@dynamic-labs-wallet/node 0.0.81 → 0.0.82
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.cjs.js +24 -13
- package/index.esm.js +24 -13
- package/package.json +2 -2
- package/src/client.d.ts +14 -7
- package/src/client.d.ts.map +1 -1
package/index.cjs.js
CHANGED
|
@@ -543,12 +543,13 @@ class DynamicWalletClient {
|
|
|
543
543
|
existingExternalServerKeyShares
|
|
544
544
|
};
|
|
545
545
|
}
|
|
546
|
-
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined }) {
|
|
546
|
+
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId = undefined }) {
|
|
547
547
|
this.ensureApiClientAuthenticated();
|
|
548
548
|
await this.verifyPassword({
|
|
549
549
|
accountAddress,
|
|
550
550
|
password,
|
|
551
|
-
walletOperation: core.WalletOperation.RESHARE
|
|
551
|
+
walletOperation: core.WalletOperation.RESHARE,
|
|
552
|
+
signedSessionId
|
|
552
553
|
});
|
|
553
554
|
const { existingExternalServerShareCount } = core.getServerWalletReshareConfig({
|
|
554
555
|
oldThresholdSignatureScheme,
|
|
@@ -604,12 +605,13 @@ class DynamicWalletClient {
|
|
|
604
605
|
});
|
|
605
606
|
return reshareResults;
|
|
606
607
|
}
|
|
607
|
-
async exportKey({ accountAddress, chainName, password = undefined }) {
|
|
608
|
+
async exportKey({ accountAddress, chainName, password = undefined, signedSessionId = undefined }) {
|
|
608
609
|
this.ensureApiClientAuthenticated();
|
|
609
610
|
await this.verifyPassword({
|
|
610
611
|
accountAddress,
|
|
611
612
|
password,
|
|
612
|
-
walletOperation: core.WalletOperation.EXPORT_PRIVATE_KEY
|
|
613
|
+
walletOperation: core.WalletOperation.EXPORT_PRIVATE_KEY,
|
|
614
|
+
signedSessionId
|
|
613
615
|
});
|
|
614
616
|
const wallet = await this.getWallet({
|
|
615
617
|
accountAddress,
|
|
@@ -700,7 +702,7 @@ class DynamicWalletClient {
|
|
|
700
702
|
throw new Error('Ceremony completion timeout');
|
|
701
703
|
}
|
|
702
704
|
}
|
|
703
|
-
async storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares = undefined, password = undefined }) {
|
|
705
|
+
async storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares = undefined, password = undefined, signedSessionId = undefined }) {
|
|
704
706
|
this.ensureApiClientAuthenticated();
|
|
705
707
|
//add retry logic for ceremony completion to prevent race condition
|
|
706
708
|
await this.ensureCeremonyCompletionBeforeBackup({
|
|
@@ -720,10 +722,12 @@ class DynamicWalletClient {
|
|
|
720
722
|
if (!this.walletMap[accountAddress] || !this.walletMap[accountAddress].walletId) {
|
|
721
723
|
throw new Error(`WalletId not found for accountAddress: ${accountAddress}`);
|
|
722
724
|
}
|
|
725
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
723
726
|
const data = await this.apiClient.storeEncryptedBackupByWallet({
|
|
724
727
|
walletId: this.walletMap[accountAddress].walletId,
|
|
725
728
|
encryptedKeyShares,
|
|
726
|
-
passwordEncrypted: Boolean(password) && password !== this.environmentId
|
|
729
|
+
passwordEncrypted: Boolean(password) && password !== this.environmentId,
|
|
730
|
+
signedSessionId
|
|
727
731
|
});
|
|
728
732
|
this.walletMap[accountAddress] = _extends({}, this.walletMap[accountAddress], {
|
|
729
733
|
externalServerKeySharesBackupInfo: getExternalServerKeyShareBackupInfo({
|
|
@@ -811,7 +815,7 @@ class DynamicWalletClient {
|
|
|
811
815
|
requiredShareCount
|
|
812
816
|
};
|
|
813
817
|
}
|
|
814
|
-
async recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, shareCount = undefined, storeRecoveredShares = true }) {
|
|
818
|
+
async recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, signedSessionId, shareCount = undefined, storeRecoveredShares = true }) {
|
|
815
819
|
this.ensureApiClientAuthenticated();
|
|
816
820
|
const wallet = this.walletMap[accountAddress];
|
|
817
821
|
this.logger.debug(`recoverEncryptedBackupByWallet wallet: ${walletOperation}`, wallet);
|
|
@@ -824,7 +828,8 @@ class DynamicWalletClient {
|
|
|
824
828
|
const { dynamic: dynamicKeyShareIds } = shares;
|
|
825
829
|
const data = await this.apiClient.recoverEncryptedBackupByWallet({
|
|
826
830
|
walletId: wallet.walletId,
|
|
827
|
-
keyShareIds: dynamicKeyShareIds
|
|
831
|
+
keyShareIds: dynamicKeyShareIds,
|
|
832
|
+
signedSessionId
|
|
828
833
|
});
|
|
829
834
|
const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === core.BackupLocation.DYNAMIC);
|
|
830
835
|
const decryptedKeyShares = await Promise.all(dynamicKeyShares.map((keyShare)=>this.decryptKeyShare({
|
|
@@ -838,11 +843,12 @@ class DynamicWalletClient {
|
|
|
838
843
|
}
|
|
839
844
|
return decryptedKeyShares;
|
|
840
845
|
}
|
|
841
|
-
async exportExternalServerKeyShares({ accountAddress, password }) {
|
|
846
|
+
async exportExternalServerKeyShares({ accountAddress, password, signedSessionId }) {
|
|
842
847
|
await this.verifyPassword({
|
|
843
848
|
accountAddress,
|
|
844
849
|
password,
|
|
845
|
-
walletOperation: core.WalletOperation.REACH_ALL_PARTIES
|
|
850
|
+
walletOperation: core.WalletOperation.REACH_ALL_PARTIES,
|
|
851
|
+
signedSessionId
|
|
846
852
|
});
|
|
847
853
|
const externalServerKeyShares = await this.getExternalServerKeyShares({
|
|
848
854
|
accountAddress,
|
|
@@ -895,11 +901,12 @@ class DynamicWalletClient {
|
|
|
895
901
|
* verifyPassword attempts to recover and decrypt a single client key share using the provided password.
|
|
896
902
|
* If successful, the key share is encrypted with the new password. This method solely performs the recovery
|
|
897
903
|
* and decryption without storing the restored key shares. If unsuccessful, it throws an error.
|
|
898
|
-
*/ async verifyPassword({ accountAddress, password = undefined, walletOperation = core.WalletOperation.NO_OPERATION }) {
|
|
904
|
+
*/ async verifyPassword({ accountAddress, password = undefined, walletOperation = core.WalletOperation.NO_OPERATION, signedSessionId = undefined }) {
|
|
899
905
|
await this.getWallet({
|
|
900
906
|
accountAddress,
|
|
901
907
|
password,
|
|
902
|
-
walletOperation
|
|
908
|
+
walletOperation,
|
|
909
|
+
signedSessionId
|
|
903
910
|
});
|
|
904
911
|
if (await this.requiresPasswordForOperation({
|
|
905
912
|
accountAddress,
|
|
@@ -919,10 +926,12 @@ class DynamicWalletClient {
|
|
|
919
926
|
throw new Error('No dynamic key shares found');
|
|
920
927
|
}
|
|
921
928
|
try {
|
|
929
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
922
930
|
await this.recoverEncryptedBackupByWallet({
|
|
923
931
|
accountAddress,
|
|
924
932
|
password,
|
|
925
933
|
walletOperation,
|
|
934
|
+
signedSessionId,
|
|
926
935
|
shareCount: 1,
|
|
927
936
|
storeRecoveredShares: false
|
|
928
937
|
});
|
|
@@ -985,7 +994,7 @@ class DynamicWalletClient {
|
|
|
985
994
|
walletProperties: wallet == null ? void 0 : wallet.walletProperties
|
|
986
995
|
});
|
|
987
996
|
}
|
|
988
|
-
async getWallet({ accountAddress, walletOperation = core.WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
|
|
997
|
+
async getWallet({ accountAddress, walletOperation = core.WalletOperation.NO_OPERATION, signedSessionId = undefined, shareCount = undefined, password = undefined }) {
|
|
989
998
|
var _user_verifiedCredentials;
|
|
990
999
|
this.ensureApiClientAuthenticated();
|
|
991
1000
|
const existingWalletCheck = await this.checkWalletFields({
|
|
@@ -1017,10 +1026,12 @@ class DynamicWalletClient {
|
|
|
1017
1026
|
accountAddress,
|
|
1018
1027
|
walletOperation
|
|
1019
1028
|
})) {
|
|
1029
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
1020
1030
|
const decryptedKeyShares = await this.recoverEncryptedBackupByWallet({
|
|
1021
1031
|
accountAddress,
|
|
1022
1032
|
password: password != null ? password : this.environmentId,
|
|
1023
1033
|
walletOperation: walletOperation,
|
|
1034
|
+
signedSessionId,
|
|
1024
1035
|
shareCount
|
|
1025
1036
|
});
|
|
1026
1037
|
this.logger.debug('Recovered backup', decryptedKeyShares);
|
package/index.esm.js
CHANGED
|
@@ -543,12 +543,13 @@ class DynamicWalletClient {
|
|
|
543
543
|
existingExternalServerKeyShares
|
|
544
544
|
};
|
|
545
545
|
}
|
|
546
|
-
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined }) {
|
|
546
|
+
async reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password = undefined, signedSessionId = undefined }) {
|
|
547
547
|
this.ensureApiClientAuthenticated();
|
|
548
548
|
await this.verifyPassword({
|
|
549
549
|
accountAddress,
|
|
550
550
|
password,
|
|
551
|
-
walletOperation: WalletOperation.RESHARE
|
|
551
|
+
walletOperation: WalletOperation.RESHARE,
|
|
552
|
+
signedSessionId
|
|
552
553
|
});
|
|
553
554
|
const { existingExternalServerShareCount } = getServerWalletReshareConfig({
|
|
554
555
|
oldThresholdSignatureScheme,
|
|
@@ -604,12 +605,13 @@ class DynamicWalletClient {
|
|
|
604
605
|
});
|
|
605
606
|
return reshareResults;
|
|
606
607
|
}
|
|
607
|
-
async exportKey({ accountAddress, chainName, password = undefined }) {
|
|
608
|
+
async exportKey({ accountAddress, chainName, password = undefined, signedSessionId = undefined }) {
|
|
608
609
|
this.ensureApiClientAuthenticated();
|
|
609
610
|
await this.verifyPassword({
|
|
610
611
|
accountAddress,
|
|
611
612
|
password,
|
|
612
|
-
walletOperation: WalletOperation.EXPORT_PRIVATE_KEY
|
|
613
|
+
walletOperation: WalletOperation.EXPORT_PRIVATE_KEY,
|
|
614
|
+
signedSessionId
|
|
613
615
|
});
|
|
614
616
|
const wallet = await this.getWallet({
|
|
615
617
|
accountAddress,
|
|
@@ -700,7 +702,7 @@ class DynamicWalletClient {
|
|
|
700
702
|
throw new Error('Ceremony completion timeout');
|
|
701
703
|
}
|
|
702
704
|
}
|
|
703
|
-
async storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares = undefined, password = undefined }) {
|
|
705
|
+
async storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares = undefined, password = undefined, signedSessionId = undefined }) {
|
|
704
706
|
this.ensureApiClientAuthenticated();
|
|
705
707
|
//add retry logic for ceremony completion to prevent race condition
|
|
706
708
|
await this.ensureCeremonyCompletionBeforeBackup({
|
|
@@ -720,10 +722,12 @@ class DynamicWalletClient {
|
|
|
720
722
|
if (!this.walletMap[accountAddress] || !this.walletMap[accountAddress].walletId) {
|
|
721
723
|
throw new Error(`WalletId not found for accountAddress: ${accountAddress}`);
|
|
722
724
|
}
|
|
725
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
723
726
|
const data = await this.apiClient.storeEncryptedBackupByWallet({
|
|
724
727
|
walletId: this.walletMap[accountAddress].walletId,
|
|
725
728
|
encryptedKeyShares,
|
|
726
|
-
passwordEncrypted: Boolean(password) && password !== this.environmentId
|
|
729
|
+
passwordEncrypted: Boolean(password) && password !== this.environmentId,
|
|
730
|
+
signedSessionId
|
|
727
731
|
});
|
|
728
732
|
this.walletMap[accountAddress] = _extends({}, this.walletMap[accountAddress], {
|
|
729
733
|
externalServerKeySharesBackupInfo: getExternalServerKeyShareBackupInfo({
|
|
@@ -811,7 +815,7 @@ class DynamicWalletClient {
|
|
|
811
815
|
requiredShareCount
|
|
812
816
|
};
|
|
813
817
|
}
|
|
814
|
-
async recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, shareCount = undefined, storeRecoveredShares = true }) {
|
|
818
|
+
async recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, signedSessionId, shareCount = undefined, storeRecoveredShares = true }) {
|
|
815
819
|
this.ensureApiClientAuthenticated();
|
|
816
820
|
const wallet = this.walletMap[accountAddress];
|
|
817
821
|
this.logger.debug(`recoverEncryptedBackupByWallet wallet: ${walletOperation}`, wallet);
|
|
@@ -824,7 +828,8 @@ class DynamicWalletClient {
|
|
|
824
828
|
const { dynamic: dynamicKeyShareIds } = shares;
|
|
825
829
|
const data = await this.apiClient.recoverEncryptedBackupByWallet({
|
|
826
830
|
walletId: wallet.walletId,
|
|
827
|
-
keyShareIds: dynamicKeyShareIds
|
|
831
|
+
keyShareIds: dynamicKeyShareIds,
|
|
832
|
+
signedSessionId
|
|
828
833
|
});
|
|
829
834
|
const dynamicKeyShares = data.keyShares.filter((keyShare)=>keyShare.encryptedAccountCredential !== null && keyShare.backupLocation === BackupLocation.DYNAMIC);
|
|
830
835
|
const decryptedKeyShares = await Promise.all(dynamicKeyShares.map((keyShare)=>this.decryptKeyShare({
|
|
@@ -838,11 +843,12 @@ class DynamicWalletClient {
|
|
|
838
843
|
}
|
|
839
844
|
return decryptedKeyShares;
|
|
840
845
|
}
|
|
841
|
-
async exportExternalServerKeyShares({ accountAddress, password }) {
|
|
846
|
+
async exportExternalServerKeyShares({ accountAddress, password, signedSessionId }) {
|
|
842
847
|
await this.verifyPassword({
|
|
843
848
|
accountAddress,
|
|
844
849
|
password,
|
|
845
|
-
walletOperation: WalletOperation.REACH_ALL_PARTIES
|
|
850
|
+
walletOperation: WalletOperation.REACH_ALL_PARTIES,
|
|
851
|
+
signedSessionId
|
|
846
852
|
});
|
|
847
853
|
const externalServerKeyShares = await this.getExternalServerKeyShares({
|
|
848
854
|
accountAddress,
|
|
@@ -895,11 +901,12 @@ class DynamicWalletClient {
|
|
|
895
901
|
* verifyPassword attempts to recover and decrypt a single client key share using the provided password.
|
|
896
902
|
* If successful, the key share is encrypted with the new password. This method solely performs the recovery
|
|
897
903
|
* and decryption without storing the restored key shares. If unsuccessful, it throws an error.
|
|
898
|
-
*/ async verifyPassword({ accountAddress, password = undefined, walletOperation = WalletOperation.NO_OPERATION }) {
|
|
904
|
+
*/ async verifyPassword({ accountAddress, password = undefined, walletOperation = WalletOperation.NO_OPERATION, signedSessionId = undefined }) {
|
|
899
905
|
await this.getWallet({
|
|
900
906
|
accountAddress,
|
|
901
907
|
password,
|
|
902
|
-
walletOperation
|
|
908
|
+
walletOperation,
|
|
909
|
+
signedSessionId
|
|
903
910
|
});
|
|
904
911
|
if (await this.requiresPasswordForOperation({
|
|
905
912
|
accountAddress,
|
|
@@ -919,10 +926,12 @@ class DynamicWalletClient {
|
|
|
919
926
|
throw new Error('No dynamic key shares found');
|
|
920
927
|
}
|
|
921
928
|
try {
|
|
929
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
922
930
|
await this.recoverEncryptedBackupByWallet({
|
|
923
931
|
accountAddress,
|
|
924
932
|
password,
|
|
925
933
|
walletOperation,
|
|
934
|
+
signedSessionId,
|
|
926
935
|
shareCount: 1,
|
|
927
936
|
storeRecoveredShares: false
|
|
928
937
|
});
|
|
@@ -985,7 +994,7 @@ class DynamicWalletClient {
|
|
|
985
994
|
walletProperties: wallet == null ? void 0 : wallet.walletProperties
|
|
986
995
|
});
|
|
987
996
|
}
|
|
988
|
-
async getWallet({ accountAddress, walletOperation = WalletOperation.NO_OPERATION, shareCount = undefined, password = undefined }) {
|
|
997
|
+
async getWallet({ accountAddress, walletOperation = WalletOperation.NO_OPERATION, signedSessionId = undefined, shareCount = undefined, password = undefined }) {
|
|
989
998
|
var _user_verifiedCredentials;
|
|
990
999
|
this.ensureApiClientAuthenticated();
|
|
991
1000
|
const existingWalletCheck = await this.checkWalletFields({
|
|
@@ -1017,10 +1026,12 @@ class DynamicWalletClient {
|
|
|
1017
1026
|
accountAddress,
|
|
1018
1027
|
walletOperation
|
|
1019
1028
|
})) {
|
|
1029
|
+
// TODO(zfaizal2): throw error if signedSessionId is not provided after service deploy
|
|
1020
1030
|
const decryptedKeyShares = await this.recoverEncryptedBackupByWallet({
|
|
1021
1031
|
accountAddress,
|
|
1022
1032
|
password: password != null ? password : this.environmentId,
|
|
1023
1033
|
walletOperation: walletOperation,
|
|
1034
|
+
signedSessionId,
|
|
1024
1035
|
shareCount
|
|
1025
1036
|
});
|
|
1026
1037
|
this.logger.debug('Recovered backup', decryptedKeyShares);
|
package/package.json
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs-wallet/node",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.82",
|
|
4
4
|
"license": "Licensed under the Dynamic Labs, Inc. Terms Of Service (https://www.dynamic.xyz/terms-conditions)",
|
|
5
5
|
"dependencies": {
|
|
6
|
-
"@dynamic-labs-wallet/core": "0.0.
|
|
6
|
+
"@dynamic-labs-wallet/core": "0.0.82",
|
|
7
7
|
"@dynamic-labs/logger": "^4.5.1",
|
|
8
8
|
"@noble/hashes": "1.7.1"
|
|
9
9
|
},
|
package/src/client.d.ts
CHANGED
|
@@ -117,17 +117,19 @@ export declare class DynamicWalletClient {
|
|
|
117
117
|
existingExternalServerKeygenIds: string[];
|
|
118
118
|
existingExternalServerKeyShares: ServerKeyShare[];
|
|
119
119
|
}>;
|
|
120
|
-
reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, }: {
|
|
120
|
+
reshare({ chainName, accountAddress, oldThresholdSignatureScheme, newThresholdSignatureScheme, password, signedSessionId, }: {
|
|
121
121
|
chainName: string;
|
|
122
122
|
accountAddress: string;
|
|
123
123
|
oldThresholdSignatureScheme: ThresholdSignatureScheme;
|
|
124
124
|
newThresholdSignatureScheme: ThresholdSignatureScheme;
|
|
125
125
|
password?: string;
|
|
126
|
+
signedSessionId?: string;
|
|
126
127
|
}): Promise<(EcdsaKeygenResult | BIP340KeygenResult)[]>;
|
|
127
|
-
exportKey({ accountAddress, chainName, password, }: {
|
|
128
|
+
exportKey({ accountAddress, chainName, password, signedSessionId, }: {
|
|
128
129
|
accountAddress: string;
|
|
129
130
|
chainName: string;
|
|
130
131
|
password?: string;
|
|
132
|
+
signedSessionId?: string;
|
|
131
133
|
}): Promise<{
|
|
132
134
|
derivedPrivateKey: string | undefined;
|
|
133
135
|
}>;
|
|
@@ -145,10 +147,11 @@ export declare class DynamicWalletClient {
|
|
|
145
147
|
ensureCeremonyCompletionBeforeBackup({ accountAddress, }: {
|
|
146
148
|
accountAddress: string;
|
|
147
149
|
}): Promise<void>;
|
|
148
|
-
storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares, password, }: {
|
|
150
|
+
storeEncryptedBackupByWallet({ accountAddress, externalServerKeyShares, password, signedSessionId, }: {
|
|
149
151
|
accountAddress: string;
|
|
150
152
|
externalServerKeyShares?: ServerKeyShare[];
|
|
151
153
|
password?: string;
|
|
154
|
+
signedSessionId?: string;
|
|
152
155
|
}): Promise<any>;
|
|
153
156
|
storeEncryptedBackupByWalletWithRetry({ accountAddress, externalServerKeyShares, password, }: {
|
|
154
157
|
accountAddress: string;
|
|
@@ -189,16 +192,18 @@ export declare class DynamicWalletClient {
|
|
|
189
192
|
shares: Partial<Record<BackupLocation, string[]>>;
|
|
190
193
|
requiredShareCount: number;
|
|
191
194
|
};
|
|
192
|
-
recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, shareCount, storeRecoveredShares, }: {
|
|
195
|
+
recoverEncryptedBackupByWallet({ accountAddress, password, walletOperation, signedSessionId, shareCount, storeRecoveredShares, }: {
|
|
193
196
|
accountAddress: string;
|
|
194
197
|
password?: string;
|
|
195
198
|
walletOperation: WalletOperation;
|
|
199
|
+
signedSessionId?: string;
|
|
196
200
|
shareCount?: number;
|
|
197
201
|
storeRecoveredShares?: boolean;
|
|
198
202
|
}): Promise<any[]>;
|
|
199
|
-
exportExternalServerKeyShares({ accountAddress, password, }: {
|
|
203
|
+
exportExternalServerKeyShares({ accountAddress, password, signedSessionId, }: {
|
|
200
204
|
accountAddress: string;
|
|
201
205
|
password?: string;
|
|
206
|
+
signedSessionId: string;
|
|
202
207
|
}): Promise<import("./mpc").ServerKeyShare[]>;
|
|
203
208
|
/**
|
|
204
209
|
* Helper function to check if the required wallet fields are present and valid
|
|
@@ -212,10 +217,11 @@ export declare class DynamicWalletClient {
|
|
|
212
217
|
* If successful, the key share is encrypted with the new password. This method solely performs the recovery
|
|
213
218
|
* and decryption without storing the restored key shares. If unsuccessful, it throws an error.
|
|
214
219
|
*/
|
|
215
|
-
verifyPassword({ accountAddress, password, walletOperation, }: {
|
|
220
|
+
verifyPassword({ accountAddress, password, walletOperation, signedSessionId, }: {
|
|
216
221
|
accountAddress: string;
|
|
217
222
|
password?: string;
|
|
218
223
|
walletOperation?: WalletOperation;
|
|
224
|
+
signedSessionId?: string;
|
|
219
225
|
}): Promise<void>;
|
|
220
226
|
isPasswordEncrypted({ accountAddress, }: {
|
|
221
227
|
accountAddress: string;
|
|
@@ -237,9 +243,10 @@ export declare class DynamicWalletClient {
|
|
|
237
243
|
getWalletExternalServerKeyShareBackupInfo({ accountAddress, }: {
|
|
238
244
|
accountAddress: string;
|
|
239
245
|
}): Promise<KeyShareBackupInfo>;
|
|
240
|
-
getWallet({ accountAddress, walletOperation, shareCount, password, }: {
|
|
246
|
+
getWallet({ accountAddress, walletOperation, signedSessionId, shareCount, password, }: {
|
|
241
247
|
accountAddress: string;
|
|
242
248
|
walletOperation?: WalletOperation;
|
|
249
|
+
signedSessionId?: string;
|
|
243
250
|
shareCount?: number;
|
|
244
251
|
password?: string;
|
|
245
252
|
}): Promise<WalletProperties>;
|
package/src/client.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,iBAAiB,EACjB,kBAAkB,EAClB,cAAc,EAGd,cAAc,EAIf,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,wBAAwB,EACxB,gBAAgB,EAIhB,eAAe,EACf,kBAAkB,EAClB,cAAc,EAGf,MAAM,2BAA2B,CAAC;AAEnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,aAAa,CAAC;AAErD,OAAO,EAAE,gBAAgB,EAAE,MAAM,SAAS,CAAC;AAU3C,KAAK,cAAc,GAAG,iBAAiB,GAAG,kBAAkB,CAAC;AAE7D,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,wCAAU;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;gBAE/B,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,GACN,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,kBAAkB,CAAC,EAAE,MAAM,CAAC;QAC5B,KAAK,CAAC,EAAE,OAAO,CAAC;KACjB;IASD,OAAO,CAAC,4BAA4B;IAQ9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAoBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAoBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,GACzB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;KACpD,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAyB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;KACzC;IAyBK,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,GACzB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;KACpD,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IAwDI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAmCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IA0EI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;KAC9B;IAYK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;KACzC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAwClC,IAAI,CAAC,EACT,cAAc,EACd,OAAO,EACP,SAAS,EACT,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAkClC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA6CK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;KAChC;IASD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,
|
|
1
|
+
{"version":3,"file":"client.d.ts","sourceRoot":"","sources":["../../packages/src/client.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,iBAAiB,EACjB,kBAAkB,EAClB,cAAc,EAGd,cAAc,EAIf,MAAM,gBAAgB,CAAC;AAExB,OAAO,EACL,wBAAwB,EACxB,gBAAgB,EAIhB,eAAe,EACf,kBAAkB,EAClB,cAAc,EAGf,MAAM,2BAA2B,CAAC;AAEnC,OAAO,EAAE,sBAAsB,EAAE,MAAM,aAAa,CAAC;AAErD,OAAO,EAAE,gBAAgB,EAAE,MAAM,SAAS,CAAC;AAU3C,KAAK,cAAc,GAAG,iBAAiB,GAAG,kBAAkB,CAAC;AAE7D,qBAAa,mBAAmB;IACvB,aAAa,EAAE,MAAM,CAAC;IACtB,KAAK,EAAE,OAAO,CAAC;IAEtB,SAAS,CAAC,MAAM,wCAAU;IAE1B,SAAS,CAAC,SAAS,EAAG,gBAAgB,CAAC;IACvC,SAAS,CAAC,SAAS,EAAE,MAAM,CAAC,MAAM,EAAE,gBAAgB,CAAC,CAAM;IAC3D,SAAS,CAAC,kBAAkB,CAAC,EAAE,MAAM,CAAC;IACtC,SAAS,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC;IACpC,SAAS,CAAC,UAAU,CAAC,EAAE,MAAM,CAAC;IAC9B,SAAS,CAAC,wBAAwB,UAAS;gBAE/B,EACV,aAAa,EACb,UAAU,EACV,kBAAkB,EAClB,KAAK,GACN,EAAE;QACD,aAAa,EAAE,MAAM,CAAC;QACtB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,kBAAkB,CAAC,EAAE,MAAM,CAAC;QAC5B,KAAK,CAAC,EAAE,OAAO,CAAC;KACjB;IASD,OAAO,CAAC,4BAA4B;IAQ9B,oBAAoB,CAAC,SAAS,EAAE,MAAM;IAoBtC,6BAA6B,CAAC,EAClC,SAAS,EACT,uBAAuB,EACvB,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,uBAAuB,EAAE,MAAM,EAAE,CAAC;QAClC,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE;IAoBK,8BAA8B,CAAC,EACnC,SAAS,EACT,wBAAwB,GACzB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;KACpD,GAAG,OAAO,CAAC,sBAAsB,EAAE,CAAC;IAyB/B,eAAe,CAAC,EACpB,SAAS,EACT,QAAQ,EACR,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;KACzC;IAyBK,oBAAoB,CAAC,EACzB,SAAS,EACT,MAAM,EACN,sBAAsB,EACtB,+BAA+B,EAC/B,wBAAwB,GACzB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,MAAM,CAAC;QACf,sBAAsB,EAAE,MAAM,EAAE,CAAC;QACjC,+BAA+B,EAAE,sBAAsB,EAAE,CAAC;QAC1D,wBAAwB,EAAE,wBAAwB,CAAC;KACpD,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,2BAA2B,EAAE,cAAc,EAAE,CAAC;KAC/C,CAAC;IAwDI,MAAM,CAAC,EACX,SAAS,EACT,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IAmCI,mBAAmB,CAAC,EACxB,SAAS,EACT,UAAU,EACV,wBAAwB,EACxB,OAAO,EACP,kBAAkB,GACnB,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,UAAU,EAAE,MAAM,CAAC;QACnB,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,OAAO,CAAC,EAAE,CAAC,KAAK,EAAE,KAAK,KAAK,IAAI,CAAC;QACjC,kBAAkB,CAAC,EAAE,CAAC,cAAc,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,KAAK,IAAI,CAAC;KACzE,GAAG,OAAO,CAAC;QACV,YAAY,EAAE,cAAc,GAAG,UAAU,GAAG,SAAS,CAAC;QACtD,uBAAuB,EAAE,cAAc,EAAE,CAAC;KAC3C,CAAC;IA0EI,iBAAiB,CAAC,EACtB,QAAQ,EACR,OAAO,GACR,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;KAC9B;IAYK,kBAAkB,CAAC,EACvB,SAAS,EACT,OAAO,EACP,MAAM,EACN,QAAQ,EACR,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,MAAM,EAAE,MAAM,CAAC;QACf,QAAQ,EAAE,cAAc,CAAC;QACzB,cAAc,EAAE,WAAW,GAAG,SAAS,CAAC;KACzC,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAwClC,IAAI,CAAC,EACT,cAAc,EACd,OAAO,EACP,SAAS,EACT,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,OAAO,EAAE,MAAM,GAAG,UAAU,CAAC;QAC7B,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,UAAU,GAAG,cAAc,CAAC;IAkClC,0BAA0B,CAAC,EAC/B,cAAc,EACd,SAAS,EACT,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IA6CK,WAAW,CAAC,EAChB,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,cAAc,CAAC;KAChC;IASD;;;;;;;;;;;;;OAaG;IACG,eAAe,CAAC,EACpB,SAAS,EACT,MAAM,EACN,2BAA2B,EAC3B,2BAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,MAAM,EAAE,gBAAgB,CAAC;QACzB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;KACvD,GAAG,OAAO,CAAC;QACV,kCAAkC,EAAE,sBAAsB,EAAE,CAAC;QAC7D,0BAA0B,EAAE,MAAM,EAAE,CAAC;QACrC,+BAA+B,EAAE,MAAM,EAAE,CAAC;QAC1C,+BAA+B,EAAE,cAAc,EAAE,CAAC;KACnD,CAAC;IA4CI,OAAO,CAAC,EACZ,SAAS,EACT,cAAc,EACd,2BAA2B,EAC3B,2BAA2B,EAC3B,QAAoB,EACpB,eAA2B,GAC5B,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,cAAc,EAAE,MAAM,CAAC;QACvB,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,2BAA2B,EAAE,wBAAwB,CAAC;QACtD,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B;IAmGK,SAAS,CAAC,EACd,cAAc,EACd,SAAS,EACT,QAAoB,EACpB,eAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,SAAS,EAAE,MAAM,CAAC;QAClB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B;;;IA0DK,gBAAgB,CAAC,EACrB,SAAS,EACT,SAAS,EACT,cAAc,GACf,EAAE;QACD,SAAS,EAAE,MAAM,CAAC;QAClB,SAAS,EAAE,cAAc,EAAE,CAAC;QAC5B,cAAc,CAAC,EAAE,MAAM,CAAC;KACzB;;;IA+DK,eAAe,CAAC,EACpB,QAAQ,EACR,QAAQ,GACT,EAAE;QACD,QAAQ,EAAE,cAAc,CAAC;QACzB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAaK,oCAAoC,CAAC,EACzC,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB;IAoBK,4BAA4B,CAAC,EACjC,cAAc,EACd,uBAAmC,EACnC,QAAoB,EACpB,eAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B;IAyDK,qCAAqC,CAAC,EAC1C,cAAc,EACd,uBAAuB,EACvB,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,uBAAuB,CAAC,EAAE,cAAc,EAAE,CAAC;QAC3C,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAoBK,0BAA0B,CAAC,EAC/B,cAAc,EACd,QAAQ,GACT,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IASK,cAAc,CAAC,EACnB,cAAc,EACd,gBAAgB,EAChB,WAAW,GACZ,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,gBAAgB,CAAC,EAAE,MAAM,CAAC;QAC1B,WAAW,CAAC,EAAE,MAAM,CAAC;KACtB;IAaK,eAAe,CAAC,EACpB,QAAQ,EACR,QAAQ,GACT,EAAE;QACD,QAAQ,EAAE,MAAM,CAAC;QACjB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB,GAAG,OAAO,CAAC,cAAc,CAAC;IAa3B;;;;;;;;;;;OAWG;IACH,eAAe,CAAC,EACd,iCAAiC,EACjC,wBAAwB,EACxB,eAAe,EACf,UAAsB,GACvB,EAAE;QACD,iCAAiC,EAAE,kBAAkB,CAAC;QACtD,wBAAwB,EAAE,wBAAwB,CAAC;QACnD,eAAe,EAAE,eAAe,CAAC;QACjC,UAAU,CAAC,EAAE,MAAM,CAAC;KACrB,GAAG;QACF,MAAM,EAAE,OAAO,CAAC,MAAM,CAAC,cAAc,EAAE,MAAM,EAAE,CAAC,CAAC,CAAC;QAClD,kBAAkB,EAAE,MAAM,CAAC;KAC5B;IA6BK,8BAA8B,CAAC,EACnC,cAAc,EACd,QAAQ,EACR,eAAe,EACf,eAAe,EACf,UAAsB,EACtB,oBAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,eAAe,CAAC;QACjC,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,oBAAoB,CAAC,EAAE,OAAO,CAAC;KAChC;IAoDK,6BAA6B,CAAC,EAClC,cAAc,EACd,QAAQ,EACR,eAAe,GAChB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,EAAE,MAAM,CAAC;KACzB;IAeD;;;;;OAKG;YACW,iBAAiB;IA8D/B;;;;OAIG;IACG,cAAc,CAAC,EACnB,cAAc,EACd,QAAoB,EACpB,eAA8C,EAC9C,eAA2B,GAC5B,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,QAAQ,CAAC,EAAE,MAAM,CAAC;QAClB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,eAAe,CAAC,EAAE,MAAM,CAAC;KAC1B;IAgDK,mBAAmB,CAAC,EACxB,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,OAAO,CAAC;IAQpB;;OAEG;IACG,4BAA4B,CAAC,EACjC,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IAYpB;;OAEG;IACG,uCAAuC,CAAC,EAC5C,cAAc,EACd,eAAiD,GAClD,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;KACnC,GAAG,OAAO,CAAC,OAAO,CAAC;IA+Bd,yCAAyC,CAAC,EAC9C,cAAc,GACf,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;KACxB,GAAG,OAAO,CAAC,kBAAkB,CAAC;IAoBzB,SAAS,CAAC,EACd,cAAc,EACd,eAA8C,EAC9C,eAA2B,EAC3B,UAAsB,EACtB,QAAoB,GACrB,EAAE;QACD,cAAc,EAAE,MAAM,CAAC;QACvB,eAAe,CAAC,EAAE,eAAe,CAAC;QAClC,eAAe,CAAC,EAAE,MAAM,CAAC;QACzB,UAAU,CAAC,EAAE,MAAM,CAAC;QACpB,QAAQ,CAAC,EAAE,MAAM,CAAC;KACnB;IAkEK,UAAU;CAuCjB"}
|