@bsv/wallet-toolbox-client 1.1.62 → 1.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/src/CWIStyleWalletManager.d.ts +417 -0
- package/out/src/CWIStyleWalletManager.d.ts.map +1 -0
- package/out/src/CWIStyleWalletManager.js +1140 -0
- package/out/src/CWIStyleWalletManager.js.map +1 -0
- package/out/src/SimpleWalletManager.d.ts +169 -0
- package/out/src/SimpleWalletManager.d.ts.map +1 -0
- package/out/src/SimpleWalletManager.js +315 -0
- package/out/src/SimpleWalletManager.js.map +1 -0
- package/out/src/Wallet.d.ts +6 -1
- package/out/src/Wallet.d.ts.map +1 -1
- package/out/src/Wallet.js +39 -7
- package/out/src/Wallet.js.map +1 -1
- package/out/src/WalletAuthenticationManager.d.ts +33 -0
- package/out/src/WalletAuthenticationManager.d.ts.map +1 -0
- package/out/src/WalletAuthenticationManager.js +110 -0
- package/out/src/WalletAuthenticationManager.js.map +1 -0
- package/out/src/WalletPermissionsManager.d.ts +575 -0
- package/out/src/WalletPermissionsManager.d.ts.map +1 -0
- package/out/src/WalletPermissionsManager.js +1789 -0
- package/out/src/WalletPermissionsManager.js.map +1 -0
- package/out/src/WalletSettingsManager.d.ts +59 -0
- package/out/src/WalletSettingsManager.d.ts.map +1 -0
- package/out/src/WalletSettingsManager.js +189 -0
- package/out/src/WalletSettingsManager.js.map +1 -0
- package/out/src/index.client.d.ts +9 -0
- package/out/src/index.client.d.ts.map +1 -1
- package/out/src/index.client.js +9 -0
- package/out/src/index.client.js.map +1 -1
- package/out/src/sdk/CertOpsWallet.d.ts +7 -0
- package/out/src/sdk/CertOpsWallet.d.ts.map +1 -0
- package/out/src/sdk/CertOpsWallet.js +3 -0
- package/out/src/sdk/CertOpsWallet.js.map +1 -0
- package/out/src/sdk/index.d.ts +1 -1
- package/out/src/sdk/index.d.ts.map +1 -1
- package/out/src/sdk/index.js +1 -1
- package/out/src/sdk/index.js.map +1 -1
- package/out/src/sdk/validationHelpers.d.ts.map +1 -1
- package/out/src/sdk/validationHelpers.js +13 -12
- package/out/src/sdk/validationHelpers.js.map +1 -1
- package/out/src/signer/methods/proveCertificate.d.ts.map +1 -1
- package/out/src/signer/methods/proveCertificate.js +3 -19
- package/out/src/signer/methods/proveCertificate.js.map +1 -1
- package/out/src/storage/remoting/StorageClient.d.ts +2 -2
- package/out/src/storage/remoting/StorageClient.d.ts.map +1 -1
- package/out/src/storage/remoting/StorageClient.js +1 -1
- package/out/src/storage/remoting/StorageClient.js.map +1 -1
- package/out/src/utility/identityUtils.d.ts +31 -0
- package/out/src/utility/identityUtils.d.ts.map +1 -0
- package/out/src/utility/identityUtils.js +116 -0
- package/out/src/utility/identityUtils.js.map +1 -0
- package/out/src/wab-client/WABClient.d.ts +49 -0
- package/out/src/wab-client/WABClient.d.ts.map +1 -0
- package/out/src/wab-client/WABClient.js +83 -0
- package/out/src/wab-client/WABClient.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts +34 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js +16 -0
- package/out/src/wab-client/auth-method-interactors/AuthMethodInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts +7 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js +36 -0
- package/out/src/wab-client/auth-method-interactors/PersonaIDInteractor.js.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts +28 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.d.ts.map +1 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js +69 -0
- package/out/src/wab-client/auth-method-interactors/TwilioPhoneInteractor.js.map +1 -0
- package/package.json +2 -2
- package/out/src/sdk/CertOps.d.ts +0 -66
- package/out/src/sdk/CertOps.d.ts.map +0 -1
- package/out/src/sdk/CertOps.js +0 -190
- package/out/src/sdk/CertOps.js.map +0 -1
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"PersonaIDInteractor.d.ts","sourceRoot":"","sources":["../../../../../src/wab-client/auth-method-interactors/PersonaIDInteractor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,oBAAoB,EAAE,WAAW,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAA;AAEnH,qBAAa,mBAAoB,SAAQ,oBAAoB;IACpD,UAAU,SAAc;IAElB,SAAS,CAAC,SAAS,EAAE,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,OAAO,EAAE,WAAW,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAavG,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,eAAe,EAAE,MAAM,EACvB,OAAO,EAAE,WAAW,GACnB,OAAO,CAAC,oBAAoB,CAAC;CAYjC"}
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.PersonaIDInteractor = void 0;
|
|
4
|
+
const AuthMethodInteractor_1 = require("./AuthMethodInteractor");
|
|
5
|
+
class PersonaIDInteractor extends AuthMethodInteractor_1.AuthMethodInteractor {
|
|
6
|
+
constructor() {
|
|
7
|
+
super(...arguments);
|
|
8
|
+
this.methodType = 'PersonaID';
|
|
9
|
+
}
|
|
10
|
+
async startAuth(serverUrl, presentationKey, payload) {
|
|
11
|
+
const res = await fetch(`${serverUrl}/auth/start`, {
|
|
12
|
+
method: 'POST',
|
|
13
|
+
headers: { 'Content-Type': 'application/json' },
|
|
14
|
+
body: JSON.stringify({
|
|
15
|
+
methodType: this.methodType,
|
|
16
|
+
presentationKey,
|
|
17
|
+
payload
|
|
18
|
+
})
|
|
19
|
+
});
|
|
20
|
+
return res.json();
|
|
21
|
+
}
|
|
22
|
+
async completeAuth(serverUrl, presentationKey, payload) {
|
|
23
|
+
const res = await fetch(`${serverUrl}/auth/complete`, {
|
|
24
|
+
method: 'POST',
|
|
25
|
+
headers: { 'Content-Type': 'application/json' },
|
|
26
|
+
body: JSON.stringify({
|
|
27
|
+
methodType: this.methodType,
|
|
28
|
+
presentationKey,
|
|
29
|
+
payload
|
|
30
|
+
})
|
|
31
|
+
});
|
|
32
|
+
return res.json();
|
|
33
|
+
}
|
|
34
|
+
}
|
|
35
|
+
exports.PersonaIDInteractor = PersonaIDInteractor;
|
|
36
|
+
//# sourceMappingURL=PersonaIDInteractor.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"PersonaIDInteractor.js","sourceRoot":"","sources":["../../../../../src/wab-client/auth-method-interactors/PersonaIDInteractor.ts"],"names":[],"mappings":";;;AAAA,iEAAmH;AAEnH,MAAa,mBAAoB,SAAQ,2CAAoB;IAA7D;;QACS,eAAU,GAAG,WAAW,CAAA;IA+BjC,CAAC;IA7BQ,KAAK,CAAC,SAAS,CAAC,SAAiB,EAAE,eAAuB,EAAE,OAAoB;QACrF,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,SAAS,aAAa,EAAE;YACjD,MAAM,EAAE,MAAM;YACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;YAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;gBACnB,UAAU,EAAE,IAAI,CAAC,UAAU;gBAC3B,eAAe;gBACf,OAAO;aACR,CAAC;SACH,CAAC,CAAA;QACF,OAAO,GAAG,CAAC,IAAI,EAAE,CAAA;IACnB,CAAC;IAEM,KAAK,CAAC,YAAY,CACvB,SAAiB,EACjB,eAAuB,EACvB,OAAoB;QAEpB,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,SAAS,gBAAgB,EAAE;YACpD,MAAM,EAAE,MAAM;YACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;YAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;gBACnB,UAAU,EAAE,IAAI,CAAC,UAAU;gBAC3B,eAAe;gBACf,OAAO;aACR,CAAC;SACH,CAAC,CAAA;QACF,OAAO,GAAG,CAAC,IAAI,EAAE,CAAA;IACnB,CAAC;CACF;AAhCD,kDAgCC"}
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
import { AuthMethodInteractor, AuthPayload, StartAuthResponse, CompleteAuthResponse } from './AuthMethodInteractor';
|
|
2
|
+
/**
|
|
3
|
+
* TwilioPhoneInteractor
|
|
4
|
+
*
|
|
5
|
+
* A client-side class that knows how to call the WAB server for Twilio-based phone verification.
|
|
6
|
+
*/
|
|
7
|
+
export declare class TwilioPhoneInteractor extends AuthMethodInteractor {
|
|
8
|
+
methodType: string;
|
|
9
|
+
/**
|
|
10
|
+
* Start the Twilio phone verification on the server.
|
|
11
|
+
* - The server will send an SMS code to the user’s phone, using Twilio Verify.
|
|
12
|
+
* @param serverUrl - The base URL of the WAB server (e.g. http://localhost:3000)
|
|
13
|
+
* @param presentationKey - The 256-bit key the client is attempting to authenticate with
|
|
14
|
+
* @param payload - { phoneNumber: string } (the phone number to verify)
|
|
15
|
+
* @returns - { success, message, data }
|
|
16
|
+
*/
|
|
17
|
+
startAuth(serverUrl: string, presentationKey: string, payload: AuthPayload): Promise<StartAuthResponse>;
|
|
18
|
+
/**
|
|
19
|
+
* Complete the Twilio phone verification on the server.
|
|
20
|
+
* - The server will verify the code with Twilio Verify’s verificationChecks endpoint.
|
|
21
|
+
* @param serverUrl - The base URL of the WAB server
|
|
22
|
+
* @param presentationKey - The 256-bit key
|
|
23
|
+
* @param payload - { phoneNumber: string, otp: string } (the code that was received via SMS)
|
|
24
|
+
* @returns - { success, message, presentationKey }
|
|
25
|
+
*/
|
|
26
|
+
completeAuth(serverUrl: string, presentationKey: string, payload: AuthPayload): Promise<CompleteAuthResponse>;
|
|
27
|
+
}
|
|
28
|
+
//# sourceMappingURL=TwilioPhoneInteractor.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwilioPhoneInteractor.d.ts","sourceRoot":"","sources":["../../../../../src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,oBAAoB,EAAE,WAAW,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAA;AAEnH;;;;GAIG;AACH,qBAAa,qBAAsB,SAAQ,oBAAoB;IACtD,UAAU,SAAgB;IAEjC;;;;;;;OAOG;IACU,SAAS,CAAC,SAAS,EAAE,MAAM,EAAE,eAAe,EAAE,MAAM,EAAE,OAAO,EAAE,WAAW,GAAG,OAAO,CAAC,iBAAiB,CAAC;IAqBpH;;;;;;;OAOG;IACU,YAAY,CACvB,SAAS,EAAE,MAAM,EACjB,eAAe,EAAE,MAAM,EACvB,OAAO,EAAE,WAAW,GACnB,OAAO,CAAC,oBAAoB,CAAC;CAoBjC"}
|
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.TwilioPhoneInteractor = void 0;
|
|
4
|
+
const AuthMethodInteractor_1 = require("./AuthMethodInteractor");
|
|
5
|
+
/**
|
|
6
|
+
* TwilioPhoneInteractor
|
|
7
|
+
*
|
|
8
|
+
* A client-side class that knows how to call the WAB server for Twilio-based phone verification.
|
|
9
|
+
*/
|
|
10
|
+
class TwilioPhoneInteractor extends AuthMethodInteractor_1.AuthMethodInteractor {
|
|
11
|
+
constructor() {
|
|
12
|
+
super(...arguments);
|
|
13
|
+
this.methodType = 'TwilioPhone';
|
|
14
|
+
}
|
|
15
|
+
/**
|
|
16
|
+
* Start the Twilio phone verification on the server.
|
|
17
|
+
* - The server will send an SMS code to the user’s phone, using Twilio Verify.
|
|
18
|
+
* @param serverUrl - The base URL of the WAB server (e.g. http://localhost:3000)
|
|
19
|
+
* @param presentationKey - The 256-bit key the client is attempting to authenticate with
|
|
20
|
+
* @param payload - { phoneNumber: string } (the phone number to verify)
|
|
21
|
+
* @returns - { success, message, data }
|
|
22
|
+
*/
|
|
23
|
+
async startAuth(serverUrl, presentationKey, payload) {
|
|
24
|
+
const res = await fetch(`${serverUrl}/auth/start`, {
|
|
25
|
+
method: 'POST',
|
|
26
|
+
headers: { 'Content-Type': 'application/json' },
|
|
27
|
+
body: JSON.stringify({
|
|
28
|
+
methodType: this.methodType,
|
|
29
|
+
presentationKey,
|
|
30
|
+
payload
|
|
31
|
+
})
|
|
32
|
+
});
|
|
33
|
+
if (!res.ok) {
|
|
34
|
+
return {
|
|
35
|
+
success: false,
|
|
36
|
+
message: `HTTP error ${res.status}`
|
|
37
|
+
};
|
|
38
|
+
}
|
|
39
|
+
return res.json();
|
|
40
|
+
}
|
|
41
|
+
/**
|
|
42
|
+
* Complete the Twilio phone verification on the server.
|
|
43
|
+
* - The server will verify the code with Twilio Verify’s verificationChecks endpoint.
|
|
44
|
+
* @param serverUrl - The base URL of the WAB server
|
|
45
|
+
* @param presentationKey - The 256-bit key
|
|
46
|
+
* @param payload - { phoneNumber: string, otp: string } (the code that was received via SMS)
|
|
47
|
+
* @returns - { success, message, presentationKey }
|
|
48
|
+
*/
|
|
49
|
+
async completeAuth(serverUrl, presentationKey, payload) {
|
|
50
|
+
const res = await fetch(`${serverUrl}/auth/complete`, {
|
|
51
|
+
method: 'POST',
|
|
52
|
+
headers: { 'Content-Type': 'application/json' },
|
|
53
|
+
body: JSON.stringify({
|
|
54
|
+
methodType: this.methodType,
|
|
55
|
+
presentationKey,
|
|
56
|
+
payload
|
|
57
|
+
})
|
|
58
|
+
});
|
|
59
|
+
if (!res.ok) {
|
|
60
|
+
return {
|
|
61
|
+
success: false,
|
|
62
|
+
message: `HTTP error ${res.status}`
|
|
63
|
+
};
|
|
64
|
+
}
|
|
65
|
+
return res.json();
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
exports.TwilioPhoneInteractor = TwilioPhoneInteractor;
|
|
69
|
+
//# sourceMappingURL=TwilioPhoneInteractor.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"TwilioPhoneInteractor.js","sourceRoot":"","sources":["../../../../../src/wab-client/auth-method-interactors/TwilioPhoneInteractor.ts"],"names":[],"mappings":";;;AAAA,iEAAmH;AAEnH;;;;GAIG;AACH,MAAa,qBAAsB,SAAQ,2CAAoB;IAA/D;;QACS,eAAU,GAAG,aAAa,CAAA;IA+DnC,CAAC;IA7DC;;;;;;;OAOG;IACI,KAAK,CAAC,SAAS,CAAC,SAAiB,EAAE,eAAuB,EAAE,OAAoB;QACrF,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,SAAS,aAAa,EAAE;YACjD,MAAM,EAAE,MAAM;YACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;YAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;gBACnB,UAAU,EAAE,IAAI,CAAC,UAAU;gBAC3B,eAAe;gBACf,OAAO;aACR,CAAC;SACH,CAAC,CAAA;QAEF,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,CAAC;YACZ,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,cAAc,GAAG,CAAC,MAAM,EAAE;aACpC,CAAA;QACH,CAAC;QAED,OAAO,GAAG,CAAC,IAAI,EAAE,CAAA;IACnB,CAAC;IAED;;;;;;;OAOG;IACI,KAAK,CAAC,YAAY,CACvB,SAAiB,EACjB,eAAuB,EACvB,OAAoB;QAEpB,MAAM,GAAG,GAAG,MAAM,KAAK,CAAC,GAAG,SAAS,gBAAgB,EAAE;YACpD,MAAM,EAAE,MAAM;YACd,OAAO,EAAE,EAAE,cAAc,EAAE,kBAAkB,EAAE;YAC/C,IAAI,EAAE,IAAI,CAAC,SAAS,CAAC;gBACnB,UAAU,EAAE,IAAI,CAAC,UAAU;gBAC3B,eAAe;gBACf,OAAO;aACR,CAAC;SACH,CAAC,CAAA;QAEF,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,CAAC;YACZ,OAAO;gBACL,OAAO,EAAE,KAAK;gBACd,OAAO,EAAE,cAAc,GAAG,CAAC,MAAM,EAAE;aACpC,CAAA;QACH,CAAC;QAED,OAAO,GAAG,CAAC,IAAI,EAAE,CAAA;IACnB,CAAC;CACF;AAhED,sDAgEC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@bsv/wallet-toolbox-client",
|
|
3
|
-
"version": "1.
|
|
3
|
+
"version": "1.2.2",
|
|
4
4
|
"description": "Client only Wallet Storage",
|
|
5
5
|
"main": "./out/src/index.client.js",
|
|
6
6
|
"types": "./out/src/index.client.d.ts",
|
|
@@ -20,7 +20,7 @@
|
|
|
20
20
|
},
|
|
21
21
|
"homepage": "https://github.com/bitcoin-sv/wallet-toolbox#readme",
|
|
22
22
|
"dependencies": {
|
|
23
|
-
"@bsv/sdk": "^1.
|
|
23
|
+
"@bsv/sdk": "^1.4.0",
|
|
24
24
|
"axios": "^0.29.0"
|
|
25
25
|
}
|
|
26
26
|
}
|
package/out/src/sdk/CertOps.d.ts
DELETED
|
@@ -1,66 +0,0 @@
|
|
|
1
|
-
import { Base64String, Certificate as BsvCertificate, CertificateFieldNameUnder50Bytes, GetPublicKeyArgs, GetPublicKeyResult, OriginatorDomainNameStringUnder250Bytes, PubKeyHex, WalletCertificate, WalletDecryptArgs, WalletDecryptResult, WalletEncryptArgs, WalletEncryptResult, WalletProtocol } from '@bsv/sdk';
|
|
2
|
-
export interface CertOpsWallet {
|
|
3
|
-
getPublicKey(args: GetPublicKeyArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<GetPublicKeyResult>;
|
|
4
|
-
encrypt(args: WalletEncryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletEncryptResult>;
|
|
5
|
-
decrypt(args: WalletDecryptArgs, originator?: OriginatorDomainNameStringUnder250Bytes): Promise<WalletDecryptResult>;
|
|
6
|
-
}
|
|
7
|
-
export declare class CertOps extends BsvCertificate {
|
|
8
|
-
wallet: CertOpsWallet;
|
|
9
|
-
_keyring?: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
10
|
-
_encryptedFields?: Record<CertificateFieldNameUnder50Bytes, Base64String>;
|
|
11
|
-
_decryptedFields?: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
12
|
-
constructor(wallet: CertOpsWallet, wc: WalletCertificate);
|
|
13
|
-
static fromCounterparty(wallet: CertOpsWallet, e: {
|
|
14
|
-
certificate: WalletCertificate;
|
|
15
|
-
keyring: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
16
|
-
counterparty: PubKeyHex;
|
|
17
|
-
}): Promise<CertOps>;
|
|
18
|
-
static fromCertifier(wallet: CertOpsWallet, e: {
|
|
19
|
-
certificate: WalletCertificate;
|
|
20
|
-
keyring: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
21
|
-
}): Promise<CertOps>;
|
|
22
|
-
static fromEncrypted(wallet: CertOpsWallet, wc: WalletCertificate, keyring: Record<CertificateFieldNameUnder50Bytes, string>): Promise<CertOps>;
|
|
23
|
-
static fromDecrypted(wallet: CertOpsWallet, wc: WalletCertificate): Promise<CertOps>;
|
|
24
|
-
static copyFields<T>(fields: Record<CertificateFieldNameUnder50Bytes, T>): Record<CertificateFieldNameUnder50Bytes, T>;
|
|
25
|
-
static getProtocolForCertificateFieldEncryption(serialNumber: string, fieldName: string): {
|
|
26
|
-
protocolID: WalletProtocol;
|
|
27
|
-
keyID: string;
|
|
28
|
-
};
|
|
29
|
-
exportForSubject(): {
|
|
30
|
-
certificate: WalletCertificate;
|
|
31
|
-
keyring: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
32
|
-
};
|
|
33
|
-
toWalletCertificate(): WalletCertificate;
|
|
34
|
-
encryptFields(counterparty?: 'self' | PubKeyHex): Promise<{
|
|
35
|
-
fields: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
36
|
-
keyring: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
37
|
-
}>;
|
|
38
|
-
decryptFields(counterparty?: PubKeyHex, keyring?: Record<CertificateFieldNameUnder50Bytes, string>): Promise<Record<CertificateFieldNameUnder50Bytes, string>>;
|
|
39
|
-
exportForCounterparty(
|
|
40
|
-
/** The incoming counterparty is who they are to us. */
|
|
41
|
-
counterparty: PubKeyHex, fieldsToReveal: CertificateFieldNameUnder50Bytes[]): Promise<{
|
|
42
|
-
certificate: WalletCertificate;
|
|
43
|
-
keyring: Record<CertificateFieldNameUnder50Bytes, string>;
|
|
44
|
-
counterparty: PubKeyHex;
|
|
45
|
-
}>;
|
|
46
|
-
/**
|
|
47
|
-
* Creates a verifiable certificate structure for a specific verifier, allowing them access to specified fields.
|
|
48
|
-
* This method decrypts the master field keys for each field specified in `fieldsToReveal` and re-encrypts them
|
|
49
|
-
* for the verifier's identity key. The resulting certificate structure includes only the fields intended to be
|
|
50
|
-
* revealed and a verifier-specific keyring for field decryption.
|
|
51
|
-
*
|
|
52
|
-
* @param {PubKeyHex} verifierIdentityKey - The public identity key of the verifier who will receive access to the specified fields.
|
|
53
|
-
* @param {CertificateFieldNameUnder50Bytes[]} fieldsToReveal - An array of field names to be revealed to the verifier. Must be a subset of the certificate's fields.
|
|
54
|
-
* @returns {Promise<Record<CertificateFieldNameUnder50Bytes[], Base64String>} - A new certificate structure containing the original encrypted fields, the verifier-specific field decryption keyring, and essential certificate metadata.
|
|
55
|
-
* @throws {WERR_INVALID_PARAMETER} Throws an error if:
|
|
56
|
-
* - fieldsToReveal is empty or a field in `fieldsToReveal` does not exist in the certificate.
|
|
57
|
-
* - The decrypted master field key fails to decrypt the corresponding field (indicating an invalid key).
|
|
58
|
-
*/
|
|
59
|
-
createKeyringForVerifier(verifierIdentityKey: PubKeyHex, fieldsToReveal: CertificateFieldNameUnder50Bytes[]): Promise<Record<CertificateFieldNameUnder50Bytes, Base64String>>;
|
|
60
|
-
/**
|
|
61
|
-
* encrypt plaintext field values for the subject
|
|
62
|
-
* update the signature using the certifier's private key.
|
|
63
|
-
*/
|
|
64
|
-
encryptAndSignNewCertificate(): Promise<void>;
|
|
65
|
-
}
|
|
66
|
-
//# sourceMappingURL=CertOps.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"CertOps.d.ts","sourceRoot":"","sources":["../../../../src/sdk/CertOps.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,YAAY,EACZ,WAAW,IAAI,cAAc,EAC7B,gCAAgC,EAChC,gBAAgB,EAChB,kBAAkB,EAClB,uCAAuC,EACvC,SAAS,EACT,iBAAiB,EACjB,iBAAiB,EACjB,mBAAmB,EACnB,iBAAiB,EACjB,mBAAmB,EAEnB,cAAc,EACf,MAAM,UAAU,CAAA;AAKjB,MAAM,WAAW,aAAa;IAC5B,YAAY,CACV,IAAI,EAAE,gBAAgB,EACtB,UAAU,CAAC,EAAE,uCAAuC,GACnD,OAAO,CAAC,kBAAkB,CAAC,CAAA;IAC9B,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;IACpH,OAAO,CAAC,IAAI,EAAE,iBAAiB,EAAE,UAAU,CAAC,EAAE,uCAAuC,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAAA;CACrH;AAED,qBAAa,OAAQ,SAAQ,cAAc;IAMhC,MAAM,EAAE,aAAa;IAL9B,QAAQ,CAAC,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;IAC3D,gBAAgB,CAAC,EAAE,MAAM,CAAC,gCAAgC,EAAE,YAAY,CAAC,CAAA;IACzE,gBAAgB,CAAC,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;gBAG1D,MAAM,EAAE,aAAa,EAC5B,EAAE,EAAE,iBAAiB;WAKV,gBAAgB,CAC3B,MAAM,EAAE,aAAa,EACrB,CAAC,EAAE;QACD,WAAW,EAAE,iBAAiB,CAAA;QAC9B,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;QACzD,YAAY,EAAE,SAAS,CAAA;KACxB,GACA,OAAO,CAAC,OAAO,CAAC;WAUN,aAAa,CACxB,MAAM,EAAE,aAAa,EACrB,CAAC,EAAE;QACD,WAAW,EAAE,iBAAiB,CAAA;QAC9B,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;KAC1D,GACA,OAAO,CAAC,OAAO,CAAC;WAON,aAAa,CACxB,MAAM,EAAE,aAAa,EACrB,EAAE,EAAE,iBAAiB,EACrB,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,GACxD,OAAO,CAAC,OAAO,CAAC;WASN,aAAa,CAAC,MAAM,EAAE,aAAa,EAAE,EAAE,EAAE,iBAAiB,GAAG,OAAO,CAAC,OAAO,CAAC;IAO1F,MAAM,CAAC,UAAU,CAAC,CAAC,EACjB,MAAM,EAAE,MAAM,CAAC,gCAAgC,EAAE,CAAC,CAAC,GAClD,MAAM,CAAC,gCAAgC,EAAE,CAAC,CAAC;IAM9C,MAAM,CAAC,wCAAwC,CAC7C,YAAY,EAAE,MAAM,EACpB,SAAS,EAAE,MAAM,GAChB;QAAE,UAAU,EAAE,cAAc,CAAC;QAAC,KAAK,EAAE,MAAM,CAAA;KAAE;IAOhD,gBAAgB,IAAI;QAClB,WAAW,EAAE,iBAAiB,CAAA;QAC9B,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;KAC1D;IAQD,mBAAmB,IAAI,iBAAiB;IAQlC,aAAa,CAAC,YAAY,GAAE,MAAM,GAAG,SAAkB,GAAG,OAAO,CAAC;QACtE,MAAM,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;QACxD,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;KAC1D,CAAC;IAuBI,aAAa,CACjB,YAAY,CAAC,EAAE,SAAS,EACxB,OAAO,CAAC,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,GACzD,OAAO,CAAC,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAC;IA2BtD,qBAAqB;IACzB,uDAAuD;IACvD,YAAY,EAAE,SAAS,EACvB,cAAc,EAAE,gCAAgC,EAAE,GACjD,OAAO,CAAC;QACT,WAAW,EAAE,iBAAiB,CAAA;QAC9B,OAAO,EAAE,MAAM,CAAC,gCAAgC,EAAE,MAAM,CAAC,CAAA;QACzD,YAAY,EAAE,SAAS,CAAA;KACxB,CAAC;IAaF;;;;;;;;;;;;OAYG;IACG,wBAAwB,CAC5B,mBAAmB,EAAE,SAAS,EAC9B,cAAc,EAAE,gCAAgC,EAAE,GACjD,OAAO,CAAC,MAAM,CAAC,gCAAgC,EAAE,YAAY,CAAC,CAAC;IAuClE;;;OAGG;IACG,4BAA4B,IAAI,OAAO,CAAC,IAAI,CAAC;CASpD"}
|
package/out/src/sdk/CertOps.js
DELETED
|
@@ -1,190 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.CertOps = void 0;
|
|
4
|
-
const sdk_1 = require("@bsv/sdk");
|
|
5
|
-
const index_client_1 = require("../index.client");
|
|
6
|
-
const sdk_2 = require("@bsv/sdk");
|
|
7
|
-
const WERR_errors_1 = require("./WERR_errors");
|
|
8
|
-
class CertOps extends sdk_1.Certificate {
|
|
9
|
-
constructor(wallet, wc) {
|
|
10
|
-
super(wc.type, wc.serialNumber, wc.subject, wc.certifier, wc.revocationOutpoint, wc.fields, wc.signature);
|
|
11
|
-
this.wallet = wallet;
|
|
12
|
-
}
|
|
13
|
-
static async fromCounterparty(wallet, e) {
|
|
14
|
-
const c = new CertOps(wallet, e.certificate);
|
|
15
|
-
// confirm cert verifies and decrypts.
|
|
16
|
-
await c.verify();
|
|
17
|
-
await c.decryptFields(e.counterparty, e.keyring);
|
|
18
|
-
// un-decrypt
|
|
19
|
-
c.fields = c._encryptedFields;
|
|
20
|
-
return c;
|
|
21
|
-
}
|
|
22
|
-
static async fromCertifier(wallet, e) {
|
|
23
|
-
return await CertOps.fromCounterparty(wallet, {
|
|
24
|
-
counterparty: e.certificate.certifier,
|
|
25
|
-
...e
|
|
26
|
-
});
|
|
27
|
-
}
|
|
28
|
-
static async fromEncrypted(wallet, wc, keyring) {
|
|
29
|
-
const c = new CertOps(wallet, wc);
|
|
30
|
-
c._keyring = keyring;
|
|
31
|
-
c._encryptedFields = this.copyFields(c.fields);
|
|
32
|
-
c._decryptedFields = await c.decryptFields();
|
|
33
|
-
await c.verify();
|
|
34
|
-
return c;
|
|
35
|
-
}
|
|
36
|
-
static async fromDecrypted(wallet, wc) {
|
|
37
|
-
const c = new CertOps(wallet, wc);
|
|
38
|
-
({ fields: c._encryptedFields, keyring: c._keyring } = await c.encryptFields());
|
|
39
|
-
c._decryptedFields = await c.decryptFields();
|
|
40
|
-
return c;
|
|
41
|
-
}
|
|
42
|
-
static copyFields(fields) {
|
|
43
|
-
const copy = {};
|
|
44
|
-
for (const [n, v] of Object.entries(fields))
|
|
45
|
-
copy[n] = v;
|
|
46
|
-
return copy;
|
|
47
|
-
}
|
|
48
|
-
static getProtocolForCertificateFieldEncryption(serialNumber, fieldName) {
|
|
49
|
-
return {
|
|
50
|
-
protocolID: [2, 'certificate field encryption'],
|
|
51
|
-
keyID: `${serialNumber} ${fieldName}`
|
|
52
|
-
};
|
|
53
|
-
}
|
|
54
|
-
exportForSubject() {
|
|
55
|
-
if (!this._keyring || !this._encryptedFields || !this.signature || this.signature.length === 0)
|
|
56
|
-
throw new WERR_errors_1.WERR_INVALID_OPERATION(`Certificate must be encrypted and signed prior to export.`);
|
|
57
|
-
const certificate = this.toWalletCertificate();
|
|
58
|
-
const keyring = this._keyring;
|
|
59
|
-
return { certificate, keyring };
|
|
60
|
-
}
|
|
61
|
-
toWalletCertificate() {
|
|
62
|
-
const wc = {
|
|
63
|
-
signature: '',
|
|
64
|
-
...this
|
|
65
|
-
};
|
|
66
|
-
return wc;
|
|
67
|
-
}
|
|
68
|
-
async encryptFields(counterparty = 'self') {
|
|
69
|
-
const fields = this._decryptedFields || this.fields;
|
|
70
|
-
const encryptedFields = {};
|
|
71
|
-
const keyring = {};
|
|
72
|
-
for (const fieldName of Object.keys(fields)) {
|
|
73
|
-
const fieldSymmetricKey = sdk_2.SymmetricKey.fromRandom();
|
|
74
|
-
const encryptedFieldValue = fieldSymmetricKey.encrypt(sdk_2.Utils.toArray(this.fields[fieldName], 'utf8'));
|
|
75
|
-
encryptedFields[fieldName] = sdk_2.Utils.toBase64(encryptedFieldValue);
|
|
76
|
-
const encryptedFieldKey = await this.wallet.encrypt({
|
|
77
|
-
plaintext: fieldSymmetricKey.toArray(),
|
|
78
|
-
counterparty,
|
|
79
|
-
...CertOps.getProtocolForCertificateFieldEncryption(this.serialNumber, fieldName)
|
|
80
|
-
});
|
|
81
|
-
keyring[fieldName] = sdk_2.Utils.toBase64(encryptedFieldKey.ciphertext);
|
|
82
|
-
}
|
|
83
|
-
this._keyring = keyring;
|
|
84
|
-
this._decryptedFields = fields;
|
|
85
|
-
this.fields = this._encryptedFields = encryptedFields;
|
|
86
|
-
return { fields: encryptedFields, keyring };
|
|
87
|
-
}
|
|
88
|
-
async decryptFields(counterparty, keyring) {
|
|
89
|
-
keyring || (keyring = this._keyring);
|
|
90
|
-
const fields = this._encryptedFields || this.fields;
|
|
91
|
-
const decryptedFields = {};
|
|
92
|
-
if (!keyring)
|
|
93
|
-
throw new index_client_1.sdk.WERR_INVALID_PARAMETER('keyring', 'valid');
|
|
94
|
-
try {
|
|
95
|
-
for (const fieldName of Object.keys(keyring)) {
|
|
96
|
-
const { plaintext: fieldRevelationKey } = await this.wallet.decrypt({
|
|
97
|
-
ciphertext: sdk_2.Utils.toArray(keyring[fieldName], 'base64'),
|
|
98
|
-
counterparty: counterparty || this.subject,
|
|
99
|
-
...CertOps.getProtocolForCertificateFieldEncryption(this.serialNumber, fieldName)
|
|
100
|
-
});
|
|
101
|
-
const fieldValue = new sdk_2.SymmetricKey(fieldRevelationKey).decrypt(sdk_2.Utils.toArray(fields[fieldName], 'base64'));
|
|
102
|
-
decryptedFields[fieldName] = sdk_2.Utils.toUTF8(fieldValue);
|
|
103
|
-
}
|
|
104
|
-
this._keyring = keyring;
|
|
105
|
-
this._encryptedFields = fields;
|
|
106
|
-
this.fields = this._decryptedFields = decryptedFields;
|
|
107
|
-
return decryptedFields;
|
|
108
|
-
}
|
|
109
|
-
catch (eu) {
|
|
110
|
-
const e = index_client_1.sdk.WalletError.fromUnknown(eu);
|
|
111
|
-
throw e;
|
|
112
|
-
}
|
|
113
|
-
}
|
|
114
|
-
async exportForCounterparty(
|
|
115
|
-
/** The incoming counterparty is who they are to us. */
|
|
116
|
-
counterparty, fieldsToReveal) {
|
|
117
|
-
if (!this._keyring || !this._encryptedFields || !this.signature || this.signature.length === 0)
|
|
118
|
-
throw new WERR_errors_1.WERR_INVALID_OPERATION(`Certificate must be encrypted and signed prior to export.`);
|
|
119
|
-
const certificate = this.toWalletCertificate();
|
|
120
|
-
const keyring = await this.createKeyringForVerifier(counterparty, fieldsToReveal);
|
|
121
|
-
// The exported counterparty is who we are to them...
|
|
122
|
-
return {
|
|
123
|
-
certificate,
|
|
124
|
-
keyring,
|
|
125
|
-
counterparty: await (0, index_client_1.getIdentityKey)(this.wallet)
|
|
126
|
-
};
|
|
127
|
-
}
|
|
128
|
-
/**
|
|
129
|
-
* Creates a verifiable certificate structure for a specific verifier, allowing them access to specified fields.
|
|
130
|
-
* This method decrypts the master field keys for each field specified in `fieldsToReveal` and re-encrypts them
|
|
131
|
-
* for the verifier's identity key. The resulting certificate structure includes only the fields intended to be
|
|
132
|
-
* revealed and a verifier-specific keyring for field decryption.
|
|
133
|
-
*
|
|
134
|
-
* @param {PubKeyHex} verifierIdentityKey - The public identity key of the verifier who will receive access to the specified fields.
|
|
135
|
-
* @param {CertificateFieldNameUnder50Bytes[]} fieldsToReveal - An array of field names to be revealed to the verifier. Must be a subset of the certificate's fields.
|
|
136
|
-
* @returns {Promise<Record<CertificateFieldNameUnder50Bytes[], Base64String>} - A new certificate structure containing the original encrypted fields, the verifier-specific field decryption keyring, and essential certificate metadata.
|
|
137
|
-
* @throws {WERR_INVALID_PARAMETER} Throws an error if:
|
|
138
|
-
* - fieldsToReveal is empty or a field in `fieldsToReveal` does not exist in the certificate.
|
|
139
|
-
* - The decrypted master field key fails to decrypt the corresponding field (indicating an invalid key).
|
|
140
|
-
*/
|
|
141
|
-
async createKeyringForVerifier(verifierIdentityKey, fieldsToReveal) {
|
|
142
|
-
if (!this._keyring || !this._encryptedFields)
|
|
143
|
-
throw new index_client_1.sdk.WERR_INVALID_OPERATION(`certificate must be encrypted`);
|
|
144
|
-
if (!Array.isArray(fieldsToReveal) || fieldsToReveal.some(n => this._encryptedFields[n] === undefined))
|
|
145
|
-
throw new index_client_1.sdk.WERR_INVALID_PARAMETER('fieldsToReveal', `an array of certificate field names`);
|
|
146
|
-
const fieldRevelationKeyring = {};
|
|
147
|
-
for (const fieldName of fieldsToReveal) {
|
|
148
|
-
// Create a keyID
|
|
149
|
-
const encryptedFieldKey = this._keyring[fieldName];
|
|
150
|
-
const protocol = CertOps.getProtocolForCertificateFieldEncryption(this.serialNumber, fieldName);
|
|
151
|
-
// Decrypt the master field key
|
|
152
|
-
const { plaintext: fieldKey } = await this.wallet.decrypt({
|
|
153
|
-
ciphertext: sdk_2.Utils.toArray(encryptedFieldKey, 'base64'),
|
|
154
|
-
counterparty: this.certifier,
|
|
155
|
-
...protocol
|
|
156
|
-
});
|
|
157
|
-
// Verify that derived key actually decrypts requested field
|
|
158
|
-
try {
|
|
159
|
-
new sdk_2.SymmetricKey(fieldKey).decrypt(sdk_2.Utils.toArray(this.fields[fieldName], 'base64'));
|
|
160
|
-
}
|
|
161
|
-
catch (_) {
|
|
162
|
-
throw new index_client_1.sdk.WERR_INTERNAL(`unable to decrypt field "${fieldName}" using derived field key.`);
|
|
163
|
-
}
|
|
164
|
-
// Encrypt derived fieldRevelationKey for verifier
|
|
165
|
-
const { ciphertext: encryptedFieldRevelationKey } = await this.wallet.encrypt({
|
|
166
|
-
plaintext: fieldKey,
|
|
167
|
-
counterparty: verifierIdentityKey,
|
|
168
|
-
...protocol
|
|
169
|
-
});
|
|
170
|
-
// Add encryptedFieldRevelationKey to fieldRevelationKeyring
|
|
171
|
-
fieldRevelationKeyring[fieldName] = sdk_2.Utils.toBase64(encryptedFieldRevelationKey);
|
|
172
|
-
}
|
|
173
|
-
// Return the field revelation keyring which can be used to create a verifiable certificate for a verifier.
|
|
174
|
-
return fieldRevelationKeyring;
|
|
175
|
-
}
|
|
176
|
-
/**
|
|
177
|
-
* encrypt plaintext field values for the subject
|
|
178
|
-
* update the signature using the certifier's private key.
|
|
179
|
-
*/
|
|
180
|
-
async encryptAndSignNewCertificate() {
|
|
181
|
-
if ((await (0, index_client_1.getIdentityKey)(this.wallet)) !== this.certifier)
|
|
182
|
-
throw new index_client_1.sdk.WERR_INVALID_PARAMETER('wallet', 'the certifier for new certificate issuance.');
|
|
183
|
-
await this.encryptFields(this.subject);
|
|
184
|
-
await this.sign(this.wallet);
|
|
185
|
-
// Confirm the signed certificate verifies:
|
|
186
|
-
await this.verify();
|
|
187
|
-
}
|
|
188
|
-
}
|
|
189
|
-
exports.CertOps = CertOps;
|
|
190
|
-
//# sourceMappingURL=CertOps.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"CertOps.js","sourceRoot":"","sources":["../../../../src/sdk/CertOps.ts"],"names":[],"mappings":";;;AAAA,kCAeiB;AACjB,kDAAqD;AACrD,kCAA8C;AAC9C,+CAAsD;AAWtD,MAAa,OAAQ,SAAQ,iBAAc;IAKzC,YACS,MAAqB,EAC5B,EAAqB;QAErB,KAAK,CAAC,EAAE,CAAC,IAAI,EAAE,EAAE,CAAC,YAAY,EAAE,EAAE,CAAC,OAAO,EAAE,EAAE,CAAC,SAAS,EAAE,EAAE,CAAC,kBAAkB,EAAE,EAAE,CAAC,MAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAA;QAHlG,WAAM,GAAN,MAAM,CAAe;IAI9B,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAC3B,MAAqB,EACrB,CAIC;QAED,MAAM,CAAC,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC,CAAC,WAAW,CAAC,CAAA;QAC5C,sCAAsC;QACtC,MAAM,CAAC,CAAC,MAAM,EAAE,CAAA;QAChB,MAAM,CAAC,CAAC,aAAa,CAAC,CAAC,CAAC,YAAY,EAAE,CAAC,CAAC,OAAO,CAAC,CAAA;QAChD,aAAa;QACb,CAAC,CAAC,MAAM,GAAG,CAAC,CAAC,gBAAiB,CAAA;QAC9B,OAAO,CAAC,CAAA;IACV,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,aAAa,CACxB,MAAqB,EACrB,CAGC;QAED,OAAO,MAAM,OAAO,CAAC,gBAAgB,CAAC,MAAM,EAAE;YAC5C,YAAY,EAAE,CAAC,CAAC,WAAW,CAAC,SAAS;YACrC,GAAG,CAAC;SACL,CAAC,CAAA;IACJ,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,aAAa,CACxB,MAAqB,EACrB,EAAqB,EACrB,OAAyD;QAEzD,MAAM,CAAC,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,CAAA;QACjC,CAAC,CAAC,QAAQ,GAAG,OAAO,CAAA;QACpB,CAAC,CAAC,gBAAgB,GAAG,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,CAAA;QAC9C,CAAC,CAAC,gBAAgB,GAAG,MAAM,CAAC,CAAC,aAAa,EAAE,CAAA;QAC5C,MAAM,CAAC,CAAC,MAAM,EAAE,CAAA;QAChB,OAAO,CAAC,CAAA;IACV,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,aAAa,CAAC,MAAqB,EAAE,EAAqB;QACrE,MAAM,CAAC,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,EAAE,CAAC,CAChC;QAAA,CAAC,EAAE,MAAM,EAAE,CAAC,CAAC,gBAAgB,EAAE,OAAO,EAAE,CAAC,CAAC,QAAQ,EAAE,GAAG,MAAM,CAAC,CAAC,aAAa,EAAE,CAAC,CAAA;QAChF,CAAC,CAAC,gBAAgB,GAAG,MAAM,CAAC,CAAC,aAAa,EAAE,CAAA;QAC5C,OAAO,CAAC,CAAA;IACV,CAAC;IAED,MAAM,CAAC,UAAU,CACf,MAAmD;QAEnD,MAAM,IAAI,GAAgD,EAAE,CAAA;QAC5D,KAAK,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC;YAAE,IAAI,CAAC,CAAC,CAAC,GAAG,CAAC,CAAA;QACxD,OAAO,IAAI,CAAA;IACb,CAAC;IAED,MAAM,CAAC,wCAAwC,CAC7C,YAAoB,EACpB,SAAiB;QAEjB,OAAO;YACL,UAAU,EAAE,CAAC,CAAC,EAAE,8BAA8B,CAAC;YAC/C,KAAK,EAAE,GAAG,YAAY,IAAI,SAAS,EAAE;SACtC,CAAA;IACH,CAAC;IAED,gBAAgB;QAId,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,IAAI,CAAC,SAAS,IAAI,IAAI,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC;YAC5F,MAAM,IAAI,oCAAsB,CAAC,2DAA2D,CAAC,CAAA;QAC/F,MAAM,WAAW,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAA;QAC9C,MAAM,OAAO,GAAG,IAAI,CAAC,QAAS,CAAA;QAC9B,OAAO,EAAE,WAAW,EAAE,OAAO,EAAE,CAAA;IACjC,CAAC;IAED,mBAAmB;QACjB,MAAM,EAAE,GAAsB;YAC5B,SAAS,EAAE,EAAE;YACb,GAAG,IAAI;SACR,CAAA;QACD,OAAO,EAAE,CAAA;IACX,CAAC;IAED,KAAK,CAAC,aAAa,CAAC,eAAmC,MAAM;QAI3D,MAAM,MAAM,GAAqD,IAAI,CAAC,gBAAgB,IAAI,IAAI,CAAC,MAAM,CAAA;QACrG,MAAM,eAAe,GAA2D,EAAE,CAAA;QAClF,MAAM,OAAO,GAA2D,EAAE,CAAA;QAE1E,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;YAC5C,MAAM,iBAAiB,GAAG,kBAAY,CAAC,UAAU,EAAE,CAAA;YACnD,MAAM,mBAAmB,GAAG,iBAAiB,CAAC,OAAO,CAAC,WAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,MAAM,CAAC,CAAC,CAAA;YACpG,eAAe,CAAC,SAAS,CAAC,GAAG,WAAK,CAAC,QAAQ,CAAC,mBAA+B,CAAC,CAAA;YAE5E,MAAM,iBAAiB,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC;gBAClD,SAAS,EAAE,iBAAiB,CAAC,OAAO,EAAE;gBACtC,YAAY;gBACZ,GAAG,OAAO,CAAC,wCAAwC,CAAC,IAAI,CAAC,YAAY,EAAE,SAAS,CAAC;aAClF,CAAC,CAAA;YACF,OAAO,CAAC,SAAS,CAAC,GAAG,WAAK,CAAC,QAAQ,CAAC,iBAAiB,CAAC,UAAU,CAAC,CAAA;QACnE,CAAC;QACD,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAA;QACvB,IAAI,CAAC,gBAAgB,GAAG,MAAM,CAAA;QAC9B,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,gBAAgB,GAAG,eAAe,CAAA;QACrD,OAAO,EAAE,MAAM,EAAE,eAAe,EAAE,OAAO,EAAE,CAAA;IAC7C,CAAC;IAED,KAAK,CAAC,aAAa,CACjB,YAAwB,EACxB,OAA0D;QAE1D,OAAO,KAAP,OAAO,GAAK,IAAI,CAAC,QAAQ,EAAA;QACzB,MAAM,MAAM,GAA2D,IAAI,CAAC,gBAAgB,IAAI,IAAI,CAAC,MAAM,CAAA;QAC3G,MAAM,eAAe,GAAqD,EAAE,CAAA;QAC5E,IAAI,CAAC,OAAO;YAAE,MAAM,IAAI,kBAAG,CAAC,sBAAsB,CAAC,SAAS,EAAE,OAAO,CAAC,CAAA;QAEtE,IAAI,CAAC;YACH,KAAK,MAAM,SAAS,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC7C,MAAM,EAAE,SAAS,EAAE,kBAAkB,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC;oBAClE,UAAU,EAAE,WAAK,CAAC,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC;oBACvD,YAAY,EAAE,YAAY,IAAI,IAAI,CAAC,OAAO;oBAC1C,GAAG,OAAO,CAAC,wCAAwC,CAAC,IAAI,CAAC,YAAY,EAAE,SAAS,CAAC;iBAClF,CAAC,CAAA;gBAEF,MAAM,UAAU,GAAG,IAAI,kBAAY,CAAC,kBAAkB,CAAC,CAAC,OAAO,CAAC,WAAK,CAAC,OAAO,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC,CAAA;gBAC3G,eAAe,CAAC,SAAS,CAAC,GAAG,WAAK,CAAC,MAAM,CAAC,UAAsB,CAAC,CAAA;YACnE,CAAC;YACD,IAAI,CAAC,QAAQ,GAAG,OAAO,CAAA;YACvB,IAAI,CAAC,gBAAgB,GAAG,MAAM,CAAA;YAC9B,IAAI,CAAC,MAAM,GAAG,IAAI,CAAC,gBAAgB,GAAG,eAAe,CAAA;YACrD,OAAO,eAAe,CAAA;QACxB,CAAC;QAAC,OAAO,EAAW,EAAE,CAAC;YACrB,MAAM,CAAC,GAAG,kBAAG,CAAC,WAAW,CAAC,WAAW,CAAC,EAAE,CAAC,CAAA;YACzC,MAAM,CAAC,CAAA;QACT,CAAC;IACH,CAAC;IAED,KAAK,CAAC,qBAAqB;IACzB,uDAAuD;IACvD,YAAuB,EACvB,cAAkD;QAMlD,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,CAAC,IAAI,CAAC,gBAAgB,IAAI,CAAC,IAAI,CAAC,SAAS,IAAI,IAAI,CAAC,SAAS,CAAC,MAAM,KAAK,CAAC;YAC5F,MAAM,IAAI,oCAAsB,CAAC,2DAA2D,CAAC,CAAA;QAC/F,MAAM,WAAW,GAAG,IAAI,CAAC,mBAAmB,EAAE,CAAA;QAC9C,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,wBAAwB,CAAC,YAAY,EAAE,cAAc,CAAC,CAAA;QACjF,qDAAqD;QACrD,OAAO;YACL,WAAW;YACX,OAAO;YACP,YAAY,EAAE,MAAM,IAAA,6BAAc,EAAC,IAAI,CAAC,MAAM,CAAC;SAChD,CAAA;IACH,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,wBAAwB,CAC5B,mBAA8B,EAC9B,cAAkD;QAElD,IAAI,CAAC,IAAI,CAAC,QAAQ,IAAI,CAAC,IAAI,CAAC,gBAAgB;YAAE,MAAM,IAAI,kBAAG,CAAC,sBAAsB,CAAC,+BAA+B,CAAC,CAAA;QACnH,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,cAAc,CAAC,IAAI,cAAc,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,IAAI,CAAC,gBAAiB,CAAC,CAAC,CAAC,KAAK,SAAS,CAAC;YACrG,MAAM,IAAI,kBAAG,CAAC,sBAAsB,CAAC,gBAAgB,EAAE,qCAAqC,CAAC,CAAA;QAC/F,MAAM,sBAAsB,GAAG,EAAE,CAAA;QACjC,KAAK,MAAM,SAAS,IAAI,cAAc,EAAE,CAAC;YACvC,iBAAiB;YACjB,MAAM,iBAAiB,GAAG,IAAI,CAAC,QAAQ,CAAC,SAAS,CAAC,CAAA;YAClD,MAAM,QAAQ,GAAG,OAAO,CAAC,wCAAwC,CAAC,IAAI,CAAC,YAAY,EAAE,SAAS,CAAC,CAAA;YAE/F,+BAA+B;YAC/B,MAAM,EAAE,SAAS,EAAE,QAAQ,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC;gBACxD,UAAU,EAAE,WAAK,CAAC,OAAO,CAAC,iBAAiB,EAAE,QAAQ,CAAC;gBACtD,YAAY,EAAE,IAAI,CAAC,SAAS;gBAC5B,GAAG,QAAQ;aACZ,CAAC,CAAA;YAEF,4DAA4D;YAC5D,IAAI,CAAC;gBACH,IAAI,kBAAY,CAAC,QAAQ,CAAC,CAAC,OAAO,CAAC,WAAK,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,QAAQ,CAAC,CAAC,CAAA;YACrF,CAAC;YAAC,OAAO,CAAC,EAAE,CAAC;gBACX,MAAM,IAAI,kBAAG,CAAC,aAAa,CAAC,4BAA4B,SAAS,4BAA4B,CAAC,CAAA;YAChG,CAAC;YAED,kDAAkD;YAClD,MAAM,EAAE,UAAU,EAAE,2BAA2B,EAAE,GAAG,MAAM,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC;gBAC5E,SAAS,EAAE,QAAQ;gBACnB,YAAY,EAAE,mBAAmB;gBACjC,GAAG,QAAQ;aACZ,CAAC,CAAA;YAEF,4DAA4D;YAC5D,sBAAsB,CAAC,SAAS,CAAC,GAAG,WAAK,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAA;QACjF,CAAC;QAED,2GAA2G;QAC3G,OAAO,sBAAsB,CAAA;IAC/B,CAAC;IAED;;;OAGG;IACH,KAAK,CAAC,4BAA4B;QAChC,IAAI,CAAC,MAAM,IAAA,6BAAc,EAAC,IAAI,CAAC,MAAM,CAAC,CAAC,KAAK,IAAI,CAAC,SAAS;YACxD,MAAM,IAAI,kBAAG,CAAC,sBAAsB,CAAC,QAAQ,EAAE,6CAA6C,CAAC,CAAA;QAE/F,MAAM,IAAI,CAAC,aAAa,CAAC,IAAI,CAAC,OAAO,CAAC,CAAA;QACtC,MAAM,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,MAAoC,CAAC,CAAA;QAC1D,2CAA2C;QAC3C,MAAM,IAAI,CAAC,MAAM,EAAE,CAAA;IACrB,CAAC;CACF;AApPD,0BAoPC"}
|