@dynamic-labs-wallet/node 0.0.311 → 0.0.313
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +87 -95
- package/index.esm.js +6 -14
- package/package.json +3 -3
- package/src/client.d.ts.map +1 -1
package/index.cjs.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
-
var core
|
|
4
|
-
var core = require('@dynamic-labs-wallet/core');
|
|
3
|
+
var core = require('#internal/core');
|
|
4
|
+
var core$1 = require('@dynamic-labs-wallet/core');
|
|
5
5
|
var node = require('#internal/node');
|
|
6
6
|
var logger = require('@dynamic-labs/logger');
|
|
7
7
|
var forwardMpcClient = require('@dynamic-labs-wallet/forward-mpc-client');
|
|
@@ -10,20 +10,20 @@ var crypto = require('crypto');
|
|
|
10
10
|
require('node:crypto');
|
|
11
11
|
|
|
12
12
|
// Removed duplicate exports - these are already exported from #internal/core
|
|
13
|
-
const getMPCSignatureScheme = ({ signingAlgorithm, baseRelayUrl = core.MPC_RELAY_PROD_API_URL })=>{
|
|
13
|
+
const getMPCSignatureScheme = ({ signingAlgorithm, baseRelayUrl = core$1.MPC_RELAY_PROD_API_URL })=>{
|
|
14
14
|
switch(signingAlgorithm){
|
|
15
|
-
case core.SigningAlgorithm.ECDSA:
|
|
15
|
+
case core$1.SigningAlgorithm.ECDSA:
|
|
16
16
|
return new node.Ecdsa(baseRelayUrl);
|
|
17
|
-
case core.SigningAlgorithm.ED25519:
|
|
17
|
+
case core$1.SigningAlgorithm.ED25519:
|
|
18
18
|
return new node.ExportableEd25519(baseRelayUrl);
|
|
19
|
-
case core.SigningAlgorithm.BIP340:
|
|
19
|
+
case core$1.SigningAlgorithm.BIP340:
|
|
20
20
|
return new node.BIP340(baseRelayUrl);
|
|
21
21
|
default:
|
|
22
22
|
throw new Error(`Unsupported signing algorithm: ${signingAlgorithm}`);
|
|
23
23
|
}
|
|
24
24
|
};
|
|
25
25
|
const getMPCSigner = ({ chainName, baseRelayUrl, bitcoinConfig })=>{
|
|
26
|
-
const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
|
|
26
|
+
const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
|
|
27
27
|
const signatureScheme = getMPCSignatureScheme({
|
|
28
28
|
signingAlgorithm: chainConfig.signingAlgorithm,
|
|
29
29
|
baseRelayUrl
|
|
@@ -49,11 +49,11 @@ const createLogError = (clientTag)=>({ message, error, context })=>logError({
|
|
|
49
49
|
clientTag
|
|
50
50
|
});
|
|
51
51
|
const logError = ({ message, error, context, clientTag = 'node' })=>{
|
|
52
|
-
if (core.isAxiosError(error)) {
|
|
53
|
-
core.handleAxiosError(error, message, context);
|
|
52
|
+
if (core$1.isAxiosError(error)) {
|
|
53
|
+
core$1.handleAxiosError(error, message, context);
|
|
54
54
|
return;
|
|
55
55
|
}
|
|
56
|
-
core.Logger.error(`[DynamicWaasWalletClient] Error in ${clientTag} client`, {
|
|
56
|
+
core$1.Logger.error(`[DynamicWaasWalletClient] Error in ${clientTag} client`, {
|
|
57
57
|
message,
|
|
58
58
|
error: error instanceof Error ? error.message : String(error),
|
|
59
59
|
context
|
|
@@ -81,12 +81,12 @@ const isHexString = (str)=>{
|
|
|
81
81
|
const getExternalServerKeyShareBackupInfo = (params)=>{
|
|
82
82
|
var _params_walletProperties, _params_walletProperties_keyShares_;
|
|
83
83
|
const backups = {
|
|
84
|
-
[core.BackupLocation.DYNAMIC]: [],
|
|
85
|
-
[core.BackupLocation.GOOGLE_DRIVE]: [],
|
|
86
|
-
[core.BackupLocation.ICLOUD]: [],
|
|
87
|
-
[core.BackupLocation.USER]: [],
|
|
88
|
-
[core.BackupLocation.EXTERNAL]: [],
|
|
89
|
-
[core.BackupLocation.DELEGATED]: []
|
|
84
|
+
[core$1.BackupLocation.DYNAMIC]: [],
|
|
85
|
+
[core$1.BackupLocation.GOOGLE_DRIVE]: [],
|
|
86
|
+
[core$1.BackupLocation.ICLOUD]: [],
|
|
87
|
+
[core$1.BackupLocation.USER]: [],
|
|
88
|
+
[core$1.BackupLocation.EXTERNAL]: [],
|
|
89
|
+
[core$1.BackupLocation.DELEGATED]: []
|
|
90
90
|
};
|
|
91
91
|
if (!(params == null ? void 0 : (_params_walletProperties = params.walletProperties) == null ? void 0 : _params_walletProperties.keyShares)) {
|
|
92
92
|
return {
|
|
@@ -141,7 +141,7 @@ const getExternalServerKeyShareBackupInfo = (params)=>{
|
|
|
141
141
|
} catch (error) {
|
|
142
142
|
attempts++;
|
|
143
143
|
if (attempts === maxAttempts) {
|
|
144
|
-
core.Logger.error(`Failed to execute ${operationName} after ${maxAttempts} attempts`, _extends({}, logContext, {
|
|
144
|
+
core$1.Logger.error(`Failed to execute ${operationName} after ${maxAttempts} attempts`, _extends({}, logContext, {
|
|
145
145
|
error
|
|
146
146
|
}));
|
|
147
147
|
throw error;
|
|
@@ -321,7 +321,7 @@ class DynamicWalletClient {
|
|
|
321
321
|
}
|
|
322
322
|
}
|
|
323
323
|
async authenticateApiToken(authToken) {
|
|
324
|
-
const tmpClient = new core.DynamicApiClient({
|
|
324
|
+
const tmpClient = new core$1.DynamicApiClient({
|
|
325
325
|
environmentId: this.environmentId,
|
|
326
326
|
authToken,
|
|
327
327
|
baseApiUrl: this.baseApiUrl,
|
|
@@ -332,7 +332,7 @@ class DynamicWalletClient {
|
|
|
332
332
|
});
|
|
333
333
|
const jwtTokenAuth = response.data.encodedJwts.minifiedJwt;
|
|
334
334
|
this.baseJWTAuthToken = jwtTokenAuth;
|
|
335
|
-
this.apiClient = new core.DynamicApiClient({
|
|
335
|
+
this.apiClient = new core$1.DynamicApiClient({
|
|
336
336
|
environmentId: this.environmentId,
|
|
337
337
|
authToken: jwtTokenAuth,
|
|
338
338
|
baseApiUrl: this.baseApiUrl,
|
|
@@ -368,7 +368,7 @@ class DynamicWalletClient {
|
|
|
368
368
|
baseRelayUrl: this.baseMPCRelayApiUrl,
|
|
369
369
|
bitcoinConfig
|
|
370
370
|
});
|
|
371
|
-
const clientThreshold = core.getClientThreshold(thresholdSignatureScheme);
|
|
371
|
+
const clientThreshold = core$1.getClientThreshold(thresholdSignatureScheme);
|
|
372
372
|
const keygenInitResults = await Promise.all(Array(clientThreshold).fill(null).map(()=>mpcSigner.initKeygen()));
|
|
373
373
|
return keygenInitResults;
|
|
374
374
|
} catch (error) {
|
|
@@ -399,9 +399,9 @@ class DynamicWalletClient {
|
|
|
399
399
|
}
|
|
400
400
|
async forwardMPCExternalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
|
|
401
401
|
try {
|
|
402
|
-
const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
|
|
402
|
+
const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
|
|
403
403
|
const signingAlgo = chainConfig.signingAlgorithm;
|
|
404
|
-
const mpcConfig = core.MPC_CONFIG[thresholdSignatureScheme];
|
|
404
|
+
const mpcConfig = core$1.MPC_CONFIG[thresholdSignatureScheme];
|
|
405
405
|
const isEd25519 = typeof signingAlgo === 'string' && signingAlgo.toLowerCase().includes('ed25519');
|
|
406
406
|
const serverKeygenResults = await Promise.all(externalServerInitKeygenResults.map(async (currentInit)=>{
|
|
407
407
|
const otherExternalServerKeygenIds = externalServerInitKeygenResults.filter((init)=>init.keygenId !== currentInit.keygenId).map((init)=>init.keygenId);
|
|
@@ -425,7 +425,7 @@ class DynamicWalletClient {
|
|
|
425
425
|
});
|
|
426
426
|
}));
|
|
427
427
|
const [serverKeygenResult] = serverKeygenResults;
|
|
428
|
-
const chainConfigForDeriv = core.getMPCChainConfig(chainName, bitcoinConfig);
|
|
428
|
+
const chainConfigForDeriv = core$1.getMPCChainConfig(chainName, bitcoinConfig);
|
|
429
429
|
const derivationPath = new Uint32Array(chainConfigForDeriv.derivationPath);
|
|
430
430
|
const rawPublicKey = await this.derivePublicKey({
|
|
431
431
|
chainName,
|
|
@@ -444,6 +444,8 @@ class DynamicWalletClient {
|
|
|
444
444
|
environmentId: this.environmentId
|
|
445
445
|
});
|
|
446
446
|
throw error;
|
|
447
|
+
} finally{
|
|
448
|
+
this.apiClient.forwardMPCClient.disconnect();
|
|
447
449
|
}
|
|
448
450
|
}
|
|
449
451
|
async externalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
|
|
@@ -465,7 +467,7 @@ class DynamicWalletClient {
|
|
|
465
467
|
bitcoinConfig
|
|
466
468
|
});
|
|
467
469
|
// Get the MPC config for the threshold signature scheme
|
|
468
|
-
const mpcConfig = core.MPC_CONFIG[thresholdSignatureScheme];
|
|
470
|
+
const mpcConfig = core$1.MPC_CONFIG[thresholdSignatureScheme];
|
|
469
471
|
// For each client keygen init result, create an array of other parties' keygenIds
|
|
470
472
|
const serverKeygenResults = await Promise.all(externalServerInitKeygenResults.map((currentInit)=>{
|
|
471
473
|
// Get all other client keygenIds (excluding current one)
|
|
@@ -485,7 +487,7 @@ class DynamicWalletClient {
|
|
|
485
487
|
}));
|
|
486
488
|
// only need one client keygen result to derive the public key
|
|
487
489
|
const [serverKeygenResult] = serverKeygenResults;
|
|
488
|
-
const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
|
|
490
|
+
const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
|
|
489
491
|
const derivationPath = new Uint32Array(chainConfig.derivationPath);
|
|
490
492
|
const rawPublicKey = await this.derivePublicKey({
|
|
491
493
|
chainName,
|
|
@@ -560,7 +562,7 @@ class DynamicWalletClient {
|
|
|
560
562
|
onError,
|
|
561
563
|
onCeremonyComplete
|
|
562
564
|
});
|
|
563
|
-
const { threshold } = core.getTSSConfig(thresholdSignatureScheme);
|
|
565
|
+
const { threshold } = core$1.getTSSConfig(thresholdSignatureScheme);
|
|
564
566
|
const externalServerKeygenResults = await Promise.all(externalServerKeygenInitResults.map(async (currentInit, index)=>{
|
|
565
567
|
const otherExternalServerKeygenIds = externalServerKeygenInitResults.filter((init)=>init.keygenId !== currentInit.keygenId).map((init)=>init.keygenId);
|
|
566
568
|
if (index === 0) {
|
|
@@ -627,14 +629,14 @@ class DynamicWalletClient {
|
|
|
627
629
|
}
|
|
628
630
|
async forwardMPCClientSign({ chainName, message, roomId, keyShare, derivationPath, formattedMessage, dynamicRequestId, isFormatted }) {
|
|
629
631
|
try {
|
|
630
|
-
const messageForForwardMPC = core.serializeMessageForForwardMPC({
|
|
632
|
+
const messageForForwardMPC = core$1.serializeMessageForForwardMPC({
|
|
631
633
|
message,
|
|
632
634
|
isFormatted,
|
|
633
635
|
chainName
|
|
634
636
|
});
|
|
635
|
-
this.logger.
|
|
636
|
-
const environment = core.getEnvironmentFromUrl(this.baseApiUrl);
|
|
637
|
-
const defaultRelayUrl = core.MPC_RELAY_URL_MAP[environment];
|
|
637
|
+
this.logger.debug('Signing message with MPC Socket Client');
|
|
638
|
+
const environment = core$1.getEnvironmentFromUrl(this.baseApiUrl);
|
|
639
|
+
const defaultRelayUrl = core$1.MPC_RELAY_URL_MAP[environment];
|
|
638
640
|
const { signature: signatureBytes } = await this.apiClient.forwardMPCClient.signMessage({
|
|
639
641
|
keyshare: keyShare,
|
|
640
642
|
message: chainName === 'SVM' ? formattedMessage : messageForForwardMPC,
|
|
@@ -661,6 +663,8 @@ class DynamicWalletClient {
|
|
|
661
663
|
dynamicRequestId
|
|
662
664
|
});
|
|
663
665
|
throw error;
|
|
666
|
+
} finally{
|
|
667
|
+
this.apiClient.forwardMPCClient.disconnect();
|
|
664
668
|
}
|
|
665
669
|
}
|
|
666
670
|
async sign({ accountAddress, externalServerKeyShares, message, chainName, password = undefined, isFormatted = false, context, onError, bitcoinConfig }) {
|
|
@@ -671,13 +675,13 @@ class DynamicWalletClient {
|
|
|
671
675
|
});
|
|
672
676
|
const wallet = await this.getWallet({
|
|
673
677
|
accountAddress,
|
|
674
|
-
walletOperation: core.WalletOperation.SIGN_MESSAGE,
|
|
678
|
+
walletOperation: core$1.WalletOperation.SIGN_MESSAGE,
|
|
675
679
|
password
|
|
676
680
|
});
|
|
677
681
|
externalServerKeyShares = externalServerKeyShares != null ? externalServerKeyShares : wallet.externalServerKeyShares;
|
|
678
682
|
if (!externalServerKeyShares) {
|
|
679
683
|
var _wallet_externalServerKeySharesBackupInfo;
|
|
680
|
-
const hasExternalKeyShareId = Object.values(((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.backups) || {}).some((locations)=>locations.some((loc)=>loc.location === core.BackupLocation.EXTERNAL));
|
|
684
|
+
const hasExternalKeyShareId = Object.values(((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.backups) || {}).some((locations)=>locations.some((loc)=>loc.location === core$1.BackupLocation.EXTERNAL));
|
|
681
685
|
const errorMessage = 'External server key shares are required to sign a message';
|
|
682
686
|
if (hasExternalKeyShareId) {
|
|
683
687
|
this.logger.error(errorMessage);
|
|
@@ -737,7 +741,7 @@ class DynamicWalletClient {
|
|
|
737
741
|
});
|
|
738
742
|
const wallet = await this.getWallet({
|
|
739
743
|
accountAddress,
|
|
740
|
-
walletOperation: core.WalletOperation.REFRESH,
|
|
744
|
+
walletOperation: core$1.WalletOperation.REFRESH,
|
|
741
745
|
password
|
|
742
746
|
});
|
|
743
747
|
const mpcSigner = getMPCSigner({
|
|
@@ -798,7 +802,7 @@ class DynamicWalletClient {
|
|
|
798
802
|
bitcoinConfig
|
|
799
803
|
});
|
|
800
804
|
// Determine share counts based on threshold signature schemes
|
|
801
|
-
const { newExternalServerShareCount, existingExternalServerShareCount } = core.getServerWalletReshareConfig({
|
|
805
|
+
const { newExternalServerShareCount, existingExternalServerShareCount } = core$1.getServerWalletReshareConfig({
|
|
802
806
|
oldThresholdSignatureScheme,
|
|
803
807
|
newThresholdSignatureScheme
|
|
804
808
|
});
|
|
@@ -827,13 +831,13 @@ class DynamicWalletClient {
|
|
|
827
831
|
accountAddress,
|
|
828
832
|
password
|
|
829
833
|
});
|
|
830
|
-
const { existingExternalServerShareCount } = core.getServerWalletReshareConfig({
|
|
834
|
+
const { existingExternalServerShareCount } = core$1.getServerWalletReshareConfig({
|
|
831
835
|
oldThresholdSignatureScheme,
|
|
832
836
|
newThresholdSignatureScheme
|
|
833
837
|
});
|
|
834
838
|
const wallet = await this.getWallet({
|
|
835
839
|
accountAddress,
|
|
836
|
-
walletOperation: core.WalletOperation.RESHARE,
|
|
840
|
+
walletOperation: core$1.WalletOperation.RESHARE,
|
|
837
841
|
shareCount: existingExternalServerShareCount,
|
|
838
842
|
password
|
|
839
843
|
});
|
|
@@ -862,8 +866,8 @@ class DynamicWalletClient {
|
|
|
862
866
|
});
|
|
863
867
|
const { roomId, serverKeygenIds: dynamicServerKeygenIds, newServerKeygenIds: newDynamicServerKeygenIds = [] } = data;
|
|
864
868
|
// Get the MPC config for the threshold signature scheme
|
|
865
|
-
const oldMpcConfig = core.MPC_CONFIG[oldThresholdSignatureScheme];
|
|
866
|
-
const newMpcConfig = core.MPC_CONFIG[newThresholdSignatureScheme];
|
|
869
|
+
const oldMpcConfig = core$1.MPC_CONFIG[oldThresholdSignatureScheme];
|
|
870
|
+
const newMpcConfig = core$1.MPC_CONFIG[newThresholdSignatureScheme];
|
|
867
871
|
const allPartyKeygenIds = [
|
|
868
872
|
...externalServerKeygenIds,
|
|
869
873
|
...dynamicServerKeygenIds,
|
|
@@ -897,7 +901,7 @@ class DynamicWalletClient {
|
|
|
897
901
|
const wallet = await this.getWallet({
|
|
898
902
|
accountAddress,
|
|
899
903
|
password,
|
|
900
|
-
walletOperation: core.WalletOperation.EXPORT_PRIVATE_KEY
|
|
904
|
+
walletOperation: core$1.WalletOperation.EXPORT_PRIVATE_KEY
|
|
901
905
|
});
|
|
902
906
|
externalServerKeyShares = externalServerKeyShares != null ? externalServerKeyShares : wallet.externalServerKeyShares;
|
|
903
907
|
if (!externalServerKeyShares) {
|
|
@@ -952,7 +956,7 @@ class DynamicWalletClient {
|
|
|
952
956
|
if (!keyExportRaw) {
|
|
953
957
|
throw new Error('Error exporting private key: Export returned null');
|
|
954
958
|
}
|
|
955
|
-
const chainConfig = core.getMPCChainConfig(chainName);
|
|
959
|
+
const chainConfig = core$1.getMPCChainConfig(chainName);
|
|
956
960
|
const walletDerivationPath = !derivationPath ? undefined : new Uint32Array(chainConfig.derivationPath);
|
|
957
961
|
let derivedPrivateKey;
|
|
958
962
|
if (mpcSigner instanceof node.Ecdsa) {
|
|
@@ -1035,7 +1039,7 @@ class DynamicWalletClient {
|
|
|
1035
1039
|
bitcoinConfig
|
|
1036
1040
|
});
|
|
1037
1041
|
locations.push({
|
|
1038
|
-
location: core.BackupLocation.DYNAMIC,
|
|
1042
|
+
location: core$1.BackupLocation.DYNAMIC,
|
|
1039
1043
|
externalKeyShareId: data.keyShareIds[0],
|
|
1040
1044
|
passwordEncrypted: passwordEncryptedFlag,
|
|
1041
1045
|
keygenId
|
|
@@ -1047,7 +1051,7 @@ class DynamicWalletClient {
|
|
|
1047
1051
|
bitcoinConfig
|
|
1048
1052
|
});
|
|
1049
1053
|
locations.push({
|
|
1050
|
-
location: core.BackupLocation.EXTERNAL,
|
|
1054
|
+
location: core$1.BackupLocation.EXTERNAL,
|
|
1051
1055
|
passwordEncrypted: passwordEncryptedFlag,
|
|
1052
1056
|
keygenId
|
|
1053
1057
|
});
|
|
@@ -1101,7 +1105,7 @@ class DynamicWalletClient {
|
|
|
1101
1105
|
const wallet = await this.getWallet({
|
|
1102
1106
|
accountAddress,
|
|
1103
1107
|
password,
|
|
1104
|
-
walletOperation: core.WalletOperation.REACH_THRESHOLD
|
|
1108
|
+
walletOperation: core$1.WalletOperation.REACH_THRESHOLD
|
|
1105
1109
|
});
|
|
1106
1110
|
// Check if the wallet has a dynamic backup and derive password encryption status from the first dynamic share
|
|
1107
1111
|
const dynamicBackups = (wallet == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups.dynamic) || [];
|
|
@@ -1113,7 +1117,7 @@ class DynamicWalletClient {
|
|
|
1113
1117
|
const recoveredShares = await this.recoverEncryptedBackupByWallet({
|
|
1114
1118
|
accountAddress,
|
|
1115
1119
|
password,
|
|
1116
|
-
walletOperation: core.WalletOperation.REACH_THRESHOLD
|
|
1120
|
+
walletOperation: core$1.WalletOperation.REACH_THRESHOLD
|
|
1117
1121
|
});
|
|
1118
1122
|
return recoveredShares;
|
|
1119
1123
|
}
|
|
@@ -1121,7 +1125,7 @@ class DynamicWalletClient {
|
|
|
1121
1125
|
await this.getWallet({
|
|
1122
1126
|
accountAddress,
|
|
1123
1127
|
password: existingPassword,
|
|
1124
|
-
walletOperation: core.WalletOperation.REACH_ALL_PARTIES
|
|
1128
|
+
walletOperation: core$1.WalletOperation.REACH_ALL_PARTIES
|
|
1125
1129
|
});
|
|
1126
1130
|
await this.storeEncryptedBackupByWallet({
|
|
1127
1131
|
accountAddress,
|
|
@@ -1151,22 +1155,22 @@ class DynamicWalletClient {
|
|
|
1151
1155
|
* @returns @requiredShareCount: The number of shares required to recover
|
|
1152
1156
|
*/ recoverStrategy({ externalServerKeySharesBackupInfo, thresholdSignatureScheme, walletOperation, shareCount = undefined }) {
|
|
1153
1157
|
const { backups } = externalServerKeySharesBackupInfo;
|
|
1154
|
-
const { clientThreshold } = core.MPC_CONFIG[thresholdSignatureScheme];
|
|
1155
|
-
let requiredShareCount = walletOperation === core.WalletOperation.REFRESH || walletOperation === core.WalletOperation.REACH_ALL_PARTIES || walletOperation === core.WalletOperation.RESHARE ? clientThreshold : 1;
|
|
1158
|
+
const { clientThreshold } = core$1.MPC_CONFIG[thresholdSignatureScheme];
|
|
1159
|
+
let requiredShareCount = walletOperation === core$1.WalletOperation.REFRESH || walletOperation === core$1.WalletOperation.REACH_ALL_PARTIES || walletOperation === core$1.WalletOperation.RESHARE ? clientThreshold : 1;
|
|
1156
1160
|
// Override requiredShareCount if shareCount is provided
|
|
1157
1161
|
if (shareCount !== undefined) {
|
|
1158
1162
|
requiredShareCount = shareCount;
|
|
1159
1163
|
}
|
|
1160
|
-
const dynamicShares = (backups[core.BackupLocation.DYNAMIC] || []).slice(0, requiredShareCount);
|
|
1161
|
-
const externalShares = (backups[core.BackupLocation.EXTERNAL] || []).slice(0, requiredShareCount);
|
|
1164
|
+
const dynamicShares = (backups[core$1.BackupLocation.DYNAMIC] || []).slice(0, requiredShareCount);
|
|
1165
|
+
const externalShares = (backups[core$1.BackupLocation.EXTERNAL] || []).slice(0, requiredShareCount);
|
|
1162
1166
|
// If we have DYNAMIC shares, use those; otherwise use EXTERNAL shares
|
|
1163
1167
|
const sharesToUse = dynamicShares.length > 0 ? dynamicShares : externalShares;
|
|
1164
|
-
const backupLocation = dynamicShares.length > 0 ? core.BackupLocation.DYNAMIC : core.BackupLocation.EXTERNAL;
|
|
1168
|
+
const backupLocation = dynamicShares.length > 0 ? core$1.BackupLocation.DYNAMIC : core$1.BackupLocation.EXTERNAL;
|
|
1165
1169
|
return {
|
|
1166
1170
|
shares: {
|
|
1167
1171
|
// EXTERNAL shares don't have externalKeyShareId (they're not uploaded to the API),
|
|
1168
1172
|
// so we use their id for counting purposes instead of calling getRequiredExternalKeyShareId.
|
|
1169
|
-
[backupLocation]: backupLocation === core.BackupLocation.DYNAMIC ? sharesToUse.map(core.getRequiredExternalKeyShareId) : sharesToUse.map((ks)=>ks.id || '')
|
|
1173
|
+
[backupLocation]: backupLocation === core$1.BackupLocation.DYNAMIC ? sharesToUse.map(core$1.getRequiredExternalKeyShareId) : sharesToUse.map((ks)=>ks.id || '')
|
|
1170
1174
|
},
|
|
1171
1175
|
requiredShareCount
|
|
1172
1176
|
};
|
|
@@ -1214,7 +1218,7 @@ class DynamicWalletClient {
|
|
|
1214
1218
|
walletOperation,
|
|
1215
1219
|
shareCount
|
|
1216
1220
|
});
|
|
1217
|
-
const dynamicKeyShareIds = shares[core.BackupLocation.DYNAMIC] || [];
|
|
1221
|
+
const dynamicKeyShareIds = shares[core$1.BackupLocation.DYNAMIC] || [];
|
|
1218
1222
|
if (dynamicKeyShareIds.length === 0) {
|
|
1219
1223
|
this.logger.debug('No DYNAMIC shares available for recovery');
|
|
1220
1224
|
return [];
|
|
@@ -1224,7 +1228,7 @@ class DynamicWalletClient {
|
|
|
1224
1228
|
externalKeyShareIds: dynamicKeyShareIds,
|
|
1225
1229
|
requiresSignedSessionId: false
|
|
1226
1230
|
});
|
|
1227
|
-
const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === core.BackupLocation.DYNAMIC);
|
|
1231
|
+
const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === core$1.BackupLocation.DYNAMIC);
|
|
1228
1232
|
var _wallet_externalServerKeySharesBackupInfo_passwordEncrypted;
|
|
1229
1233
|
const isPasswordEncrypted = (_wallet_externalServerKeySharesBackupInfo_passwordEncrypted = (_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.passwordEncrypted) != null ? _wallet_externalServerKeySharesBackupInfo_passwordEncrypted : false;
|
|
1230
1234
|
if (isPasswordEncrypted && !password) {
|
|
@@ -1257,7 +1261,7 @@ class DynamicWalletClient {
|
|
|
1257
1261
|
* @param accountAddress - The account address of the wallet to check
|
|
1258
1262
|
* @param walletOperation - The wallet operation that determines required fields
|
|
1259
1263
|
* @returns boolean indicating if wallet needs to be re-fetched and restored from server
|
|
1260
|
-
*/ async checkWalletFields({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD, shareCount }) {
|
|
1264
|
+
*/ async checkWalletFields({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD, shareCount }) {
|
|
1261
1265
|
var _existingWallet_externalServerKeyShares;
|
|
1262
1266
|
let keyshareCheck = false;
|
|
1263
1267
|
let walletCheck = false;
|
|
@@ -1326,11 +1330,11 @@ class DynamicWalletClient {
|
|
|
1326
1330
|
await this.getWallet({
|
|
1327
1331
|
accountAddress,
|
|
1328
1332
|
password,
|
|
1329
|
-
walletOperation: core.WalletOperation.NO_OPERATION
|
|
1333
|
+
walletOperation: core$1.WalletOperation.NO_OPERATION
|
|
1330
1334
|
});
|
|
1331
1335
|
if (await this.requiresPasswordForOperation({
|
|
1332
1336
|
accountAddress,
|
|
1333
|
-
walletOperation: core.WalletOperation.NO_OPERATION
|
|
1337
|
+
walletOperation: core$1.WalletOperation.NO_OPERATION
|
|
1334
1338
|
}) && !password) {
|
|
1335
1339
|
throw new Error('Password is required for operation but not provided');
|
|
1336
1340
|
}
|
|
@@ -1352,7 +1356,7 @@ class DynamicWalletClient {
|
|
|
1352
1356
|
await this.recoverEncryptedBackupByWallet({
|
|
1353
1357
|
accountAddress,
|
|
1354
1358
|
password,
|
|
1355
|
-
walletOperation: core.WalletOperation.NO_OPERATION
|
|
1359
|
+
walletOperation: core$1.WalletOperation.NO_OPERATION
|
|
1356
1360
|
});
|
|
1357
1361
|
} catch (error) {
|
|
1358
1362
|
this.logger.error('Error in verifying password', error);
|
|
@@ -1367,7 +1371,7 @@ class DynamicWalletClient {
|
|
|
1367
1371
|
}
|
|
1368
1372
|
/**
|
|
1369
1373
|
* check if the operation requires a password
|
|
1370
|
-
*/ async requiresPasswordForOperation({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD }) {
|
|
1374
|
+
*/ async requiresPasswordForOperation({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD }) {
|
|
1371
1375
|
const isEncrypted = await this.isPasswordEncrypted({
|
|
1372
1376
|
accountAddress
|
|
1373
1377
|
});
|
|
@@ -1381,12 +1385,12 @@ class DynamicWalletClient {
|
|
|
1381
1385
|
}
|
|
1382
1386
|
/**
|
|
1383
1387
|
* check if the operation requires restoring backup shares
|
|
1384
|
-
*/ async requiresRestoreBackupSharesForOperation({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD }) {
|
|
1388
|
+
*/ async requiresRestoreBackupSharesForOperation({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD }) {
|
|
1385
1389
|
const externalServerKeySharesBackupInfo = await this.getWalletExternalServerKeyShareBackupInfo({
|
|
1386
1390
|
accountAddress
|
|
1387
1391
|
});
|
|
1388
1392
|
const externalServerKeyShares = this.walletMap[accountAddress].externalServerKeyShares || [];
|
|
1389
|
-
if (walletOperation === core.WalletOperation.REACH_ALL_PARTIES || walletOperation === core.WalletOperation.REFRESH || walletOperation === core.WalletOperation.RESHARE) {
|
|
1393
|
+
if (walletOperation === core$1.WalletOperation.REACH_ALL_PARTIES || walletOperation === core$1.WalletOperation.REFRESH || walletOperation === core$1.WalletOperation.RESHARE) {
|
|
1390
1394
|
return true;
|
|
1391
1395
|
}
|
|
1392
1396
|
const { shares, requiredShareCount } = this.recoverStrategy({
|
|
@@ -1394,8 +1398,8 @@ class DynamicWalletClient {
|
|
|
1394
1398
|
thresholdSignatureScheme: this.walletMap[accountAddress].thresholdSignatureScheme,
|
|
1395
1399
|
walletOperation
|
|
1396
1400
|
});
|
|
1397
|
-
const dynamicKeyShareIds = shares[core.BackupLocation.DYNAMIC] || [];
|
|
1398
|
-
const externalKeyShareIds = shares[core.BackupLocation.EXTERNAL] || [];
|
|
1401
|
+
const dynamicKeyShareIds = shares[core$1.BackupLocation.DYNAMIC] || [];
|
|
1402
|
+
const externalKeyShareIds = shares[core$1.BackupLocation.EXTERNAL] || [];
|
|
1399
1403
|
// Check if we have enough shares from either location
|
|
1400
1404
|
const totalAvailableShares = externalServerKeyShares.length + dynamicKeyShareIds.length + externalKeyShareIds.length;
|
|
1401
1405
|
if (totalAvailableShares >= requiredShareCount) {
|
|
@@ -1415,7 +1419,7 @@ class DynamicWalletClient {
|
|
|
1415
1419
|
wallet = fetchedWallet;
|
|
1416
1420
|
}
|
|
1417
1421
|
// Return existing backup info if it exists
|
|
1418
|
-
if (((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC = _wallet_externalServerKeySharesBackupInfo_backups[core.BackupLocation.DYNAMIC]) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC.length) > 0) {
|
|
1422
|
+
if (((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC = _wallet_externalServerKeySharesBackupInfo_backups[core$1.BackupLocation.DYNAMIC]) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC.length) > 0) {
|
|
1419
1423
|
return wallet.externalServerKeySharesBackupInfo;
|
|
1420
1424
|
}
|
|
1421
1425
|
// Get backup info from server
|
|
@@ -1425,7 +1429,7 @@ class DynamicWalletClient {
|
|
|
1425
1429
|
walletProperties: walletData == null ? void 0 : walletData.walletProperties
|
|
1426
1430
|
});
|
|
1427
1431
|
}
|
|
1428
|
-
async getWallet({ accountAddress, walletOperation = core.WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
|
|
1432
|
+
async getWallet({ accountAddress, walletOperation = core$1.WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
|
|
1429
1433
|
try {
|
|
1430
1434
|
this.ensureApiClientAuthenticated();
|
|
1431
1435
|
const existingWalletCheck = await this.checkWalletFields({
|
|
@@ -1444,7 +1448,7 @@ class DynamicWalletClient {
|
|
|
1444
1448
|
this.logger.debug('Restoring wallet', wallet);
|
|
1445
1449
|
// The wallet is already processed, so we can use it directly
|
|
1446
1450
|
this.walletMap[accountAddress] = wallet;
|
|
1447
|
-
if (walletOperation !== core.WalletOperation.NO_OPERATION && await this.requiresRestoreBackupSharesForOperation({
|
|
1451
|
+
if (walletOperation !== core$1.WalletOperation.NO_OPERATION && await this.requiresRestoreBackupSharesForOperation({
|
|
1448
1452
|
accountAddress,
|
|
1449
1453
|
walletOperation
|
|
1450
1454
|
})) {
|
|
@@ -1551,14 +1555,14 @@ class DynamicWalletClient {
|
|
|
1551
1555
|
var _vc_walletProperties_thresholdSignatureScheme;
|
|
1552
1556
|
return {
|
|
1553
1557
|
walletId: vc.id,
|
|
1554
|
-
chainName: core.verifiedCredentialNameToChainEnum[vc.chain],
|
|
1558
|
+
chainName: core$1.verifiedCredentialNameToChainEnum[vc.chain],
|
|
1555
1559
|
accountAddress: vc.address,
|
|
1556
1560
|
externalServerKeySharesBackupInfo: getExternalServerKeyShareBackupInfo({
|
|
1557
1561
|
walletProperties: vc.walletProperties
|
|
1558
1562
|
}),
|
|
1559
1563
|
externalServerKeyShares: ((_this_walletMap_vc_address = this.walletMap[vc.address]) == null ? void 0 : _this_walletMap_vc_address.externalServerKeyShares) || [],
|
|
1560
1564
|
derivationPath: (_vc_walletProperties = vc.walletProperties) == null ? void 0 : _vc_walletProperties.derivationPath,
|
|
1561
|
-
thresholdSignatureScheme: (_vc_walletProperties_thresholdSignatureScheme = (_vc_walletProperties1 = vc.walletProperties) == null ? void 0 : _vc_walletProperties1.thresholdSignatureScheme) != null ? _vc_walletProperties_thresholdSignatureScheme : core.ThresholdSignatureScheme.TWO_OF_TWO
|
|
1565
|
+
thresholdSignatureScheme: (_vc_walletProperties_thresholdSignatureScheme = (_vc_walletProperties1 = vc.walletProperties) == null ? void 0 : _vc_walletProperties1.thresholdSignatureScheme) != null ? _vc_walletProperties_thresholdSignatureScheme : core$1.ThresholdSignatureScheme.TWO_OF_TWO
|
|
1562
1566
|
};
|
|
1563
1567
|
});
|
|
1564
1568
|
this.walletMap = wallets.reduce((acc, wallet)=>{
|
|
@@ -1608,45 +1612,33 @@ class DynamicWalletClient {
|
|
|
1608
1612
|
defaultLogger.setLogLevel(debug ? 'DEBUG' : 'INFO');
|
|
1609
1613
|
this.logger = defaultLogger;
|
|
1610
1614
|
}
|
|
1611
|
-
core.Logger.configure(this.logger);
|
|
1615
|
+
core$1.Logger.configure(this.logger);
|
|
1612
1616
|
this.environmentId = environmentId;
|
|
1613
|
-
this.baseApiUrl = baseApiUrl != null ? baseApiUrl : core.DYNAMIC_AUTH_PROD_BASE_API_URL;
|
|
1614
|
-
const environment = core.getEnvironmentFromUrl(baseApiUrl);
|
|
1615
|
-
this.baseMPCRelayApiUrl = baseMPCRelayApiUrl != null ? baseMPCRelayApiUrl : core.MPC_RELAY_URL_MAP[environment];
|
|
1617
|
+
this.baseApiUrl = baseApiUrl != null ? baseApiUrl : core$1.DYNAMIC_AUTH_PROD_BASE_API_URL;
|
|
1618
|
+
const environment = core$1.getEnvironmentFromUrl(baseApiUrl);
|
|
1619
|
+
this.baseMPCRelayApiUrl = baseMPCRelayApiUrl != null ? baseMPCRelayApiUrl : core$1.MPC_RELAY_URL_MAP[environment];
|
|
1616
1620
|
this.debug = Boolean(debug);
|
|
1617
1621
|
this.forwardMPCEnabled = enableMPCAccelerator || Boolean(forwardMPCClient);
|
|
1618
1622
|
this.resolvedForwardMPCClient = forwardMPCClient != null ? forwardMPCClient : (()=>{
|
|
1619
1623
|
if (!this.forwardMPCEnabled) return undefined;
|
|
1620
|
-
const environment = core.getEnvironmentFromUrl(baseApiUrl);
|
|
1621
|
-
const enclaveUrl = core.DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP[environment];
|
|
1624
|
+
const environment = core$1.getEnvironmentFromUrl(baseApiUrl);
|
|
1625
|
+
const enclaveUrl = core$1.DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP[environment];
|
|
1622
1626
|
if (!enclaveUrl) throw new Error(`No ForwardMPC enclave URL configured for environment: ${environment}`);
|
|
1623
1627
|
return new forwardMpcClient.ForwardMPCClientV2(enclaveUrl, {
|
|
1624
1628
|
reconnectInterval: 5000,
|
|
1625
1629
|
reconnectAttempts: 5,
|
|
1626
1630
|
connectionTimeout: 10000,
|
|
1627
|
-
attestationConfig: core.DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP[environment],
|
|
1631
|
+
attestationConfig: core$1.DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP[environment],
|
|
1628
1632
|
logger: this.logger
|
|
1629
1633
|
});
|
|
1630
1634
|
})();
|
|
1631
1635
|
// Initialize API client with forwardMPCClient
|
|
1632
|
-
this.apiClient = new core.DynamicApiClient({
|
|
1636
|
+
this.apiClient = new core$1.DynamicApiClient({
|
|
1633
1637
|
environmentId,
|
|
1634
1638
|
baseApiUrl,
|
|
1635
1639
|
forwardMPCClient: this.resolvedForwardMPCClient,
|
|
1636
1640
|
logger: this.logger
|
|
1637
1641
|
});
|
|
1638
|
-
if (this.forwardMPCEnabled) {
|
|
1639
|
-
this.apiClient.forwardMPCClient.connect().then(()=>{
|
|
1640
|
-
this.logger.info('Optimistically Connected to ForwardMPC enclave', {
|
|
1641
|
-
environmentId: this.environmentId
|
|
1642
|
-
});
|
|
1643
|
-
}).catch((error)=>{
|
|
1644
|
-
this.logger.error('Error connecting to ForwardMPC enclave optimistically', {
|
|
1645
|
-
error,
|
|
1646
|
-
environmentId: this.environmentId
|
|
1647
|
-
});
|
|
1648
|
-
});
|
|
1649
|
-
}
|
|
1650
1642
|
}
|
|
1651
1643
|
}
|
|
1652
1644
|
|
|
@@ -1659,9 +1651,9 @@ const createCore = ({ environmentId, baseApiUrl, baseMPCRelayApiUrl, debug = fal
|
|
|
1659
1651
|
defaultLogger.setLogLevel(debug ? 'DEBUG' : 'INFO');
|
|
1660
1652
|
coreLogger = defaultLogger;
|
|
1661
1653
|
}
|
|
1662
|
-
core.Logger.configure(coreLogger);
|
|
1654
|
+
core$1.Logger.configure(coreLogger);
|
|
1663
1655
|
const createApiClient = (options = {})=>{
|
|
1664
|
-
return new core.DynamicApiClient(_extends({
|
|
1656
|
+
return new core$1.DynamicApiClient(_extends({
|
|
1665
1657
|
environmentId,
|
|
1666
1658
|
baseApiUrl
|
|
1667
1659
|
}, options, {
|
|
@@ -1837,19 +1829,19 @@ const revokeDelegation = async (client, walletId)=>{
|
|
|
1837
1829
|
|
|
1838
1830
|
Object.defineProperty(exports, "SOLANA_RPC_URL", {
|
|
1839
1831
|
enumerable: true,
|
|
1840
|
-
get: function () { return core.SOLANA_RPC_URL; }
|
|
1832
|
+
get: function () { return core$1.SOLANA_RPC_URL; }
|
|
1841
1833
|
});
|
|
1842
1834
|
Object.defineProperty(exports, "ThresholdSignatureScheme", {
|
|
1843
1835
|
enumerable: true,
|
|
1844
|
-
get: function () { return core.ThresholdSignatureScheme; }
|
|
1836
|
+
get: function () { return core$1.ThresholdSignatureScheme; }
|
|
1845
1837
|
});
|
|
1846
1838
|
Object.defineProperty(exports, "WalletOperation", {
|
|
1847
1839
|
enumerable: true,
|
|
1848
|
-
get: function () { return core.WalletOperation; }
|
|
1840
|
+
get: function () { return core$1.WalletOperation; }
|
|
1849
1841
|
});
|
|
1850
1842
|
Object.defineProperty(exports, "getMPCChainConfig", {
|
|
1851
1843
|
enumerable: true,
|
|
1852
|
-
get: function () { return core.getMPCChainConfig; }
|
|
1844
|
+
get: function () { return core$1.getMPCChainConfig; }
|
|
1853
1845
|
});
|
|
1854
1846
|
exports.DynamicWalletClient = DynamicWalletClient;
|
|
1855
1847
|
exports.base64ToBytes = base64ToBytes;
|
|
@@ -1869,9 +1861,9 @@ exports.mergeUniqueKeyShares = mergeUniqueKeyShares;
|
|
|
1869
1861
|
exports.retryPromise = retryPromise;
|
|
1870
1862
|
exports.revokeDelegation = revokeDelegation;
|
|
1871
1863
|
exports.stringToBytes = stringToBytes;
|
|
1872
|
-
Object.keys(core
|
|
1864
|
+
Object.keys(core).forEach(function (k) {
|
|
1873
1865
|
if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
|
|
1874
1866
|
enumerable: true,
|
|
1875
|
-
get: function () { return core
|
|
1867
|
+
get: function () { return core[k]; }
|
|
1876
1868
|
});
|
|
1877
1869
|
});
|
package/index.esm.js
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
export * from '#internal/core';
|
|
2
|
-
import { SigningAlgorithm, MPC_RELAY_PROD_API_URL, getMPCChainConfig, isAxiosError, handleAxiosError, Logger,
|
|
2
|
+
import { SigningAlgorithm, MPC_RELAY_PROD_API_URL, getMPCChainConfig, BackupLocation, isAxiosError, handleAxiosError, Logger, DynamicApiClient, getClientThreshold, MPC_CONFIG, getTSSConfig, serializeMessageForForwardMPC, getEnvironmentFromUrl, MPC_RELAY_URL_MAP, WalletOperation, getServerWalletReshareConfig, getRequiredExternalKeyShareId, ThresholdSignatureScheme, verifiedCredentialNameToChainEnum, DYNAMIC_AUTH_PROD_BASE_API_URL, DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP, DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP } from '@dynamic-labs-wallet/core';
|
|
3
3
|
export { SOLANA_RPC_URL, ThresholdSignatureScheme, WalletOperation, getMPCChainConfig } from '@dynamic-labs-wallet/core';
|
|
4
4
|
import { BIP340, ExportableEd25519, Ecdsa, MessageHash, EcdsaSignature, EcdsaKeygenResult, ExportableEd25519KeygenResult, BIP340KeygenResult } from '#internal/node';
|
|
5
5
|
import { Logger as Logger$1 } from '@dynamic-labs/logger';
|
|
@@ -443,6 +443,8 @@ class DynamicWalletClient {
|
|
|
443
443
|
environmentId: this.environmentId
|
|
444
444
|
});
|
|
445
445
|
throw error;
|
|
446
|
+
} finally{
|
|
447
|
+
this.apiClient.forwardMPCClient.disconnect();
|
|
446
448
|
}
|
|
447
449
|
}
|
|
448
450
|
async externalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
|
|
@@ -631,7 +633,7 @@ class DynamicWalletClient {
|
|
|
631
633
|
isFormatted,
|
|
632
634
|
chainName
|
|
633
635
|
});
|
|
634
|
-
this.logger.
|
|
636
|
+
this.logger.debug('Signing message with MPC Socket Client');
|
|
635
637
|
const environment = getEnvironmentFromUrl(this.baseApiUrl);
|
|
636
638
|
const defaultRelayUrl = MPC_RELAY_URL_MAP[environment];
|
|
637
639
|
const { signature: signatureBytes } = await this.apiClient.forwardMPCClient.signMessage({
|
|
@@ -660,6 +662,8 @@ class DynamicWalletClient {
|
|
|
660
662
|
dynamicRequestId
|
|
661
663
|
});
|
|
662
664
|
throw error;
|
|
665
|
+
} finally{
|
|
666
|
+
this.apiClient.forwardMPCClient.disconnect();
|
|
663
667
|
}
|
|
664
668
|
}
|
|
665
669
|
async sign({ accountAddress, externalServerKeyShares, message, chainName, password = undefined, isFormatted = false, context, onError, bitcoinConfig }) {
|
|
@@ -1634,18 +1638,6 @@ class DynamicWalletClient {
|
|
|
1634
1638
|
forwardMPCClient: this.resolvedForwardMPCClient,
|
|
1635
1639
|
logger: this.logger
|
|
1636
1640
|
});
|
|
1637
|
-
if (this.forwardMPCEnabled) {
|
|
1638
|
-
this.apiClient.forwardMPCClient.connect().then(()=>{
|
|
1639
|
-
this.logger.info('Optimistically Connected to ForwardMPC enclave', {
|
|
1640
|
-
environmentId: this.environmentId
|
|
1641
|
-
});
|
|
1642
|
-
}).catch((error)=>{
|
|
1643
|
-
this.logger.error('Error connecting to ForwardMPC enclave optimistically', {
|
|
1644
|
-
error,
|
|
1645
|
-
environmentId: this.environmentId
|
|
1646
|
-
});
|
|
1647
|
-
});
|
|
1648
|
-
}
|
|
1649
1641
|
}
|
|
1650
1642
|
}
|
|
1651
1643
|
|
package/package.json
CHANGED
|
@@ -1,11 +1,11 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/node",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.313",
|
|
4
4
|
"license": "Licensed under the Dynamic Labs, Inc. Terms Of Service (https://www.dynamic.xyz/terms-conditions)",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"dependencies": {
|
|
7
|
-
"@dynamic-labs-wallet/core": "0.0.
|
|
8
|
-
"@dynamic-labs-wallet/forward-mpc-client": "0.5.
|
|
7
|
+
"@dynamic-labs-wallet/core": "0.0.313",
|
|
8
|
+
"@dynamic-labs-wallet/forward-mpc-client": "0.5.4",
|
|
9
9
|
"@dynamic-labs/logger": "^4.45.2",
|
|
10
10
|
"@dynamic-labs/sdk-api-core": "^0.0.900",
|
|
11
11
|
"uuid": "11.1.0",
|
package/src/client.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,kBAAkB,EAElB,iBAAiB,EACjB,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,cAAc,EAGd,gBAAgB,EAIhB,wBAAwB,EACxB,KAAK,OAAO,EAEZ,eAAe,EAUf,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACvB,KAAK,8BAA8B,EAEpC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,kBAAkB,EAAE,MAAM,yCAAyC,CAAC;AAC7E,OAAO,KAAK,EAAyB,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAG5F,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAErD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAC7D,OAAO,KAAK,EAAE,wBAAwB,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAG7E,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;IAC3C,SAAS,CAAC,iBAAiB,UAAQ;IACnC,SAAS,CAAC,wBAAwB,EAAE,kBAAkB,GAAG,SAAS,CAAC;gBAEvD,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,EACL,gBAAgB,EAChB,oBAA2B,EAC3B,MAAM,GACP,EAAE,wBAAwB;IA4D3B,OAAO,CAAC,4BAA4B;IAM9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAuBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,gBAAgB,EAChB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAuB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAsBK,8BAA8B,CAAC,EACnC,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA8DI,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA4EI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAoCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAsEI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,EACP,WAAW,EACX,OAAO,EACP,aAAa,EACb,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC;IAwBK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAmBlC,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,GACZ,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;QACpD,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;KACvB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA0ClC,IAAI,CAAC,EACT,cAAc,EACd,uBAAuB,EACvB,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,OAAO,EACP,OAAO,EACP,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA+ElC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAiDK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAUD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAoGK,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,aAAa,EACb,mBAAmB,GACpB,EAAE,8BAA8B,CAAC;QAChC,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,CAAC;;;IAyDI,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IA4CK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAWvF,oCAAoC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE;IAanF,4BAA4B,CAAC,EACjC,cAAc,EACd,uBAAmC,EACnC,QAAoB,EACpB,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IA0GK,qCAAqC,CAAC,EAC1C,cAAc,EACd,uBAAuB,EACvB,QAAQ,EACR,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAkBK,0BAA0B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA2BtG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAcK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,iCAAiC,EACjC,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,iCAAiC,EAAE,kBAAkB,CAAC;QACtD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IAoCD;;;;;;;;;OASG;cACa,wBAAwB,CAAC,EACvC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,uBAAuB,EACvB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,YAAY,EAAE,MAAM,CAAC;KACtB,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,UAAsB,EACtB,oBAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;KAChC;IAiEK,6BAA6B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAa/G;;;;;OAKG;YACW,iBAAiB;IAgF/B;;;;OAIG;IACG,cAAc,CAAC,EAAE,cAAc,EAAE,QAAoB,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA8CtG,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAO3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAmCd,yCAAyC,CAAC,EAC9C,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA2BzB,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA2DD;;;OAGG;IACG,kBAAkB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,GAAG,IAAI,CAAC;IAqElF;;;OAGG;IACG,UAAU;IAgChB;;;;;;;;;OASG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;CAqBT"}
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,kBAAkB,EAElB,iBAAiB,EACjB,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,cAAc,EAGd,gBAAgB,EAIhB,wBAAwB,EACxB,KAAK,OAAO,EAEZ,eAAe,EAUf,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACvB,KAAK,8BAA8B,EAEpC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,kBAAkB,EAAE,MAAM,yCAAyC,CAAC;AAC7E,OAAO,KAAK,EAAyB,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAG5F,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAErD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAC7D,OAAO,KAAK,EAAE,wBAAwB,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAG7E,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;IAC3C,SAAS,CAAC,iBAAiB,UAAQ;IACnC,SAAS,CAAC,wBAAwB,EAAE,kBAAkB,GAAG,SAAS,CAAC;gBAEvD,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,EACL,gBAAgB,EAChB,oBAA2B,EAC3B,MAAM,GACP,EAAE,wBAAwB;IA4C3B,OAAO,CAAC,4BAA4B;IAM9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAuBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,gBAAgB,EAChB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAuB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAsBK,8BAA8B,CAAC,EACnC,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IAgEI,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA4EI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAoCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAsEI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,EACP,WAAW,EACX,OAAO,EACP,aAAa,EACb,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC;IAwBK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAmBlC,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,GACZ,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;QACpD,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;KACvB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA4ClC,IAAI,CAAC,EACT,cAAc,EACd,uBAAuB,EACvB,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,OAAO,EACP,OAAO,EACP,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA+ElC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAiDK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAUD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAoGK,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,aAAa,EACb,mBAAmB,GACpB,EAAE,8BAA8B,CAAC;QAChC,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,CAAC;;;IAyDI,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IA4CK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAWvF,oCAAoC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE;IAanF,4BAA4B,CAAC,EACjC,cAAc,EACd,uBAAmC,EACnC,QAAoB,EACpB,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IA0GK,qCAAqC,CAAC,EAC1C,cAAc,EACd,uBAAuB,EACvB,QAAQ,EACR,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAkBK,0BAA0B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA2BtG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAcK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,iCAAiC,EACjC,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,iCAAiC,EAAE,kBAAkB,CAAC;QACtD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IAoCD;;;;;;;;;OASG;cACa,wBAAwB,CAAC,EACvC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,uBAAuB,EACvB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,YAAY,EAAE,MAAM,CAAC;KACtB,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,UAAsB,EACtB,oBAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;KAChC;IAiEK,6BAA6B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAa/G;;;;;OAKG;YACW,iBAAiB;IAgF/B;;;;OAIG;IACG,cAAc,CAAC,EAAE,cAAc,EAAE,QAAoB,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA8CtG,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAO3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAmCd,yCAAyC,CAAC,EAC9C,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA2BzB,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA2DD;;;OAGG;IACG,kBAAkB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,GAAG,IAAI,CAAC;IAqElF;;;OAGG;IACG,UAAU;IAgChB;;;;;;;;;OASG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;CAqBT"}
|