@dynamic-labs-wallet/node 0.0.311 → 0.0.313

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/index.cjs.js CHANGED
@@ -1,7 +1,7 @@
1
1
  'use strict';
2
2
 
3
- var core$1 = require('#internal/core');
4
- var core = require('@dynamic-labs-wallet/core');
3
+ var core = require('#internal/core');
4
+ var core$1 = require('@dynamic-labs-wallet/core');
5
5
  var node = require('#internal/node');
6
6
  var logger = require('@dynamic-labs/logger');
7
7
  var forwardMpcClient = require('@dynamic-labs-wallet/forward-mpc-client');
@@ -10,20 +10,20 @@ var crypto = require('crypto');
10
10
  require('node:crypto');
11
11
 
12
12
  // Removed duplicate exports - these are already exported from #internal/core
13
- const getMPCSignatureScheme = ({ signingAlgorithm, baseRelayUrl = core.MPC_RELAY_PROD_API_URL })=>{
13
+ const getMPCSignatureScheme = ({ signingAlgorithm, baseRelayUrl = core$1.MPC_RELAY_PROD_API_URL })=>{
14
14
  switch(signingAlgorithm){
15
- case core.SigningAlgorithm.ECDSA:
15
+ case core$1.SigningAlgorithm.ECDSA:
16
16
  return new node.Ecdsa(baseRelayUrl);
17
- case core.SigningAlgorithm.ED25519:
17
+ case core$1.SigningAlgorithm.ED25519:
18
18
  return new node.ExportableEd25519(baseRelayUrl);
19
- case core.SigningAlgorithm.BIP340:
19
+ case core$1.SigningAlgorithm.BIP340:
20
20
  return new node.BIP340(baseRelayUrl);
21
21
  default:
22
22
  throw new Error(`Unsupported signing algorithm: ${signingAlgorithm}`);
23
23
  }
24
24
  };
25
25
  const getMPCSigner = ({ chainName, baseRelayUrl, bitcoinConfig })=>{
26
- const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
26
+ const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
27
27
  const signatureScheme = getMPCSignatureScheme({
28
28
  signingAlgorithm: chainConfig.signingAlgorithm,
29
29
  baseRelayUrl
@@ -49,11 +49,11 @@ const createLogError = (clientTag)=>({ message, error, context })=>logError({
49
49
  clientTag
50
50
  });
51
51
  const logError = ({ message, error, context, clientTag = 'node' })=>{
52
- if (core.isAxiosError(error)) {
53
- core.handleAxiosError(error, message, context);
52
+ if (core$1.isAxiosError(error)) {
53
+ core$1.handleAxiosError(error, message, context);
54
54
  return;
55
55
  }
56
- core.Logger.error(`[DynamicWaasWalletClient] Error in ${clientTag} client`, {
56
+ core$1.Logger.error(`[DynamicWaasWalletClient] Error in ${clientTag} client`, {
57
57
  message,
58
58
  error: error instanceof Error ? error.message : String(error),
59
59
  context
@@ -81,12 +81,12 @@ const isHexString = (str)=>{
81
81
  const getExternalServerKeyShareBackupInfo = (params)=>{
82
82
  var _params_walletProperties, _params_walletProperties_keyShares_;
83
83
  const backups = {
84
- [core.BackupLocation.DYNAMIC]: [],
85
- [core.BackupLocation.GOOGLE_DRIVE]: [],
86
- [core.BackupLocation.ICLOUD]: [],
87
- [core.BackupLocation.USER]: [],
88
- [core.BackupLocation.EXTERNAL]: [],
89
- [core.BackupLocation.DELEGATED]: []
84
+ [core$1.BackupLocation.DYNAMIC]: [],
85
+ [core$1.BackupLocation.GOOGLE_DRIVE]: [],
86
+ [core$1.BackupLocation.ICLOUD]: [],
87
+ [core$1.BackupLocation.USER]: [],
88
+ [core$1.BackupLocation.EXTERNAL]: [],
89
+ [core$1.BackupLocation.DELEGATED]: []
90
90
  };
91
91
  if (!(params == null ? void 0 : (_params_walletProperties = params.walletProperties) == null ? void 0 : _params_walletProperties.keyShares)) {
92
92
  return {
@@ -141,7 +141,7 @@ const getExternalServerKeyShareBackupInfo = (params)=>{
141
141
  } catch (error) {
142
142
  attempts++;
143
143
  if (attempts === maxAttempts) {
144
- core.Logger.error(`Failed to execute ${operationName} after ${maxAttempts} attempts`, _extends({}, logContext, {
144
+ core$1.Logger.error(`Failed to execute ${operationName} after ${maxAttempts} attempts`, _extends({}, logContext, {
145
145
  error
146
146
  }));
147
147
  throw error;
@@ -321,7 +321,7 @@ class DynamicWalletClient {
321
321
  }
322
322
  }
323
323
  async authenticateApiToken(authToken) {
324
- const tmpClient = new core.DynamicApiClient({
324
+ const tmpClient = new core$1.DynamicApiClient({
325
325
  environmentId: this.environmentId,
326
326
  authToken,
327
327
  baseApiUrl: this.baseApiUrl,
@@ -332,7 +332,7 @@ class DynamicWalletClient {
332
332
  });
333
333
  const jwtTokenAuth = response.data.encodedJwts.minifiedJwt;
334
334
  this.baseJWTAuthToken = jwtTokenAuth;
335
- this.apiClient = new core.DynamicApiClient({
335
+ this.apiClient = new core$1.DynamicApiClient({
336
336
  environmentId: this.environmentId,
337
337
  authToken: jwtTokenAuth,
338
338
  baseApiUrl: this.baseApiUrl,
@@ -368,7 +368,7 @@ class DynamicWalletClient {
368
368
  baseRelayUrl: this.baseMPCRelayApiUrl,
369
369
  bitcoinConfig
370
370
  });
371
- const clientThreshold = core.getClientThreshold(thresholdSignatureScheme);
371
+ const clientThreshold = core$1.getClientThreshold(thresholdSignatureScheme);
372
372
  const keygenInitResults = await Promise.all(Array(clientThreshold).fill(null).map(()=>mpcSigner.initKeygen()));
373
373
  return keygenInitResults;
374
374
  } catch (error) {
@@ -399,9 +399,9 @@ class DynamicWalletClient {
399
399
  }
400
400
  async forwardMPCExternalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
401
401
  try {
402
- const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
402
+ const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
403
403
  const signingAlgo = chainConfig.signingAlgorithm;
404
- const mpcConfig = core.MPC_CONFIG[thresholdSignatureScheme];
404
+ const mpcConfig = core$1.MPC_CONFIG[thresholdSignatureScheme];
405
405
  const isEd25519 = typeof signingAlgo === 'string' && signingAlgo.toLowerCase().includes('ed25519');
406
406
  const serverKeygenResults = await Promise.all(externalServerInitKeygenResults.map(async (currentInit)=>{
407
407
  const otherExternalServerKeygenIds = externalServerInitKeygenResults.filter((init)=>init.keygenId !== currentInit.keygenId).map((init)=>init.keygenId);
@@ -425,7 +425,7 @@ class DynamicWalletClient {
425
425
  });
426
426
  }));
427
427
  const [serverKeygenResult] = serverKeygenResults;
428
- const chainConfigForDeriv = core.getMPCChainConfig(chainName, bitcoinConfig);
428
+ const chainConfigForDeriv = core$1.getMPCChainConfig(chainName, bitcoinConfig);
429
429
  const derivationPath = new Uint32Array(chainConfigForDeriv.derivationPath);
430
430
  const rawPublicKey = await this.derivePublicKey({
431
431
  chainName,
@@ -444,6 +444,8 @@ class DynamicWalletClient {
444
444
  environmentId: this.environmentId
445
445
  });
446
446
  throw error;
447
+ } finally{
448
+ this.apiClient.forwardMPCClient.disconnect();
447
449
  }
448
450
  }
449
451
  async externalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
@@ -465,7 +467,7 @@ class DynamicWalletClient {
465
467
  bitcoinConfig
466
468
  });
467
469
  // Get the MPC config for the threshold signature scheme
468
- const mpcConfig = core.MPC_CONFIG[thresholdSignatureScheme];
470
+ const mpcConfig = core$1.MPC_CONFIG[thresholdSignatureScheme];
469
471
  // For each client keygen init result, create an array of other parties' keygenIds
470
472
  const serverKeygenResults = await Promise.all(externalServerInitKeygenResults.map((currentInit)=>{
471
473
  // Get all other client keygenIds (excluding current one)
@@ -485,7 +487,7 @@ class DynamicWalletClient {
485
487
  }));
486
488
  // only need one client keygen result to derive the public key
487
489
  const [serverKeygenResult] = serverKeygenResults;
488
- const chainConfig = core.getMPCChainConfig(chainName, bitcoinConfig);
490
+ const chainConfig = core$1.getMPCChainConfig(chainName, bitcoinConfig);
489
491
  const derivationPath = new Uint32Array(chainConfig.derivationPath);
490
492
  const rawPublicKey = await this.derivePublicKey({
491
493
  chainName,
@@ -560,7 +562,7 @@ class DynamicWalletClient {
560
562
  onError,
561
563
  onCeremonyComplete
562
564
  });
563
- const { threshold } = core.getTSSConfig(thresholdSignatureScheme);
565
+ const { threshold } = core$1.getTSSConfig(thresholdSignatureScheme);
564
566
  const externalServerKeygenResults = await Promise.all(externalServerKeygenInitResults.map(async (currentInit, index)=>{
565
567
  const otherExternalServerKeygenIds = externalServerKeygenInitResults.filter((init)=>init.keygenId !== currentInit.keygenId).map((init)=>init.keygenId);
566
568
  if (index === 0) {
@@ -627,14 +629,14 @@ class DynamicWalletClient {
627
629
  }
628
630
  async forwardMPCClientSign({ chainName, message, roomId, keyShare, derivationPath, formattedMessage, dynamicRequestId, isFormatted }) {
629
631
  try {
630
- const messageForForwardMPC = core.serializeMessageForForwardMPC({
632
+ const messageForForwardMPC = core$1.serializeMessageForForwardMPC({
631
633
  message,
632
634
  isFormatted,
633
635
  chainName
634
636
  });
635
- this.logger.info('Forward MPC enabled, signing message with forward MPC');
636
- const environment = core.getEnvironmentFromUrl(this.baseApiUrl);
637
- const defaultRelayUrl = core.MPC_RELAY_URL_MAP[environment];
637
+ this.logger.debug('Signing message with MPC Socket Client');
638
+ const environment = core$1.getEnvironmentFromUrl(this.baseApiUrl);
639
+ const defaultRelayUrl = core$1.MPC_RELAY_URL_MAP[environment];
638
640
  const { signature: signatureBytes } = await this.apiClient.forwardMPCClient.signMessage({
639
641
  keyshare: keyShare,
640
642
  message: chainName === 'SVM' ? formattedMessage : messageForForwardMPC,
@@ -661,6 +663,8 @@ class DynamicWalletClient {
661
663
  dynamicRequestId
662
664
  });
663
665
  throw error;
666
+ } finally{
667
+ this.apiClient.forwardMPCClient.disconnect();
664
668
  }
665
669
  }
666
670
  async sign({ accountAddress, externalServerKeyShares, message, chainName, password = undefined, isFormatted = false, context, onError, bitcoinConfig }) {
@@ -671,13 +675,13 @@ class DynamicWalletClient {
671
675
  });
672
676
  const wallet = await this.getWallet({
673
677
  accountAddress,
674
- walletOperation: core.WalletOperation.SIGN_MESSAGE,
678
+ walletOperation: core$1.WalletOperation.SIGN_MESSAGE,
675
679
  password
676
680
  });
677
681
  externalServerKeyShares = externalServerKeyShares != null ? externalServerKeyShares : wallet.externalServerKeyShares;
678
682
  if (!externalServerKeyShares) {
679
683
  var _wallet_externalServerKeySharesBackupInfo;
680
- const hasExternalKeyShareId = Object.values(((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.backups) || {}).some((locations)=>locations.some((loc)=>loc.location === core.BackupLocation.EXTERNAL));
684
+ const hasExternalKeyShareId = Object.values(((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.backups) || {}).some((locations)=>locations.some((loc)=>loc.location === core$1.BackupLocation.EXTERNAL));
681
685
  const errorMessage = 'External server key shares are required to sign a message';
682
686
  if (hasExternalKeyShareId) {
683
687
  this.logger.error(errorMessage);
@@ -737,7 +741,7 @@ class DynamicWalletClient {
737
741
  });
738
742
  const wallet = await this.getWallet({
739
743
  accountAddress,
740
- walletOperation: core.WalletOperation.REFRESH,
744
+ walletOperation: core$1.WalletOperation.REFRESH,
741
745
  password
742
746
  });
743
747
  const mpcSigner = getMPCSigner({
@@ -798,7 +802,7 @@ class DynamicWalletClient {
798
802
  bitcoinConfig
799
803
  });
800
804
  // Determine share counts based on threshold signature schemes
801
- const { newExternalServerShareCount, existingExternalServerShareCount } = core.getServerWalletReshareConfig({
805
+ const { newExternalServerShareCount, existingExternalServerShareCount } = core$1.getServerWalletReshareConfig({
802
806
  oldThresholdSignatureScheme,
803
807
  newThresholdSignatureScheme
804
808
  });
@@ -827,13 +831,13 @@ class DynamicWalletClient {
827
831
  accountAddress,
828
832
  password
829
833
  });
830
- const { existingExternalServerShareCount } = core.getServerWalletReshareConfig({
834
+ const { existingExternalServerShareCount } = core$1.getServerWalletReshareConfig({
831
835
  oldThresholdSignatureScheme,
832
836
  newThresholdSignatureScheme
833
837
  });
834
838
  const wallet = await this.getWallet({
835
839
  accountAddress,
836
- walletOperation: core.WalletOperation.RESHARE,
840
+ walletOperation: core$1.WalletOperation.RESHARE,
837
841
  shareCount: existingExternalServerShareCount,
838
842
  password
839
843
  });
@@ -862,8 +866,8 @@ class DynamicWalletClient {
862
866
  });
863
867
  const { roomId, serverKeygenIds: dynamicServerKeygenIds, newServerKeygenIds: newDynamicServerKeygenIds = [] } = data;
864
868
  // Get the MPC config for the threshold signature scheme
865
- const oldMpcConfig = core.MPC_CONFIG[oldThresholdSignatureScheme];
866
- const newMpcConfig = core.MPC_CONFIG[newThresholdSignatureScheme];
869
+ const oldMpcConfig = core$1.MPC_CONFIG[oldThresholdSignatureScheme];
870
+ const newMpcConfig = core$1.MPC_CONFIG[newThresholdSignatureScheme];
867
871
  const allPartyKeygenIds = [
868
872
  ...externalServerKeygenIds,
869
873
  ...dynamicServerKeygenIds,
@@ -897,7 +901,7 @@ class DynamicWalletClient {
897
901
  const wallet = await this.getWallet({
898
902
  accountAddress,
899
903
  password,
900
- walletOperation: core.WalletOperation.EXPORT_PRIVATE_KEY
904
+ walletOperation: core$1.WalletOperation.EXPORT_PRIVATE_KEY
901
905
  });
902
906
  externalServerKeyShares = externalServerKeyShares != null ? externalServerKeyShares : wallet.externalServerKeyShares;
903
907
  if (!externalServerKeyShares) {
@@ -952,7 +956,7 @@ class DynamicWalletClient {
952
956
  if (!keyExportRaw) {
953
957
  throw new Error('Error exporting private key: Export returned null');
954
958
  }
955
- const chainConfig = core.getMPCChainConfig(chainName);
959
+ const chainConfig = core$1.getMPCChainConfig(chainName);
956
960
  const walletDerivationPath = !derivationPath ? undefined : new Uint32Array(chainConfig.derivationPath);
957
961
  let derivedPrivateKey;
958
962
  if (mpcSigner instanceof node.Ecdsa) {
@@ -1035,7 +1039,7 @@ class DynamicWalletClient {
1035
1039
  bitcoinConfig
1036
1040
  });
1037
1041
  locations.push({
1038
- location: core.BackupLocation.DYNAMIC,
1042
+ location: core$1.BackupLocation.DYNAMIC,
1039
1043
  externalKeyShareId: data.keyShareIds[0],
1040
1044
  passwordEncrypted: passwordEncryptedFlag,
1041
1045
  keygenId
@@ -1047,7 +1051,7 @@ class DynamicWalletClient {
1047
1051
  bitcoinConfig
1048
1052
  });
1049
1053
  locations.push({
1050
- location: core.BackupLocation.EXTERNAL,
1054
+ location: core$1.BackupLocation.EXTERNAL,
1051
1055
  passwordEncrypted: passwordEncryptedFlag,
1052
1056
  keygenId
1053
1057
  });
@@ -1101,7 +1105,7 @@ class DynamicWalletClient {
1101
1105
  const wallet = await this.getWallet({
1102
1106
  accountAddress,
1103
1107
  password,
1104
- walletOperation: core.WalletOperation.REACH_THRESHOLD
1108
+ walletOperation: core$1.WalletOperation.REACH_THRESHOLD
1105
1109
  });
1106
1110
  // Check if the wallet has a dynamic backup and derive password encryption status from the first dynamic share
1107
1111
  const dynamicBackups = (wallet == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups.dynamic) || [];
@@ -1113,7 +1117,7 @@ class DynamicWalletClient {
1113
1117
  const recoveredShares = await this.recoverEncryptedBackupByWallet({
1114
1118
  accountAddress,
1115
1119
  password,
1116
- walletOperation: core.WalletOperation.REACH_THRESHOLD
1120
+ walletOperation: core$1.WalletOperation.REACH_THRESHOLD
1117
1121
  });
1118
1122
  return recoveredShares;
1119
1123
  }
@@ -1121,7 +1125,7 @@ class DynamicWalletClient {
1121
1125
  await this.getWallet({
1122
1126
  accountAddress,
1123
1127
  password: existingPassword,
1124
- walletOperation: core.WalletOperation.REACH_ALL_PARTIES
1128
+ walletOperation: core$1.WalletOperation.REACH_ALL_PARTIES
1125
1129
  });
1126
1130
  await this.storeEncryptedBackupByWallet({
1127
1131
  accountAddress,
@@ -1151,22 +1155,22 @@ class DynamicWalletClient {
1151
1155
  * @returns @requiredShareCount: The number of shares required to recover
1152
1156
  */ recoverStrategy({ externalServerKeySharesBackupInfo, thresholdSignatureScheme, walletOperation, shareCount = undefined }) {
1153
1157
  const { backups } = externalServerKeySharesBackupInfo;
1154
- const { clientThreshold } = core.MPC_CONFIG[thresholdSignatureScheme];
1155
- let requiredShareCount = walletOperation === core.WalletOperation.REFRESH || walletOperation === core.WalletOperation.REACH_ALL_PARTIES || walletOperation === core.WalletOperation.RESHARE ? clientThreshold : 1;
1158
+ const { clientThreshold } = core$1.MPC_CONFIG[thresholdSignatureScheme];
1159
+ let requiredShareCount = walletOperation === core$1.WalletOperation.REFRESH || walletOperation === core$1.WalletOperation.REACH_ALL_PARTIES || walletOperation === core$1.WalletOperation.RESHARE ? clientThreshold : 1;
1156
1160
  // Override requiredShareCount if shareCount is provided
1157
1161
  if (shareCount !== undefined) {
1158
1162
  requiredShareCount = shareCount;
1159
1163
  }
1160
- const dynamicShares = (backups[core.BackupLocation.DYNAMIC] || []).slice(0, requiredShareCount);
1161
- const externalShares = (backups[core.BackupLocation.EXTERNAL] || []).slice(0, requiredShareCount);
1164
+ const dynamicShares = (backups[core$1.BackupLocation.DYNAMIC] || []).slice(0, requiredShareCount);
1165
+ const externalShares = (backups[core$1.BackupLocation.EXTERNAL] || []).slice(0, requiredShareCount);
1162
1166
  // If we have DYNAMIC shares, use those; otherwise use EXTERNAL shares
1163
1167
  const sharesToUse = dynamicShares.length > 0 ? dynamicShares : externalShares;
1164
- const backupLocation = dynamicShares.length > 0 ? core.BackupLocation.DYNAMIC : core.BackupLocation.EXTERNAL;
1168
+ const backupLocation = dynamicShares.length > 0 ? core$1.BackupLocation.DYNAMIC : core$1.BackupLocation.EXTERNAL;
1165
1169
  return {
1166
1170
  shares: {
1167
1171
  // EXTERNAL shares don't have externalKeyShareId (they're not uploaded to the API),
1168
1172
  // so we use their id for counting purposes instead of calling getRequiredExternalKeyShareId.
1169
- [backupLocation]: backupLocation === core.BackupLocation.DYNAMIC ? sharesToUse.map(core.getRequiredExternalKeyShareId) : sharesToUse.map((ks)=>ks.id || '')
1173
+ [backupLocation]: backupLocation === core$1.BackupLocation.DYNAMIC ? sharesToUse.map(core$1.getRequiredExternalKeyShareId) : sharesToUse.map((ks)=>ks.id || '')
1170
1174
  },
1171
1175
  requiredShareCount
1172
1176
  };
@@ -1214,7 +1218,7 @@ class DynamicWalletClient {
1214
1218
  walletOperation,
1215
1219
  shareCount
1216
1220
  });
1217
- const dynamicKeyShareIds = shares[core.BackupLocation.DYNAMIC] || [];
1221
+ const dynamicKeyShareIds = shares[core$1.BackupLocation.DYNAMIC] || [];
1218
1222
  if (dynamicKeyShareIds.length === 0) {
1219
1223
  this.logger.debug('No DYNAMIC shares available for recovery');
1220
1224
  return [];
@@ -1224,7 +1228,7 @@ class DynamicWalletClient {
1224
1228
  externalKeyShareIds: dynamicKeyShareIds,
1225
1229
  requiresSignedSessionId: false
1226
1230
  });
1227
- const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === core.BackupLocation.DYNAMIC);
1231
+ const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === core$1.BackupLocation.DYNAMIC);
1228
1232
  var _wallet_externalServerKeySharesBackupInfo_passwordEncrypted;
1229
1233
  const isPasswordEncrypted = (_wallet_externalServerKeySharesBackupInfo_passwordEncrypted = (_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo.passwordEncrypted) != null ? _wallet_externalServerKeySharesBackupInfo_passwordEncrypted : false;
1230
1234
  if (isPasswordEncrypted && !password) {
@@ -1257,7 +1261,7 @@ class DynamicWalletClient {
1257
1261
  * @param accountAddress - The account address of the wallet to check
1258
1262
  * @param walletOperation - The wallet operation that determines required fields
1259
1263
  * @returns boolean indicating if wallet needs to be re-fetched and restored from server
1260
- */ async checkWalletFields({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD, shareCount }) {
1264
+ */ async checkWalletFields({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD, shareCount }) {
1261
1265
  var _existingWallet_externalServerKeyShares;
1262
1266
  let keyshareCheck = false;
1263
1267
  let walletCheck = false;
@@ -1326,11 +1330,11 @@ class DynamicWalletClient {
1326
1330
  await this.getWallet({
1327
1331
  accountAddress,
1328
1332
  password,
1329
- walletOperation: core.WalletOperation.NO_OPERATION
1333
+ walletOperation: core$1.WalletOperation.NO_OPERATION
1330
1334
  });
1331
1335
  if (await this.requiresPasswordForOperation({
1332
1336
  accountAddress,
1333
- walletOperation: core.WalletOperation.NO_OPERATION
1337
+ walletOperation: core$1.WalletOperation.NO_OPERATION
1334
1338
  }) && !password) {
1335
1339
  throw new Error('Password is required for operation but not provided');
1336
1340
  }
@@ -1352,7 +1356,7 @@ class DynamicWalletClient {
1352
1356
  await this.recoverEncryptedBackupByWallet({
1353
1357
  accountAddress,
1354
1358
  password,
1355
- walletOperation: core.WalletOperation.NO_OPERATION
1359
+ walletOperation: core$1.WalletOperation.NO_OPERATION
1356
1360
  });
1357
1361
  } catch (error) {
1358
1362
  this.logger.error('Error in verifying password', error);
@@ -1367,7 +1371,7 @@ class DynamicWalletClient {
1367
1371
  }
1368
1372
  /**
1369
1373
  * check if the operation requires a password
1370
- */ async requiresPasswordForOperation({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD }) {
1374
+ */ async requiresPasswordForOperation({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD }) {
1371
1375
  const isEncrypted = await this.isPasswordEncrypted({
1372
1376
  accountAddress
1373
1377
  });
@@ -1381,12 +1385,12 @@ class DynamicWalletClient {
1381
1385
  }
1382
1386
  /**
1383
1387
  * check if the operation requires restoring backup shares
1384
- */ async requiresRestoreBackupSharesForOperation({ accountAddress, walletOperation = core.WalletOperation.REACH_THRESHOLD }) {
1388
+ */ async requiresRestoreBackupSharesForOperation({ accountAddress, walletOperation = core$1.WalletOperation.REACH_THRESHOLD }) {
1385
1389
  const externalServerKeySharesBackupInfo = await this.getWalletExternalServerKeyShareBackupInfo({
1386
1390
  accountAddress
1387
1391
  });
1388
1392
  const externalServerKeyShares = this.walletMap[accountAddress].externalServerKeyShares || [];
1389
- if (walletOperation === core.WalletOperation.REACH_ALL_PARTIES || walletOperation === core.WalletOperation.REFRESH || walletOperation === core.WalletOperation.RESHARE) {
1393
+ if (walletOperation === core$1.WalletOperation.REACH_ALL_PARTIES || walletOperation === core$1.WalletOperation.REFRESH || walletOperation === core$1.WalletOperation.RESHARE) {
1390
1394
  return true;
1391
1395
  }
1392
1396
  const { shares, requiredShareCount } = this.recoverStrategy({
@@ -1394,8 +1398,8 @@ class DynamicWalletClient {
1394
1398
  thresholdSignatureScheme: this.walletMap[accountAddress].thresholdSignatureScheme,
1395
1399
  walletOperation
1396
1400
  });
1397
- const dynamicKeyShareIds = shares[core.BackupLocation.DYNAMIC] || [];
1398
- const externalKeyShareIds = shares[core.BackupLocation.EXTERNAL] || [];
1401
+ const dynamicKeyShareIds = shares[core$1.BackupLocation.DYNAMIC] || [];
1402
+ const externalKeyShareIds = shares[core$1.BackupLocation.EXTERNAL] || [];
1399
1403
  // Check if we have enough shares from either location
1400
1404
  const totalAvailableShares = externalServerKeyShares.length + dynamicKeyShareIds.length + externalKeyShareIds.length;
1401
1405
  if (totalAvailableShares >= requiredShareCount) {
@@ -1415,7 +1419,7 @@ class DynamicWalletClient {
1415
1419
  wallet = fetchedWallet;
1416
1420
  }
1417
1421
  // Return existing backup info if it exists
1418
- if (((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC = _wallet_externalServerKeySharesBackupInfo_backups[core.BackupLocation.DYNAMIC]) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC.length) > 0) {
1422
+ if (((_wallet_externalServerKeySharesBackupInfo = wallet.externalServerKeySharesBackupInfo) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups = _wallet_externalServerKeySharesBackupInfo.backups) == null ? void 0 : (_wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC = _wallet_externalServerKeySharesBackupInfo_backups[core$1.BackupLocation.DYNAMIC]) == null ? void 0 : _wallet_externalServerKeySharesBackupInfo_backups_BackupLocation_DYNAMIC.length) > 0) {
1419
1423
  return wallet.externalServerKeySharesBackupInfo;
1420
1424
  }
1421
1425
  // Get backup info from server
@@ -1425,7 +1429,7 @@ class DynamicWalletClient {
1425
1429
  walletProperties: walletData == null ? void 0 : walletData.walletProperties
1426
1430
  });
1427
1431
  }
1428
- async getWallet({ accountAddress, walletOperation = core.WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
1432
+ async getWallet({ accountAddress, walletOperation = core$1.WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
1429
1433
  try {
1430
1434
  this.ensureApiClientAuthenticated();
1431
1435
  const existingWalletCheck = await this.checkWalletFields({
@@ -1444,7 +1448,7 @@ class DynamicWalletClient {
1444
1448
  this.logger.debug('Restoring wallet', wallet);
1445
1449
  // The wallet is already processed, so we can use it directly
1446
1450
  this.walletMap[accountAddress] = wallet;
1447
- if (walletOperation !== core.WalletOperation.NO_OPERATION && await this.requiresRestoreBackupSharesForOperation({
1451
+ if (walletOperation !== core$1.WalletOperation.NO_OPERATION && await this.requiresRestoreBackupSharesForOperation({
1448
1452
  accountAddress,
1449
1453
  walletOperation
1450
1454
  })) {
@@ -1551,14 +1555,14 @@ class DynamicWalletClient {
1551
1555
  var _vc_walletProperties_thresholdSignatureScheme;
1552
1556
  return {
1553
1557
  walletId: vc.id,
1554
- chainName: core.verifiedCredentialNameToChainEnum[vc.chain],
1558
+ chainName: core$1.verifiedCredentialNameToChainEnum[vc.chain],
1555
1559
  accountAddress: vc.address,
1556
1560
  externalServerKeySharesBackupInfo: getExternalServerKeyShareBackupInfo({
1557
1561
  walletProperties: vc.walletProperties
1558
1562
  }),
1559
1563
  externalServerKeyShares: ((_this_walletMap_vc_address = this.walletMap[vc.address]) == null ? void 0 : _this_walletMap_vc_address.externalServerKeyShares) || [],
1560
1564
  derivationPath: (_vc_walletProperties = vc.walletProperties) == null ? void 0 : _vc_walletProperties.derivationPath,
1561
- thresholdSignatureScheme: (_vc_walletProperties_thresholdSignatureScheme = (_vc_walletProperties1 = vc.walletProperties) == null ? void 0 : _vc_walletProperties1.thresholdSignatureScheme) != null ? _vc_walletProperties_thresholdSignatureScheme : core.ThresholdSignatureScheme.TWO_OF_TWO
1565
+ thresholdSignatureScheme: (_vc_walletProperties_thresholdSignatureScheme = (_vc_walletProperties1 = vc.walletProperties) == null ? void 0 : _vc_walletProperties1.thresholdSignatureScheme) != null ? _vc_walletProperties_thresholdSignatureScheme : core$1.ThresholdSignatureScheme.TWO_OF_TWO
1562
1566
  };
1563
1567
  });
1564
1568
  this.walletMap = wallets.reduce((acc, wallet)=>{
@@ -1608,45 +1612,33 @@ class DynamicWalletClient {
1608
1612
  defaultLogger.setLogLevel(debug ? 'DEBUG' : 'INFO');
1609
1613
  this.logger = defaultLogger;
1610
1614
  }
1611
- core.Logger.configure(this.logger);
1615
+ core$1.Logger.configure(this.logger);
1612
1616
  this.environmentId = environmentId;
1613
- this.baseApiUrl = baseApiUrl != null ? baseApiUrl : core.DYNAMIC_AUTH_PROD_BASE_API_URL;
1614
- const environment = core.getEnvironmentFromUrl(baseApiUrl);
1615
- this.baseMPCRelayApiUrl = baseMPCRelayApiUrl != null ? baseMPCRelayApiUrl : core.MPC_RELAY_URL_MAP[environment];
1617
+ this.baseApiUrl = baseApiUrl != null ? baseApiUrl : core$1.DYNAMIC_AUTH_PROD_BASE_API_URL;
1618
+ const environment = core$1.getEnvironmentFromUrl(baseApiUrl);
1619
+ this.baseMPCRelayApiUrl = baseMPCRelayApiUrl != null ? baseMPCRelayApiUrl : core$1.MPC_RELAY_URL_MAP[environment];
1616
1620
  this.debug = Boolean(debug);
1617
1621
  this.forwardMPCEnabled = enableMPCAccelerator || Boolean(forwardMPCClient);
1618
1622
  this.resolvedForwardMPCClient = forwardMPCClient != null ? forwardMPCClient : (()=>{
1619
1623
  if (!this.forwardMPCEnabled) return undefined;
1620
- const environment = core.getEnvironmentFromUrl(baseApiUrl);
1621
- const enclaveUrl = core.DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP[environment];
1624
+ const environment = core$1.getEnvironmentFromUrl(baseApiUrl);
1625
+ const enclaveUrl = core$1.DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP[environment];
1622
1626
  if (!enclaveUrl) throw new Error(`No ForwardMPC enclave URL configured for environment: ${environment}`);
1623
1627
  return new forwardMpcClient.ForwardMPCClientV2(enclaveUrl, {
1624
1628
  reconnectInterval: 5000,
1625
1629
  reconnectAttempts: 5,
1626
1630
  connectionTimeout: 10000,
1627
- attestationConfig: core.DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP[environment],
1631
+ attestationConfig: core$1.DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP[environment],
1628
1632
  logger: this.logger
1629
1633
  });
1630
1634
  })();
1631
1635
  // Initialize API client with forwardMPCClient
1632
- this.apiClient = new core.DynamicApiClient({
1636
+ this.apiClient = new core$1.DynamicApiClient({
1633
1637
  environmentId,
1634
1638
  baseApiUrl,
1635
1639
  forwardMPCClient: this.resolvedForwardMPCClient,
1636
1640
  logger: this.logger
1637
1641
  });
1638
- if (this.forwardMPCEnabled) {
1639
- this.apiClient.forwardMPCClient.connect().then(()=>{
1640
- this.logger.info('Optimistically Connected to ForwardMPC enclave', {
1641
- environmentId: this.environmentId
1642
- });
1643
- }).catch((error)=>{
1644
- this.logger.error('Error connecting to ForwardMPC enclave optimistically', {
1645
- error,
1646
- environmentId: this.environmentId
1647
- });
1648
- });
1649
- }
1650
1642
  }
1651
1643
  }
1652
1644
 
@@ -1659,9 +1651,9 @@ const createCore = ({ environmentId, baseApiUrl, baseMPCRelayApiUrl, debug = fal
1659
1651
  defaultLogger.setLogLevel(debug ? 'DEBUG' : 'INFO');
1660
1652
  coreLogger = defaultLogger;
1661
1653
  }
1662
- core.Logger.configure(coreLogger);
1654
+ core$1.Logger.configure(coreLogger);
1663
1655
  const createApiClient = (options = {})=>{
1664
- return new core.DynamicApiClient(_extends({
1656
+ return new core$1.DynamicApiClient(_extends({
1665
1657
  environmentId,
1666
1658
  baseApiUrl
1667
1659
  }, options, {
@@ -1837,19 +1829,19 @@ const revokeDelegation = async (client, walletId)=>{
1837
1829
 
1838
1830
  Object.defineProperty(exports, "SOLANA_RPC_URL", {
1839
1831
  enumerable: true,
1840
- get: function () { return core.SOLANA_RPC_URL; }
1832
+ get: function () { return core$1.SOLANA_RPC_URL; }
1841
1833
  });
1842
1834
  Object.defineProperty(exports, "ThresholdSignatureScheme", {
1843
1835
  enumerable: true,
1844
- get: function () { return core.ThresholdSignatureScheme; }
1836
+ get: function () { return core$1.ThresholdSignatureScheme; }
1845
1837
  });
1846
1838
  Object.defineProperty(exports, "WalletOperation", {
1847
1839
  enumerable: true,
1848
- get: function () { return core.WalletOperation; }
1840
+ get: function () { return core$1.WalletOperation; }
1849
1841
  });
1850
1842
  Object.defineProperty(exports, "getMPCChainConfig", {
1851
1843
  enumerable: true,
1852
- get: function () { return core.getMPCChainConfig; }
1844
+ get: function () { return core$1.getMPCChainConfig; }
1853
1845
  });
1854
1846
  exports.DynamicWalletClient = DynamicWalletClient;
1855
1847
  exports.base64ToBytes = base64ToBytes;
@@ -1869,9 +1861,9 @@ exports.mergeUniqueKeyShares = mergeUniqueKeyShares;
1869
1861
  exports.retryPromise = retryPromise;
1870
1862
  exports.revokeDelegation = revokeDelegation;
1871
1863
  exports.stringToBytes = stringToBytes;
1872
- Object.keys(core$1).forEach(function (k) {
1864
+ Object.keys(core).forEach(function (k) {
1873
1865
  if (k !== 'default' && !Object.prototype.hasOwnProperty.call(exports, k)) Object.defineProperty(exports, k, {
1874
1866
  enumerable: true,
1875
- get: function () { return core$1[k]; }
1867
+ get: function () { return core[k]; }
1876
1868
  });
1877
1869
  });
package/index.esm.js CHANGED
@@ -1,5 +1,5 @@
1
1
  export * from '#internal/core';
2
- import { SigningAlgorithm, MPC_RELAY_PROD_API_URL, getMPCChainConfig, isAxiosError, handleAxiosError, Logger, BackupLocation, DynamicApiClient, getClientThreshold, MPC_CONFIG, getTSSConfig, serializeMessageForForwardMPC, getEnvironmentFromUrl, MPC_RELAY_URL_MAP, WalletOperation, getServerWalletReshareConfig, getRequiredExternalKeyShareId, ThresholdSignatureScheme, verifiedCredentialNameToChainEnum, DYNAMIC_AUTH_PROD_BASE_API_URL, DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP, DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP } from '@dynamic-labs-wallet/core';
2
+ import { SigningAlgorithm, MPC_RELAY_PROD_API_URL, getMPCChainConfig, BackupLocation, isAxiosError, handleAxiosError, Logger, DynamicApiClient, getClientThreshold, MPC_CONFIG, getTSSConfig, serializeMessageForForwardMPC, getEnvironmentFromUrl, MPC_RELAY_URL_MAP, WalletOperation, getServerWalletReshareConfig, getRequiredExternalKeyShareId, ThresholdSignatureScheme, verifiedCredentialNameToChainEnum, DYNAMIC_AUTH_PROD_BASE_API_URL, DYNAMIC_FORWARD_MPC_ENCLAVE_URL_MAP, DYNAMIC_FORWARD_MPC_ENCLAVE_ATTESTATION_CONFIG_MAP } from '@dynamic-labs-wallet/core';
3
3
  export { SOLANA_RPC_URL, ThresholdSignatureScheme, WalletOperation, getMPCChainConfig } from '@dynamic-labs-wallet/core';
4
4
  import { BIP340, ExportableEd25519, Ecdsa, MessageHash, EcdsaSignature, EcdsaKeygenResult, ExportableEd25519KeygenResult, BIP340KeygenResult } from '#internal/node';
5
5
  import { Logger as Logger$1 } from '@dynamic-labs/logger';
@@ -443,6 +443,8 @@ class DynamicWalletClient {
443
443
  environmentId: this.environmentId
444
444
  });
445
445
  throw error;
446
+ } finally{
447
+ this.apiClient.forwardMPCClient.disconnect();
446
448
  }
447
449
  }
448
450
  async externalServerKeyGen({ chainName, roomId, dynamicServerKeygenIds, externalServerInitKeygenResults, thresholdSignatureScheme, bitcoinConfig }) {
@@ -631,7 +633,7 @@ class DynamicWalletClient {
631
633
  isFormatted,
632
634
  chainName
633
635
  });
634
- this.logger.info('Forward MPC enabled, signing message with forward MPC');
636
+ this.logger.debug('Signing message with MPC Socket Client');
635
637
  const environment = getEnvironmentFromUrl(this.baseApiUrl);
636
638
  const defaultRelayUrl = MPC_RELAY_URL_MAP[environment];
637
639
  const { signature: signatureBytes } = await this.apiClient.forwardMPCClient.signMessage({
@@ -660,6 +662,8 @@ class DynamicWalletClient {
660
662
  dynamicRequestId
661
663
  });
662
664
  throw error;
665
+ } finally{
666
+ this.apiClient.forwardMPCClient.disconnect();
663
667
  }
664
668
  }
665
669
  async sign({ accountAddress, externalServerKeyShares, message, chainName, password = undefined, isFormatted = false, context, onError, bitcoinConfig }) {
@@ -1634,18 +1638,6 @@ class DynamicWalletClient {
1634
1638
  forwardMPCClient: this.resolvedForwardMPCClient,
1635
1639
  logger: this.logger
1636
1640
  });
1637
- if (this.forwardMPCEnabled) {
1638
- this.apiClient.forwardMPCClient.connect().then(()=>{
1639
- this.logger.info('Optimistically Connected to ForwardMPC enclave', {
1640
- environmentId: this.environmentId
1641
- });
1642
- }).catch((error)=>{
1643
- this.logger.error('Error connecting to ForwardMPC enclave optimistically', {
1644
- error,
1645
- environmentId: this.environmentId
1646
- });
1647
- });
1648
- }
1649
1641
  }
1650
1642
  }
1651
1643
 
package/package.json CHANGED
@@ -1,11 +1,11 @@
1
1
  {
2
2
  "name": "@dynamic-labs-wallet/node",
3
- "version": "0.0.311",
3
+ "version": "0.0.313",
4
4
  "license": "Licensed under the Dynamic Labs, Inc. Terms Of Service (https://www.dynamic.xyz/terms-conditions)",
5
5
  "type": "module",
6
6
  "dependencies": {
7
- "@dynamic-labs-wallet/core": "0.0.311",
8
- "@dynamic-labs-wallet/forward-mpc-client": "0.5.2",
7
+ "@dynamic-labs-wallet/core": "0.0.313",
8
+ "@dynamic-labs-wallet/forward-mpc-client": "0.5.4",
9
9
  "@dynamic-labs/logger": "^4.45.2",
10
10
  "@dynamic-labs/sdk-api-core": "^0.0.900",
11
11
  "uuid": "11.1.0",
@@ -1 +1 @@
1
- {"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,kBAAkB,EAElB,iBAAiB,EACjB,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,cAAc,EAGd,gBAAgB,EAIhB,wBAAwB,EACxB,KAAK,OAAO,EAEZ,eAAe,EAUf,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACvB,KAAK,8BAA8B,EAEpC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,kBAAkB,EAAE,MAAM,yCAAyC,CAAC;AAC7E,OAAO,KAAK,EAAyB,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAG5F,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAErD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAC7D,OAAO,KAAK,EAAE,wBAAwB,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAG7E,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;IAC3C,SAAS,CAAC,iBAAiB,UAAQ;IACnC,SAAS,CAAC,wBAAwB,EAAE,kBAAkB,GAAG,SAAS,CAAC;gBAEvD,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,EACL,gBAAgB,EAChB,oBAA2B,EAC3B,MAAM,GACP,EAAE,wBAAwB;IA4D3B,OAAO,CAAC,4BAA4B;IAM9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAuBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,gBAAgB,EAChB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAuB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAsBK,8BAA8B,CAAC,EACnC,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA8DI,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA4EI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAoCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAsEI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,EACP,WAAW,EACX,OAAO,EACP,aAAa,EACb,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC;IAwBK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAmBlC,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,GACZ,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;QACpD,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;KACvB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA0ClC,IAAI,CAAC,EACT,cAAc,EACd,uBAAuB,EACvB,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,OAAO,EACP,OAAO,EACP,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA+ElC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAiDK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAUD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAoGK,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,aAAa,EACb,mBAAmB,GACpB,EAAE,8BAA8B,CAAC;QAChC,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,CAAC;;;IAyDI,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IA4CK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAWvF,oCAAoC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE;IAanF,4BAA4B,CAAC,EACjC,cAAc,EACd,uBAAmC,EACnC,QAAoB,EACpB,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IA0GK,qCAAqC,CAAC,EAC1C,cAAc,EACd,uBAAuB,EACvB,QAAQ,EACR,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAkBK,0BAA0B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA2BtG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAcK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,iCAAiC,EACjC,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,iCAAiC,EAAE,kBAAkB,CAAC;QACtD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IAoCD;;;;;;;;;OASG;cACa,wBAAwB,CAAC,EACvC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,uBAAuB,EACvB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,YAAY,EAAE,MAAM,CAAC;KACtB,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,UAAsB,EACtB,oBAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;KAChC;IAiEK,6BAA6B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAa/G;;;;;OAKG;YACW,iBAAiB;IAgF/B;;;;OAIG;IACG,cAAc,CAAC,EAAE,cAAc,EAAE,QAAoB,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA8CtG,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAO3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAmCd,yCAAyC,CAAC,EAC9C,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA2BzB,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA2DD;;;OAGG;IACG,kBAAkB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,GAAG,IAAI,CAAC;IAqElF;;;OAGG;IACG,UAAU;IAgChB;;;;;;;;;OASG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;CAqBT"}
1
+ {"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EAEL,kBAAkB,EAElB,iBAAiB,EACjB,cAAc,EAGd,WAAW,EACX,KAAK,cAAc,EACpB,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,cAAc,EAGd,gBAAgB,EAIhB,wBAAwB,EACxB,KAAK,OAAO,EAEZ,eAAe,EAUf,KAAK,aAAa,EAClB,KAAK,kBAAkB,EACvB,KAAK,8BAA8B,EAEpC,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,kBAAkB,EAAE,MAAM,yCAAyC,CAAC;AAC7E,OAAO,KAAK,EAAyB,kBAAkB,EAAE,MAAM,4BAA4B,CAAC;AAG5F,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,gBAAgB,CAAC;AAErD,OAAO,KAAK,EAAE,sBAAsB,EAAE,MAAM,gBAAgB,CAAC;AAC7D,OAAO,KAAK,EAAE,wBAAwB,EAAE,gBAAgB,EAAE,MAAM,YAAY,CAAC;AAG7E,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,EAAE,OAAO,CAAC;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;IAC3C,SAAS,CAAC,iBAAiB,UAAQ;IACnC,SAAS,CAAC,wBAAwB,EAAE,kBAAkB,GAAG,SAAS,CAAC;gBAEvD,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,EACL,gBAAgB,EAChB,oBAA2B,EAC3B,MAAM,GACP,EAAE,wBAAwB;IA4C3B,OAAO,CAAC,4BAA4B;IAM9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAuBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,gBAAgB,EAChB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,gBAAgB,EAAE,MAAM,CAAC;QACzB,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAqBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAuB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAsBK,8BAA8B,CAAC,EACnC,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IAgEI,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,EACxB,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IA4EI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,QAAQ,EACR,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,QAAQ,CAAC,EAAE,OAAO,CAAC;QACnB,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAoCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,aAAa,EACb,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,MAAM,GAAG,SAAS,CAAC;QAC/D,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAsEI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,EACP,WAAW,EACX,OAAO,EACP,aAAa,EACb,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC;IAwBK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,WAAW,EACX,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAmBlC,oBAAoB,CAAC,EACzB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,EACd,gBAAgB,EAChB,gBAAgB,EAChB,WAAW,GACZ,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;QACxC,gBAAgB,EAAE,MAAM,GAAG,UAAU,GAAG,WAAW,CAAC;QACpD,gBAAgB,EAAE,MAAM,CAAC;QACzB,WAAW,CAAC,EAAE,OAAO,CAAC;KACvB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA4ClC,IAAI,CAAC,EACT,cAAc,EACd,uBAAuB,EACvB,OAAO,EACP,SAAS,EACT,QAAoB,EACpB,WAAmB,EACnB,OAAO,EACP,OAAO,EACP,aAAa,GACd,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,WAAW,CAAC,EAAE,OAAO,CAAC;QACtB,OAAO,CAAC,EAAE,kBAAkB,CAAC;QAC7B,aAAa,CAAC,EAAE,aAAa,CAAC;QAC9B,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;KAClC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IA+ElC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAiDK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,EACd,aAAa,GACd,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;QAC/B,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B;IAUD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,uBAAuB,EACvB,0BAAkC,GACnC,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,0BAA0B,CAAC,EAAE,OAAO,CAAC;KACtC;IAoGK,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,uBAAuB,EACvB,aAAa,EACb,mBAAmB,GACpB,EAAE,8BAA8B,CAAC;QAChC,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,aAAa,CAAC,EAAE,aAAa,CAAC;KAC/B,CAAC;;;IAyDI,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IA4CK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,cAAc,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAWvF,oCAAoC,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE;IAanF,4BAA4B,CAAC,EACjC,cAAc,EACd,uBAAmC,EACnC,QAAoB,EACpB,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IA0GK,qCAAqC,CAAC,EAC1C,cAAc,EACd,uBAAuB,EACvB,QAAQ,EACR,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAkBK,0BAA0B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA2BtG,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,EACX,0BAA0B,GAC3B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;QACrB,0BAA0B,EAAE,OAAO,CAAC;KACrC;IAcK,eAAe,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,EAAE;QAAE,QAAQ,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,cAAc,CAAC;IAW/G;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,iCAAiC,EACjC,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,iCAAiC,EAAE,kBAAkB,CAAC;QACtD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IAoCD;;;;;;;;;OASG;cACa,wBAAwB,CAAC,EACvC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,uBAAuB,EACvB,YAAY,GACb,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,YAAY,EAAE,MAAM,CAAC;KACtB,GAAG,OAAO,CAAC,IAAI,CAAC;IAkBX,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,UAAsB,EACtB,oBAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;KAChC;IAiEK,6BAA6B,CAAC,EAAE,cAAc,EAAE,QAAQ,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IAa/G;;;;;OAKG;YACW,iBAAiB;IAgF/B;;;;OAIG;IACG,cAAc,CAAC,EAAE,cAAc,EAAE,QAAoB,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAC;QAAC,QAAQ,CAAC,EAAE,MAAM,CAAA;KAAE;IA8CtG,mBAAmB,CAAC,EAAE,cAAc,EAAE,EAAE;QAAE,cAAc,EAAE,MAAM,CAAA;KAAE,GAAG,OAAO,CAAC,OAAO,CAAC;IAO3F;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAmCd,yCAAyC,CAAC,EAC9C,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IA2BzB,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,UAAsB,EACtB,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA2DD;;;OAGG;IACG,kBAAkB,CAAC,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,gBAAgB,GAAG,IAAI,CAAC;IAqElF;;;OAGG;IACG,UAAU;IAgChB;;;;;;;;;OASG;IACH,SAAS,CAAC,wBAAwB,CAAC,EACjC,cAAc,EACd,QAAQ,EACR,SAAS,EACT,wBAAwB,EACxB,cAAc,EACd,eAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,EAAE,MAAM,CAAC;QACjB,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,cAAc,CAAC,EAAE,MAAM,CAAC;QACxB,eAAe,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,OAAO,CAAC,CAAC;KAC3C,GAAG,IAAI;CAqBT"}