare(otherXid);\n }\n}\n\n/**\n * Parse a XID envelope from a UR string.\n *\n * Port of `parse_xid_envelope()` from proposed_participant.rs lines 39-60.\n */\nfunction parseXidEnvelope(input: string): [Envelope, XIDDocument] {\n const trimmed = input.trim();\n if (trimmed.length === 0) {\n throw new Error(\"XID document is required\");\n }\n\n const ur = UR.fromURString(trimmed);\n const urType = ur.urTypeStr();\n if (urType !== \"xid\" && urType !== \"envelope\") {\n throw new Error(`Expected a ur:xid document, found ur:${urType}`);\n }\n\n const envelopeCbor = ur.cbor() as unknown as Cbor;\n // Try tagged CBOR first, then untagged\n let envelope: Envelope;\n try {\n envelope = Envelope.fromTaggedCbor(envelopeCbor);\n } catch {\n envelope = Envelope.fromUntaggedCbor(envelopeCbor);\n }\n\n const document = XIDDocument.fromEnvelope(envelope, undefined, XIDVerifySignature.Inception);\n\n return [envelope, document];\n}\n","/**\n * Copyright © 2023-2026 Blockchain Commons, LLC\n * Copyright © 2025-2026 Parity Technologies\n *\n *\n * DKG Group Invite structures.\n *\n * Port of dkg/group_invite.rs from frost-hubert-rust.\n *\n * @module\n */\n\nimport { ARID } from \"@bcts/components\";\nimport { CborDate } from \"@bcts/dcbor\";\nimport { Envelope, Function as EnvelopeFunction } from \"@bcts/envelope\";\nimport { SealedRequest, SealedResponse } from \"@bcts/gstp\";\nimport { XIDDocument, XIDVerifySignature } from \"@bcts/xid\";\n\nimport { DkgProposedParticipant } from \"./proposed-participant.js\";\n\n/**\n * Result of a DKG invitation.\n *\n * Port of `enum DkgInvitationResult` from group_invite.rs lines 170-173.\n */\nexport type DkgInvitationResult = { type: \"accepted\" } | { type: \"declined\"; reason: string };\n\n/**\n * Helper to create an accepted result.\n */\nexport function accepted(): DkgInvitationResult {\n return { type: \"accepted\" };\n}\n\n/**\n * Helper to create a declined result.\n */\nexport function declined(reason: string): DkgInvitationResult {\n return { type: \"declined\", reason };\n}\n\n/**\n * DKG Invite - represents an invitation to participate in a DKG session.\n *\n * Port of `struct DkgInvite` from group_invite.rs lines 11-27.\n */\nexport class DkgInvite {\n private readonly _requestId: ARID;\n private readonly _sender: XIDDocument;\n private readonly _groupId: ARID;\n private readonly _date: Date;\n private readonly _validUntil: Date;\n private readonly _minSigners: number;\n private readonly _charter: string;\n private readonly _orderedParticipants: DkgProposedParticipant[];\n\n private constructor(\n requestId: ARID,\n sender: XIDDocument,\n groupId: ARID,\n date: Date,\n validUntil: Date,\n minSigners: number,\n charter: string,\n orderedParticipants: DkgProposedParticipant[],\n ) {\n this._requestId = requestId;\n this._sender = sender;\n this._groupId = groupId;\n this._date = date;\n this._validUntil = validUntil;\n this._minSigners = minSigners;\n this._charter = charter;\n this._orderedParticipants = orderedParticipants;\n }\n\n /**\n * Create a new DKG invite.\n *\n * Port of `DkgInvite::new()` from group_invite.rs lines 30-67.\n */\n static create(\n requestId: ARID,\n sender: XIDDocument,\n groupId: ARID,\n date: Date,\n validUntil: Date,\n minSigners: number,\n charter: string,\n participants: string[],\n responseArids: ARID[],\n ): DkgInvite {\n if (participants.length !== responseArids.length) {\n throw new Error(\n `Number of participants (${participants.length}) does not match number of response ARIDs (${responseArids.length})`,\n );\n }\n\n if (minSigners < 2) {\n throw new Error(\"min_signers must be at least 2\");\n }\n\n const orderedParticipants = participants.map((urString, i) =>\n DkgProposedParticipant.create(urString, responseArids[i]),\n );\n\n if (minSigners > orderedParticipants.length) {\n throw new Error(\"min_signers cannot exceed number of participants\");\n }\n\n // Sort by XID\n orderedParticipants.sort((a, b) => a.compareTo(b));\n\n return new DkgInvite(\n requestId,\n sender,\n groupId,\n date,\n validUntil,\n minSigners,\n charter,\n orderedParticipants,\n );\n }\n\n requestId(): ARID {\n return this._requestId;\n }\n\n sender(): XIDDocument {\n return this._sender;\n }\n\n groupId(): ARID {\n return this._groupId;\n }\n\n date(): Date {\n return this._date;\n }\n\n validUntil(): Date {\n return this._validUntil;\n }\n\n minSigners(): number {\n return this._minSigners;\n }\n\n charter(): string {\n return this._charter;\n }\n\n participants(): DkgProposedParticipant[] {\n return this._orderedParticipants;\n }\n\n /**\n * Create a GSTP sealed request from this invite.\n *\n * Port of `DkgInvite::to_request()` from group_invite.rs lines 87-121.\n */\n toRequest(): SealedRequest {\n let request = SealedRequest.new(\"dkgInvite\", this.requestId(), this.sender())\n .withParameter(\"group\", this.groupId())\n .withParameter(\"minSigners\", BigInt(this.minSigners()))\n .withParameter(\"charter\", this.charter())\n .withDate(this.date())\n .withParameter(\"validUntil\", CborDate.fromDatetime(this.validUntil()));\n\n for (const participant of this.participants()) {\n const xidDocumentEnvelope = participant.xidDocumentEnvelope();\n const responseArid = participant.responseArid();\n const encryptionKey = participant.xidDocument().encryptionKey();\n\n if (encryptionKey === undefined) {\n throw new Error(\"Participant XID document has no encryption key\");\n }\n\n const encryptedResponseArid = Envelope.new(responseArid).encryptToRecipients([encryptionKey]);\n\n const participantEnvelope = xidDocumentEnvelope\n .wrap()\n .addAssertion(\"response_arid\", encryptedResponseArid);\n\n request = request.withParameter(\"participant\", participantEnvelope);\n }\n\n return request;\n }\n\n /**\n * Creates a signed but unencrypted envelope for auditing/preview.\n *\n * Port of `DkgInvite::to_unsealed_envelope()` from group_invite.rs lines 124-139.\n */\n toUnsealedEnvelope(): Envelope {\n const request = this.toRequest();\n const sender = this.sender();\n const signerPrivateKeys = sender.inceptionPrivateKeys();\n\n if (signerPrivateKeys === undefined) {\n throw new Error(\"Sender XID document has no inception signing key\");\n }\n\n return request.toEnvelope(\n this.validUntil(),\n signerPrivateKeys,\n undefined, // No recipient = signed but not encrypted\n );\n }\n\n /**\n * Creates a sealed envelope encrypted to all participants.\n *\n * Port of `DkgInvite::to_envelope()` from group_invite.rs lines 142-166.\n */\n toEnvelope(): Envelope {\n const request = this.toRequest();\n const sender = this.sender();\n const signerPrivateKeys = sender.inceptionPrivateKeys();\n\n if (signerPrivateKeys === undefined) {\n throw new Error(\"Sender XID document has no inception signing key\");\n }\n\n const recipients = this.participants().map((p) => p.xidDocument());\n\n return request.toEnvelopeForRecipients(this.validUntil(), signerPrivateKeys, recipients);\n }\n}\n\n/**\n * DKG Invitation - represents a received invitation from a participant's perspective.\n *\n * Port of `struct DkgInvitation` from group_invite.rs lines 175-186.\n */\nexport class DkgInvitation {\n private readonly _responseArid: ARID;\n private readonly _validUntil: Date;\n private readonly _sender: XIDDocument;\n private readonly _requestId: ARID;\n private readonly _peerContinuation: Envelope | undefined;\n private readonly _minSigners: number;\n private readonly _charter: string;\n private readonly _groupId: ARID;\n\n private constructor(\n responseArid: ARID,\n validUntil: Date,\n sender: XIDDocument,\n requestId: ARID,\n peerContinuation: Envelope | undefined,\n minSigners: number,\n charter: string,\n groupId: ARID,\n ) {\n this._responseArid = responseArid;\n this._validUntil = validUntil;\n this._sender = sender;\n this._requestId = requestId;\n this._peerContinuation = peerContinuation;\n this._minSigners = minSigners;\n this._charter = charter;\n this._groupId = groupId;\n }\n\n responseArid(): ARID {\n return this._responseArid;\n }\n\n validUntil(): Date {\n return this._validUntil;\n }\n\n sender(): XIDDocument {\n return this._sender;\n }\n\n requestId(): ARID {\n return this._requestId;\n }\n\n peerContinuation(): Envelope | undefined {\n return this._peerContinuation;\n }\n\n minSigners(): number {\n return this._minSigners;\n }\n\n charter(): string {\n return this._charter;\n }\n\n groupId(): ARID {\n return this._groupId;\n }\n\n /**\n * Build a GSTP response for this invitation result.\n *\n * Port of `DkgInvitation::to_response()` from group_invite.rs lines 207-224.\n */\n toResponse(response: DkgInvitationResult, recipient: XIDDocument): SealedResponse {\n let base: SealedResponse;\n if (response.type === \"accepted\") {\n base = SealedResponse.newSuccess(this.requestId(), recipient);\n } else {\n base = SealedResponse.newFailure(this.requestId(), recipient).withError(response.reason);\n }\n\n return base.withPeerContinuation(this.peerContinuation());\n }\n\n /**\n * Create a signed/encrypted GSTP envelope containing the response for the coordinator.\n *\n * Port of `DkgInvitation::to_envelope()` from group_invite.rs lines 228-244.\n */\n toEnvelope(response: DkgInvitationResult, recipient: XIDDocument): Envelope {\n const responseObj = this.toResponse(response, recipient);\n const signerPrivateKeys = recipient.inceptionPrivateKeys();\n\n if (signerPrivateKeys === undefined) {\n throw new Error(\"Recipient XID document has no signing keys\");\n }\n\n const recipients = [this.sender()];\n\n return responseObj.toEnvelopeForRecipients(this.validUntil(), signerPrivateKeys, recipients);\n }\n\n /**\n * Parse a DKG invitation from an invite envelope.\n *\n * Port of `DkgInvitation::from_invite()` from group_invite.rs lines 255-344.\n */\n static fromInvite(\n invite: Envelope,\n now: Date,\n expectedSender: XIDDocument | undefined,\n recipient: XIDDocument,\n ): DkgInvitation {\n const recipientPrivateKeys = recipient.inceptionPrivateKeys();\n\n if (recipientPrivateKeys === undefined) {\n throw new Error(\"Recipient XID document has no inception private keys\");\n }\n\n const sealedRequest = SealedRequest.tryFromEnvelope(\n invite,\n undefined,\n now,\n recipientPrivateKeys,\n );\n\n if (expectedSender !== undefined && sealedRequest.sender().xid() !== expectedSender.xid()) {\n throw new Error(\"Invite sender does not match expected sender\");\n }\n\n if (!sealedRequest.request().function().equals(EnvelopeFunction.fromString(\"dkgInvite\"))) {\n throw new Error(\"Unexpected invite function\");\n }\n\n const validUntil = sealedRequest.extractObjectForParameter<Date>(\"validUntil\");\n\n if (validUntil <= now) {\n throw new Error(\"Invitation expired\");\n }\n\n const recipientXid = recipient.xid();\n const minSigners = sealedRequest.extractObjectForParameter<number>(\"minSigners\");\n const charter = sealedRequest.extractObjectForParameter<string>(\"charter\");\n const groupId = sealedRequest.extractObjectForParameter<ARID>(\"group\");\n const participantObjects = sealedRequest.objectsForParameter(\"participant\");\n\n if (minSigners < 2) {\n throw new Error(\"min_signers must be at least 2\");\n }\n\n if (minSigners > participantObjects.length) {\n throw new Error(\"min_signers exceeds participant count\");\n }\n\n for (const participant of participantObjects) {\n const xidDocumentEnvelope = participant.tryUnwrap();\n const xidDocument = XIDDocument.fromEnvelope(\n xidDocumentEnvelope,\n undefined,\n XIDVerifySignature.Inception,\n );\n\n if (xidDocument.xid() !== recipientXid) {\n continue;\n }\n\n const encryptedResponseArid = participant.objectForPredicate(\"response_arid\");\n const responseAridEnvelope = encryptedResponseArid.decryptToRecipient(recipientPrivateKeys);\n const responseArid: ARID = responseAridEnvelope.extractSubject((cbor) =>\n ARID.fromTaggedCbor(cbor),\n );\n\n return new DkgInvitation(\n responseArid,\n validUntil,\n sealedRequest.sender(),\n sealedRequest.request().id(),\n sealedRequest.peerContinuation(),\n minSigners,\n charter,\n groupId,\n );\n }\n\n throw new Error(\"Recipient not found in invite\");\n }\n}\n"],"mappings":";;;;;;;;;;;;;;AAuBA,IAAa,yBAAb,MAAa,uBAAuB;CAClC,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CAEjB,AAAQ,YACN,UACA,UACA,UACA,cACA;AACA,OAAK,YAAY;AACjB,OAAK,YAAY;AACjB,OAAK,YAAY;AACjB,OAAK,gBAAgB;;;;;;;CAQvB,OAAO,OAAO,UAAkB,cAA4C;EAC1E,MAAM,CAAC,UAAU,YAAY,iBAAiB,SAAS;AACvD,SAAO,IAAI,uBAAuB,UAAU,UAAU,UAAU,aAAa;;;;;;;CAQ/E,MAAW;AACT,SAAO,KAAK,UAAU,KAAK;;;;;;;CAQ7B,cAA2B;AACzB,SAAO,KAAK;;;;;;;CAQd,gBAAwB;AACtB,SAAO,KAAK;;;;;;;CAQd,sBAAgC;AAC9B,SAAO,KAAK;;;;;;;CAQd,eAAqB;AACnB,SAAO,KAAK;;;;;CAMd,UAAU,OAAuC;EAC/C,MAAM,UAAU,KAAK,KAAK,CAAC,UAAU;EACrC,MAAM,WAAW,MAAM,KAAK,CAAC,UAAU;AACvC,SAAO,QAAQ,cAAc,SAAS;;;;;;;;AAS1C,SAAS,iBAAiB,OAAwC;CAChE,MAAM,UAAU,MAAM,MAAM;AAC5B,KAAI,QAAQ,WAAW,EACrB,OAAM,IAAI,MAAM,2BAA2B;CAG7C,MAAM,KAAKA,2BAAG,aAAa,QAAQ;CACnC,MAAM,SAAS,GAAG,WAAW;AAC7B,KAAI,WAAW,SAAS,WAAW,WACjC,OAAM,IAAI,MAAM,wCAAwC,SAAS;CAGnE,MAAM,eAAe,GAAG,MAAM;CAE9B,IAAI;AACJ,KAAI;AACF,aAAWC,wBAAS,eAAe,aAAa;SAC1C;AACN,aAAWA,wBAAS,iBAAiB,aAAa;;CAGpD,MAAM,WAAWC,sBAAY,aAAa,UAAU,QAAWC,6BAAmB,UAAU;AAE5F,QAAO,CAAC,UAAU,SAAS;;;;;;;;;;;;;;;;;;;ACxG7B,SAAgB,WAAgC;AAC9C,QAAO,EAAE,MAAM,YAAY;;;;;AAM7B,SAAgB,SAAS,QAAqC;AAC5D,QAAO;EAAE,MAAM;EAAY;EAAQ;;;;;;;AAQrC,IAAa,YAAb,MAAa,UAAU;CACrB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CAEjB,AAAQ,YACN,WACA,QACA,SACA,MACA,YACA,YACA,SACA,qBACA;AACA,OAAK,aAAa;AAClB,OAAK,UAAU;AACf,OAAK,WAAW;AAChB,OAAK,QAAQ;AACb,OAAK,cAAc;AACnB,OAAK,cAAc;AACnB,OAAK,WAAW;AAChB,OAAK,uBAAuB;;;;;;;CAQ9B,OAAO,OACL,WACA,QACA,SACA,MACA,YACA,YACA,SACA,cACA,eACW;AACX,MAAI,aAAa,WAAW,cAAc,OACxC,OAAM,IAAI,MACR,2BAA2B,aAAa,OAAO,6CAA6C,cAAc,OAAO,GAClH;AAGH,MAAI,aAAa,EACf,OAAM,IAAI,MAAM,iCAAiC;EAGnD,MAAM,sBAAsB,aAAa,KAAK,UAAU,MACtD,uBAAuB,OAAO,UAAU,cAAc,GAAG,CAC1D;AAED,MAAI,aAAa,oBAAoB,OACnC,OAAM,IAAI,MAAM,mDAAmD;AAIrE,sBAAoB,MAAM,GAAG,MAAM,EAAE,UAAU,EAAE,CAAC;AAElD,SAAO,IAAI,UACT,WACA,QACA,SACA,MACA,YACA,YACA,SACA,oBACD;;CAGH,YAAkB;AAChB,SAAO,KAAK;;CAGd,SAAsB;AACpB,SAAO,KAAK;;CAGd,UAAgB;AACd,SAAO,KAAK;;CAGd,OAAa;AACX,SAAO,KAAK;;CAGd,aAAmB;AACjB,SAAO,KAAK;;CAGd,aAAqB;AACnB,SAAO,KAAK;;CAGd,UAAkB;AAChB,SAAO,KAAK;;CAGd,eAAyC;AACvC,SAAO,KAAK;;;;;;;CAQd,YAA2B;EACzB,IAAI,UAAUC,yBAAc,IAAI,aAAa,KAAK,WAAW,EAAE,KAAK,QAAQ,CAAC,CAC1E,cAAc,SAAS,KAAK,SAAS,CAAC,CACtC,cAAc,cAAc,OAAO,KAAK,YAAY,CAAC,CAAC,CACtD,cAAc,WAAW,KAAK,SAAS,CAAC,CACxC,SAAS,KAAK,MAAM,CAAC,CACrB,cAAc,cAAcC,qBAAS,aAAa,KAAK,YAAY,CAAC,CAAC;AAExE,OAAK,MAAM,eAAe,KAAK,cAAc,EAAE;GAC7C,MAAM,sBAAsB,YAAY,qBAAqB;GAC7D,MAAM,eAAe,YAAY,cAAc;GAC/C,MAAM,gBAAgB,YAAY,aAAa,CAAC,eAAe;AAE/D,OAAI,kBAAkB,OACpB,OAAM,IAAI,MAAM,iDAAiD;GAGnE,MAAM,wBAAwBC,wBAAS,IAAI,aAAa,CAAC,oBAAoB,CAAC,cAAc,CAAC;GAE7F,MAAM,sBAAsB,oBACzB,MAAM,CACN,aAAa,iBAAiB,sBAAsB;AAEvD,aAAU,QAAQ,cAAc,eAAe,oBAAoB;;AAGrE,SAAO;;;;;;;CAQT,qBAA+B;EAC7B,MAAM,UAAU,KAAK,WAAW;EAEhC,MAAM,oBADS,KAAK,QAAQ,CACK,sBAAsB;AAEvD,MAAI,sBAAsB,OACxB,OAAM,IAAI,MAAM,mDAAmD;AAGrE,SAAO,QAAQ,WACb,KAAK,YAAY,EACjB,mBACA,OACD;;;;;;;CAQH,aAAuB;EACrB,MAAM,UAAU,KAAK,WAAW;EAEhC,MAAM,oBADS,KAAK,QAAQ,CACK,sBAAsB;AAEvD,MAAI,sBAAsB,OACxB,OAAM,IAAI,MAAM,mDAAmD;EAGrE,MAAM,aAAa,KAAK,cAAc,CAAC,KAAK,MAAM,EAAE,aAAa,CAAC;AAElE,SAAO,QAAQ,wBAAwB,KAAK,YAAY,EAAE,mBAAmB,WAAW;;;;;;;;AAS5F,IAAa,gBAAb,MAAa,cAAc;CACzB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CACjB,AAAiB;CAEjB,AAAQ,YACN,cACA,YACA,QACA,WACA,kBACA,YACA,SACA,SACA;AACA,OAAK,gBAAgB;AACrB,OAAK,cAAc;AACnB,OAAK,UAAU;AACf,OAAK,aAAa;AAClB,OAAK,oBAAoB;AACzB,OAAK,cAAc;AACnB,OAAK,WAAW;AAChB,OAAK,WAAW;;CAGlB,eAAqB;AACnB,SAAO,KAAK;;CAGd,aAAmB;AACjB,SAAO,KAAK;;CAGd,SAAsB;AACpB,SAAO,KAAK;;CAGd,YAAkB;AAChB,SAAO,KAAK;;CAGd,mBAAyC;AACvC,SAAO,KAAK;;CAGd,aAAqB;AACnB,SAAO,KAAK;;CAGd,UAAkB;AAChB,SAAO,KAAK;;CAGd,UAAgB;AACd,SAAO,KAAK;;;;;;;CAQd,WAAW,UAA+B,WAAwC;EAChF,IAAI;AACJ,MAAI,SAAS,SAAS,WACpB,QAAOC,0BAAe,WAAW,KAAK,WAAW,EAAE,UAAU;MAE7D,QAAOA,0BAAe,WAAW,KAAK,WAAW,EAAE,UAAU,CAAC,UAAU,SAAS,OAAO;AAG1F,SAAO,KAAK,qBAAqB,KAAK,kBAAkB,CAAC;;;;;;;CAQ3D,WAAW,UAA+B,WAAkC;EAC1E,MAAM,cAAc,KAAK,WAAW,UAAU,UAAU;EACxD,MAAM,oBAAoB,UAAU,sBAAsB;AAE1D,MAAI,sBAAsB,OACxB,OAAM,IAAI,MAAM,6CAA6C;EAG/D,MAAM,aAAa,CAAC,KAAK,QAAQ,CAAC;AAElC,SAAO,YAAY,wBAAwB,KAAK,YAAY,EAAE,mBAAmB,WAAW;;;;;;;CAQ9F,OAAO,WACL,QACA,KACA,gBACA,WACe;EACf,MAAM,uBAAuB,UAAU,sBAAsB;AAE7D,MAAI,yBAAyB,OAC3B,OAAM,IAAI,MAAM,uDAAuD;EAGzE,MAAM,gBAAgBH,yBAAc,gBAClC,QACA,QACA,KACA,qBACD;AAED,MAAI,mBAAmB,UAAa,cAAc,QAAQ,CAAC,KAAK,KAAK,eAAe,KAAK,CACvF,OAAM,IAAI,MAAM,+CAA+C;AAGjE,MAAI,CAAC,cAAc,SAAS,CAAC,UAAU,CAAC,OAAOI,wBAAiB,WAAW,YAAY,CAAC,CACtF,OAAM,IAAI,MAAM,6BAA6B;EAG/C,MAAM,aAAa,cAAc,0BAAgC,aAAa;AAE9E,MAAI,cAAc,IAChB,OAAM,IAAI,MAAM,qBAAqB;EAGvC,MAAM,eAAe,UAAU,KAAK;EACpC,MAAM,aAAa,cAAc,0BAAkC,aAAa;EAChF,MAAM,UAAU,cAAc,0BAAkC,UAAU;EAC1E,MAAM,UAAU,cAAc,0BAAgC,QAAQ;EACtE,MAAM,qBAAqB,cAAc,oBAAoB,cAAc;AAE3E,MAAI,aAAa,EACf,OAAM,IAAI,MAAM,iCAAiC;AAGnD,MAAI,aAAa,mBAAmB,OAClC,OAAM,IAAI,MAAM,wCAAwC;AAG1D,OAAK,MAAM,eAAe,oBAAoB;GAC5C,MAAM,sBAAsB,YAAY,WAAW;AAOnD,OANoBC,sBAAY,aAC9B,qBACA,QACAC,6BAAmB,UACpB,CAEe,KAAK,KAAK,aACxB;AASF,UAAO,IAAI,cANmB,YAAY,mBAAmB,gBAAgB,CAC1B,mBAAmB,qBAAqB,CAC3C,gBAAgB,SAC9DC,sBAAK,eAAe,KAAK,CAC1B,EAIC,YACA,cAAc,QAAQ,EACtB,cAAc,SAAS,CAAC,IAAI,EAC5B,cAAc,kBAAkB,EAChC,YACA,SACA,QACD;;AAGH,QAAM,IAAI,MAAM,gCAAgC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"group-invite-Dz1Jmiky.d.cts","names":[],"sources":["../src/dkg/proposed-participant.ts","../src/dkg/group-invite.ts"],"mappings":";;;;;;;;;;;cAuBa,sBAAA;EAAA,iBACM,SAAA;EAAA,iBACA,SAAA;EAAA,iBACA,SAAA;EAAA,iBACA,aAAA;EAAA,QAEV,WAAA,CAAA;EAiBuC;;;;;EAAA,OAAvC,MAAA,CAAO,QAAA,UAAkB,YAAA,EAAc,IAAA,GAAO,sBAAA;EAmBtC;;;;;EATf,GAAA,CAAA,GAAO,GAAA;EA2CP;;;;;EAlCA,WAAA,CAAA,GAAe,WAAA;;;ACxCjB;;;EDiDE,aAAA,CAAA;ECjDkC;;;;;ED0DlC,mBAAA,CAAA,GAAuB,QAAA;ECrDD;;;;AAOxB;EDuDE,YAAA,CAAA,GAAgB,IAAA;;;;EAOhB,SAAA,CAAU,KAAA,EAAO,sBAAA;AAAA;;;;;;;;KC1EP,mBAAA;EAAwB,IAAA;AAAA;EAAuB,IAAA;EAAkB,MAAA;AAAA;;;;iBAK7D,QAAA,CAAA,GAAY,mBAAA;;;;iBAOZ,QAAA,CAAS,MAAA,WAAiB,mBAAA;;;;;;cAS7B,SAAA;EAAA,iBACM,UAAA;EAAA,iBACA,OAAA;EAAA,iBACA,QAAA;EAAA,iBACA,KAAA;EAAA,iBACA,WAAA;EAAA,iBACA,WAAA;EAAA,iBACA,QAAA;EAAA,iBACA,oBAAA;EAAA,QAEV,WAAA,CAAA;EA/BkD;;;;AAK3D;EAL2D,OAwDlD,MAAA,CACL,SAAA,EAAW,IAAA,EACX,MAAA,EAAQ,WAAA,EACR,OAAA,EAAS,IAAA,EACT,IAAA,EAAM,IAAA,EACN,UAAA,EAAY,IAAA,EACZ,UAAA,UACA,OAAA,UACA,YAAA,YACA,aAAA,EAAe,IAAA,KACd,SAAA;EAkCH,SAAA,CAAA,GAAa,IAAA;EAIb,MAAA,CAAA,GAAU,WAAA;EAIV,OAAA,CAAA,GAAW,IAAA;EAIX,IAAA,CAAA,GAAQ,IAAA;EAIR,UAAA,CAAA,GAAc,IAAA;EAId,UAAA,CAAA;EAIA,OAAA,CAAA;EAIA,YAAA,CAAA,GAAgB,sBAAA;EA3GL;;;;;EAoHX,SAAA,CAAA,GAAa,aAAA;EA7EL;;;;;EA+GR,kBAAA,CAAA,GAAsB,QAAA;EA/DX;;;;;EAoFX,UAAA,CAAA,GAAc,QAAA;AAAA;;;;;;cAoBH,aAAA;EAAA,iBACM,aAAA;EAAA,iBACA,WAAA;EAAA,iBACA,OAAA;EAAA,iBACA,UAAA;EAAA,iBACA,iBAAA;EAAA,iBACA,WAAA;EAAA,iBACA,QAAA;EAAA,iBACA,QAAA;EAAA,QAEV,WAAA,CAAA;EAoBP,YAAA,CAAA,GAAgB,IAAA;EAIhB,UAAA,CAAA,GAAc,IAAA;EAId,MAAA,CAAA,GAAU,WAAA;EAIV,SAAA,CAAA,GAAa,IAAA;EAIb,gBAAA,CAAA,GAAoB,QAAA;EAIpB,UAAA,CAAA;EAIA,OAAA,CAAA;EAIA,OAAA,CAAA,GAAW,IAAA;EA/MT;;;;;EAwNF,UAAA,CAAW,QAAA,EAAU,mBAAA,EAAqB,SAAA,EAAW,WAAA,GAAc,cAAA;EAnLtD;;;;;EAmMb,UAAA,CAAW,QAAA,EAAU,mBAAA,EAAqB,SAAA,EAAW,WAAA,GAAc,QAAA;EAvL3D;;;;;EAAA,OAyMD,UAAA,CACL,MAAA,EAAQ,QAAA,EACR,GAAA,EAAK,IAAA,EACL,cAAA,EAAgB,WAAA,cAChB,SAAA,EAAW,WAAA,GACV,aAAA;AAAA"}
|