@emblemvault/auth-sdk 2.3.16 → 2.3.18
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/crypto/index.d.ts +50 -0
- package/dist/crypto/index.d.ts.map +1 -0
- package/dist/crypto/index.js +2 -0
- package/dist/crypto/index.js.map +1 -0
- package/dist/crypto/index.mjs +2 -0
- package/dist/crypto/index.mjs.map +1 -0
- package/dist/crypto/types.d.ts +41 -0
- package/dist/crypto/types.d.ts.map +1 -0
- package/dist/emblem-auth.min.js +1 -1
- package/dist/emblem-auth.min.js.map +1 -1
- package/dist/emblem-auth.umd.js +1 -1
- package/dist/emblem-auth.umd.js.map +1 -1
- package/dist/index.js +1 -1
- package/dist/index.js.map +1 -1
- package/dist/index.mjs +1 -1
- package/dist/index.mjs.map +1 -1
- package/dist/signers/ethers.js.map +1 -1
- package/dist/signers/ethers.mjs.map +1 -1
- package/dist/signers/index.js +1 -1
- package/dist/signers/index.js.map +1 -1
- package/dist/signers/index.mjs +1 -1
- package/dist/signers/index.mjs.map +1 -1
- package/dist/signers/validation.d.ts.map +1 -1
- package/dist/signers/viem.d.ts.map +1 -1
- package/dist/signers/viem.js +1 -1
- package/dist/signers/viem.js.map +1 -1
- package/dist/signers/viem.mjs +1 -1
- package/dist/signers/viem.mjs.map +1 -1
- package/dist/signers/web3.js.map +1 -1
- package/dist/signers/web3.mjs.map +1 -1
- package/dist/types/index.d.ts +1 -0
- package/dist/types/index.d.ts.map +1 -1
- package/package.json +6 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"emblem-auth.min.js","sources":["../src/SessionManager.ts","../src/EmblemAuthSDK.ts","../src/signers/http.ts","../src/signers/validation.ts","../src/signers/utils.ts","../src/signers/vault.ts","../src/signers/viem.ts","../src/signers/ethers.ts","../node_modules/tslib/tslib.es6.js","../src/signers/web3.ts","../src/signers/solana.ts","../src/signers/bitcoin.ts"],"sourcesContent":["import type { AuthSession, SessionRefreshInfo } from './types/session';\n\ninterface SessionManagerConfig {\n /**\n * Callback to refresh an expiring session\n */\n onRefresh?: (session: AuthSession) => Promise<AuthSession | null>;\n\n /**\n * Time before expiry to trigger refresh (milliseconds)\n * @default 60000 (1 minute)\n */\n refreshSkewMs?: number;\n}\n\ntype SessionEventMap = {\n session: (session: AuthSession | null) => void;\n sessionExpired: (session: AuthSession) => void;\n sessionRefreshed: (session: AuthSession) => void;\n sessionWillRefresh: (info: SessionRefreshInfo) => void;\n};\n\ntype SessionEventKey = keyof SessionEventMap;\ntype SessionEventHandler<K extends SessionEventKey> = SessionEventMap[K];\n\nexport class SessionManager {\n private session: AuthSession | null = null;\n private timer: NodeJS.Timeout | null = null;\n private readonly onRefresh?: (session: AuthSession) => Promise<AuthSession | null>;\n private readonly events: Partial<Record<SessionEventKey, SessionEventHandler<any>[]>> = {};\n private readonly refreshSkewMs: number;\n private consecutiveFailures: number = 0;\n private readonly maxBackoffMs: number = 30000; // Max 30 second backoff\n private readonly baseBackoffMs: number = 2000; // Start with 2 second backoff\n\n constructor(config: SessionManagerConfig = {}) {\n this.onRefresh = config.onRefresh;\n this.refreshSkewMs = config.refreshSkewMs ?? 60000; // Default 60 seconds\n }\n\n /**\n * Set the current session and schedule refresh\n */\n setSession(session: AuthSession | null): void {\n this.session = session;\n this.schedule();\n this.emit('session', session);\n }\n\n /**\n * Get the current session\n */\n getSession(): AuthSession | null {\n return this.session;\n }\n\n /**\n * Clear the current session\n */\n clear(): void {\n this.session = null;\n this.cancel();\n this.emit('session', null);\n }\n\n /**\n * Subscribe to session events\n */\n on<K extends SessionEventKey>(event: K, handler: SessionEventHandler<K>): void {\n if (!this.events[event]) {\n this.events[event] = [];\n }\n this.events[event]!.push(handler as any);\n }\n\n /**\n * Unsubscribe from session events\n */\n off<K extends SessionEventKey>(event: K, handler: SessionEventHandler<K>): void {\n const handlers = this.events[event];\n if (handlers) {\n const index = handlers.indexOf(handler as any);\n if (index !== -1) {\n handlers.splice(index, 1);\n }\n }\n }\n\n /**\n * Destroy the session manager\n */\n destroy(): void {\n this.cancel();\n this.session = null;\n Object.keys(this.events).forEach(key => {\n delete this.events[key as SessionEventKey];\n });\n }\n\n private emit<K extends SessionEventKey>(\n event: K,\n payload: Parameters<SessionEventMap[K]>[0]\n ): void {\n const handlers = this.events[event];\n if (!handlers) return;\n\n for (const handler of handlers) {\n try {\n handler(payload as any);\n } catch (error) {\n console.error(`Error in session event handler for ${event}:`, error);\n }\n }\n }\n\n private cancel(): void {\n if (this.timer) {\n clearTimeout(this.timer);\n this.timer = null;\n }\n }\n\n /**\n * Calculate backoff delay with exponential increase, capped at maxBackoffMs\n */\n private getBackoffDelay(): number {\n // Exponential backoff: 2s, 4s, 8s, 16s, 30s (capped)\n // consecutiveFailures is 1 after first failure, so use (n-1) as exponent\n const delay = Math.min(\n this.baseBackoffMs * Math.pow(2, Math.max(0, this.consecutiveFailures - 1)),\n this.maxBackoffMs\n );\n return delay;\n }\n\n /**\n * Schedule a retry after a failed refresh attempt\n */\n private scheduleRetry(session: AuthSession): void {\n this.cancel();\n\n const now = Date.now();\n const ttl = session.expiresAt - now;\n\n // If already expired, don't retry\n if (ttl <= 0) {\n this.emit('sessionExpired', session);\n return;\n }\n\n // Calculate backoff, but don't exceed remaining TTL\n const backoff = Math.min(this.getBackoffDelay(), ttl - 1000); // Leave 1s buffer\n\n if (backoff <= 0) {\n // No time left to retry, just wait for expiry\n this.timer = setTimeout(() => {\n this.emit('sessionExpired', session);\n }, ttl);\n return;\n }\n\n console.log(`[SessionManager] Refresh failed, retrying in ${backoff}ms (attempt ${this.consecutiveFailures + 1})`);\n\n this.timer = setTimeout(async () => {\n if (!this.onRefresh) {\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n }\n return;\n }\n\n try {\n const refreshed = await this.onRefresh(session);\n // Check if we got a genuinely NEW session (different expiresAt)\n if (refreshed?.expiresAt && refreshed.authToken && refreshed.expiresAt !== session.expiresAt) {\n // Success! Reset failures and schedule next refresh\n this.consecutiveFailures = 0;\n this.setSession(refreshed);\n this.emit('sessionRefreshed', refreshed);\n } else {\n // Still failed - increment failures and retry with backoff\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n } catch (error) {\n console.error('Session refresh error:', error);\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n }, backoff);\n }\n\n private schedule(): void {\n this.cancel();\n\n const session = this.session;\n if (!session?.expiresAt) return;\n\n const now = Date.now();\n const ttl = session.expiresAt - now;\n\n if (ttl <= 0) {\n this.emit('sessionExpired', session);\n return;\n }\n\n // Reset consecutive failures when scheduling a fresh refresh\n this.consecutiveFailures = 0;\n\n const refreshIn = Math.max(0, ttl - this.refreshSkewMs);\n this.emit('sessionWillRefresh', { inMs: refreshIn, ttl });\n\n this.timer = setTimeout(async () => {\n if (!this.onRefresh) {\n // No refresh hook; check if expired\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n }\n return;\n }\n\n try {\n const refreshed = await this.onRefresh(session);\n // Check if we got a genuinely NEW session (different expiresAt)\n if (refreshed?.expiresAt && refreshed.authToken && refreshed.expiresAt !== session.expiresAt) {\n // Success! Schedule next refresh\n this.consecutiveFailures = 0;\n this.setSession(refreshed);\n this.emit('sessionRefreshed', refreshed);\n } else {\n // Refresh failed - start retry with backoff\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n } catch (error) {\n console.error('Session refresh error:', error);\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n }, refreshIn);\n }\n}\n","import { SessionManager } from './SessionManager';\nimport type {\n EmblemAuthConfig,\n AuthSession,\n WalletAuthParams,\n AuthInitResponse,\n AuthError,\n PostMessageData,\n AuthEventMap,\n AuthEventKey,\n AuthEventHandler,\n VaultInfo,\n Hex,\n SignerVaultInfo,\n EmailSendOtpParams,\n EmailVerifyOtpParams,\n EmailLoginParams,\n OAuthProvider,\n} from './types';\n\n// Signer types only - actual implementations are dynamically imported\n// to keep peer dependencies (ethers, viem, @solana/web3.js) truly optional\nimport type { EmblemEthersWallet } from './signers/ethers';\nimport type { EmblemSolanaSigner } from './signers/solana';\nimport type { EmblemWeb3Adapter } from './signers/web3';\nimport type { EmblemBitcoinSigner } from './signers/bitcoin';\n\nexport class EmblemAuthSDK {\n private readonly config: EmblemAuthConfig & {\n authUrl: string;\n apiUrl: string;\n persistSession: boolean;\n };\n private session: AuthSession | null = null;\n private pendingNonce: string | null = null;\n private readonly messageHandler: (event: MessageEvent) => void;\n private overlayEl: HTMLElement | null = null;\n private _iframeEl: HTMLIFrameElement | null = null;\n private overlayCleanup: (() => void) | null = null;\n private readonly sessionMgr: SessionManager;\n private readonly events: Partial<Record<AuthEventKey, AuthEventHandler<any>[]>> = {};\n private _cachedVaultInfo: VaultInfo | null = null;\n private readonly storageKey: string;\n private readonly visitorIdKey: string;\n private _visitorId: string | null = null;\n\n constructor(config: EmblemAuthConfig) {\n if (!config?.appId) {\n throw new Error('appId is required');\n }\n\n this.config = {\n ...config,\n authUrl: config.authUrl ?? 'https://auth.emblemvault.ai',\n apiUrl: config.apiUrl ?? 'https://api.emblemvault.ai',\n persistSession: config.persistSession ?? true,\n };\n this.storageKey = `emblem_session_${config.appId}`;\n this.visitorIdKey = `emblem_visitorId_${config.appId}`;\n this.messageHandler = this.onMessage.bind(this);\n // Only add message listener in browser environments\n if (typeof window !== 'undefined') {\n window.addEventListener('message', this.messageHandler);\n }\n\n this.sessionMgr = new SessionManager({\n onRefresh: async current => {\n try {\n const refreshed = await this.refreshSession();\n return refreshed || current;\n } catch {\n return current;\n }\n },\n });\n\n // Forward session manager events\n this.sessionMgr.on('sessionExpired', s => this.emit('sessionExpired', s));\n this.sessionMgr.on('sessionRefreshed', s => this.emit('sessionRefreshed', s));\n this.sessionMgr.on('sessionWillRefresh', info => this.emit('sessionWillRefresh', info));\n\n // Restore persisted session if enabled\n if (this.config.persistSession) {\n const restored = this.loadPersistedSession();\n if (restored) {\n this.hydrateSession(restored);\n }\n // Also restore visitorId\n this._visitorId = this.loadPersistedVisitorId();\n }\n\n // Fallback for OAuth providers that break window.opener via COOP:\n // backend can redirect to the app origin with the session in the URL hash.\n this.tryConsumeSessionFromHash();\n }\n\n private tryConsumeSessionFromHash(): void {\n if (typeof window === 'undefined') return;\n try {\n const raw = String(window.location.hash || '').replace(/^#/, '');\n if (!raw) return;\n const params = new URLSearchParams(raw);\n const encoded = params.get('emblemAuthSession');\n if (!encoded) return;\n\n const b64 = decodeURIComponent(encoded);\n const json = decodeURIComponent(escape(atob(b64)));\n const session = JSON.parse(json) as AuthSession;\n\n // Basic safety: only accept if appId matches this SDK instance\n if (session?.appId && session.appId !== this.config.appId) {\n this.authDebug('consumeHash:ignored (appId mismatch)', {\n expected: this.config.appId,\n received: session.appId,\n });\n return;\n }\n\n this.authDebug('consumeHash:accepted', { appId: session?.appId });\n\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.config.onSuccess?.(session);\n this.emit('session', session);\n\n // Clear hash to avoid leaking tokens in copy/paste, history, etc.\n try {\n window.history.replaceState(null, '', window.location.pathname + window.location.search);\n } catch {\n // ignore\n }\n } catch (e) {\n this.authDebug('consumeHash:failed', { error: (e as Error)?.message || String(e) });\n }\n }\n\n /**\n * Authenticate with a wallet signature (programmatic/headless auth)\n * Uses the external verification endpoint for cross-origin compatibility\n */\n async authenticateWallet(params: WalletAuthParams): Promise<AuthSession | null> {\n const { network, message, signature, publicKey, address } = params;\n\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required for authenticateWallet');\n }\n if (!network || !message || !signature) {\n throw new Error('network, message, signature are required');\n }\n\n const url = `${this.config.apiUrl.replace(/\\/$/, '')}/api/auth/wallet/verify-external`;\n const response = await fetch(url, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: this.config.appId,\n network,\n message,\n signature,\n publicKey,\n address,\n }),\n });\n\n if (!response.ok) {\n const errorData = await this.safeJson(response);\n const error = new Error(errorData?.error || `wallet_verify_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = errorData;\n throw error;\n }\n\n const data = await response.json();\n const session = data?.session as AuthSession | null;\n\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.config.onSuccess?.(session);\n this.emit('session', session);\n }\n\n return session;\n }\n\n /**\n * Start OAuth sign-in (google/twitter) using authUrl's /auth/oauth/init proxy flow.\n * This uses the same postMessage contract as openAuthModal().\n */\n async openOAuth(provider: OAuthProvider): Promise<void> {\n if (typeof window === 'undefined') {\n throw new Error('openOAuth() must be called in a browser environment');\n }\n\n const origin = window.location.origin;\n this.authDebug('openOAuth:start', { provider, origin, apiUrl: this.config.apiUrl });\n\n // Use authUrl (registration-site host) for OAuth so callback can be proxied there.\n // getAuthInit already prefers authUrl and falls back to apiUrl if needed.\n const initData = await this.getAuthInit({ origin });\n\n const nonce = (initData?.nonce as string) || this.randomId();\n const state = initData?.state as string;\n this.pendingNonce = nonce;\n this.authDebug('openOAuth:init ok', {\n noncePrefix: String(nonce).slice(0, 8),\n hasState: !!state,\n statePrefix: String(state || '').slice(0, 16),\n });\n\n const authOrigin = this.normalizeBaseUrl(this.config.authUrl, 'authUrl');\n const url = new URL(`${authOrigin}/api/auth/oauth/init`);\n url.searchParams.set('provider', provider);\n url.searchParams.set('state', state);\n this.authDebug('openOAuth:navigate', { url: url.toString() });\n\n // OAuth providers frequently block being embedded in iframes.\n // Always use a popup/new tab, and fallback to same-window navigation if popups are blocked.\n const win = window.open(url.toString(), 'emblem-auth', this.popupFeatures());\n if (win) {\n try {\n win.focus();\n } catch {}\n return;\n }\n\n // Popup blocked: fall back to same-window navigation (works in top-level browsing contexts).\n try {\n this.authDebug('openOAuth:popup blocked, using same-window navigation');\n window.location.assign(url.toString());\n } catch {\n const error = new Error('Popup blocked. Please allow popups for this site.') as AuthError;\n this.emitError(error);\n }\n }\n\n /**\n * Email registration: request OTP (server will send email; optionally returns OTP in dev).\n */\n async sendEmailOtp(\n params: EmailSendOtpParams\n ): Promise<{ success: boolean; expiresAt?: string; otp?: string }> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/send-otp`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_send_otp_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n return data;\n }\n\n /**\n * Email registration: verify OTP and create a session.\n */\n async verifyEmailOtp(params: EmailVerifyOtpParams): Promise<AuthSession | null> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/verify-otp`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n otp: params.otp,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_verify_otp_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Email login (email + password) -> session.\n */\n async authenticateEmail(params: EmailLoginParams): Promise<AuthSession | null> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/login`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_login_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Authenticate with a password (for AI agents / headless auth)\n * Password is hashed with appId to create a deterministic identifier.\n * Same password = same vault, different password = different vault.\n * No email or browser required - ideal for AI agents.\n *\n * @param params.password - Must be at least 16 characters (use long random strings like API keys)\n *\n * @example\n * ```typescript\n * const session = await sdk.authenticatePassword({\n * password: 'my-super-secret-agent-password-123'\n * });\n * ```\n */\n async authenticatePassword(params: { password: string }): Promise<AuthSession | null> {\n const authBase = this.config.authUrl.replace(/\\/$/, '');\n const response = await fetch(`${authBase}/api/auth/password/verify`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: this.config.appId,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `password_verify_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Open the authentication modal\n */\n async openAuthModal(): Promise<void> {\n const origin = window.location.origin;\n let initData: AuthInitResponse | null = null;\n let initError: AuthError | null = null;\n\n try {\n initData = await this.getAuthInit({ origin });\n } catch (error) {\n initError = error as AuthError;\n console.warn('[EmblemAuthSDK] /api/auth/init failed:', initError?.message || error);\n }\n\n const nonce = initData?.nonce || this.randomId();\n this.pendingNonce = nonce;\n\n let modalUrl = this.resolveModalUrl({ nonce, origin, state: initData?.state });\n\n // If origin not allowed, open modal error page directly\n if (initError?.payload?.error === 'origin_not_allowed') {\n try {\n const base = new URL('/connect', this.config.authUrl);\n base.searchParams.set('error', 'origin_not_allowed');\n base.searchParams.set('appId', this.config.appId);\n base.searchParams.set('origin', origin);\n modalUrl = base.toString();\n } catch {\n // Ignore URL construction errors\n }\n }\n\n const mode = this.config.modalMode || 'auto';\n let opened = false;\n\n if (mode === 'iframe' || mode === 'auto') {\n try {\n opened = this.openIframeModal(modalUrl);\n } catch (error) {\n console.warn(\n '[EmblemAuthSDK] iframe modal failed, will fallback to popup:',\n (error as Error)?.message\n );\n }\n }\n\n if (!opened) {\n const features = this.popupFeatures();\n const win = window.open(modalUrl, 'emblem-auth', features);\n if (!win) {\n const error = new Error('Popup blocked. Please allow popups for this site.') as AuthError;\n this.emitError(error);\n }\n }\n }\n\n /**\n * Get the current session\n */\n getSession(): AuthSession | null {\n return this.session;\n }\n\n /**\n * Get the visitor ID from the last authentication\n * This is the VaultFP fingerprint ID captured during auth\n */\n getVisitorId(): string | null {\n return this._visitorId;\n }\n\n /**\n * Refresh the current session\n * Supports two modes:\n * - Web apps: Uses httpOnly cookies (credentials: include, no body)\n * - Mobile/Native apps: Uses refresh token from session (sent in body)\n */\n async refreshSession(): Promise<AuthSession | null> {\n try {\n if (!this.session) return null;\n\n // Extract origin from authUrl for refresh endpoint\n const authOrigin = this.tryGetOriginFromConfig();\n if (!authOrigin) return this.session;\n\n const refreshUrl = `${authOrigin}/api/auth/refresh`;\n\n // Check if we have a refresh token in session (mobile/native mode)\n // If so, send it in the body. Otherwise, rely on httpOnly cookie (web mode)\n const hasTokenInSession = Boolean(this.session.refreshToken);\n\n const response = await fetch(refreshUrl, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify(hasTokenInSession ? { refreshToken: this.session.refreshToken } : {}),\n // Always include credentials - needed for cookie mode, harmless for token mode\n credentials: 'include',\n });\n\n if (!response.ok) return this.session;\n\n const data = await response.json();\n const nextSession = data?.session as AuthSession | null;\n\n if (nextSession) {\n // For mobile/native: preserve the new refresh token if returned\n // For web: refreshToken will be undefined (handled by cookies)\n this.session = nextSession;\n this.persistSession(nextSession);\n this.sessionMgr.setSession(nextSession);\n this.emit('session', nextSession);\n }\n\n return this.session;\n } catch {\n return this.session;\n }\n }\n\n /**\n * Get vault information\n */\n async getVaultInfo(): Promise<VaultInfo> {\n if (this._cachedVaultInfo) return this._cachedVaultInfo;\n\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No session');\n }\n\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required');\n }\n\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const resp = await fetch(`${apiBase}/vault/info`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${session.authToken}`,\n 'Content-Type': 'application/json',\n },\n body: '{}',\n });\n\n if (!resp.ok) {\n throw new Error('Failed to fetch vault info');\n }\n\n const rawVaultInfo = await resp.json();\n\n // Normalize the response to match the VaultInfo type\n const vaultInfo: VaultInfo = {\n ...rawVaultInfo,\n // Ensure tokenId is populated (alias for vaultId)\n tokenId: rawVaultInfo.tokenId || rawVaultInfo.vaultId,\n // Populate solanaAddress from address if not already set\n // The 'address' field from the API is the Solana address\n solanaAddress: rawVaultInfo.solanaAddress || rawVaultInfo.address,\n };\n\n this._cachedVaultInfo = vaultInfo;\n return vaultInfo;\n }\n\n /**\n * Get or create the vault API key\n */\n async getVaultApiKey(): Promise<string> {\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required');\n }\n\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No active session');\n }\n\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const token = session.authToken;\n const vaultId = session.user?.vaultId;\n\n // Try to get API key hash from vault info\n let apiKeyHash: string | null = null;\n\n try {\n const infoRes = await fetch(`${apiBase}/vault/info-complete`, {\n method: 'POST',\n headers: { Authorization: `Bearer ${token}` },\n });\n\n if (infoRes.ok) {\n const infoJson = await infoRes.json();\n apiKeyHash = infoJson?.raw?.pkp?.api_key_hash || infoJson?.raw?.pkp?.apiKeyHash || null;\n }\n } catch {\n // Ignore errors\n }\n\n // Fallback: list by created_by if info-complete didn't return a hash\n if (!apiKeyHash) {\n try {\n const appId = session.appId;\n const rawIdentifier = session.user?.identifier || '';\n const scopedIdentifier = appId ? `${appId}:${rawIdentifier}` : rawIdentifier;\n\n if (scopedIdentifier) {\n const vaultsRes = await fetch(\n `${apiBase}/api/vaults/${encodeURIComponent(scopedIdentifier)}`\n );\n if (vaultsRes.ok) {\n const vaults = await vaultsRes.json();\n const match = Array.isArray(vaults)\n ? vaults.find(v => String(v.tokenId || v.token_id) === String(vaultId)) || vaults[0]\n : null;\n apiKeyHash = match?.api_key_hash || match?.apiKeyHash || null;\n }\n }\n } catch {\n // Ignore errors\n }\n }\n\n // If no hash, generate a new key\n if (!apiKeyHash) {\n const genRes = await fetch(`${apiBase}/api/vaults/${encodeURIComponent(vaultId)}/api-key`, {\n method: 'POST',\n headers: { Authorization: `Bearer ${token}` },\n });\n\n if (!genRes.ok) {\n throw new Error(`gen_key_${genRes.status}`);\n }\n\n const genJson = await genRes.json();\n const apiKey = genJson?.apiKey || genJson?.key || null;\n\n if (!apiKey) {\n throw new Error('missing_apiKey');\n }\n\n return apiKey;\n }\n\n // Decrypt existing key\n const decRes = await fetch(`${apiBase}/decrypt`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({ tokenId: vaultId, dataToEncryptHash: apiKeyHash }),\n });\n\n if (!decRes.ok) {\n throw new Error(`decrypt_${decRes.status}`);\n }\n\n const decJson = await decRes.json();\n const decrypted = decJson?.decryptedString || null;\n\n if (!decrypted) {\n throw new Error('missing_decrypted');\n }\n\n return decrypted;\n }\n\n /**\n * Hydrate a previously saved session\n */\n hydrateSession(session: AuthSession): void {\n if (!session?.authToken) return;\n\n this.session = session;\n this.persistSession(session);\n this._cachedVaultInfo = null; // Clear cache on session change\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n\n /**\n * Logout and clear the session\n */\n logout(): void {\n this.session = null;\n this.persistSession(null);\n this._visitorId = null;\n this.persistVisitorId(null);\n this._cachedVaultInfo = null; // Clear cache on logout\n this.sessionMgr.clear();\n this.emit('session', null);\n }\n\n /**\n * Subscribe to auth events\n */\n on<K extends AuthEventKey>(event: K, handler: AuthEventHandler<K>): void {\n if (!this.events[event]) {\n this.events[event] = [];\n }\n this.events[event]!.push(handler as any);\n }\n\n /**\n * Unsubscribe from auth events\n */\n off<K extends AuthEventKey>(event: K, handler: AuthEventHandler<K>): void {\n const handlers = this.events[event];\n if (handlers) {\n const index = handlers.indexOf(handler as any);\n if (index !== -1) {\n handlers.splice(index, 1);\n }\n }\n }\n\n // ============================================================================\n // Signer Adapters\n // ============================================================================\n\n /**\n * Helper to get signer config and vault info\n */\n private async getSignerContext(): Promise<{\n config: { baseUrl?: string; getJwt: () => string | null | undefined };\n vaultInfo: SignerVaultInfo;\n }> {\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No active session. Call openAuthModal() or authenticateWallet() first.');\n }\n\n const vaultInfo = await this.getVaultInfo();\n\n return {\n config: {\n baseUrl: this.config.apiUrl,\n getJwt: () => this.getSession()?.authToken,\n },\n vaultInfo: {\n vaultId: vaultInfo.vaultId,\n evmAddress: (vaultInfo.evmAddress || '0x') as Hex,\n address: vaultInfo.solanaAddress || vaultInfo.address || '',\n tokenId: vaultInfo.tokenId,\n created_by: vaultInfo.created_by,\n },\n };\n }\n\n /**\n * Create a viem-compatible account adapter for EVM signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const account = await sdk.toViemAccount();\n * const signature = await account.signMessage({ message: 'Hello' });\n * ```\n */\n async toViemAccount(): Promise<{\n address: Hex;\n signMessage: (args: { message: unknown }) => Promise<Hex>;\n signTypedData: (typedData: unknown) => Promise<Hex>;\n signTransaction: (tx: unknown, opts?: unknown) => Promise<Hex>;\n type: 'local';\n source: 'custom';\n }> {\n const { toViemAccount } = await import('./signers/viem');\n const { config, vaultInfo } = await this.getSignerContext();\n return toViemAccount(config, vaultInfo);\n }\n\n /**\n * Create an ethers v6 compatible wallet adapter for EVM signing\n * Requires an active session with authToken\n *\n * @param provider - Optional ethers Provider for transaction population\n *\n * @example\n * ```typescript\n * const wallet = await sdk.toEthersWallet(provider);\n * const signature = await wallet.signMessage('Hello');\n * const tx = await wallet.sendTransaction({ to, value });\n * ```\n */\n async toEthersWallet(provider?: unknown | null): Promise<EmblemEthersWallet> {\n const { toEthersWallet } = await import('./signers/ethers');\n const { config, vaultInfo } = await this.getSignerContext();\n return toEthersWallet(config, provider, vaultInfo);\n }\n\n /**\n * Create a Web3.js compatible adapter for EVM signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const adapter = await sdk.toWeb3Adapter();\n * const signature = await adapter.signMessage('Hello');\n * ```\n */\n async toWeb3Adapter(): Promise<EmblemWeb3Adapter> {\n const { toWeb3Adapter } = await import('./signers/web3');\n const { config, vaultInfo } = await this.getSignerContext();\n return toWeb3Adapter(config, vaultInfo);\n }\n\n /**\n * Create a Solana Web3.js compatible signer\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toSolanaWeb3Signer();\n * const signature = await signer.signMessage('Hello');\n * const signedTx = await signer.signTransaction(tx);\n * ```\n */\n async toSolanaWeb3Signer(): Promise<EmblemSolanaSigner> {\n const { toSolanaWeb3Signer } = await import('./signers/solana');\n const { config, vaultInfo } = await this.getSignerContext();\n return toSolanaWeb3Signer(config, vaultInfo);\n }\n\n /**\n * Create a Solana Kit compatible signer\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toSolanaKitSigner();\n * const signature = await signer.signMessage('Hello');\n * ```\n */\n async toSolanaKitSigner(): Promise<EmblemSolanaSigner> {\n const { toSolanaKitSigner } = await import('./signers/solana');\n const { config, vaultInfo } = await this.getSignerContext();\n return toSolanaKitSigner(config, vaultInfo);\n }\n\n /**\n * Create a Bitcoin signer for PSBT signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toBitcoinSigner();\n * console.log('Bitcoin addresses:', signer.addresses);\n *\n * // Sign a PSBT\n * const result = await signer.signPsbt(psbtBase64, {\n * transactionType: 'p2wpkh'\n * });\n * console.log('Signed TX:', result.signedTxHex);\n * ```\n */\n async toBitcoinSigner(): Promise<EmblemBitcoinSigner> {\n const { toBitcoinSigner, fetchBitcoinVaultInfo } = await import('./signers/bitcoin');\n const { config } = await this.getSignerContext();\n // Bitcoin signer needs its own vault info with btcPubkey\n const btcVaultInfo = await fetchBitcoinVaultInfo(config);\n return toBitcoinSigner(config, btcVaultInfo);\n }\n\n /**\n * Clean up event listeners\n */\n destroy(): void {\n // Only remove message listener in browser environments\n if (typeof window !== 'undefined') {\n window.removeEventListener('message', this.messageHandler);\n }\n this.sessionMgr.destroy();\n this.closeOverlay();\n Object.keys(this.events).forEach(key => {\n delete this.events[key as AuthEventKey];\n });\n }\n\n private resolveModalUrl(params: { nonce: string; origin: string; state?: string }): string {\n // Derive modal URL from authUrl\n const base = `${this.config.authUrl.replace(/\\/$/, '')}/connect`;\n const url = new URL(base, window.location.href);\n url.searchParams.set('appId', this.config.appId);\n url.searchParams.set('origin', params.origin);\n url.searchParams.set('nonce', params.nonce);\n if (params.state) {\n url.searchParams.set('state', params.state);\n }\n return url.toString();\n }\n\n private authDebugEnabled(): boolean {\n // Browser: allow enabling via localStorage.AUTH_DEBUG=\"true\"\n try {\n const v = window?.localStorage?.getItem?.('AUTH_DEBUG');\n if (String(v).toLowerCase() === 'true') return true;\n } catch {\n // ignore\n }\n\n // Bundler envs: allow NEXT_PUBLIC_AUTH_DEBUG / AUTH_DEBUG if present\n try {\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const p: any = typeof process !== 'undefined' ? process : null;\n const env = p?.env || {};\n const v = env.NEXT_PUBLIC_AUTH_DEBUG ?? env.AUTH_DEBUG;\n if (!v) return false;\n const s = String(v).toLowerCase().trim();\n return s === '1' || s === 'true' || s === 'yes' || s === 'on';\n } catch {\n return false;\n }\n }\n\n private authDebug(...args: unknown[]): void {\n if (!this.authDebugEnabled()) return;\n // eslint-disable-next-line no-console\n console.log('[AUTH_DEBUG]', ...args);\n }\n\n /**\n * Normalize a configured URL. Accepts absolute URLs (https://...) or relative paths (/...).\n * If a host-like string is provided without a scheme (e.g. \"api.emblemvault.ai\"),\n * we assume https://.\n */\n private normalizeBaseUrl(input: string, label: 'apiUrl' | 'authUrl'): string {\n if (!input) throw new Error(`${label} is required`);\n const trimmed = String(input).trim();\n const base = typeof window !== 'undefined' ? window.location.href : 'http://localhost';\n\n // First attempt: standard URL parsing (supports relative paths in browser)\n try {\n const u = new URL(trimmed, base);\n return u.toString().replace(/\\/$/, '');\n } catch {\n // continue\n }\n\n // Second attempt: treat as host-like and assume https://\n try {\n const u = new URL(`https://${trimmed.replace(/^\\/+/, '')}`);\n return u.toString().replace(/\\/$/, '');\n } catch {\n // continue\n }\n\n throw new Error(\n `${label} must be an absolute URL (e.g. \"https://api.emblemvault.ai\") or a relative path (e.g. \"/\")`\n );\n }\n\n private onMessage(event: MessageEvent): void {\n try {\n // Validate origin\n const allowedOrigins = new Set(\n [\n window.location.origin,\n this.tryGetOriginFromConfig(),\n this.tryGetOriginFromApiUrl(),\n ].filter(Boolean)\n );\n\n if (!allowedOrigins.has(event.origin)) {\n this.authDebug('onMessage:ignored (origin)', {\n eventOrigin: event.origin,\n allowedOrigins: Array.from(allowedOrigins),\n });\n return;\n }\n\n const data = event.data as PostMessageData;\n\n // Handle cancel message\n if (data?.type === 'emblem-auth-cancelled') {\n // Nonce check for cancel\n if (!this.pendingNonce || data.nonce !== this.pendingNonce) {\n return;\n }\n\n this.pendingNonce = null;\n this.closeOverlay();\n\n // Call onCancel callback if provided\n if (this.config.onCancel) {\n this.config.onCancel();\n }\n\n // Emit cancelled event\n this.emit('cancelled', undefined as never);\n return;\n }\n\n if (data?.type !== 'emblem-auth-success') return;\n\n // Nonce check\n if (!this.pendingNonce || data.nonce !== this.pendingNonce) {\n console.error('[EmblemAuthSDK] Nonce mismatch', {\n expected: this.pendingNonce,\n received: data?.nonce,\n origin: event.origin,\n });\n this.authDebug('onMessage:ignored (nonce)', {\n expected: this.pendingNonce,\n received: data?.nonce,\n origin: event.origin,\n type: data?.type,\n });\n return;\n }\n\n this.pendingNonce = null;\n this.authDebug('onMessage:accepted', { origin: event.origin });\n\n // Accept the session\n const session = data.session as AuthSession | null;\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n\n // Store visitorId if provided\n if (data.visitorId) {\n this._visitorId = data.visitorId;\n this.persistVisitorId(data.visitorId);\n }\n\n if (session && this.config.onSuccess) {\n this.config.onSuccess(session);\n }\n\n this.emit('session', session);\n this.closeOverlay();\n } catch (error) {\n this.emitError(error as AuthError);\n }\n }\n\n private emit<K extends AuthEventKey>(event: K, payload: Parameters<AuthEventMap[K]>[0]): void {\n const handlers = this.events[event];\n if (!handlers) return;\n\n for (const handler of handlers) {\n try {\n handler(payload as any);\n } catch (error) {\n console.error(`Error in auth event handler for ${event}:`, error);\n }\n }\n }\n\n private emitError(error: AuthError): void {\n this.config.onError?.(error);\n this.emit('authError', error);\n }\n\n private popupFeatures(): string {\n // Slightly wider for better UX, still reasonable on small screens\n const width = 520;\n const height = 680;\n const top = Math.max(0, (window.outerHeight - height) / 2);\n const left = Math.max(0, (window.outerWidth - width) / 2);\n return `popup=yes,width=${width},height=${height},left=${left},top=${top}`;\n }\n\n private randomId(): string {\n const array = new Uint8Array(16);\n if (window.crypto?.getRandomValues) {\n window.crypto.getRandomValues(array);\n } else {\n for (let i = 0; i < array.length; i++) {\n array[i] = Math.floor(Math.random() * 256);\n }\n }\n return Array.from(array, b => b.toString(16).padStart(2, '0')).join('');\n }\n\n private tryGetOriginFromConfig(): string | null {\n try {\n if (!this.config.authUrl) return null;\n // Use window.location.href as base in browser (supports relative authUrl)\n // In Node.js, authUrl must be absolute\n const normalized = this.normalizeBaseUrl(this.config.authUrl, 'authUrl');\n return new URL(normalized).origin;\n } catch {\n return null;\n }\n }\n\n private tryGetOriginFromApiUrl(): string | null {\n try {\n if (!this.config.apiUrl) return null;\n const normalized = this.normalizeBaseUrl(this.config.apiUrl, 'apiUrl');\n return new URL(normalized).origin;\n } catch {\n return null;\n }\n }\n\n private async getAuthInit(params: { origin: string }): Promise<AuthInitResponse> {\n const body = JSON.stringify({\n appId: this.config.appId,\n origin: params.origin,\n });\n\n const tryInit = async (baseUrl: string): Promise<AuthInitResponse> => {\n const response = await fetch(`${baseUrl.replace(/\\/$/, '')}/api/auth/init`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body,\n });\n\n const data = await response.json().catch(() => null);\n\n if (!response.ok) {\n const error = new Error(`init ${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data || {};\n throw error;\n }\n\n return data as AuthInitResponse;\n };\n\n // Prefer authUrl (registration site) for single-origin setups, but fallback to apiUrl\n // so modal can still open with a valid state even if the authUrl proxy route isn't deployed.\n try {\n return await tryInit(this.config.authUrl);\n } catch (error) {\n const firstError = error as AuthError;\n try {\n return await tryInit(this.config.apiUrl);\n } catch (fallbackError) {\n // Preserve original failure details (often more actionable), but include fallback in payload.\n const merged = firstError;\n merged.payload = {\n ...(firstError?.payload || {}),\n fallback: (fallbackError as AuthError)?.payload || undefined,\n };\n throw merged;\n }\n }\n }\n\n private openIframeModal(url: string): boolean {\n // Clean up any existing overlay\n if (this.overlayEl) {\n this.closeOverlay();\n }\n\n // Create overlay\n const overlay = document.createElement('div');\n overlay.setAttribute('data-emblem-overlay', '');\n overlay.style.position = 'fixed';\n overlay.style.inset = '0';\n overlay.style.background = 'rgba(0,0,0,0.55)';\n // Backdrop blur where supported (nice polish)\n (overlay.style as any).backdropFilter = 'blur(6px)';\n (overlay.style as any).webkitBackdropFilter = 'blur(6px)';\n overlay.style.zIndex = '999999';\n overlay.style.display = 'flex';\n overlay.style.alignItems = 'center';\n overlay.style.justifyContent = 'center';\n overlay.style.padding = '12px';\n\n // Create container\n const container = document.createElement('div');\n container.style.width = 'min(520px, 96vw)';\n container.style.height = 'min(680px, 92vh)';\n container.style.background = '#12161b';\n container.style.border = '1px solid #222b35';\n container.style.borderRadius = '12px';\n container.style.boxShadow = '0 12px 48px rgba(0,0,0,0.7)';\n container.style.overflow = 'hidden';\n container.style.position = 'relative';\n container.style.display = 'flex';\n container.style.flexDirection = 'column';\n\n // Header bar (keeps close button from overlapping iframe content)\n const header = document.createElement('div');\n header.style.height = '52px';\n header.style.display = 'flex';\n header.style.alignItems = 'center';\n header.style.justifyContent = 'space-between';\n header.style.padding = '0 12px';\n header.style.borderBottom = '1px solid rgba(255, 255, 255, 0.06)';\n header.style.background = '#12161b';\n\n const title = document.createElement('div');\n title.textContent = 'Emblem';\n title.style.fontFamily =\n 'ui-sans-serif, system-ui, -apple-system, Segoe UI, Roboto, Helvetica, Arial';\n title.style.fontSize = '13px';\n title.style.letterSpacing = '0.08em';\n title.style.textTransform = 'uppercase';\n title.style.color = 'rgba(230, 238, 248, 0.75)';\n\n const closeBtn = document.createElement('button');\n closeBtn.type = 'button';\n closeBtn.textContent = '×';\n closeBtn.setAttribute('aria-label', 'Close');\n closeBtn.setAttribute('title', 'Close');\n closeBtn.style.width = '40px';\n closeBtn.style.height = '40px';\n closeBtn.style.display = 'flex';\n closeBtn.style.alignItems = 'center';\n closeBtn.style.justifyContent = 'center';\n closeBtn.style.background = 'rgba(255, 255, 255, 0.04)';\n closeBtn.style.color = '#e6eef8';\n closeBtn.style.border = '1px solid rgba(255, 255, 255, 0.08)';\n closeBtn.style.borderRadius = '10px';\n closeBtn.style.fontSize = '24px';\n closeBtn.style.lineHeight = '1';\n closeBtn.style.cursor = 'pointer';\n closeBtn.style.userSelect = 'none';\n closeBtn.onclick = () => this.cancelAuth();\n\n header.appendChild(title);\n header.appendChild(closeBtn);\n\n // Create iframe\n const iframe = document.createElement('iframe');\n iframe.src = url;\n iframe.style.width = '100%';\n iframe.style.height = '100%';\n iframe.style.border = '0';\n iframe.referrerPolicy = 'no-referrer';\n iframe.allow = 'clipboard-read; clipboard-write;';\n\n container.appendChild(header);\n container.appendChild(iframe);\n overlay.appendChild(container);\n document.body.appendChild(overlay);\n\n // Close when clicking outside the modal content\n overlay.addEventListener('click', e => {\n if (e.target === overlay) this.cancelAuth();\n });\n\n // Close on Escape\n const onKey = (e: KeyboardEvent): void => {\n if (e.key === 'Escape') {\n this.cancelAuth();\n }\n };\n document.addEventListener('keydown', onKey, { capture: true });\n\n this.overlayEl = overlay;\n this._iframeEl = iframe;\n this.overlayCleanup = () => {\n document.removeEventListener('keydown', onKey, { capture: true });\n };\n\n return true;\n }\n\n private closeOverlay(): void {\n try {\n this.overlayCleanup?.();\n } catch {\n // Ignore errors\n }\n this.overlayCleanup = null;\n\n if (this.overlayEl?.parentNode) {\n this.overlayEl.parentNode.removeChild(this.overlayEl);\n }\n\n this.overlayEl = null;\n this._iframeEl = null;\n }\n\n /**\n * Cancel authentication (called when user closes modal via X button or Escape)\n */\n private cancelAuth(): void {\n this.pendingNonce = null;\n this.closeOverlay();\n\n // Call onCancel callback if provided\n if (this.config.onCancel) {\n this.config.onCancel();\n }\n\n // Emit cancelled event\n this.emit('cancelled', undefined as never);\n }\n\n private async safeJson(response: Response): Promise<any> {\n try {\n return await response.json();\n } catch {\n return null;\n }\n }\n\n private loadPersistedSession(): AuthSession | null {\n try {\n if (typeof localStorage === 'undefined') return null;\n const stored = localStorage.getItem(this.storageKey);\n if (!stored) return null;\n\n const session = JSON.parse(stored) as AuthSession;\n\n // Validate session has required fields and hasn't expired\n if (!session?.authToken || !session?.expiresAt) return null;\n if (Date.now() >= session.expiresAt) {\n localStorage.removeItem(this.storageKey);\n return null;\n }\n\n return session;\n } catch {\n return null;\n }\n }\n\n private persistSession(session: AuthSession | null): void {\n try {\n if (typeof localStorage === 'undefined') return;\n\n if (session && this.config.persistSession) {\n localStorage.setItem(this.storageKey, JSON.stringify(session));\n } else {\n localStorage.removeItem(this.storageKey);\n }\n } catch {\n // Ignore storage errors (e.g., private browsing mode)\n }\n }\n\n private loadPersistedVisitorId(): string | null {\n try {\n if (typeof localStorage === 'undefined') return null;\n return localStorage.getItem(this.visitorIdKey);\n } catch {\n return null;\n }\n }\n\n private persistVisitorId(visitorId: string | null): void {\n try {\n if (typeof localStorage === 'undefined') return;\n\n if (visitorId && this.config.persistSession) {\n localStorage.setItem(this.visitorIdKey, visitorId);\n } else {\n localStorage.removeItem(this.visitorIdKey);\n }\n } catch {\n // Ignore storage errors (e.g., private browsing mode)\n }\n }\n}\n","import type { SignerConfig } from '../types/signers';\n\nfunction sanitizeErrorMessage(status: number, text: string): string {\n // Sanitize error messages to avoid leaking sensitive server information\n let errorMessage = `Emblem signer error ${status}`;\n\n if (status >= 500) {\n errorMessage += ': Internal server error';\n } else if (status === 401 || status === 403) {\n errorMessage += ': Authentication failed';\n } else if (status === 404) {\n errorMessage += ': Resource not found';\n } else if (status === 405) {\n errorMessage += ': Method not allowed';\n } else if (text) {\n // For 4xx client errors, include limited error details\n errorMessage += `: ${text.substring(0, 200)}`; // Limit to 200 chars\n }\n\n return errorMessage;\n}\n\nasync function resolveAuthHeaders(config: SignerConfig): Promise<Record<string, string>> {\n // Priority: custom headers -> jwt/getJwt/sdk -> apiKey (deprecated)\n if (typeof config.getAuthHeaders === 'function') {\n const h = await config.getAuthHeaders();\n if (h && typeof h === 'object') return h;\n }\n\n const tok =\n config.jwt ??\n (typeof config.getJwt === 'function' ? await config.getJwt() : undefined) ??\n config.sdk?.getSession()?.authToken ??\n undefined;\n\n if (tok) {\n return { Authorization: `Bearer ${tok}` };\n }\n\n // apiKey is deprecated but still supported as fallback\n if (config.apiKey) {\n return { 'x-api-key': config.apiKey };\n }\n\n throw new Error(\n 'No authentication available: provide jwt, getJwt(), getAuthHeaders(), sdk, or apiKey'\n );\n}\n\nexport async function emblemPost<T = unknown>(\n path: string,\n body: unknown,\n config: SignerConfig\n): Promise<T> {\n const baseUrl = config.baseUrl ?? 'https://api.emblemvault.ai';\n const authHeaders = await resolveAuthHeaders(config);\n const res = await fetch(`${baseUrl}${path}`, {\n method: 'POST',\n headers: {\n 'content-type': 'application/json',\n ...authHeaders,\n },\n body: JSON.stringify(body, (_key: string, value: unknown) =>\n typeof value === 'bigint' ? value.toString() : value\n ),\n });\n\n if (!res.ok) {\n const text = await res.text().catch(() => '');\n throw new Error(sanitizeErrorMessage(res.status, text));\n }\n\n return res.json() as Promise<T>;\n}\n\nexport async function emblemGet<T = unknown>(path: string, config: SignerConfig): Promise<T> {\n const baseUrl = config.baseUrl ?? 'https://api.emblemvault.ai';\n const authHeaders = await resolveAuthHeaders(config);\n const res = await fetch(`${baseUrl}${path}`, {\n method: 'GET',\n headers: authHeaders,\n });\n\n if (!res.ok) {\n const text = await res.text().catch(() => '');\n throw new Error(sanitizeErrorMessage(res.status, text));\n }\n\n return res.json() as Promise<T>;\n}\n","import type { SignerConfig } from '../types/signers';\n\n/**\n * Environment detection utilities for warning about unsafe usage patterns\n */\n\n/**\n * Detect if code is running in a browser environment\n */\nexport function isBrowserEnvironment(): boolean {\n return typeof window !== 'undefined' && typeof document !== 'undefined';\n}\n\n/**\n * Check if we're in a Node.js server environment\n */\nexport function isNodeEnvironment(): boolean {\n return (\n typeof process !== 'undefined' && process.versions != null && process.versions.node != null\n );\n}\n\n/**\n * Validate baseUrl format\n */\nexport function validateBaseUrl(baseUrl?: string): void {\n if (!baseUrl) return; // undefined is ok, will use default\n\n if (!baseUrl.startsWith('http://') && !baseUrl.startsWith('https://')) {\n throw new Error('baseUrl must be a valid HTTP(S) URL');\n }\n\n // Warn about http (not https)\n if (\n baseUrl.startsWith('http://') &&\n !baseUrl.includes('localhost') &&\n !baseUrl.includes('127.0.0.1')\n ) {\n console.warn(\n '[Emblem Security Warning] baseUrl uses HTTP instead of HTTPS. This is insecure for production use.'\n );\n }\n}\n\n/**\n * Validate Ethereum address format\n */\nexport function validateEthereumAddress(address: string): void {\n if (!address || typeof address !== 'string') {\n throw new Error('Address is required');\n }\n\n if (!address.startsWith('0x')) {\n throw new Error('Address must start with 0x');\n }\n\n if (!/^0x[0-9a-fA-F]{40}$/.test(address)) {\n throw new Error('Invalid Ethereum address format');\n }\n}\n\n/**\n * Validate vault ID\n */\nexport function validateVaultId(vaultId: string): void {\n if (!vaultId || typeof vaultId !== 'string') {\n throw new Error('vaultId is required');\n }\n\n if (vaultId.trim() === '') {\n throw new Error('vaultId cannot be empty');\n }\n}\n\n/**\n * Safe number conversion with bounds checking\n */\nexport function toSafeNumber(value: unknown, fieldName: string): number {\n const num = Number(value);\n\n if (!Number.isSafeInteger(num)) {\n throw new Error(\n `${fieldName} value ${value} exceeds safe integer range (max: ${Number.MAX_SAFE_INTEGER})`\n );\n }\n\n return num;\n}\n\n/**\n * Extended config with security options\n */\nexport interface SignerSecurityConfig extends SignerConfig {\n /**\n * Enable debug logging for security-related checks\n * @default false\n */\n debugSecurity?: boolean;\n}\n\n/**\n * Validate signer configuration\n */\nexport function validateSignerConfig(config: SignerSecurityConfig): void {\n // Validate auth: require at least one method (jwt, getJwt, getAuthHeaders)\n const hasJwt = !!config.jwt;\n const hasGetJwt = typeof config.getJwt === 'function';\n const hasHeaders = typeof config.getAuthHeaders === 'function';\n\n if (!hasJwt && !hasGetJwt && !hasHeaders) {\n throw new Error('Authentication required: provide jwt, getJwt(), or getAuthHeaders()');\n }\n\n // Validate baseUrl if provided\n if (config.baseUrl) {\n validateBaseUrl(config.baseUrl);\n }\n\n // Security audit logging\n if (config.debugSecurity) {\n console.log('[Emblem Security Debug]', {\n environment: isBrowserEnvironment() ? 'browser' : 'node',\n hasBaseUrl: !!config.baseUrl,\n timestamp: new Date().toISOString(),\n });\n }\n}\n","import type { Hex } from '../types/signers';\nimport { toSafeNumber } from './validation';\n\nexport function toHexIfBigInt(v: unknown): unknown {\n return typeof v === 'bigint' ? '0x' + v.toString(16) : v;\n}\n\n/**\n * viem txs sometimes have bigint / hex / optional fields. Ethers serializers\n * accept hex strings for numeric fields. Normalize where helpful.\n */\nexport function normalizeTxForEmblem(tx: Record<string, unknown>): Record<string, unknown> {\n const out: Record<string, unknown> = { ...tx };\n\n if (out.value !== undefined) out.value = toHexIfBigInt(out.value);\n if (out.gas !== undefined) {\n out.gasLimit = toHexIfBigInt(out.gas);\n delete out.gas;\n }\n if (out.gasLimit !== undefined) out.gasLimit = toHexIfBigInt(out.gasLimit);\n if (out.gasPrice !== undefined) out.gasPrice = toHexIfBigInt(out.gasPrice);\n if (out.maxFeePerGas !== undefined) out.maxFeePerGas = toHexIfBigInt(out.maxFeePerGas);\n if (out.maxPriorityFeePerGas !== undefined)\n out.maxPriorityFeePerGas = toHexIfBigInt(out.maxPriorityFeePerGas);\n if (out.nonce !== undefined) out.nonce = toSafeNumber(out.nonce, 'nonce');\n if (out.chainId !== undefined) out.chainId = toSafeNumber(out.chainId, 'chainId');\n\n // Some backends only accept legacy fields; fold EIP-1559 into gasPrice and drop unsupported keys\n if (out.maxFeePerGas !== undefined || out.maxPriorityFeePerGas !== undefined) {\n if (out.gasPrice === undefined && out.maxFeePerGas !== undefined) {\n out.gasPrice = out.maxFeePerGas;\n }\n delete out.maxFeePerGas;\n delete out.maxPriorityFeePerGas;\n }\n\n // Remove fields commonly unsupported by legacy serializers\n delete out.type;\n delete out.accessList;\n delete out.account;\n delete out.chain;\n delete out.from;\n\n return out;\n}\n\nexport function isHexString(value: unknown): value is Hex {\n return typeof value === 'string' && /^0x[0-9a-fA-F]*$/.test(value);\n}\n\nexport function bytesToHex(bytes: ArrayLike<number>): Hex {\n let out = '0x';\n for (let i = 0; i < bytes.length; i++) {\n out += (bytes[i] as number).toString(16).padStart(2, '0');\n }\n return out as Hex;\n}\n","import type { SignerConfig, SignerVaultInfo, Hex } from '../types/signers';\nimport { emblemPost } from './http';\n\nexport async function fetchVaultInfo(config: SignerConfig): Promise<SignerVaultInfo> {\n // Note: The server only supports POST for /vault/info\n const data: Partial<{\n vaultId: string;\n address: string;\n evmAddress: Hex;\n created_by?: string;\n }> = await emblemPost('/vault/info', {}, config);\n\n // Validate required response data (vaultId + evmAddress are required for EVM)\n if (!data || !data.vaultId || !data.evmAddress) {\n throw new Error('Invalid vault info response: missing required fields');\n }\n\n if (!String(data.evmAddress).startsWith('0x')) {\n throw new Error('Invalid evmAddress format in response');\n }\n\n return {\n vaultId: data.vaultId,\n tokenId: data.vaultId,\n address: data.address || '', // Solana address may be absent; keep optional\n evmAddress: data.evmAddress as Hex,\n created_by: data.created_by,\n };\n}\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, isHexString, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\n// Minimal viem types to avoid hard dependency\ninterface ViemAccount {\n address: Hex;\n signMessage: (args: { message: unknown }) => Promise<Hex>;\n signTypedData: (typedData: unknown) => Promise<Hex>;\n signTransaction: (tx: unknown, opts?: unknown) => Promise<Hex>;\n type: 'local';\n source: 'custom';\n publicKey?: Hex;\n}\n\nexport async function toViemAccount(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<ViemAccount> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n const { evmAddress, vaultId } = info;\n\n // Dynamically import viem's toAccount\n // String concatenation prevents bundlers from statically analyzing the import\n // DO NOT CHANGE THIS PATTERN - using a literal import('viem/accounts') breaks Next.js/Webpack builds\n // when viem is not installed. The variable indirection is intentional. - Shannon\n const moduleName = 'viem/accounts';\n const { toAccount } = await import(/* @vite-ignore */ moduleName);\n\n return toAccount({\n address: evmAddress,\n\n async signMessage({ message }: { message: unknown }): Promise<Hex> {\n let payload: string;\n let isRaw = false;\n\n if (typeof message === 'string') {\n payload = message;\n isRaw = false;\n } else if (message && typeof (message as { raw?: unknown }).raw !== 'undefined') {\n const raw = (message as { raw: unknown }).raw;\n payload = typeof raw === 'string' ? raw : bytesToHex(raw as ArrayLike<number>);\n isRaw = true;\n } else if (message instanceof Uint8Array) {\n payload = bytesToHex(message);\n isRaw = false;\n } else if (isHexString(message)) {\n payload = message as string;\n isRaw = false;\n } else {\n // Don't silently convert objects to \"[object Object]\"\n throw new Error(\n `Unsupported message type: ${typeof message}. Expected string, Uint8Array, or hex string.`\n );\n }\n\n const data = await emblemPost<{\n signerAddress: string;\n signature: Hex;\n }>('/sign-eth-message', { vaultId, message: payload, raw: isRaw }, config);\n\n return data.signature;\n },\n\n async signTypedData(typedData: unknown): Promise<Hex> {\n const { domain, types, message } = typedData as {\n domain: unknown;\n types: unknown;\n message: unknown;\n };\n const data = await emblemPost<{\n signerAddress: string;\n signature: Hex;\n }>('/sign-typed-message', { vaultId, domain, types, message }, config);\n\n return data.signature;\n },\n\n async signTransaction(tx: unknown, _opts?: unknown): Promise<Hex> {\n const normalizedTx = normalizeTxForEmblem(tx as Record<string, unknown>);\n\n const data = await emblemPost<{\n signedTransaction: Hex;\n }>('/sign-eth-tx', { vaultId, transaction: normalizedTx }, config);\n\n return data.signedTransaction;\n },\n }) as ViemAccount;\n}\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\n// ethers v6 compatible interface (like solana pattern - no runtime dependency)\nexport interface EmblemEthersWallet {\n getAddress(): Promise<string>;\n signMessage(message: string | Uint8Array): Promise<string>;\n signTypedData(\n domain: unknown,\n types: Record<string, Array<{ name: string; type: string }>>,\n value: Record<string, unknown>\n ): Promise<string>;\n signTransaction(tx: unknown): Promise<string>;\n sendTransaction(tx: unknown): Promise<unknown>;\n connect(provider: unknown): EmblemEthersWallet;\n provider: unknown;\n // Additional methods\n initialize(): Promise<void>;\n getVaultId(): string;\n setChainId(chainId: number): void;\n getChainId(): number;\n signAndBroadcast(transaction: unknown, waitForReceipt?: boolean): Promise<string>;\n}\n\nexport async function toEthersWallet(\n config: SignerConfig,\n provider?: unknown | null,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemEthersWallet> {\n // Dynamic import - only loads ethers when this function is called\n // String concatenation prevents bundlers from statically analyzing the import\n // DO NOT CHANGE THIS PATTERN - using a literal import('ethers') breaks Next.js/Webpack builds\n // when ethers is not installed. The variable indirection is intentional. - Shannon\n let ethers: typeof import('ethers');\n try {\n const moduleName = 'ethers';\n ethers = await import(/* @vite-ignore */ moduleName);\n } catch {\n throw new Error('ethers is required for toEthersWallet(). Install it with: npm install ethers');\n }\n\n const { AbstractSigner, resolveAddress } = ethers;\n type AbstractProvider = import('ethers').AbstractProvider;\n type TransactionRequest = import('ethers').TransactionRequest;\n type TransactionResponse = import('ethers').TransactionResponse;\n type TransactionLike = import('ethers').TransactionLike<string>;\n type TypedDataDomain = import('ethers').TypedDataDomain;\n type TypedDataField = import('ethers').TypedDataField;\n\n const info = infoOverride ?? (await fetchVaultInfo(config));\n\n // Class defined inside function after dynamic import\n class EmblemEthersWalletImpl extends AbstractSigner {\n private readonly _config: SignerConfig;\n private _address: Hex | null = null;\n private _vaultId: string | null = null;\n private _chainId = 1;\n private _initPromise?: Promise<void>;\n\n constructor(\n signerConfig: SignerConfig,\n signerProvider?: AbstractProvider | null,\n seed?: { address?: Hex; vaultId?: string; chainId?: number }\n ) {\n super(signerProvider ?? null);\n this._config = signerConfig;\n if (seed?.address) this._address = seed.address;\n if (seed?.vaultId) this._vaultId = seed.vaultId;\n if (seed?.chainId) this._chainId = seed.chainId;\n }\n\n async initialize(): Promise<void> {\n if (this._initPromise) return this._initPromise;\n\n this._initPromise = fetchVaultInfo(this._config)\n .then((vaultInfo) => {\n this._address = vaultInfo.evmAddress;\n this._vaultId = vaultInfo.vaultId;\n })\n .catch((err) => {\n this._initPromise = undefined;\n throw err;\n });\n\n return this._initPromise;\n }\n\n async getAddress(): Promise<string> {\n if (!this._address) await this.initialize();\n return this._address!;\n }\n\n getVaultId(): string {\n if (!this._vaultId) throw new Error('Wallet not initialized. Call initialize() first.');\n return this._vaultId;\n }\n\n setChainId(chainId: number): void {\n this._chainId = chainId;\n }\n\n getChainId(): number {\n return this._chainId;\n }\n\n connect(newProvider: AbstractProvider): EmblemEthersWalletImpl {\n if (!newProvider) throw new Error('Provider cannot be null');\n return new EmblemEthersWalletImpl(this._config, newProvider, {\n address: this._address ?? undefined,\n vaultId: this._vaultId ?? undefined,\n chainId: this._chainId,\n });\n }\n\n async signMessage(message: string | Uint8Array): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const payload = typeof message === 'string' ? message : bytesToHex(message);\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-eth-message',\n { vaultId: this._vaultId!, message: payload },\n this._config\n );\n return data.signature;\n }\n\n async signTypedData(\n domain: TypedDataDomain,\n types: Record<string, Array<TypedDataField>>,\n value: Record<string, unknown>\n ): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const cleanTypes = { ...types };\n if (cleanTypes && (cleanTypes as Record<string, unknown>).EIP712Domain) {\n delete (cleanTypes as Record<string, unknown>).EIP712Domain;\n }\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-typed-message',\n { vaultId: this._vaultId!, domain, types: cleanTypes, message: value },\n this._config\n );\n return data.signature;\n }\n\n async _signTypedData(\n domain: TypedDataDomain,\n types: Record<string, Array<TypedDataField>>,\n value: Record<string, unknown>\n ): Promise<string> {\n return this.signTypedData(domain, types, value);\n }\n\n async signTransaction(tx: TransactionRequest): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const from = (tx as Record<string, unknown>).from as string | undefined;\n const addr = await this.getAddress();\n\n if (from && from.toLowerCase() !== addr.toLowerCase()) {\n throw new Error('transaction from does not match signer address');\n }\n\n const toSign = this.provider\n ? ({ ...await this.populateTransaction(tx) } as Record<string, unknown>)\n : ({ ...tx } as Record<string, unknown>);\n if (toSign.from) delete toSign.from;\n if (!('to' in toSign) || !toSign.to) {\n throw new Error(\"Transaction must have a 'to' address\");\n }\n if (toSign.nonce === undefined || toSign.nonce === null) {\n throw new Error('Transaction must have a nonce');\n }\n const normalized = normalizeTxForEmblem(toSign);\n const resp = await emblemPost<{ signedTransaction: Hex }>(\n '/sign-eth-tx',\n { vaultId: this._vaultId!, transaction: normalized, options: { chainId: this._chainId } },\n this._config\n );\n return resp.signedTransaction;\n }\n\n async sendTransaction(tx: TransactionRequest): Promise<TransactionResponse> {\n if (!this.provider) throw new Error('Provider required to send transaction');\n const signed = await this.signTransaction(tx);\n return await this.provider.broadcastTransaction(signed);\n }\n\n async populateTransaction(transaction: TransactionRequest): Promise<TransactionLike> {\n const tx = { ...transaction } as TransactionRequest;\n if (!this.provider) throw new Error('Provider required to populate transaction');\n const fromAddress = tx.from\n ? await resolveAddress(tx.from, this.provider)\n : await this.getAddress();\n\n let chainId: bigint;\n if (!tx.chainId) {\n const network = await this.provider.getNetwork();\n chainId = network.chainId;\n this._chainId = Number(network.chainId);\n } else {\n chainId = BigInt(tx.chainId);\n this._chainId = Number(tx.chainId);\n }\n\n const nonce =\n tx.nonce != null\n ? Number(tx.nonce)\n : await this.provider.getTransactionCount(fromAddress, 'pending');\n const toAddress = tx.to ? await resolveAddress(tx.to, this.provider) : null;\n const value = tx.value ? BigInt(tx.value.toString()) : 0n;\n\n let gasLimit: bigint;\n if (!tx.gasLimit) {\n try {\n gasLimit = await this.provider.estimateGas({ ...tx, from: fromAddress });\n } catch {\n gasLimit = 21000n;\n }\n } else {\n gasLimit = BigInt(tx.gasLimit.toString());\n }\n\n let gasPrice: bigint | null = null;\n if (!tx.gasPrice && tx.type !== 2) {\n const feeData = await this.provider.getFeeData();\n gasPrice = feeData.gasPrice ?? null;\n } else if (tx.gasPrice) {\n gasPrice = BigInt(tx.gasPrice.toString());\n }\n\n const populated: TransactionLike = {\n from: fromAddress,\n to: toAddress,\n value,\n nonce,\n gasLimit,\n data: tx.data as string | undefined,\n chainId,\n type: tx.type || undefined,\n };\n if (gasPrice !== null) populated.gasPrice = gasPrice;\n if (tx.maxFeePerGas) populated.maxFeePerGas = BigInt(tx.maxFeePerGas.toString());\n if (tx.maxPriorityFeePerGas)\n populated.maxPriorityFeePerGas = BigInt(tx.maxPriorityFeePerGas.toString());\n return populated;\n }\n\n async signAndBroadcast(\n transaction: TransactionRequest,\n waitForReceipt: boolean = false\n ): Promise<string> {\n if (!this.provider) throw new Error('Provider required to send transaction');\n const signed = await this.signTransaction(transaction);\n const resp = await this.provider.broadcastTransaction(signed);\n const hash = resp.hash as string;\n if (waitForReceipt) {\n await this.provider.waitForTransaction(hash);\n }\n return hash;\n }\n }\n\n return new EmblemEthersWalletImpl(config, provider as AbstractProvider | null, {\n address: info.evmAddress,\n vaultId: info.vaultId,\n });\n}\n","/******************************************************************************\r\nCopyright (c) Microsoft Corporation.\r\n\r\nPermission to use, copy, modify, and/or distribute this software for any\r\npurpose with or without fee is hereby granted.\r\n\r\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH\r\nREGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY\r\nAND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,\r\nINDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM\r\nLOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR\r\nOTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR\r\nPERFORMANCE OF THIS SOFTWARE.\r\n***************************************************************************** */\r\n/* global Reflect, Promise, SuppressedError, Symbol, Iterator */\r\n\r\nvar extendStatics = function(d, b) {\r\n extendStatics = Object.setPrototypeOf ||\r\n ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n function (d, b) { for (var p in b) if (Object.prototype.hasOwnProperty.call(b, p)) d[p] = b[p]; };\r\n return extendStatics(d, b);\r\n};\r\n\r\nexport function __extends(d, b) {\r\n if (typeof b !== \"function\" && b !== null)\r\n throw new TypeError(\"Class extends value \" + String(b) + \" is not a constructor or null\");\r\n extendStatics(d, b);\r\n function __() { this.constructor = d; }\r\n d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n}\r\n\r\nexport var __assign = function() {\r\n __assign = Object.assign || function __assign(t) {\r\n for (var s, i = 1, n = arguments.length; i < n; i++) {\r\n s = arguments[i];\r\n for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p)) t[p] = s[p];\r\n }\r\n return t;\r\n }\r\n return __assign.apply(this, arguments);\r\n}\r\n\r\nexport function __rest(s, e) {\r\n var t = {};\r\n for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0)\r\n t[p] = s[p];\r\n if (s != null && typeof Object.getOwnPropertySymbols === \"function\")\r\n for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {\r\n if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i]))\r\n t[p[i]] = s[p[i]];\r\n }\r\n return t;\r\n}\r\n\r\nexport function __decorate(decorators, target, key, desc) {\r\n var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;\r\n if (typeof Reflect === \"object\" && typeof Reflect.decorate === \"function\") r = Reflect.decorate(decorators, target, key, desc);\r\n else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;\r\n return c > 3 && r && Object.defineProperty(target, key, r), r;\r\n}\r\n\r\nexport function __param(paramIndex, decorator) {\r\n return function (target, key) { decorator(target, key, paramIndex); }\r\n}\r\n\r\nexport function __esDecorate(ctor, descriptorIn, decorators, contextIn, initializers, extraInitializers) {\r\n function accept(f) { if (f !== void 0 && typeof f !== \"function\") throw new TypeError(\"Function expected\"); return f; }\r\n var kind = contextIn.kind, key = kind === \"getter\" ? \"get\" : kind === \"setter\" ? \"set\" : \"value\";\r\n var target = !descriptorIn && ctor ? contextIn[\"static\"] ? ctor : ctor.prototype : null;\r\n var descriptor = descriptorIn || (target ? Object.getOwnPropertyDescriptor(target, contextIn.name) : {});\r\n var _, done = false;\r\n for (var i = decorators.length - 1; i >= 0; i--) {\r\n var context = {};\r\n for (var p in contextIn) context[p] = p === \"access\" ? {} : contextIn[p];\r\n for (var p in contextIn.access) context.access[p] = contextIn.access[p];\r\n context.addInitializer = function (f) { if (done) throw new TypeError(\"Cannot add initializers after decoration has completed\"); extraInitializers.push(accept(f || null)); };\r\n var result = (0, decorators[i])(kind === \"accessor\" ? { get: descriptor.get, set: descriptor.set } : descriptor[key], context);\r\n if (kind === \"accessor\") {\r\n if (result === void 0) continue;\r\n if (result === null || typeof result !== \"object\") throw new TypeError(\"Object expected\");\r\n if (_ = accept(result.get)) descriptor.get = _;\r\n if (_ = accept(result.set)) descriptor.set = _;\r\n if (_ = accept(result.init)) initializers.unshift(_);\r\n }\r\n else if (_ = accept(result)) {\r\n if (kind === \"field\") initializers.unshift(_);\r\n else descriptor[key] = _;\r\n }\r\n }\r\n if (target) Object.defineProperty(target, contextIn.name, descriptor);\r\n done = true;\r\n};\r\n\r\nexport function __runInitializers(thisArg, initializers, value) {\r\n var useValue = arguments.length > 2;\r\n for (var i = 0; i < initializers.length; i++) {\r\n value = useValue ? initializers[i].call(thisArg, value) : initializers[i].call(thisArg);\r\n }\r\n return useValue ? value : void 0;\r\n};\r\n\r\nexport function __propKey(x) {\r\n return typeof x === \"symbol\" ? x : \"\".concat(x);\r\n};\r\n\r\nexport function __setFunctionName(f, name, prefix) {\r\n if (typeof name === \"symbol\") name = name.description ? \"[\".concat(name.description, \"]\") : \"\";\r\n return Object.defineProperty(f, \"name\", { configurable: true, value: prefix ? \"\".concat(prefix, \" \", name) : name });\r\n};\r\n\r\nexport function __metadata(metadataKey, metadataValue) {\r\n if (typeof Reflect === \"object\" && typeof Reflect.metadata === \"function\") return Reflect.metadata(metadataKey, metadataValue);\r\n}\r\n\r\nexport function __awaiter(thisArg, _arguments, P, generator) {\r\n function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }\r\n return new (P || (P = Promise))(function (resolve, reject) {\r\n function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }\r\n step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n });\r\n}\r\n\r\nexport function __generator(thisArg, body) {\r\n var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g = Object.create((typeof Iterator === \"function\" ? Iterator : Object).prototype);\r\n return g.next = verb(0), g[\"throw\"] = verb(1), g[\"return\"] = verb(2), typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n function verb(n) { return function (v) { return step([n, v]); }; }\r\n function step(op) {\r\n if (f) throw new TypeError(\"Generator is already executing.\");\r\n while (g && (g = 0, op[0] && (_ = 0)), _) try {\r\n if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n if (y = 0, t) op = [op[0] & 2, t.value];\r\n switch (op[0]) {\r\n case 0: case 1: t = op; break;\r\n case 4: _.label++; return { value: op[1], done: false };\r\n case 5: _.label++; y = op[1]; op = [0]; continue;\r\n case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n default:\r\n if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n if (t[2]) _.ops.pop();\r\n _.trys.pop(); continue;\r\n }\r\n op = body.call(thisArg, _);\r\n } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n }\r\n}\r\n\r\nexport var __createBinding = Object.create ? (function(o, m, k, k2) {\r\n if (k2 === undefined) k2 = k;\r\n var desc = Object.getOwnPropertyDescriptor(m, k);\r\n if (!desc || (\"get\" in desc ? !m.__esModule : desc.writable || desc.configurable)) {\r\n desc = { enumerable: true, get: function() { return m[k]; } };\r\n }\r\n Object.defineProperty(o, k2, desc);\r\n}) : (function(o, m, k, k2) {\r\n if (k2 === undefined) k2 = k;\r\n o[k2] = m[k];\r\n});\r\n\r\nexport function __exportStar(m, o) {\r\n for (var p in m) if (p !== \"default\" && !Object.prototype.hasOwnProperty.call(o, p)) __createBinding(o, m, p);\r\n}\r\n\r\nexport function __values(o) {\r\n var s = typeof Symbol === \"function\" && Symbol.iterator, m = s && o[s], i = 0;\r\n if (m) return m.call(o);\r\n if (o && typeof o.length === \"number\") return {\r\n next: function () {\r\n if (o && i >= o.length) o = void 0;\r\n return { value: o && o[i++], done: !o };\r\n }\r\n };\r\n throw new TypeError(s ? \"Object is not iterable.\" : \"Symbol.iterator is not defined.\");\r\n}\r\n\r\nexport function __read(o, n) {\r\n var m = typeof Symbol === \"function\" && o[Symbol.iterator];\r\n if (!m) return o;\r\n var i = m.call(o), r, ar = [], e;\r\n try {\r\n while ((n === void 0 || n-- > 0) && !(r = i.next()).done) ar.push(r.value);\r\n }\r\n catch (error) { e = { error: error }; }\r\n finally {\r\n try {\r\n if (r && !r.done && (m = i[\"return\"])) m.call(i);\r\n }\r\n finally { if (e) throw e.error; }\r\n }\r\n return ar;\r\n}\r\n\r\n/** @deprecated */\r\nexport function __spread() {\r\n for (var ar = [], i = 0; i < arguments.length; i++)\r\n ar = ar.concat(__read(arguments[i]));\r\n return ar;\r\n}\r\n\r\n/** @deprecated */\r\nexport function __spreadArrays() {\r\n for (var s = 0, i = 0, il = arguments.length; i < il; i++) s += arguments[i].length;\r\n for (var r = Array(s), k = 0, i = 0; i < il; i++)\r\n for (var a = arguments[i], j = 0, jl = a.length; j < jl; j++, k++)\r\n r[k] = a[j];\r\n return r;\r\n}\r\n\r\nexport function __spreadArray(to, from, pack) {\r\n if (pack || arguments.length === 2) for (var i = 0, l = from.length, ar; i < l; i++) {\r\n if (ar || !(i in from)) {\r\n if (!ar) ar = Array.prototype.slice.call(from, 0, i);\r\n ar[i] = from[i];\r\n }\r\n }\r\n return to.concat(ar || Array.prototype.slice.call(from));\r\n}\r\n\r\nexport function __await(v) {\r\n return this instanceof __await ? (this.v = v, this) : new __await(v);\r\n}\r\n\r\nexport function __asyncGenerator(thisArg, _arguments, generator) {\r\n if (!Symbol.asyncIterator) throw new TypeError(\"Symbol.asyncIterator is not defined.\");\r\n var g = generator.apply(thisArg, _arguments || []), i, q = [];\r\n return i = Object.create((typeof AsyncIterator === \"function\" ? AsyncIterator : Object).prototype), verb(\"next\"), verb(\"throw\"), verb(\"return\", awaitReturn), i[Symbol.asyncIterator] = function () { return this; }, i;\r\n function awaitReturn(f) { return function (v) { return Promise.resolve(v).then(f, reject); }; }\r\n function verb(n, f) { if (g[n]) { i[n] = function (v) { return new Promise(function (a, b) { q.push([n, v, a, b]) > 1 || resume(n, v); }); }; if (f) i[n] = f(i[n]); } }\r\n function resume(n, v) { try { step(g[n](v)); } catch (e) { settle(q[0][3], e); } }\r\n function step(r) { r.value instanceof __await ? Promise.resolve(r.value.v).then(fulfill, reject) : settle(q[0][2], r); }\r\n function fulfill(value) { resume(\"next\", value); }\r\n function reject(value) { resume(\"throw\", value); }\r\n function settle(f, v) { if (f(v), q.shift(), q.length) resume(q[0][0], q[0][1]); }\r\n}\r\n\r\nexport function __asyncDelegator(o) {\r\n var i, p;\r\n return i = {}, verb(\"next\"), verb(\"throw\", function (e) { throw e; }), verb(\"return\"), i[Symbol.iterator] = function () { return this; }, i;\r\n function verb(n, f) { i[n] = o[n] ? function (v) { return (p = !p) ? { value: __await(o[n](v)), done: false } : f ? f(v) : v; } : f; }\r\n}\r\n\r\nexport function __asyncValues(o) {\r\n if (!Symbol.asyncIterator) throw new TypeError(\"Symbol.asyncIterator is not defined.\");\r\n var m = o[Symbol.asyncIterator], i;\r\n return m ? m.call(o) : (o = typeof __values === \"function\" ? __values(o) : o[Symbol.iterator](), i = {}, verb(\"next\"), verb(\"throw\"), verb(\"return\"), i[Symbol.asyncIterator] = function () { return this; }, i);\r\n function verb(n) { i[n] = o[n] && function (v) { return new Promise(function (resolve, reject) { v = o[n](v), settle(resolve, reject, v.done, v.value); }); }; }\r\n function settle(resolve, reject, d, v) { Promise.resolve(v).then(function(v) { resolve({ value: v, done: d }); }, reject); }\r\n}\r\n\r\nexport function __makeTemplateObject(cooked, raw) {\r\n if (Object.defineProperty) { Object.defineProperty(cooked, \"raw\", { value: raw }); } else { cooked.raw = raw; }\r\n return cooked;\r\n};\r\n\r\nvar __setModuleDefault = Object.create ? (function(o, v) {\r\n Object.defineProperty(o, \"default\", { enumerable: true, value: v });\r\n}) : function(o, v) {\r\n o[\"default\"] = v;\r\n};\r\n\r\nvar ownKeys = function(o) {\r\n ownKeys = Object.getOwnPropertyNames || function (o) {\r\n var ar = [];\r\n for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;\r\n return ar;\r\n };\r\n return ownKeys(o);\r\n};\r\n\r\nexport function __importStar(mod) {\r\n if (mod && mod.__esModule) return mod;\r\n var result = {};\r\n if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== \"default\") __createBinding(result, mod, k[i]);\r\n __setModuleDefault(result, mod);\r\n return result;\r\n}\r\n\r\nexport function __importDefault(mod) {\r\n return (mod && mod.__esModule) ? mod : { default: mod };\r\n}\r\n\r\nexport function __classPrivateFieldGet(receiver, state, kind, f) {\r\n if (kind === \"a\" && !f) throw new TypeError(\"Private accessor was defined without a getter\");\r\n if (typeof state === \"function\" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError(\"Cannot read private member from an object whose class did not declare it\");\r\n return kind === \"m\" ? f : kind === \"a\" ? f.call(receiver) : f ? f.value : state.get(receiver);\r\n}\r\n\r\nexport function __classPrivateFieldSet(receiver, state, value, kind, f) {\r\n if (kind === \"m\") throw new TypeError(\"Private method is not writable\");\r\n if (kind === \"a\" && !f) throw new TypeError(\"Private accessor was defined without a setter\");\r\n if (typeof state === \"function\" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError(\"Cannot write private member to an object whose class did not declare it\");\r\n return (kind === \"a\" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;\r\n}\r\n\r\nexport function __classPrivateFieldIn(state, receiver) {\r\n if (receiver === null || (typeof receiver !== \"object\" && typeof receiver !== \"function\")) throw new TypeError(\"Cannot use 'in' operator on non-object\");\r\n return typeof state === \"function\" ? receiver === state : state.has(receiver);\r\n}\r\n\r\nexport function __addDisposableResource(env, value, async) {\r\n if (value !== null && value !== void 0) {\r\n if (typeof value !== \"object\" && typeof value !== \"function\") throw new TypeError(\"Object expected.\");\r\n var dispose, inner;\r\n if (async) {\r\n if (!Symbol.asyncDispose) throw new TypeError(\"Symbol.asyncDispose is not defined.\");\r\n dispose = value[Symbol.asyncDispose];\r\n }\r\n if (dispose === void 0) {\r\n if (!Symbol.dispose) throw new TypeError(\"Symbol.dispose is not defined.\");\r\n dispose = value[Symbol.dispose];\r\n if (async) inner = dispose;\r\n }\r\n if (typeof dispose !== \"function\") throw new TypeError(\"Object not disposable.\");\r\n if (inner) dispose = function() { try { inner.call(this); } catch (e) { return Promise.reject(e); } };\r\n env.stack.push({ value: value, dispose: dispose, async: async });\r\n }\r\n else if (async) {\r\n env.stack.push({ async: true });\r\n }\r\n return value;\r\n\r\n}\r\n\r\nvar _SuppressedError = typeof SuppressedError === \"function\" ? SuppressedError : function (error, suppressed, message) {\r\n var e = new Error(message);\r\n return e.name = \"SuppressedError\", e.error = error, e.suppressed = suppressed, e;\r\n};\r\n\r\nexport function __disposeResources(env) {\r\n function fail(e) {\r\n env.error = env.hasError ? new _SuppressedError(e, env.error, \"An error was suppressed during disposal.\") : e;\r\n env.hasError = true;\r\n }\r\n var r, s = 0;\r\n function next() {\r\n while (r = env.stack.pop()) {\r\n try {\r\n if (!r.async && s === 1) return s = 0, env.stack.push(r), Promise.resolve().then(next);\r\n if (r.dispose) {\r\n var result = r.dispose.call(r.value);\r\n if (r.async) return s |= 2, Promise.resolve(result).then(next, function(e) { fail(e); return next(); });\r\n }\r\n else s |= 1;\r\n }\r\n catch (e) {\r\n fail(e);\r\n }\r\n }\r\n if (s === 1) return env.hasError ? Promise.reject(env.error) : Promise.resolve();\r\n if (env.hasError) throw env.error;\r\n }\r\n return next();\r\n}\r\n\r\nexport function __rewriteRelativeImportExtension(path, preserveJsx) {\r\n if (typeof path === \"string\" && /^\\.\\.?\\//.test(path)) {\r\n return path.replace(/\\.(tsx)$|((?:\\.d)?)((?:\\.[^./]+?)?)\\.([cm]?)ts$/i, function (m, tsx, d, ext, cm) {\r\n return tsx ? preserveJsx ? \".jsx\" : \".js\" : d && (!ext || !cm) ? m : (d + ext + \".\" + cm.toLowerCase() + \"js\");\r\n });\r\n }\r\n return path;\r\n}\r\n\r\nexport default {\r\n __extends: __extends,\r\n __assign: __assign,\r\n __rest: __rest,\r\n __decorate: __decorate,\r\n __param: __param,\r\n __esDecorate: __esDecorate,\r\n __runInitializers: __runInitializers,\r\n __propKey: __propKey,\r\n __setFunctionName: __setFunctionName,\r\n __metadata: __metadata,\r\n __awaiter: __awaiter,\r\n __generator: __generator,\r\n __createBinding: __createBinding,\r\n __exportStar: __exportStar,\r\n __values: __values,\r\n __read: __read,\r\n __spread: __spread,\r\n __spreadArrays: __spreadArrays,\r\n __spreadArray: __spreadArray,\r\n __await: __await,\r\n __asyncGenerator: __asyncGenerator,\r\n __asyncDelegator: __asyncDelegator,\r\n __asyncValues: __asyncValues,\r\n __makeTemplateObject: __makeTemplateObject,\r\n __importStar: __importStar,\r\n __importDefault: __importDefault,\r\n __classPrivateFieldGet: __classPrivateFieldGet,\r\n __classPrivateFieldSet: __classPrivateFieldSet,\r\n __classPrivateFieldIn: __classPrivateFieldIn,\r\n __addDisposableResource: __addDisposableResource,\r\n __disposeResources: __disposeResources,\r\n __rewriteRelativeImportExtension: __rewriteRelativeImportExtension,\r\n};\r\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\nexport class EmblemWeb3Adapter {\n readonly address: Hex;\n readonly #vaultId: string;\n readonly #config: SignerConfig;\n\n constructor(address: Hex, vaultId: string, config: SignerConfig) {\n this.address = address;\n this.#vaultId = vaultId;\n this.#config = config;\n }\n\n async signMessage(message: string | Uint8Array): Promise<Hex> {\n const payload = typeof message === 'string' ? message : bytesToHex(message);\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-eth-message',\n { vaultId: this.#vaultId, message: payload },\n this.#config\n );\n return data.signature;\n }\n\n async signTypedData(\n domain: Record<string, unknown>,\n types: Record<string, unknown>,\n message: Record<string, unknown>\n ): Promise<Hex> {\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-typed-message',\n { vaultId: this.#vaultId, domain, types, message },\n this.#config\n );\n return data.signature;\n }\n\n async signTransaction(tx: Record<string, unknown>): Promise<{ rawTransaction: Hex }> {\n const normalized = normalizeTxForEmblem(tx);\n const resp = await emblemPost<{ signedTransaction: Hex }>(\n '/sign-eth-tx',\n { vaultId: this.#vaultId, transaction: normalized },\n this.#config\n );\n return { rawTransaction: resp.signedTransaction };\n }\n}\n\nexport async function toWeb3Adapter(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemWeb3Adapter> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemWeb3Adapter(info.evmAddress, info.vaultId, config);\n}\n","import type { SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { fetchVaultInfo } from './vault';\n\n// @solana/web3.js compatible interfaces\nexport interface SolanaSignerInterface {\n publicKey: string;\n signMessage(message: Uint8Array | string): Promise<Uint8Array>;\n signTransaction(transaction: unknown): Promise<unknown>;\n}\n\n// For Solana Kit compatibility\nexport interface SolanaKitSignerInterface {\n publicKey: string;\n signMessage(message: Uint8Array | string): Promise<Uint8Array>;\n signTransaction(transaction: unknown): Promise<unknown>;\n}\n\nexport class EmblemSolanaSigner implements SolanaSignerInterface, SolanaKitSignerInterface {\n readonly publicKey: string; // base58 address\n private readonly config: SignerConfig;\n private readonly vaultId: string;\n\n constructor(config: SignerConfig, vaultInfo: SignerVaultInfo) {\n this.publicKey = vaultInfo.address;\n this.config = config;\n this.vaultId = vaultInfo.vaultId;\n }\n\n async signMessage(message: Uint8Array | string): Promise<Uint8Array> {\n // Convert message to bytes if it's a string\n const messageBytes = typeof message === 'string' ? new TextEncoder().encode(message) : message;\n\n // Convert to base64 for API transmission\n const messageBase64 = btoa(String.fromCharCode(...messageBytes));\n\n const response = await emblemPost<{ signature: string }>(\n '/sign-solana-message',\n { vaultId: this.vaultId, message: messageBase64 },\n this.config\n );\n\n // The server returns a signature - could be base64, base58, or hex\n // Let's check what format we're getting and handle accordingly\n\n // Try to decode as base58 first (Solana standard)\n try {\n // Use @solana/web3.js bs58 decoder if available, otherwise fallback\n const win = typeof window !== 'undefined' ? (window as unknown as { bs58?: { decode(s: string): Uint8Array } }) : undefined;\n if (win?.bs58) {\n return win.bs58.decode(response.signature);\n }\n // For Node.js environments or if bs58 is not globally available\n // The signature might be base64 encoded\n const signatureBytes = Uint8Array.from(atob(response.signature), (c) => c.charCodeAt(0));\n return signatureBytes;\n } catch (e) {\n // If base64 decode fails, try treating as hex\n if (response.signature.startsWith('0x')) {\n const hex = response.signature.slice(2);\n const bytes = new Uint8Array(hex.length / 2);\n for (let i = 0; i < hex.length; i += 2) {\n bytes[i / 2] = parseInt(hex.substr(i, 2), 16);\n }\n return bytes;\n }\n throw new Error(`Unable to decode signature format: ${e}`);\n }\n }\n\n async signTransaction(transaction: unknown): Promise<unknown> {\n // Serialize transaction for API transmission\n const serializedTransaction = this.serializeTransaction(transaction);\n\n const response = await emblemPost<{\n serializedSignedTransaction?: string;\n signedTransaction?: string;\n }>(\n '/sign-solana-transaction',\n {\n vaultId: this.vaultId,\n transactionToSign: serializedTransaction, // Pass the base64 string directly\n broadcast: false, // Don't broadcast, just sign\n versionedTransaction: true, // Match API test format\n },\n this.config\n );\n\n // Parse the signed transaction response - handle both response formats\n const signedTxData = response.serializedSignedTransaction || response.signedTransaction;\n if (!signedTxData) {\n throw new Error('No signed transaction data received from server');\n }\n\n return this.deserializeTransaction(signedTxData);\n }\n\n private serializeTransaction(tx: unknown): string {\n // Handle different transaction formats from @solana/web3.js\n if (tx && typeof tx === 'object') {\n // For VersionedTransaction or Transaction objects\n if ((tx as { serialize?: () => Uint8Array }).serialize) {\n // Server expects just the base64 string, not an object\n const serialized = (tx as { serialize: () => Uint8Array }).serialize();\n const base64 = btoa(String.fromCharCode(...serialized));\n return base64;\n }\n // For transaction objects with instructions\n if (\n (tx as { instructions?: unknown }).instructions ||\n (tx as { recentBlockhash?: unknown }).recentBlockhash\n ) {\n throw new Error(\n 'Cannot serialize unsigned transaction objects. Please use VersionedTransaction.'\n );\n }\n }\n\n // Fallback: assume it's already a string\n return tx as string;\n }\n\n private deserializeTransaction(signedTxData: unknown): unknown {\n // If it's already an object (shouldn't happen based on type), handle it\n if (\n typeof signedTxData === 'object' &&\n signedTxData &&\n (signedTxData as { serializedSignedTransaction?: string }).serializedSignedTransaction\n ) {\n signedTxData = (signedTxData as { serializedSignedTransaction: string })\n .serializedSignedTransaction;\n }\n\n // If it's a string, decode from base64\n if (typeof signedTxData === 'string') {\n try {\n // The server returns base64, so decode it\n const decoded = atob(signedTxData);\n return new Uint8Array(decoded.split('').map((c) => c.charCodeAt(0)));\n } catch (e) {\n console.error('Failed to decode transaction:', e);\n throw new Error(`Unable to deserialize transaction response: ${e}`);\n }\n }\n\n // If it's already a Uint8Array or other type, return as-is\n return signedTxData;\n }\n\n // Additional utility methods for @solana/web3.js compatibility\n\n /** Get the vault ID for this signer */\n getVaultId(): string {\n return this.vaultId;\n }\n\n /** Sign multiple transactions in batch */\n async signAllTransactions(transactions: unknown[]): Promise<unknown[]> {\n // Sign each transaction individually for now\n // Could be optimized with a batch API endpoint in the future\n const results = [];\n for (const tx of transactions) {\n results.push(await this.signTransaction(tx));\n }\n return results;\n }\n\n /** Check if this signer can sign for a given public key */\n canSign(publicKey: string): boolean {\n return publicKey === this.publicKey;\n }\n\n /** Sign and optionally broadcast a transaction */\n async signAndBroadcast(transaction: unknown, broadcast: boolean = true): Promise<string> {\n // Serialize transaction for API transmission\n const serializedTransaction = this.serializeTransaction(transaction);\n\n const response = await emblemPost<{\n transactionSignature?: string;\n serializedSignedTransaction?: string;\n }>(\n '/sign-solana-transaction',\n {\n vaultId: this.vaultId,\n transactionToSign: serializedTransaction, // Pass the base64 string directly\n broadcast: broadcast,\n versionedTransaction: true, // Match API test format\n },\n this.config\n );\n\n if (broadcast) {\n // Return the transaction signature\n if (!response.transactionSignature) {\n throw new Error('No transaction signature received from broadcast');\n }\n return response.transactionSignature;\n } else {\n // Return the signed transaction data\n if (!response.serializedSignedTransaction) {\n throw new Error('No signed transaction data received from server');\n }\n return response.serializedSignedTransaction;\n }\n }\n}\n\nexport async function toSolanaWeb3Signer(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemSolanaSigner> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemSolanaSigner(config, info);\n}\n\nexport async function toSolanaKitSigner(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemSolanaSigner> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemSolanaSigner(config, info);\n}\n","import type { SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { fetchVaultInfo } from './vault';\n\n/**\n * Bitcoin address types\n */\nexport type BitcoinAddressType = 'p2pkh' | 'p2wpkh' | 'p2tr' | 'p2sh';\n\n/**\n * Bitcoin network type\n */\nexport type BitcoinNetwork = 'mainnet' | 'testnet';\n\n/**\n * Input signing instruction for PSBTs\n * Compatible with UniSat wallet-api's UserToSignInput format\n */\nexport interface BitcoinToSignInput {\n /** Input index in the PSBT */\n index: number;\n /** Bitcoin address associated with this input */\n address?: string;\n /** Public key (hex) for this input */\n publicKey?: string;\n /** Sighash types for signing */\n sighashTypes?: number[];\n /** Tap leaf hash to sign (hex) for Taproot script path spending */\n tapLeafHashToSign?: string;\n /** Use tweaked signer for Taproot */\n useTweakedSigner?: boolean;\n /** Disable tweak signer for Taproot */\n disableTweakSigner?: boolean;\n}\n\n/**\n * Bitcoin sign transaction options\n */\nexport interface BitcoinSignOptions {\n /** Transaction type determines signing algorithm (ECDSA for p2pkh/p2wpkh, Schnorr for p2tr) */\n transactionType: 'p2pkh' | 'p2wpkh' | 'p2tr';\n /** Per-input signing instructions for complex PSBTs */\n toSignInputs?: BitcoinToSignInput[];\n}\n\n/**\n * Response from signing a Bitcoin PSBT\n */\nexport interface BitcoinSignResult {\n success: boolean;\n /** Signed PSBT in base64 format */\n signedPsbt: string;\n /** Final transaction hex (ready for broadcast) */\n signedTxHex: string;\n /** Raw signature */\n signature: string;\n}\n\n/**\n * Extended vault info including Bitcoin public key and derived addresses\n */\nexport interface BitcoinVaultInfo extends SignerVaultInfo {\n /** Bitcoin public key (compressed, hex) */\n btcPubkey: string;\n /** Derived Bitcoin addresses */\n btcAddresses?: {\n /** Legacy (1...) */\n p2pkh: string;\n /** Native SegWit (bc1q...) */\n p2wpkh: string;\n /** Taproot (bc1p...) */\n p2tr: string;\n };\n}\n\n/**\n * Bitcoin signer interface compatible with common Bitcoin libraries\n */\nexport interface BitcoinSignerInterface {\n /** Bitcoin public key (compressed, hex) */\n publicKey: string;\n /** Derived Bitcoin addresses */\n addresses: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n /** Sign a PSBT */\n signPsbt(psbtBase64: string, options: BitcoinSignOptions): Promise<BitcoinSignResult>;\n /** Sign multiple PSBTs */\n signAllPsbts(\n psbts: Array<{ psbt: string; options: BitcoinSignOptions }>\n ): Promise<BitcoinSignResult[]>;\n /** Get the vault ID */\n getVaultId(): string;\n /** Get public key as hex */\n getPublicKey(): string;\n}\n\n/**\n * Constants for Bitcoin calculations\n */\nexport const SATS_PER_BTC = 100_000_000;\n\n/**\n * Emblem Bitcoin Signer implementation\n */\nexport class EmblemBitcoinSigner implements BitcoinSignerInterface {\n readonly publicKey: string; // Compressed public key (hex)\n readonly addresses: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n private readonly config: SignerConfig;\n private readonly vaultId: string;\n\n constructor(config: SignerConfig, vaultInfo: BitcoinVaultInfo) {\n if (!vaultInfo.btcPubkey) {\n throw new Error('Bitcoin public key is required in vault info');\n }\n this.publicKey = vaultInfo.btcPubkey;\n this.addresses = vaultInfo.btcAddresses ?? {\n p2pkh: '',\n p2wpkh: '',\n p2tr: '',\n };\n this.config = config;\n this.vaultId = vaultInfo.vaultId;\n }\n\n /**\n * Sign a Bitcoin PSBT\n * @param psbtBase64 - PSBT in base64 format\n * @param options - Signing options including transaction type and per-input instructions\n */\n async signPsbt(psbtBase64: string, options: BitcoinSignOptions): Promise<BitcoinSignResult> {\n const { transactionType, toSignInputs } = options;\n\n // Normalize toSignInputs for JSON transmission\n const normalizedInputs = toSignInputs?.map(input => ({\n ...input,\n // Ensure tapLeafHashToSign is a string (some libs pass Buffer/Uint8Array)\n tapLeafHashToSign: this.normalizeToHex(input.tapLeafHashToSign),\n }));\n\n const response = await emblemPost<BitcoinSignResult>(\n '/sign-btc-transaction',\n {\n vaultId: this.vaultId,\n psbt: psbtBase64,\n transactionType,\n toSignInputs: normalizedInputs,\n },\n this.config\n );\n\n return response;\n }\n\n /**\n * Sign multiple PSBTs\n * @param psbts - Array of PSBTs with their signing options\n */\n async signAllPsbts(\n psbts: Array<{ psbt: string; options: BitcoinSignOptions }>\n ): Promise<BitcoinSignResult[]> {\n const results: BitcoinSignResult[] = [];\n for (const { psbt, options } of psbts) {\n results.push(await this.signPsbt(psbt, options));\n }\n return results;\n }\n\n /**\n * Get the vault ID\n */\n getVaultId(): string {\n return this.vaultId;\n }\n\n /**\n * Get public key as hex\n */\n getPublicKey(): string {\n return this.publicKey;\n }\n\n /**\n * Check if a given address belongs to this signer\n */\n ownsAddress(address: string): boolean {\n return (\n address === this.addresses.p2pkh ||\n address === this.addresses.p2wpkh ||\n address === this.addresses.p2tr\n );\n }\n\n /**\n * Get the appropriate address for a given type\n */\n getAddress(type: BitcoinAddressType = 'p2wpkh'): string {\n switch (type) {\n case 'p2pkh':\n return this.addresses.p2pkh;\n case 'p2wpkh':\n return this.addresses.p2wpkh;\n case 'p2tr':\n return this.addresses.p2tr;\n case 'p2sh':\n // P2SH is typically wrapped SegWit, return p2wpkh as fallback\n return this.addresses.p2wpkh;\n default:\n return this.addresses.p2wpkh;\n }\n }\n\n /**\n * Normalize a value to hex string (handles string, Buffer, Uint8Array)\n */\n private normalizeToHex(value: string | ArrayLike<number> | undefined): string | undefined {\n if (value === undefined || value === null) return undefined;\n if (typeof value === 'string') return value;\n // Handle Buffer/Uint8Array\n const bytes = value as ArrayLike<number>;\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += (bytes[i] as number).toString(16).padStart(2, '0');\n }\n return hex;\n }\n}\n\n/**\n * Create an Emblem Bitcoin signer from config\n * @param config - Signer configuration with authentication\n * @param infoOverride - Optional vault info to skip API call\n */\nexport async function toBitcoinSigner(\n config: SignerConfig,\n infoOverride?: BitcoinVaultInfo\n): Promise<EmblemBitcoinSigner> {\n const info = infoOverride ?? (await fetchBitcoinVaultInfo(config));\n return new EmblemBitcoinSigner(config, info);\n}\n\n/**\n * Fetch vault info with Bitcoin-specific fields\n */\nexport async function fetchBitcoinVaultInfo(config: SignerConfig): Promise<BitcoinVaultInfo> {\n const data = await emblemPost<{\n vaultId: string;\n address?: string;\n evmAddress?: string;\n btcPubkey?: string;\n btcAddresses?: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n created_by?: string;\n }>('/vault/info', {}, config);\n\n if (!data || !data.vaultId) {\n throw new Error('Invalid vault info response: missing vaultId');\n }\n\n if (!data.btcPubkey) {\n throw new Error('Invalid vault info response: missing btcPubkey (Bitcoin public key)');\n }\n\n return {\n vaultId: data.vaultId,\n address: data.address || '',\n evmAddress: (data.evmAddress || '0x') as `0x${string}`,\n btcPubkey: data.btcPubkey,\n btcAddresses: data.btcAddresses,\n created_by: data.created_by,\n };\n}\n\n/**\n * Utility: Detect Bitcoin address type from address string\n */\nexport function detectAddressType(address: string): BitcoinAddressType | 'unknown' {\n if (address.startsWith('bc1p')) return 'p2tr'; // Taproot (bech32m)\n if (address.startsWith('bc1q')) return 'p2wpkh'; // Native SegWit (bech32)\n if (address.startsWith('1')) return 'p2pkh'; // Legacy\n if (address.startsWith('3')) return 'p2sh'; // Script Hash\n // Testnet addresses\n if (address.startsWith('tb1p')) return 'p2tr';\n if (address.startsWith('tb1q')) return 'p2wpkh';\n if (address.startsWith('m') || address.startsWith('n')) return 'p2pkh';\n if (address.startsWith('2')) return 'p2sh';\n return 'unknown';\n}\n\n/**\n * Utility: Convert satoshis to BTC\n */\nexport function satsToBTC(sats: number): number {\n return sats / SATS_PER_BTC;\n}\n\n/**\n * Utility: Convert BTC to satoshis\n */\nexport function btcToSats(btc: number): number {\n return Math.round(btc * SATS_PER_BTC);\n}\n\n/**\n * Utility: Format satoshis for display\n */\nexport function formatSats(sats: number): string {\n return `${sats.toLocaleString()} sats (${satsToBTC(sats).toFixed(8)} BTC)`;\n}\n\n/**\n * Utility: Estimate transaction size in vbytes\n */\nexport function estimateTransactionSize(\n inputCount: number,\n outputCount: number,\n inputType: BitcoinAddressType = 'p2wpkh'\n): number {\n let inputSize: number;\n switch (inputType) {\n case 'p2pkh':\n inputSize = 148; // Legacy (no witness discount)\n break;\n case 'p2tr':\n inputSize = 58; // Taproot (approx vbytes)\n break;\n case 'p2wpkh':\n default:\n inputSize = 68; // Native SegWit (approx vbytes)\n break;\n }\n\n const outputSize = 31; // Bech32 output (approx vbytes)\n const overhead = 10; // Version, locktime, etc.\n\n return overhead + inputCount * inputSize + outputCount * outputSize;\n}\n\n/**\n * Utility: Calculate estimated fee\n */\nexport function calculateFee(vsize: number, feeRate: number): number {\n return Math.ceil(vsize * feeRate);\n}\n\n/**\n * Utility: Check if amount is above dust threshold\n */\nexport function isDust(sats: number, addressType: BitcoinAddressType = 'p2wpkh'): boolean {\n // Dust threshold: ~546 sats for legacy, ~294 for SegWit\n const dustThreshold = addressType === 'p2wpkh' || addressType === 'p2tr' ? 294 : 546;\n return sats < dustThreshold;\n}\n"],"names":["SessionManager","constructor","config","this","session","timer","events","consecutiveFailures","maxBackoffMs","baseBackoffMs","onRefresh","refreshSkewMs","setSession","schedule","emit","getSession","clear","cancel","on","event","handler","push","off","handlers","index","indexOf","splice","destroy","Object","keys","forEach","key","payload","error","clearTimeout","getBackoffDelay","Math","min","pow","max","scheduleRetry","now","Date","ttl","expiresAt","backoff","setTimeout","async","refreshed","authToken","refreshIn","inMs","EmblemAuthSDK","pendingNonce","overlayEl","_iframeEl","overlayCleanup","_cachedVaultInfo","_visitorId","appId","Error","authUrl","apiUrl","persistSession","storageKey","visitorIdKey","messageHandler","onMessage","bind","window","addEventListener","sessionMgr","current","refreshSession","s","info","restored","loadPersistedSession","hydrateSession","loadPersistedVisitorId","tryConsumeSessionFromHash","raw","String","location","hash","replace","encoded","URLSearchParams","get","b64","decodeURIComponent","json","escape","atob","JSON","parse","authDebug","expected","received","onSuccess","history","replaceState","pathname","search","e","message","authenticateWallet","params","network","signature","publicKey","address","url","response","fetch","method","headers","body","stringify","ok","errorData","safeJson","status","data","openOAuth","provider","origin","initData","getAuthInit","nonce","randomId","state","noncePrefix","slice","hasState","statePrefix","authOrigin","normalizeBaseUrl","URL","searchParams","set","toString","win","open","popupFeatures","focus","assign","emitError","sendEmailOtp","apiBase","email","password","catch","verifyEmailOtp","otp","authenticateEmail","authenticatePassword","authBase","openAuthModal","initError","modalUrl","resolveModalUrl","base","mode","modalMode","opened","openIframeModal","features","getVisitorId","tryGetOriginFromConfig","refreshUrl","hasTokenInSession","Boolean","refreshToken","credentials","nextSession","getVaultInfo","resp","Authorization","rawVaultInfo","vaultInfo","tokenId","vaultId","solanaAddress","getVaultApiKey","token","user","apiKeyHash","infoRes","infoJson","pkp","api_key_hash","rawIdentifier","identifier","scopedIdentifier","vaultsRes","encodeURIComponent","vaults","match","Array","isArray","find","v","token_id","genRes","genJson","apiKey","decRes","dataToEncryptHash","decJson","decrypted","decryptedString","logout","persistVisitorId","getSignerContext","baseUrl","getJwt","evmAddress","created_by","toViemAccount","Promise","toEthersWallet","toWeb3Adapter","toSolanaWeb3Signer","toSolanaKitSigner","toBitcoinSigner","fetchBitcoinVaultInfo","resolve","then","bitcoin","removeEventListener","closeOverlay","href","authDebugEnabled","localStorage","getItem","toLowerCase","p","process","env","NEXT_PUBLIC_AUTH_DEBUG","AUTH_DEBUG","trim","args","input","label","trimmed","allowedOrigins","Set","tryGetOriginFromApiUrl","filter","has","eventOrigin","from","type","onCancel","undefined","visitorId","onError","top","outerHeight","outerWidth","array","Uint8Array","crypto","getRandomValues","i","length","floor","random","b","padStart","join","normalized","tryInit","firstError","fallbackError","merged","fallback","overlay","document","createElement","setAttribute","style","position","inset","background","backdropFilter","webkitBackdropFilter","zIndex","display","alignItems","justifyContent","padding","container","width","height","border","borderRadius","boxShadow","overflow","flexDirection","header","borderBottom","title","textContent","fontFamily","fontSize","letterSpacing","textTransform","color","closeBtn","lineHeight","cursor","userSelect","onclick","cancelAuth","appendChild","iframe","src","referrerPolicy","allow","target","onKey","capture","parentNode","removeChild","stored","removeItem","setItem","emblemPost","path","authHeaders","getAuthHeaders","h","tok","jwt","sdk","resolveAuthHeaders","res","_key","value","text","errorMessage","substring","sanitizeErrorMessage","toSafeNumber","fieldName","num","Number","isSafeInteger","MAX_SAFE_INTEGER","toHexIfBigInt","normalizeTxForEmblem","tx","out","gas","gasLimit","gasPrice","maxFeePerGas","maxPriorityFeePerGas","chainId","accessList","account","chain","bytesToHex","bytes","fetchVaultInfo","startsWith","infoOverride","toAccount","import","signMessage","isRaw","test","signTypedData","typedData","domain","types","signTransaction","_opts","normalizedTx","transaction","signedTransaction","ethers","moduleName","AbstractSigner","resolveAddress","EmblemEthersWalletImpl","signerConfig","signerProvider","seed","super","_address","_vaultId","_chainId","_config","initialize","_initPromise","err","getAddress","getVaultId","setChainId","getChainId","connect","newProvider","cleanTypes","EIP712Domain","_signTypedData","addr","toSign","populateTransaction","to","options","sendTransaction","signed","broadcastTransaction","fromAddress","BigInt","getNetwork","getTransactionCount","toAddress","estimateGas","getFeeData","populated","signAndBroadcast","waitForReceipt","waitForTransaction","__classPrivateFieldGet","receiver","kind","f","TypeError","call","__classPrivateFieldSet","SuppressedError","EmblemWeb3Adapter","_EmblemWeb3Adapter_vaultId","_EmblemWeb3Adapter_config","rawTransaction","EmblemSolanaSigner","messageBytes","TextEncoder","encode","messageBase64","btoa","fromCharCode","bs58","decode","c","charCodeAt","hex","parseInt","substr","serializedTransaction","serializeTransaction","transactionToSign","broadcast","versionedTransaction","signedTxData","serializedSignedTransaction","deserializeTransaction","serialize","serialized","instructions","recentBlockhash","decoded","split","map","signAllTransactions","transactions","results","canSign","transactionSignature","SATS_PER_BTC","EmblemBitcoinSigner","btcPubkey","addresses","btcAddresses","p2pkh","p2wpkh","p2tr","signPsbt","psbtBase64","transactionType","toSignInputs","normalizedInputs","tapLeafHashToSign","normalizeToHex","psbt","signAllPsbts","psbts","getPublicKey","ownsAddress","satsToBTC","sats","btc","round","toLocaleString","toFixed","inputCount","outputCount","inputType","inputSize","vsize","feeRate","ceil","addressType"],"mappings":"uPAyBaA,EAUX,WAAAC,CAAYC,EAA+B,IATnCC,KAAOC,QAAuB,KAC9BD,KAAKE,MAA0B,KAEtBF,KAAMG,OAAiE,GAEhFH,KAAmBI,oBAAW,EACrBJ,KAAAK,aAAuB,IACvBL,KAAAM,cAAwB,IAGvCN,KAAKO,UAAYR,EAAOQ,UACxBP,KAAKQ,cAAgBT,EAAOS,eAAiB,GAC9C,CAKD,UAAAC,CAAWR,GACTD,KAAKC,QAAUA,EACfD,KAAKU,WACLV,KAAKW,KAAK,UAAWV,EACtB,CAKD,UAAAW,GACE,OAAOZ,KAAKC,OACb,CAKD,KAAAY,GACEb,KAAKC,QAAU,KACfD,KAAKc,SACLd,KAAKW,KAAK,UAAW,KACtB,CAKD,EAAAI,CAA8BC,EAAUC,GACjCjB,KAAKG,OAAOa,KACfhB,KAAKG,OAAOa,GAAS,IAEvBhB,KAAKG,OAAOa,GAAQE,KAAKD,EAC1B,CAKD,GAAAE,CAA+BH,EAAUC,GACvC,MAAMG,EAAWpB,KAAKG,OAAOa,GAC7B,GAAII,EAAU,CACZ,MAAMC,EAAQD,EAASE,QAAQL,IAChB,IAAXI,GACFD,EAASG,OAAOF,EAAO,EAE1B,CACF,CAKD,OAAAG,GACExB,KAAKc,SACLd,KAAKC,QAAU,KACfwB,OAAOC,KAAK1B,KAAKG,QAAQwB,QAAQC,WACxB5B,KAAKG,OAAOyB,IAEtB,CAEO,IAAAjB,CACNK,EACAa,GAEA,MAAMT,EAAWpB,KAAKG,OAAOa,GAC7B,GAAKI,EAEL,IAAK,MAAMH,KAAWG,EACpB,IACEH,EAAQY,EACT,CAAC,MAAOC,GAER,CAEJ,CAEO,MAAAhB,GACFd,KAAKE,QACP6B,aAAa/B,KAAKE,OAClBF,KAAKE,MAAQ,KAEhB,CAKO,eAAA8B,GAON,OAJcC,KAAKC,IACjBlC,KAAKM,cAAgB2B,KAAKE,IAAI,EAAGF,KAAKG,IAAI,EAAGpC,KAAKI,oBAAsB,IACxEJ,KAAKK,aAGR,CAKO,aAAAgC,CAAcpC,GACpBD,KAAKc,SAEL,MAAMwB,EAAMC,KAAKD,MACXE,EAAMvC,EAAQwC,UAAYH,EAGhC,GAAIE,GAAO,EAET,YADAxC,KAAKW,KAAK,iBAAkBV,GAK9B,MAAMyC,EAAUT,KAAKC,IAAIlC,KAAKgC,kBAAmBQ,EAAM,KAIrDxC,KAAKE,MAFHwC,GAAW,EAEAC,WAAW,KACtB3C,KAAKW,KAAK,iBAAkBV,IAC3BuC,GAMQG,WAAWC,UACtB,GAAK5C,KAAKO,UAOV,IACE,MAAMsC,QAAkB7C,KAAKO,UAAUN,GAEnC4C,GAAWJ,WAAaI,EAAUC,WAAaD,EAAUJ,YAAcxC,EAAQwC,WAEjFzC,KAAKI,oBAAsB,EAC3BJ,KAAKS,WAAWoC,GAChB7C,KAAKW,KAAK,mBAAoBkC,KAG9B7C,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,GAGxB,CAAC,MAAO6B,GAEP9B,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,EAEtB,MA/BKsC,KAAKD,OAASrC,EAAQwC,WACxBzC,KAAKW,KAAK,iBAAkBV,IA+B/ByC,EACJ,CAEO,QAAAhC,GACNV,KAAKc,SAEL,MAAMb,EAAUD,KAAKC,QACrB,IAAKA,GAASwC,UAAW,OAEzB,MAAMH,EAAMC,KAAKD,MACXE,EAAMvC,EAAQwC,UAAYH,EAEhC,GAAIE,GAAO,EAET,YADAxC,KAAKW,KAAK,iBAAkBV,GAK9BD,KAAKI,oBAAsB,EAE3B,MAAM2C,EAAYd,KAAKG,IAAI,EAAGI,EAAMxC,KAAKQ,eACzCR,KAAKW,KAAK,qBAAsB,CAAEqC,KAAMD,EAAWP,QAEnDxC,KAAKE,MAAQyC,WAAWC,UACtB,GAAK5C,KAAKO,UAQV,IACE,MAAMsC,QAAkB7C,KAAKO,UAAUN,GAEnC4C,GAAWJ,WAAaI,EAAUC,WAAaD,EAAUJ,YAAcxC,EAAQwC,WAEjFzC,KAAKI,oBAAsB,EAC3BJ,KAAKS,WAAWoC,GAChB7C,KAAKW,KAAK,mBAAoBkC,KAG9B7C,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,GAGxB,CAAC,MAAO6B,GAEP9B,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,EAEtB,MA/BKsC,KAAKD,OAASrC,EAAQwC,WACxBzC,KAAKW,KAAK,iBAAkBV,IA+B/B8C,EACJ,QCrOUE,EAmBX,WAAAnD,CAAYC,GACV,GAdMC,KAAOC,QAAuB,KAC9BD,KAAYkD,aAAkB,KAE9BlD,KAASmD,UAAuB,KAChCnD,KAASoD,UAA6B,KACtCpD,KAAcqD,eAAwB,KAE7BrD,KAAMG,OAA2D,GAC1EH,KAAgBsD,iBAAqB,KAGrCtD,KAAUuD,WAAkB,MAG7BxD,GAAQyD,MACX,MAAM,IAAIC,MAAM,qBAkClB,GA/BAzD,KAAKD,OAAS,IACTA,EACH2D,QAAS3D,EAAO2D,SAAW,8BAC3BC,OAAQ5D,EAAO4D,QAAU,6BACzBC,eAAgB7D,EAAO6D,iBAAkB,GAE3C5D,KAAK6D,WAAa,kBAAkB9D,EAAOyD,QAC3CxD,KAAK8D,aAAe,oBAAoB/D,EAAOyD,QAC/CxD,KAAK+D,eAAiB/D,KAAKgE,UAAUC,KAAKjE,MAEpB,oBAAXkE,QACTA,OAAOC,iBAAiB,UAAWnE,KAAK+D,gBAG1C/D,KAAKoE,WAAa,IAAIvE,EAAe,CACnCU,UAAWqC,MAAMyB,IACf,IAEE,aADwBrE,KAAKsE,kBACTD,CACrB,CAAC,MACA,OAAOA,CACR,KAKLrE,KAAKoE,WAAWrD,GAAG,iBAAkBwD,GAAKvE,KAAKW,KAAK,iBAAkB4D,IACtEvE,KAAKoE,WAAWrD,GAAG,mBAAoBwD,GAAKvE,KAAKW,KAAK,mBAAoB4D,IAC1EvE,KAAKoE,WAAWrD,GAAG,qBAAsByD,GAAQxE,KAAKW,KAAK,qBAAsB6D,IAG7ExE,KAAKD,OAAO6D,eAAgB,CAC9B,MAAMa,EAAWzE,KAAK0E,uBAClBD,GACFzE,KAAK2E,eAAeF,GAGtBzE,KAAKuD,WAAavD,KAAK4E,wBACxB,CAID5E,KAAK6E,2BACN,CAEO,yBAAAA,GACN,GAAsB,oBAAXX,OACX,IACE,MAAMY,EAAMC,OAAOb,OAAOc,SAASC,MAAQ,IAAIC,QAAQ,KAAM,IAC7D,IAAKJ,EAAK,OACV,MACMK,EADS,IAAIC,gBAAgBN,GACZO,IAAI,qBAC3B,IAAKF,EAAS,OAEd,MAAMG,EAAMC,mBAAmBJ,GACzBK,EAAOD,mBAAmBE,OAAOC,KAAKJ,KACtCrF,EAAU0F,KAAKC,MAAMJ,GAG3B,GAAIvF,GAASuD,OAASvD,EAAQuD,QAAUxD,KAAKD,OAAOyD,MAKlD,YAJAxD,KAAK6F,UAAU,uCAAwC,CACrDC,SAAU9F,KAAKD,OAAOyD,MACtBuC,SAAU9F,EAAQuD,QAKtBxD,KAAK6F,UAAU,uBAAwB,CAAErC,MAAOvD,GAASuD,QAEzDxD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKD,OAAOiG,YAAY/F,GACxBD,KAAKW,KAAK,UAAWV,GAGrB,IACEiE,OAAO+B,QAAQC,aAAa,KAAM,GAAIhC,OAAOc,SAASmB,SAAWjC,OAAOc,SAASoB,OAClF,CAAC,MAED,CACF,CAAC,MAAOC,GACPrG,KAAK6F,UAAU,qBAAsB,CAAE/D,MAAQuE,GAAaC,SAAWvB,OAAOsB,IAC/E,CACF,CAMD,wBAAME,CAAmBC,GACvB,MAAMC,QAAEA,EAAOH,QAAEA,EAAOI,UAAEA,EAASC,UAAEA,EAASC,QAAEA,GAAYJ,EAE5D,IAAKxG,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,6CAElB,IAAKgD,IAAYH,IAAYI,EAC3B,MAAM,IAAIjD,MAAM,4CAGlB,MAAMoD,EAAM,GAAG7G,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,sCAC3C4B,QAAiBC,MAAMF,EAAK,CAChCG,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOxD,KAAKD,OAAOyD,MACnBiD,UACAH,UACAI,YACAC,YACAC,cAIJ,IAAKE,EAASM,GAAI,CAChB,MAAMC,QAAkBrH,KAAKsH,SAASR,GAChChF,EAAQ,IAAI2B,MAAM4D,GAAWvF,OAAS,iBAAiBgF,EAASS,UAGtE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAUwF,EACVvF,CACP,CAED,MAAM0F,QAAaV,EAAStB,OACtBvF,EAAUuH,GAAMvH,QAUtB,OARIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKD,OAAOiG,YAAY/F,GACxBD,KAAKW,KAAK,UAAWV,IAGhBA,CACR,CAMD,eAAMwH,CAAUC,GACd,GAAsB,oBAAXxD,OACT,MAAM,IAAIT,MAAM,uDAGlB,MAAMkE,EAASzD,OAAOc,SAAS2C,OAC/B3H,KAAK6F,UAAU,kBAAmB,CAAE6B,WAAUC,SAAQhE,OAAQ3D,KAAKD,OAAO4D,SAI1E,MAAMiE,QAAiB5H,KAAK6H,YAAY,CAAEF,WAEpCG,EAASF,GAAUE,OAAoB9H,KAAK+H,WAC5CC,EAAQJ,GAAUI,MACxBhI,KAAKkD,aAAe4E,EACpB9H,KAAK6F,UAAU,oBAAqB,CAClCoC,YAAalD,OAAO+C,GAAOI,MAAM,EAAG,GACpCC,WAAYH,EACZI,YAAarD,OAAOiD,GAAS,IAAIE,MAAM,EAAG,MAG5C,MAAMG,EAAarI,KAAKsI,iBAAiBtI,KAAKD,OAAO2D,QAAS,WACxDmD,EAAM,IAAI0B,IAAI,GAAGF,yBACvBxB,EAAI2B,aAAaC,IAAI,WAAYf,GACjCb,EAAI2B,aAAaC,IAAI,QAAST,GAC9BhI,KAAK6F,UAAU,qBAAsB,CAAEgB,IAAKA,EAAI6B,aAIhD,MAAMC,EAAMzE,OAAO0E,KAAK/B,EAAI6B,WAAY,cAAe1I,KAAK6I,iBAC5D,GAAIF,EACF,IACEA,EAAIG,OACL,CAAC,MAAQ,MAKZ,IACE9I,KAAK6F,UAAU,yDACf3B,OAAOc,SAAS+D,OAAOlC,EAAI6B,WAC5B,CAAC,MACA,MAAM5G,EAAQ,IAAI2B,MAAM,qDACxBzD,KAAKgJ,UAAUlH,EAChB,CACF,CAKD,kBAAMmH,CACJzC,GAEA,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,4BAAmC,CACjElC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdC,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,kBAAkBgF,EAASS,UAGlE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,OAAO0F,CACR,CAKD,oBAAM8B,CAAe9C,GACnB,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,8BAAqC,CACnElC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdI,IAAK/C,EAAO+C,IACZH,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,oBAAoBgF,EAASS,UAGpE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAKD,uBAAMuJ,CAAkBhD,GACtB,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,yBAAgC,CAC9DlC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdC,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,eAAegF,EAASS,UAG/D,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAiBD,0BAAMwJ,CAAqBjD,GACzB,MAAMkD,EAAW1J,KAAKD,OAAO2D,QAAQwB,QAAQ,MAAO,IAC9C4B,QAAiBC,MAAM,GAAG2C,6BAAqC,CACnE1C,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOxD,KAAKD,OAAOyD,MACnB4F,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,mBAAmBgF,EAASS,UAGnE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAKD,mBAAM0J,GACJ,MAAMhC,EAASzD,OAAOc,SAAS2C,OAC/B,IAAIC,EAAoC,KACpCgC,EAA8B,KAElC,IACEhC,QAAiB5H,KAAK6H,YAAY,CAAEF,UACrC,CAAC,MAAO7F,GACP8H,EAAY9H,CAEb,CAED,MAAMgG,EAAQF,GAAUE,OAAS9H,KAAK+H,WACtC/H,KAAKkD,aAAe4E,EAEpB,IAAI+B,EAAW7J,KAAK8J,gBAAgB,CAAEhC,QAAOH,SAAQK,MAAOJ,GAAUI,QAGtE,GAAkC,uBAA9B4B,GAAW/H,SAASC,MACtB,IACE,MAAMiI,EAAO,IAAIxB,IAAI,WAAYvI,KAAKD,OAAO2D,SAC7CqG,EAAKvB,aAAaC,IAAI,QAAS,sBAC/BsB,EAAKvB,aAAaC,IAAI,QAASzI,KAAKD,OAAOyD,OAC3CuG,EAAKvB,aAAaC,IAAI,SAAUd,GAChCkC,EAAWE,EAAKrB,UACjB,CAAC,MAED,CAGH,MAAMsB,EAAOhK,KAAKD,OAAOkK,WAAa,OACtC,IAAIC,GAAS,EAEb,GAAa,WAATF,GAA8B,SAATA,EACvB,IACEE,EAASlK,KAAKmK,gBAAgBN,EAC/B,CAAC,MAAO/H,GAKR,CAGH,IAAKoI,EAAQ,CACX,MAAME,EAAWpK,KAAK6I,gBAEtB,IADY3E,OAAO0E,KAAKiB,EAAU,cAAeO,GACvC,CACR,MAAMtI,EAAQ,IAAI2B,MAAM,qDACxBzD,KAAKgJ,UAAUlH,EAChB,CACF,CACF,CAKD,UAAAlB,GACE,OAAOZ,KAAKC,OACb,CAMD,YAAAoK,GACE,OAAOrK,KAAKuD,UACb,CAQD,oBAAMe,GACJ,IACE,IAAKtE,KAAKC,QAAS,OAAO,KAG1B,MAAMoI,EAAarI,KAAKsK,yBACxB,IAAKjC,EAAY,OAAOrI,KAAKC,QAE7B,MAAMsK,EAAa,GAAGlC,qBAIhBmC,EAAoBC,QAAQzK,KAAKC,QAAQyK,cAEzC5D,QAAiBC,MAAMwD,EAAY,CACvCvD,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAUqD,EAAoB,CAAEE,aAAc1K,KAAKC,QAAQyK,cAAiB,IAEvFC,YAAa,YAGf,IAAK7D,EAASM,GAAI,OAAOpH,KAAKC,QAE9B,MAAMuH,QAAaV,EAAStB,OACtBoF,EAAcpD,GAAMvH,QAW1B,OATI2K,IAGF5K,KAAKC,QAAU2K,EACf5K,KAAK4D,eAAegH,GACpB5K,KAAKoE,WAAW3D,WAAWmK,GAC3B5K,KAAKW,KAAK,UAAWiK,IAGhB5K,KAAKC,OACb,CAAC,MACA,OAAOD,KAAKC,OACb,CACF,CAKD,kBAAM4K,GACJ,GAAI7K,KAAKsD,iBAAkB,OAAOtD,KAAKsD,iBAEvC,MAAMrD,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,cAGlB,IAAKzD,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,sBAGlB,MAAMyF,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4F,QAAa/D,MAAM,GAAGmC,eAAsB,CAChDlC,OAAQ,OACRC,QAAS,CACP8D,cAAe,UAAU9K,EAAQ6C,YACjC,eAAgB,oBAElBoE,KAAM,OAGR,IAAK4D,EAAK1D,GACR,MAAM,IAAI3D,MAAM,8BAGlB,MAAMuH,QAAqBF,EAAKtF,OAG1ByF,EAAuB,IACxBD,EAEHE,QAASF,EAAaE,SAAWF,EAAaG,QAG9CC,cAAeJ,EAAaI,eAAiBJ,EAAapE,SAI5D,OADA5G,KAAKsD,iBAAmB2H,EACjBA,CACR,CAKD,oBAAMI,GACJ,IAAKrL,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,sBAGlB,MAAMxD,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,qBAGlB,MAAMyF,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5CoG,EAAQrL,EAAQ6C,UAChBqI,EAAUlL,EAAQsL,MAAMJ,QAG9B,IAAIK,EAA4B,KAEhC,IACE,MAAMC,QAAgB1E,MAAM,GAAGmC,wBAA+B,CAC5DlC,OAAQ,OACRC,QAAS,CAAE8D,cAAe,UAAUO,OAGtC,GAAIG,EAAQrE,GAAI,CACd,MAAMsE,QAAiBD,EAAQjG,OAC/BgG,EAAaE,GAAU5G,KAAK6G,KAAKC,cAAgBF,GAAU5G,KAAK6G,KAAKH,YAAc,IACpF,CACF,CAAC,MAED,CAGD,IAAKA,EACH,IACE,MAAMhI,EAAQvD,EAAQuD,MAChBqI,EAAgB5L,EAAQsL,MAAMO,YAAc,GAC5CC,EAAmBvI,EAAQ,GAAGA,KAASqI,IAAkBA,EAE/D,GAAIE,EAAkB,CACpB,MAAMC,QAAkBjF,MACtB,GAAGmC,gBAAsB+C,mBAAmBF,MAE9C,GAAIC,EAAU5E,GAAI,CAChB,MAAM8E,QAAeF,EAAUxG,OACzB2G,EAAQC,MAAMC,QAAQH,GACxBA,EAAOI,KAAKC,GAAKxH,OAAOwH,EAAErB,SAAWqB,EAAEC,YAAczH,OAAOoG,KAAae,EAAO,GAChF,KACJV,EAAaW,GAAOP,cAAgBO,GAAOX,YAAc,IAC1D,CACF,CACF,CAAC,MAED,CAIH,IAAKA,EAAY,CACf,MAAMiB,QAAe1F,MAAM,GAAGmC,gBAAsB+C,mBAAmBd,aAAoB,CACzFnE,OAAQ,OACRC,QAAS,CAAE8D,cAAe,UAAUO,OAGtC,IAAKmB,EAAOrF,GACV,MAAM,IAAI3D,MAAM,WAAWgJ,EAAOlF,UAGpC,MAAMmF,QAAgBD,EAAOjH,OACvBmH,EAASD,GAASC,QAAUD,GAAS9K,KAAO,KAElD,IAAK+K,EACH,MAAM,IAAIlJ,MAAM,kBAGlB,OAAOkJ,CACR,CAGD,MAAMC,QAAe7F,MAAM,GAAGmC,YAAmB,CAC/ClC,OAAQ,OACRC,QAAS,CACP8D,cAAe,UAAUO,IACzB,eAAgB,oBAElBpE,KAAMvB,KAAKwB,UAAU,CAAE+D,QAASC,EAAS0B,kBAAmBrB,MAG9D,IAAKoB,EAAOxF,GACV,MAAM,IAAI3D,MAAM,WAAWmJ,EAAOrF,UAGpC,MAAMuF,QAAgBF,EAAOpH,OACvBuH,EAAYD,GAASE,iBAAmB,KAE9C,IAAKD,EACH,MAAM,IAAItJ,MAAM,qBAGlB,OAAOsJ,CACR,CAKD,cAAApI,CAAe1E,GACRA,GAAS6C,YAEd9C,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKsD,iBAAmB,KACxBtD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,GACtB,CAKD,MAAAgN,GACEjN,KAAKC,QAAU,KACfD,KAAK4D,eAAe,MACpB5D,KAAKuD,WAAa,KAClBvD,KAAKkN,iBAAiB,MACtBlN,KAAKsD,iBAAmB,KACxBtD,KAAKoE,WAAWvD,QAChBb,KAAKW,KAAK,UAAW,KACtB,CAKD,EAAAI,CAA2BC,EAAUC,GAC9BjB,KAAKG,OAAOa,KACfhB,KAAKG,OAAOa,GAAS,IAEvBhB,KAAKG,OAAOa,GAAQE,KAAKD,EAC1B,CAKD,GAAAE,CAA4BH,EAAUC,GACpC,MAAMG,EAAWpB,KAAKG,OAAOa,GAC7B,GAAII,EAAU,CACZ,MAAMC,EAAQD,EAASE,QAAQL,IAChB,IAAXI,GACFD,EAASG,OAAOF,EAAO,EAE1B,CACF,CASO,sBAAM8L,GAIZ,MAAMlN,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,0EAGlB,MAAMwH,QAAkBjL,KAAK6K,eAE7B,MAAO,CACL9K,OAAQ,CACNqN,QAASpN,KAAKD,OAAO4D,OACrB0J,OAAQ,IAAMrN,KAAKY,cAAckC,WAEnCmI,UAAW,CACTE,QAASF,EAAUE,QACnBmC,WAAarC,EAAUqC,YAAc,KACrC1G,QAASqE,EAAUG,eAAiBH,EAAUrE,SAAW,GACzDsE,QAASD,EAAUC,QACnBqC,WAAYtC,EAAUsC,YAG3B,CAYD,mBAAMC,GAQJ,MAAMA,cAAEA,SAAwBC,8CAC1B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOK,EAAczN,EAAQkL,EAC9B,CAeD,oBAAMyC,CAAehG,GACnB,MAAMgG,eAAEA,SAAyBD,8CAC3B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOO,EAAe3N,EAAQ2H,EAAUuD,EACzC,CAYD,mBAAM0C,GACJ,MAAMA,cAAEA,SAAwBF,8CAC1B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOQ,EAAc5N,EAAQkL,EAC9B,CAaD,wBAAM2C,GACJ,MAAMA,mBAAEA,SAA6BH,8CAC/B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOS,EAAmB7N,EAAQkL,EACnC,CAYD,uBAAM4C,GACJ,MAAMA,kBAAEA,SAA4BJ,8CAC9B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOU,EAAkB9N,EAAQkL,EAClC,CAkBD,qBAAM6C,GACJ,MAAMA,gBAAEA,EAAeC,sBAAEA,SAAgCN,QAAAO,UAAAC,KAAA,WAAA,OAAAC,CAAA,IACnDnO,OAAEA,SAAiBC,KAAKmN,mBAG9B,OAAOW,EAAgB/N,QADIgO,EAAsBhO,GAElD,CAKD,OAAAyB,GAEwB,oBAAX0C,QACTA,OAAOiK,oBAAoB,UAAWnO,KAAK+D,gBAE7C/D,KAAKoE,WAAW5C,UAChBxB,KAAKoO,eACL3M,OAAOC,KAAK1B,KAAKG,QAAQwB,QAAQC,WACxB5B,KAAKG,OAAOyB,IAEtB,CAEO,eAAAkI,CAAgBtD,GAEtB,MAAMuD,EAAO,GAAG/J,KAAKD,OAAO2D,QAAQwB,QAAQ,MAAO,cAC7C2B,EAAM,IAAI0B,IAAIwB,EAAM7F,OAAOc,SAASqJ,MAO1C,OANAxH,EAAI2B,aAAaC,IAAI,QAASzI,KAAKD,OAAOyD,OAC1CqD,EAAI2B,aAAaC,IAAI,SAAUjC,EAAOmB,QACtCd,EAAI2B,aAAaC,IAAI,QAASjC,EAAOsB,OACjCtB,EAAOwB,OACTnB,EAAI2B,aAAaC,IAAI,QAASjC,EAAOwB,OAEhCnB,EAAI6B,UACZ,CAEO,gBAAA4F,GAEN,IACE,MAAM/B,EAAIrI,QAAQqK,cAAcC,UAAU,cAC1C,GAAgC,SAA5BzJ,OAAOwH,GAAGkC,cAA0B,OAAO,CAChD,CAAC,MAED,CAGD,IAEE,MAAMC,EAA4B,oBAAZC,QAA0BA,QAAU,KACpDC,EAAMF,GAAGE,KAAO,GAChBrC,EAAIqC,EAAIC,wBAA0BD,EAAIE,WAC5C,IAAKvC,EAAG,OAAO,EACf,MAAMhI,EAAIQ,OAAOwH,GAAGkC,cAAcM,OAClC,MAAa,MAANxK,GAAmB,SAANA,GAAsB,QAANA,GAAqB,OAANA,CACpD,CAAC,MACA,OAAO,CACR,CACF,CAEO,SAAAsB,IAAamJ,GACdhP,KAAKsO,kBAGX,CAOO,gBAAAhG,CAAiB2G,EAAeC,GACtC,IAAKD,EAAO,MAAM,IAAIxL,MAAM,GAAGyL,iBAC/B,MAAMC,EAAUpK,OAAOkK,GAAOF,OACxBhF,EAAyB,oBAAX7F,OAAyBA,OAAOc,SAASqJ,KAAO,mBAGpE,IAEE,OADU,IAAI9F,IAAI4G,EAASpF,GAClBrB,WAAWxD,QAAQ,MAAO,GACpC,CAAC,MAED,CAGD,IAEE,OADU,IAAIqD,IAAI,WAAW4G,EAAQjK,QAAQ,OAAQ,OAC5CwD,WAAWxD,QAAQ,MAAO,GACpC,CAAC,MAED,CAED,MAAM,IAAIzB,MACR,GAAGyL,8FAEN,CAEO,SAAAlL,CAAUhD,GAChB,IAEE,MAAMoO,EAAiB,IAAIC,IACzB,CACEnL,OAAOc,SAAS2C,OAChB3H,KAAKsK,yBACLtK,KAAKsP,0BACLC,OAAO9E,UAGX,IAAK2E,EAAeI,IAAIxO,EAAM2G,QAK5B,YAJA3H,KAAK6F,UAAU,6BAA8B,CAC3C4J,YAAazO,EAAM2G,OACnByH,eAAgBhD,MAAMsD,KAAKN,KAK/B,MAAM5H,EAAOxG,EAAMwG,KAGnB,GAAmB,0BAAfA,GAAMmI,KAAkC,CAE1C,IAAK3P,KAAKkD,cAAgBsE,EAAKM,QAAU9H,KAAKkD,aAC5C,OAaF,OAVAlD,KAAKkD,aAAe,KACpBlD,KAAKoO,eAGDpO,KAAKD,OAAO6P,UACd5P,KAAKD,OAAO6P,gBAId5P,KAAKW,KAAK,iBAAakP,EAExB,CAED,GAAmB,wBAAfrI,GAAMmI,KAAgC,OAG1C,IAAK3P,KAAKkD,cAAgBsE,EAAKM,QAAU9H,KAAKkD,aAY5C,YANAlD,KAAK6F,UAAU,4BAA6B,CAC1CC,SAAU9F,KAAKkD,aACf6C,SAAUyB,GAAMM,MAChBH,OAAQ3G,EAAM2G,OACdgI,KAAMnI,GAAMmI,OAKhB3P,KAAKkD,aAAe,KACpBlD,KAAK6F,UAAU,qBAAsB,CAAE8B,OAAQ3G,EAAM2G,SAGrD,MAAM1H,EAAUuH,EAAKvH,QACrBD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAGvBuH,EAAKsI,YACP9P,KAAKuD,WAAaiE,EAAKsI,UACvB9P,KAAKkN,iBAAiB1F,EAAKsI,YAGzB7P,GAAWD,KAAKD,OAAOiG,WACzBhG,KAAKD,OAAOiG,UAAU/F,GAGxBD,KAAKW,KAAK,UAAWV,GACrBD,KAAKoO,cACN,CAAC,MAAOtM,GACP9B,KAAKgJ,UAAUlH,EAChB,CACF,CAEO,IAAAnB,CAA6BK,EAAUa,GAC7C,MAAMT,EAAWpB,KAAKG,OAAOa,GAC7B,GAAKI,EAEL,IAAK,MAAMH,KAAWG,EACpB,IACEH,EAAQY,EACT,CAAC,MAAOC,GAER,CAEJ,CAEO,SAAAkH,CAAUlH,GAChB9B,KAAKD,OAAOgQ,UAAUjO,GACtB9B,KAAKW,KAAK,YAAamB,EACxB,CAEO,aAAA+G,GAEN,MAEMmH,EAAM/N,KAAKG,IAAI,GAAI8B,OAAO+L,YADjB,KACyC,GAExD,MAAO,uCADMhO,KAAKG,IAAI,GAAI8B,OAAOgM,WAHnB,KAGyC,UACcF,GACtE,CAEO,QAAAjI,GACN,MAAMoI,EAAQ,IAAIC,WAAW,IAC7B,GAAIlM,OAAOmM,QAAQC,gBACjBpM,OAAOmM,OAAOC,gBAAgBH,QAE9B,IAAK,IAAII,EAAI,EAAGA,EAAIJ,EAAMK,OAAQD,IAChCJ,EAAMI,GAAKtO,KAAKwO,MAAsB,IAAhBxO,KAAKyO,UAG/B,OAAOtE,MAAMsD,KAAKS,EAAOQ,GAAKA,EAAEjI,SAAS,IAAIkI,SAAS,EAAG,MAAMC,KAAK,GACrE,CAEO,sBAAAvG,GACN,IACE,IAAKtK,KAAKD,OAAO2D,QAAS,OAAO,KAGjC,MAAMoN,EAAa9Q,KAAKsI,iBAAiBtI,KAAKD,OAAO2D,QAAS,WAC9D,OAAO,IAAI6E,IAAIuI,GAAYnJ,MAC5B,CAAC,MACA,OAAO,IACR,CACF,CAEO,sBAAA2H,GACN,IACE,IAAKtP,KAAKD,OAAO4D,OAAQ,OAAO,KAChC,MAAMmN,EAAa9Q,KAAKsI,iBAAiBtI,KAAKD,OAAO4D,OAAQ,UAC7D,OAAO,IAAI4E,IAAIuI,GAAYnJ,MAC5B,CAAC,MACA,OAAO,IACR,CACF,CAEO,iBAAME,CAAYrB,GACxB,MAAMU,EAAOvB,KAAKwB,UAAU,CAC1B3D,MAAOxD,KAAKD,OAAOyD,MACnBmE,OAAQnB,EAAOmB,SAGXoJ,EAAUnO,MAAOwK,IACrB,MAAMtG,QAAiBC,MAAM,GAAGqG,EAAQlI,QAAQ,MAAO,oBAAqB,CAC1E8B,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,SAGIM,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAE/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM,QAAQqD,EAASS,UAGzC,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,GAAQ,GAClB1F,CACP,CAED,OAAO0F,GAKT,IACE,aAAauJ,EAAQ/Q,KAAKD,OAAO2D,QAClC,CAAC,MAAO5B,GACP,MAAMkP,EAAalP,EACnB,IACE,aAAaiP,EAAQ/Q,KAAKD,OAAO4D,OAClC,CAAC,MAAOsN,GAEP,MAAMC,EAASF,EAKf,MAJAE,EAAOrP,QAAU,IACXmP,GAAYnP,SAAW,GAC3BsP,SAAWF,GAA6BpP,cAAWgO,GAE/CqB,CACP,CACF,CACF,CAEO,eAAA/G,CAAgBtD,GAElB7G,KAAKmD,WACPnD,KAAKoO,eAIP,MAAMgD,EAAUC,SAASC,cAAc,OACvCF,EAAQG,aAAa,sBAAuB,IAC5CH,EAAQI,MAAMC,SAAW,QACzBL,EAAQI,MAAME,MAAQ,IACtBN,EAAQI,MAAMG,WAAa,mBAE1BP,EAAQI,MAAcI,eAAiB,YACvCR,EAAQI,MAAcK,qBAAuB,YAC9CT,EAAQI,MAAMM,OAAS,SACvBV,EAAQI,MAAMO,QAAU,OACxBX,EAAQI,MAAMQ,WAAa,SAC3BZ,EAAQI,MAAMS,eAAiB,SAC/Bb,EAAQI,MAAMU,QAAU,OAGxB,MAAMC,EAAYd,SAASC,cAAc,OACzCa,EAAUX,MAAMY,MAAQ,mBACxBD,EAAUX,MAAMa,OAAS,mBACzBF,EAAUX,MAAMG,WAAa,UAC7BQ,EAAUX,MAAMc,OAAS,oBACzBH,EAAUX,MAAMe,aAAe,OAC/BJ,EAAUX,MAAMgB,UAAY,8BAC5BL,EAAUX,MAAMiB,SAAW,SAC3BN,EAAUX,MAAMC,SAAW,WAC3BU,EAAUX,MAAMO,QAAU,OAC1BI,EAAUX,MAAMkB,cAAgB,SAGhC,MAAMC,EAAStB,SAASC,cAAc,OACtCqB,EAAOnB,MAAMa,OAAS,OACtBM,EAAOnB,MAAMO,QAAU,OACvBY,EAAOnB,MAAMQ,WAAa,SAC1BW,EAAOnB,MAAMS,eAAiB,gBAC9BU,EAAOnB,MAAMU,QAAU,SACvBS,EAAOnB,MAAMoB,aAAe,sCAC5BD,EAAOnB,MAAMG,WAAa,UAE1B,MAAMkB,EAAQxB,SAASC,cAAc,OACrCuB,EAAMC,YAAc,SACpBD,EAAMrB,MAAMuB,WACV,8EACFF,EAAMrB,MAAMwB,SAAW,OACvBH,EAAMrB,MAAMyB,cAAgB,SAC5BJ,EAAMrB,MAAM0B,cAAgB,YAC5BL,EAAMrB,MAAM2B,MAAQ,4BAEpB,MAAMC,EAAW/B,SAASC,cAAc,UACxC8B,EAASzD,KAAO,SAChByD,EAASN,YAAc,IACvBM,EAAS7B,aAAa,aAAc,SACpC6B,EAAS7B,aAAa,QAAS,SAC/B6B,EAAS5B,MAAMY,MAAQ,OACvBgB,EAAS5B,MAAMa,OAAS,OACxBe,EAAS5B,MAAMO,QAAU,OACzBqB,EAAS5B,MAAMQ,WAAa,SAC5BoB,EAAS5B,MAAMS,eAAiB,SAChCmB,EAAS5B,MAAMG,WAAa,4BAC5ByB,EAAS5B,MAAM2B,MAAQ,UACvBC,EAAS5B,MAAMc,OAAS,sCACxBc,EAAS5B,MAAMe,aAAe,OAC9Ba,EAAS5B,MAAMwB,SAAW,OAC1BI,EAAS5B,MAAM6B,WAAa,IAC5BD,EAAS5B,MAAM8B,OAAS,UACxBF,EAAS5B,MAAM+B,WAAa,OAC5BH,EAASI,QAAU,IAAMxT,KAAKyT,aAE9Bd,EAAOe,YAAYb,GACnBF,EAAOe,YAAYN,GAGnB,MAAMO,EAAStC,SAASC,cAAc,UACtCqC,EAAOC,IAAM/M,EACb8M,EAAOnC,MAAMY,MAAQ,OACrBuB,EAAOnC,MAAMa,OAAS,OACtBsB,EAAOnC,MAAMc,OAAS,IACtBqB,EAAOE,eAAiB,cACxBF,EAAOG,MAAQ,mCAEf3B,EAAUuB,YAAYf,GACtBR,EAAUuB,YAAYC,GACtBvC,EAAQsC,YAAYvB,GACpBd,SAASnK,KAAKwM,YAAYtC,GAG1BA,EAAQjN,iBAAiB,QAASkC,IAC5BA,EAAE0N,SAAW3C,GAASpR,KAAKyT,eAIjC,MAAMO,EAAS3N,IACC,WAAVA,EAAEzE,KACJ5B,KAAKyT,cAWT,OARApC,SAASlN,iBAAiB,UAAW6P,EAAO,CAAEC,SAAS,IAEvDjU,KAAKmD,UAAYiO,EACjBpR,KAAKoD,UAAYuQ,EACjB3T,KAAKqD,eAAiB,KACpBgO,SAASlD,oBAAoB,UAAW6F,EAAO,CAAEC,SAAS,MAGrD,CACR,CAEO,YAAA7F,GACN,IACEpO,KAAKqD,kBACN,CAAC,MAED,CACDrD,KAAKqD,eAAiB,KAElBrD,KAAKmD,WAAW+Q,YAClBlU,KAAKmD,UAAU+Q,WAAWC,YAAYnU,KAAKmD,WAG7CnD,KAAKmD,UAAY,KACjBnD,KAAKoD,UAAY,IAClB,CAKO,UAAAqQ,GACNzT,KAAKkD,aAAe,KACpBlD,KAAKoO,eAGDpO,KAAKD,OAAO6P,UACd5P,KAAKD,OAAO6P,WAId5P,KAAKW,KAAK,iBAAakP,EACxB,CAEO,cAAMvI,CAASR,GACrB,IACE,aAAaA,EAAStB,MACvB,CAAC,MACA,OAAO,IACR,CACF,CAEO,oBAAAd,GACN,IACE,GAA4B,oBAAjB6J,aAA8B,OAAO,KAChD,MAAM6F,EAAS7F,aAAaC,QAAQxO,KAAK6D,YACzC,IAAKuQ,EAAQ,OAAO,KAEpB,MAAMnU,EAAU0F,KAAKC,MAAMwO,GAG3B,OAAKnU,GAAS6C,WAAc7C,GAASwC,UACjCF,KAAKD,OAASrC,EAAQwC,WACxB8L,aAAa8F,WAAWrU,KAAK6D,YACtB,MAGF5D,EANgD,IAOxD,CAAC,MACA,OAAO,IACR,CACF,CAEO,cAAA2D,CAAe3D,GACrB,IACE,GAA4B,oBAAjBsO,aAA8B,OAErCtO,GAAWD,KAAKD,OAAO6D,eACzB2K,aAAa+F,QAAQtU,KAAK6D,WAAY8B,KAAKwB,UAAUlH,IAErDsO,aAAa8F,WAAWrU,KAAK6D,WAEhC,CAAC,MAED,CACF,CAEO,sBAAAe,GACN,IACE,MAA4B,oBAAjB2J,aAAqC,KACzCA,aAAaC,QAAQxO,KAAK8D,aAClC,CAAC,MACA,OAAO,IACR,CACF,CAEO,gBAAAoJ,CAAiB4C,GACvB,IACE,GAA4B,oBAAjBvB,aAA8B,OAErCuB,GAAa9P,KAAKD,OAAO6D,eAC3B2K,aAAa+F,QAAQtU,KAAK8D,aAAcgM,GAExCvB,aAAa8F,WAAWrU,KAAK8D,aAEhC,CAAC,MAED,CACF,ECxvCIlB,eAAe2R,EACpBC,EACAtN,EACAnH,GAEA,MAAMqN,EAAUrN,EAAOqN,SAAW,6BAC5BqH,QAjCR7R,eAAkC7C,GAEhC,GAAqC,mBAA1BA,EAAO2U,eAA+B,CAC/C,MAAMC,QAAU5U,EAAO2U,iBACvB,GAAIC,GAAkB,iBAANA,EAAgB,OAAOA,CACxC,CAED,MAAMC,EACJ7U,EAAO8U,MACmB,mBAAlB9U,EAAOsN,aAA8BtN,EAAOsN,cAAWwC,IAC/D9P,EAAO+U,KAAKlU,cAAckC,gBAC1B+M,EAEF,GAAI+E,EACF,MAAO,CAAE7J,cAAe,UAAU6J,KAIpC,GAAI7U,EAAO4M,OACT,MAAO,CAAE,YAAa5M,EAAO4M,QAG/B,MAAM,IAAIlJ,MACR,uFAEJ,CAQ4BsR,CAAmBhV,GACvCiV,QAAYjO,MAAM,GAAGqG,IAAUoH,IAAQ,CAC3CxN,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbwN,GAELvN,KAAMvB,KAAKwB,UAAUD,EAAM,CAAC+N,EAAcC,IACvB,iBAAVA,EAAqBA,EAAMxM,WAAawM,KAInD,IAAKF,EAAI5N,GAAI,CACX,MAAM+N,QAAaH,EAAIG,OAAO9L,MAAM,IAAM,IAC1C,MAAM,IAAI5F,MAnEd,SAA8B8D,EAAgB4N,GAE5C,IAAIC,EAAe,uBAAuB7N,IAe1C,OAbIA,GAAU,IACZ6N,GAAgB,0BACI,MAAX7N,GAA6B,MAAXA,EAC3B6N,GAAgB,0BACI,MAAX7N,EACT6N,GAAgB,uBACI,MAAX7N,EACT6N,GAAgB,uBACPD,IAETC,GAAgB,KAAKD,EAAKE,UAAU,EAAG,QAGlCD,CACT,CAiDoBE,CAAqBN,EAAIzN,OAAQ4N,GAClD,CAED,OAAOH,EAAIxP,MACb,CCIgB,SAAA+P,EAAaL,EAAgBM,GAC3C,MAAMC,EAAMC,OAAOR,GAEnB,IAAKQ,OAAOC,cAAcF,GACxB,MAAM,IAAIhS,MACR,GAAG+R,WAAmBN,sCAA0CQ,OAAOE,qBAI3E,OAAOH,CACT,CCpFM,SAAUI,EAActJ,GAC5B,MAAoB,iBAANA,EAAiB,KAAOA,EAAE7D,SAAS,IAAM6D,CACzD,CAMM,SAAUuJ,EAAqBC,GACnC,MAAMC,EAA+B,IAAKD,GA+B1C,YA7BkBlG,IAAdmG,EAAId,QAAqBc,EAAId,MAAQW,EAAcG,EAAId,aAC3CrF,IAAZmG,EAAIC,MACND,EAAIE,SAAWL,EAAcG,EAAIC,YAC1BD,EAAIC,UAEQpG,IAAjBmG,EAAIE,WAAwBF,EAAIE,SAAWL,EAAcG,EAAIE,gBAC5CrG,IAAjBmG,EAAIG,WAAwBH,EAAIG,SAAWN,EAAcG,EAAIG,gBACxCtG,IAArBmG,EAAII,eAA4BJ,EAAII,aAAeP,EAAcG,EAAII,oBACxCvG,IAA7BmG,EAAIK,uBACNL,EAAIK,qBAAuBR,EAAcG,EAAIK,4BAC7BxG,IAAdmG,EAAIlO,QAAqBkO,EAAIlO,MAAQyN,EAAaS,EAAIlO,MAAO,eAC7C+H,IAAhBmG,EAAIM,UAAuBN,EAAIM,QAAUf,EAAaS,EAAIM,QAAS,iBAG9CzG,IAArBmG,EAAII,mBAA2DvG,IAA7BmG,EAAIK,4BACnBxG,IAAjBmG,EAAIG,eAA+CtG,IAArBmG,EAAII,eACpCJ,EAAIG,SAAWH,EAAII,qBAEdJ,EAAII,oBACJJ,EAAIK,6BAINL,EAAIrG,YACJqG,EAAIO,kBACJP,EAAIQ,eACJR,EAAIS,aACJT,EAAItG,KAEJsG,CACT,CAMM,SAAUU,EAAWC,GACzB,IAAIX,EAAM,KACV,IAAK,IAAIzF,EAAI,EAAGA,EAAIoG,EAAMnG,OAAQD,IAChCyF,GAAQW,EAAMpG,GAAc7H,SAAS,IAAIkI,SAAS,EAAG,KAEvD,OAAOoF,CACT,CCrDOpT,eAAegU,EAAe7W,GAEnC,MAAMyH,QAKK+M,EAAW,cAAe,CAAE,EAAExU,GAGzC,IAAKyH,IAASA,EAAK2D,UAAY3D,EAAK8F,WAClC,MAAM,IAAI7J,MAAM,wDAGlB,IAAKsB,OAAOyC,EAAK8F,YAAYuJ,WAAW,MACtC,MAAM,IAAIpT,MAAM,yCAGlB,MAAO,CACL0H,QAAS3D,EAAK2D,QACdD,QAAS1D,EAAK2D,QACdvE,QAASY,EAAKZ,SAAW,GACzB0G,WAAY9F,EAAK8F,WACjBC,WAAY/F,EAAK+F,WAErB,mDCZO3K,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,IAC7CuN,WAAEA,EAAUnC,QAAEA,GAAY3G,GAO1BuS,UAAEA,SAAoBC,OADT,iBAGnB,OAAOD,EAAU,CACfnQ,QAAS0G,EAET,iBAAM2J,EAAY3Q,QAAEA,IAClB,IAAIzE,EACAqV,GAAQ,EAEZ,GAAuB,iBAAZ5Q,EACTzE,EAAUyE,EACV4Q,GAAQ,OACH,GAAI5Q,QAAyD,IAAtCA,EAA8BxB,IAAqB,CAC/E,MAAMA,EAAOwB,EAA6BxB,IAC1CjD,EAAyB,iBAARiD,EAAmBA,EAAM4R,EAAW5R,GACrDoS,GAAQ,CACT,MAAM,GAAI5Q,aAAmB8J,WAC5BvO,EAAU6U,EAAWpQ,GACrB4Q,GAAQ,MACH,IFAa,iBADEhC,EECC5O,KFAS,mBAAmB6Q,KAAKjC,GEKtD,MAAM,IAAIzR,MACR,oCAAoC6C,kDALtCzE,EAAUyE,EACV4Q,GAAQ,CAMT,CFTD,IAAsBhC,EEgBtB,aALmBX,EAGhB,oBAAqB,CAAEpJ,UAAS7E,QAASzE,EAASiD,IAAKoS,GAASnX,IAEvD2G,SACb,EAED,mBAAM0Q,CAAcC,GAClB,MAAMC,OAAEA,EAAMC,MAAEA,EAAKjR,QAAEA,GAAY+Q,EAUnC,aALmB9C,EAGhB,sBAAuB,CAAEpJ,UAASmM,SAAQC,QAAOjR,WAAWvG,IAEnD2G,SACb,EAED,qBAAM8Q,CAAgBzB,EAAa0B,GACjC,MAAMC,EAAe5B,EAAqBC,GAM1C,aAJmBxB,EAEhB,eAAgB,CAAEpJ,UAASwM,YAAaD,GAAgB3X,IAE/C6X,iBACb,GAEL,2DC/DOhV,eACL7C,EACA2H,EACAoP,GAMA,IAAIe,EACJ,IACE,MAAMC,EAAa,SACnBD,QAAeb,OAA0Bc,EAC1C,CAAC,MACA,MAAM,IAAIrU,MAAM,+EACjB,CAED,MAAMsU,eAAEA,EAAcC,eAAEA,GAAmBH,EAQrCrT,EAAOsS,SAAuBF,EAAe7W,GAGnD,MAAMkY,UAA+BF,EAOnC,WAAAjY,CACEoY,EACAC,EACAC,GAEAC,MAAMF,GAAkB,MAVlBnY,KAAQsY,SAAe,KACvBtY,KAAQuY,SAAkB,KAC1BvY,KAAQwY,SAAG,EASjBxY,KAAKyY,QAAUP,EACXE,GAAMxR,UAAS5G,KAAKsY,SAAWF,EAAKxR,SACpCwR,GAAMjN,UAASnL,KAAKuY,SAAWH,EAAKjN,SACpCiN,GAAM9B,UAAStW,KAAKwY,SAAWJ,EAAK9B,QACzC,CAED,gBAAMoC,GACJ,OAAI1Y,KAAK2Y,eAET3Y,KAAK2Y,aAAe/B,EAAe5W,KAAKyY,SACrCxK,KAAMhD,IACLjL,KAAKsY,SAAWrN,EAAUqC,WAC1BtN,KAAKuY,SAAWtN,EAAUE,UAE3B9B,MAAOuP,IAEN,MADA5Y,KAAK2Y,kBAAe9I,EACd+I,KAToB5Y,KAAK2Y,YAapC,CAED,gBAAME,GAEJ,OADK7Y,KAAKsY,gBAAgBtY,KAAK0Y,aACxB1Y,KAAKsY,QACb,CAED,UAAAQ,GACE,IAAK9Y,KAAKuY,SAAU,MAAM,IAAI9U,MAAM,oDACpC,OAAOzD,KAAKuY,QACb,CAED,UAAAQ,CAAWzC,GACTtW,KAAKwY,SAAWlC,CACjB,CAED,UAAA0C,GACE,OAAOhZ,KAAKwY,QACb,CAED,OAAAS,CAAQC,GACN,IAAKA,EAAa,MAAM,IAAIzV,MAAM,2BAClC,OAAO,IAAIwU,EAAuBjY,KAAKyY,QAASS,EAAa,CAC3DtS,QAAS5G,KAAKsY,eAAYzI,EAC1B1E,QAASnL,KAAKuY,eAAY1I,EAC1ByG,QAAStW,KAAKwY,UAEjB,CAED,iBAAMvB,CAAY3Q,GACXtG,KAAKuY,gBAAgBvY,KAAK0Y,aAC/B,MAAM7W,EAA6B,iBAAZyE,EAAuBA,EAAUoQ,EAAWpQ,GAMnE,aALmBiO,EACjB,oBACA,CAAEpJ,QAASnL,KAAKuY,SAAWjS,QAASzE,GACpC7B,KAAKyY,UAEK/R,SACb,CAED,mBAAM0Q,CACJE,EACAC,EACArC,GAEKlV,KAAKuY,gBAAgBvY,KAAK0Y,aAC/B,MAAMS,EAAa,IAAK5B,GACpB4B,GAAeA,EAAuCC,qBAChDD,EAAuCC,aAOjD,aALmB7E,EACjB,sBACA,CAAEpJ,QAASnL,KAAKuY,SAAWjB,SAAQC,MAAO4B,EAAY7S,QAAS4O,GAC/DlV,KAAKyY,UAEK/R,SACb,CAED,oBAAM2S,CACJ/B,EACAC,EACArC,GAEA,OAAOlV,KAAKoX,cAAcE,EAAQC,EAAOrC,EAC1C,CAED,qBAAMsC,CAAgBzB,GACf/V,KAAKuY,gBAAgBvY,KAAK0Y,aAC/B,MAAMhJ,EAAQqG,EAA+BrG,KACvC4J,QAAatZ,KAAK6Y,aAExB,GAAInJ,GAAQA,EAAKjB,gBAAkB6K,EAAK7K,cACtC,MAAM,IAAIhL,MAAM,kDAGlB,MAAM8V,EAASvZ,KAAK0H,SACf,UAAW1H,KAAKwZ,oBAAoBzD,IACpC,IAAKA,GAEV,GADIwD,EAAO7J,aAAa6J,EAAO7J,OACzB,OAAQ6J,KAAYA,EAAOE,GAC/B,MAAM,IAAIhW,MAAM,wCAElB,QAAqBoM,IAAjB0J,EAAOzR,OAAwC,OAAjByR,EAAOzR,MACvC,MAAM,IAAIrE,MAAM,iCAElB,MAAMqN,EAAagF,EAAqByD,GAMxC,aALmBhF,EACjB,eACA,CAAEpJ,QAASnL,KAAKuY,SAAWZ,YAAa7G,EAAY4I,QAAS,CAAEpD,QAAStW,KAAKwY,WAC7ExY,KAAKyY,UAEKb,iBACb,CAED,qBAAM+B,CAAgB5D,GACpB,IAAK/V,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,yCACpC,MAAMmW,QAAe5Z,KAAKwX,gBAAgBzB,GAC1C,aAAa/V,KAAK0H,SAASmS,qBAAqBD,EACjD,CAED,yBAAMJ,CAAoB7B,GACxB,MAAM5B,EAAK,IAAK4B,GAChB,IAAK3X,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,6CACpC,MAAMqW,EAAc/D,EAAGrG,WACbsI,EAAejC,EAAGrG,KAAM1P,KAAK0H,gBAC7B1H,KAAK6Y,aAEf,IAAIvC,EACJ,GAAKP,EAAGO,QAKNA,EAAUyD,OAAOhE,EAAGO,SACpBtW,KAAKwY,SAAW9C,OAAOK,EAAGO,aANX,CACf,MAAM7P,QAAgBzG,KAAK0H,SAASsS,aACpC1D,EAAU7P,EAAQ6P,QAClBtW,KAAKwY,SAAW9C,OAAOjP,EAAQ6P,QAChC,CAKD,MAAMxO,EACQ,MAAZiO,EAAGjO,MACC4N,OAAOK,EAAGjO,aACJ9H,KAAK0H,SAASuS,oBAAoBH,EAAa,WACrDI,EAAYnE,EAAG0D,SAAWzB,EAAejC,EAAG0D,GAAIzZ,KAAK0H,UAAY,KACjEwN,EAAQa,EAAGb,MAAQ6E,OAAOhE,EAAGb,MAAMxM,YAAc,GAEvD,IAAIwN,EACJ,GAAKH,EAAGG,SAONA,EAAW6D,OAAOhE,EAAGG,SAASxN,iBAN9B,IACEwN,QAAiBlW,KAAK0H,SAASyS,YAAY,IAAKpE,EAAIrG,KAAMoK,GAC3D,CAAC,MACA5D,EAAW,MACZ,CAKH,IAAIC,EAA0B,KAC9B,GAAKJ,EAAGI,UAAwB,IAAZJ,EAAGpG,KAGZoG,EAAGI,WACZA,EAAW4D,OAAOhE,EAAGI,SAASzN,iBAJG,CAEjCyN,SADsBnW,KAAK0H,SAAS0S,cACjBjE,UAAY,IAChC,CAID,MAAMkE,EAA6B,CACjC3K,KAAMoK,EACNL,GAAIS,EACJhF,QACApN,QACAoO,WACA1O,KAAMuO,EAAGvO,KACT8O,UACA3G,KAAMoG,EAAGpG,WAAQE,GAMnB,OAJiB,OAAbsG,IAAmBkE,EAAUlE,SAAWA,GACxCJ,EAAGK,eAAciE,EAAUjE,aAAe2D,OAAOhE,EAAGK,aAAa1N,aACjEqN,EAAGM,uBACLgE,EAAUhE,qBAAuB0D,OAAOhE,EAAGM,qBAAqB3N,aAC3D2R,CACR,CAED,sBAAMC,CACJ3C,EACA4C,GAA0B,GAE1B,IAAKva,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,yCACpC,MAAMmW,QAAe5Z,KAAKwX,gBAAgBG,GAEpC1S,SADajF,KAAK0H,SAASmS,qBAAqBD,IACpC3U,KAIlB,OAHIsV,SACIva,KAAK0H,SAAS8S,mBAAmBvV,GAElCA,CACR,EAGH,OAAO,IAAIgT,EAAuBlY,EAAQ2H,EAAqC,CAC7Ed,QAASpC,EAAK8I,WACdnC,QAAS3G,EAAK2G,SAElB,ICoBO,SAASsP,EAAuBC,EAAU1S,EAAO2S,EAAMC,GAC1D,GAAa,MAATD,IAAiBC,EAAG,MAAM,IAAIC,UAAU,iDAC5C,GAAqB,mBAAV7S,EAAuB0S,IAAa1S,IAAU4S,GAAK5S,EAAMwH,IAAIkL,GAAW,MAAM,IAAIG,UAAU,4EACvG,MAAgB,MAATF,EAAeC,EAAa,MAATD,EAAeC,EAAEE,KAAKJ,GAAYE,EAAIA,EAAE1F,MAAQlN,EAAM3C,IAAIqV,EACxF,CAEO,SAASK,EAAuBL,EAAU1S,EAAOkN,EAAOyF,EAAMC,GACjE,GAAa,MAATD,EAAc,MAAM,IAAIE,UAAU,kCACtC,GAAa,MAATF,IAAiBC,EAAG,MAAM,IAAIC,UAAU,iDAC5C,GAAqB,mBAAV7S,EAAuB0S,IAAa1S,IAAU4S,GAAK5S,EAAMwH,IAAIkL,GAAW,MAAM,IAAIG,UAAU,2EACvG,MAAiB,MAATF,EAAeC,EAAEE,KAAKJ,EAAUxF,GAAS0F,EAAIA,EAAE1F,MAAQA,EAAQlN,EAAMS,IAAIiS,EAAUxF,GAASA,CACxG,CA+BkD,mBAApB8F,iBAAiCA,sBCnUlDC,EAKX,WAAAnb,CAAY8G,EAAcuE,EAAiBpL,GAHlCmb,EAAiBzS,IAAAzI,UAAA,GACjBmb,EAAsB1S,IAAAzI,UAAA,GAG7BA,KAAK4G,QAAUA,EACfmU,EAAA/a,KAAIkb,EAAY/P,EAAO,KACvB4P,EAAA/a,KAAImb,EAAWpb,EAAM,IACtB,CAED,iBAAMkX,CAAY3Q,GAChB,MAAMzE,EAA6B,iBAAZyE,EAAuBA,EAAUoQ,EAAWpQ,GAMnE,aALmBiO,EACjB,oBACA,CAAEpJ,QAASsP,EAAAza,KAAakb,EAAA,KAAE5U,QAASzE,GACnC4Y,EAAAza,KAAYmb,EAAA,OAEFzU,SACb,CAED,mBAAM0Q,CACJE,EACAC,EACAjR,GAOA,aALmBiO,EACjB,sBACA,CAAEpJ,QAASsP,EAAAza,YAAesX,SAAQC,QAAOjR,WACzCmU,EAAAza,KAAYmb,EAAA,OAEFzU,SACb,CAED,qBAAM8Q,CAAgBzB,GACpB,MAAMjF,EAAagF,EAAqBC,GAMxC,MAAO,CAAEqF,sBALU7G,EACjB,eACA,CAAEpJ,QAASsP,EAAAza,KAAakb,EAAA,KAAEvD,YAAa7G,GACvC2J,EAAAza,KAAYmb,EAAA,OAEgBvD,kBAC/B,oGAGIhV,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAIkb,EAAkBzW,EAAK8I,WAAY9I,EAAK2G,QAASpL,EAC9D,UCtCasb,EAKX,WAAAvb,CAAYC,EAAsBkL,GAChCjL,KAAK2G,UAAYsE,EAAUrE,QAC3B5G,KAAKD,OAASA,EACdC,KAAKmL,QAAUF,EAAUE,OAC1B,CAED,iBAAM8L,CAAY3Q,GAEhB,MAAMgV,EAAkC,iBAAZhV,GAAuB,IAAIiV,aAAcC,OAAOlV,GAAWA,EAGjFmV,EAAgBC,KAAK3W,OAAO4W,gBAAgBL,IAE5CxU,QAAiByN,EACrB,uBACA,CAAEpJ,QAASnL,KAAKmL,QAAS7E,QAASmV,GAClCzb,KAAKD,QAOP,IAEE,MAAM4I,EAAwB,oBAAXzE,OAA0BA,YAAqE2L,EAClH,GAAIlH,GAAKiT,KACP,OAAOjT,EAAIiT,KAAKC,OAAO/U,EAASJ,WAKlC,OADuB0J,WAAWV,KAAKhK,KAAKoB,EAASJ,WAAaoV,GAAMA,EAAEC,WAAW,GAEtF,CAAC,MAAO1V,GAEP,GAAIS,EAASJ,UAAUmQ,WAAW,MAAO,CACvC,MAAMmF,EAAMlV,EAASJ,UAAUwB,MAAM,GAC/ByO,EAAQ,IAAIvG,WAAW4L,EAAIxL,OAAS,GAC1C,IAAK,IAAID,EAAI,EAAGA,EAAIyL,EAAIxL,OAAQD,GAAK,EACnCoG,EAAMpG,EAAI,GAAK0L,SAASD,EAAIE,OAAO3L,EAAG,GAAI,IAE5C,OAAOoG,CACR,CACD,MAAM,IAAIlT,MAAM,sCAAsC4C,IACvD,CACF,CAED,qBAAMmR,CAAgBG,GAEpB,MAAMwE,EAAwBnc,KAAKoc,qBAAqBzE,GAElD7Q,QAAiByN,EAIrB,2BACA,CACEpJ,QAASnL,KAAKmL,QACdkR,kBAAmBF,EACnBG,WAAW,EACXC,sBAAsB,GAExBvc,KAAKD,QAIDyc,EAAe1V,EAAS2V,6BAA+B3V,EAAS8Q,kBACtE,IAAK4E,EACH,MAAM,IAAI/Y,MAAM,mDAGlB,OAAOzD,KAAK0c,uBAAuBF,EACpC,CAEO,oBAAAJ,CAAqBrG,GAE3B,GAAIA,GAAoB,iBAAPA,EAAiB,CAEhC,GAAKA,EAAwC4G,UAAW,CAEtD,MAAMC,EAAc7G,EAAuC4G,YAE3D,OADejB,KAAK3W,OAAO4W,gBAAgBiB,GAE5C,CAED,GACG7G,EAAkC8G,cAClC9G,EAAqC+G,gBAEtC,MAAM,IAAIrZ,MACR,kFAGL,CAGD,OAAOsS,CACR,CAEO,sBAAA2G,CAAuBF,GAY7B,GAT0B,iBAAjBA,GACPA,GACCA,EAA0DC,8BAE3DD,EAAgBA,EACbC,6BAIuB,iBAAjBD,EACT,IAEE,MAAMO,EAAUrX,KAAK8W,GACrB,OAAO,IAAIpM,WAAW2M,EAAQC,MAAM,IAAIC,IAAKnB,GAAMA,EAAEC,WAAW,IACjE,CAAC,MAAO1V,GAEP,MAAM,IAAI5C,MAAM,+CAA+C4C,IAChE,CAIH,OAAOmW,CACR,CAKD,UAAA1D,GACE,OAAO9Y,KAAKmL,OACb,CAGD,yBAAM+R,CAAoBC,GAGxB,MAAMC,EAAU,GAChB,IAAK,MAAMrH,KAAMoH,EACfC,EAAQlc,WAAWlB,KAAKwX,gBAAgBzB,IAE1C,OAAOqH,CACR,CAGD,OAAAC,CAAQ1W,GACN,OAAOA,IAAc3G,KAAK2G,SAC3B,CAGD,sBAAM2T,CAAiB3C,EAAsB2E,GAAqB,GAEhE,MAAMH,EAAwBnc,KAAKoc,qBAAqBzE,GAElD7Q,QAAiByN,EAIrB,2BACA,CACEpJ,QAASnL,KAAKmL,QACdkR,kBAAmBF,EACnBG,UAAWA,EACXC,sBAAsB,GAExBvc,KAAKD,QAGP,GAAIuc,EAAW,CAEb,IAAKxV,EAASwW,qBACZ,MAAM,IAAI7Z,MAAM,oDAElB,OAAOqD,EAASwW,oBACjB,CAEC,IAAKxW,EAAS2V,4BACZ,MAAM,IAAIhZ,MAAM,mDAElB,OAAOqD,EAAS2V,2BAEnB,8EAGI7Z,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAIsb,EAAmBtb,EAAQyE,EACxC,oBAEO5B,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAIsb,EAAmBtb,EAAQyE,EACxC,ICvHO,MAAM+Y,EAAe,UAKfC,EAUX,WAAA1d,CAAYC,EAAsBkL,GAChC,IAAKA,EAAUwS,UACb,MAAM,IAAIha,MAAM,gDAElBzD,KAAK2G,UAAYsE,EAAUwS,UAC3Bzd,KAAK0d,UAAYzS,EAAU0S,cAAgB,CACzCC,MAAO,GACPC,OAAQ,GACRC,KAAM,IAER9d,KAAKD,OAASA,EACdC,KAAKmL,QAAUF,EAAUE,OAC1B,CAOD,cAAM4S,CAASC,EAAoBtE,GACjC,MAAMuE,gBAAEA,EAAeC,aAAEA,GAAiBxE,EAGpCyE,EAAmBD,GAAcjB,IAAIhO,IAAU,IAChDA,EAEHmP,kBAAmBpe,KAAKqe,eAAepP,EAAMmP,sBAc/C,aAXuB7J,EACrB,wBACA,CACEpJ,QAASnL,KAAKmL,QACdmT,KAAMN,EACNC,kBACAC,aAAcC,GAEhBne,KAAKD,OAIR,CAMD,kBAAMwe,CACJC,GAEA,MAAMpB,EAA+B,GACrC,IAAK,MAAMkB,KAAEA,EAAI5E,QAAEA,KAAa8E,EAC9BpB,EAAQlc,WAAWlB,KAAK+d,SAASO,EAAM5E,IAEzC,OAAO0D,CACR,CAKD,UAAAtE,GACE,OAAO9Y,KAAKmL,OACb,CAKD,YAAAsT,GACE,OAAOze,KAAK2G,SACb,CAKD,WAAA+X,CAAY9X,GACV,OACEA,IAAY5G,KAAK0d,UAAUE,OAC3BhX,IAAY5G,KAAK0d,UAAUG,QAC3BjX,IAAY5G,KAAK0d,UAAUI,IAE9B,CAKD,UAAAjF,CAAWlJ,EAA2B,UACpC,OAAQA,GACN,IAAK,QACH,OAAO3P,KAAK0d,UAAUE,MACxB,IAAK,SAIL,IAAK,OAGL,QACE,OAAO5d,KAAK0d,UAAUG,OANxB,IAAK,OACH,OAAO7d,KAAK0d,UAAUI,KAO3B,CAKO,cAAAO,CAAenJ,GACrB,GAAIA,QAAuC,OAC3C,GAAqB,iBAAVA,EAAoB,OAAOA,EAEtC,MAAMyB,EAAQzB,EACd,IAAI8G,EAAM,GACV,IAAK,IAAIzL,EAAI,EAAGA,EAAIoG,EAAMnG,OAAQD,IAChCyL,GAAQrF,EAAMpG,GAAc7H,SAAS,IAAIkI,SAAS,EAAG,KAEvD,OAAOoL,CACR,EAmBIpZ,eAAemL,EAAsBhO,GAC1C,MAAMyH,QAAa+M,EAWhB,cAAe,CAAE,EAAExU,GAEtB,IAAKyH,IAASA,EAAK2D,QACjB,MAAM,IAAI1H,MAAM,gDAGlB,IAAK+D,EAAKiW,UACR,MAAM,IAAIha,MAAM,uEAGlB,MAAO,CACL0H,QAAS3D,EAAK2D,QACdvE,QAASY,EAAKZ,SAAW,GACzB0G,WAAa9F,EAAK8F,YAAc,KAChCmQ,UAAWjW,EAAKiW,UAChBE,aAAcnW,EAAKmW,aACnBpQ,WAAY/F,EAAK+F,WAErB,CAqBM,SAAUoR,EAAUC,GACxB,OAAOA,EAAOrB,CAChB,0FAhEO3a,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuB/I,EAAsBhO,GAC1D,OAAO,IAAIyd,EAAoBzd,EAAQyE,EACzC,4CAwCM,SAA4BoC,GAChC,OAAIA,EAAQiQ,WAAW,QAAgB,OACnCjQ,EAAQiQ,WAAW,QAAgB,SACnCjQ,EAAQiQ,WAAW,KAAa,QAChCjQ,EAAQiQ,WAAW,KAAa,OAEhCjQ,EAAQiQ,WAAW,QAAgB,OACnCjQ,EAAQiQ,WAAW,QAAgB,SACnCjQ,EAAQiQ,WAAW,MAAQjQ,EAAQiQ,WAAW,KAAa,QAC3DjQ,EAAQiQ,WAAW,KAAa,OAC7B,SACT,wBAYM,SAAoBgI,GACxB,OAAO5c,KAAK6c,MAAMD,EAAMtB,EAC1B,aAKM,SAAqBqB,GACzB,MAAO,GAAGA,EAAKG,0BAA0BJ,EAAUC,GAAMI,QAAQ,SACnE,0BAKM,SACJC,EACAC,EACAC,EAAgC,UAEhC,IAAIC,EACJ,OAAQD,GACN,IAAK,QACHC,EAAY,IACZ,MACF,IAAK,OACHA,EAAY,GACZ,MAEF,QACEA,EAAY,GAOhB,OAFiB,GAECH,EAAaG,EAHZ,GAGwBF,CAC7C,eAKgB,SAAaG,EAAeC,GAC1C,OAAOrd,KAAKsd,KAAKF,EAAQC,EAC3B,kBAKuBV,EAAcY,EAAkC,UAGrE,OAAOZ,GAD+B,WAAhBY,GAA4C,SAAhBA,EAAyB,IAAM,IAEnF"}
|
|
1
|
+
{"version":3,"file":"emblem-auth.min.js","sources":["../src/SessionManager.ts","../src/EmblemAuthSDK.ts","../src/signers/http.ts","../src/signers/validation.ts","../src/signers/utils.ts","../src/signers/vault.ts","../src/signers/viem.ts","../src/signers/ethers.ts","../node_modules/tslib/tslib.es6.js","../src/signers/web3.ts","../src/signers/solana.ts","../src/signers/bitcoin.ts"],"sourcesContent":["import type { AuthSession, SessionRefreshInfo } from './types/session';\n\ninterface SessionManagerConfig {\n /**\n * Callback to refresh an expiring session\n */\n onRefresh?: (session: AuthSession) => Promise<AuthSession | null>;\n\n /**\n * Time before expiry to trigger refresh (milliseconds)\n * @default 60000 (1 minute)\n */\n refreshSkewMs?: number;\n}\n\ntype SessionEventMap = {\n session: (session: AuthSession | null) => void;\n sessionExpired: (session: AuthSession) => void;\n sessionRefreshed: (session: AuthSession) => void;\n sessionWillRefresh: (info: SessionRefreshInfo) => void;\n};\n\ntype SessionEventKey = keyof SessionEventMap;\ntype SessionEventHandler<K extends SessionEventKey> = SessionEventMap[K];\n\nexport class SessionManager {\n private session: AuthSession | null = null;\n private timer: NodeJS.Timeout | null = null;\n private readonly onRefresh?: (session: AuthSession) => Promise<AuthSession | null>;\n private readonly events: Partial<Record<SessionEventKey, SessionEventHandler<any>[]>> = {};\n private readonly refreshSkewMs: number;\n private consecutiveFailures: number = 0;\n private readonly maxBackoffMs: number = 30000; // Max 30 second backoff\n private readonly baseBackoffMs: number = 2000; // Start with 2 second backoff\n\n constructor(config: SessionManagerConfig = {}) {\n this.onRefresh = config.onRefresh;\n this.refreshSkewMs = config.refreshSkewMs ?? 60000; // Default 60 seconds\n }\n\n /**\n * Set the current session and schedule refresh\n */\n setSession(session: AuthSession | null): void {\n this.session = session;\n this.schedule();\n this.emit('session', session);\n }\n\n /**\n * Get the current session\n */\n getSession(): AuthSession | null {\n return this.session;\n }\n\n /**\n * Clear the current session\n */\n clear(): void {\n this.session = null;\n this.cancel();\n this.emit('session', null);\n }\n\n /**\n * Subscribe to session events\n */\n on<K extends SessionEventKey>(event: K, handler: SessionEventHandler<K>): void {\n if (!this.events[event]) {\n this.events[event] = [];\n }\n this.events[event]!.push(handler as any);\n }\n\n /**\n * Unsubscribe from session events\n */\n off<K extends SessionEventKey>(event: K, handler: SessionEventHandler<K>): void {\n const handlers = this.events[event];\n if (handlers) {\n const index = handlers.indexOf(handler as any);\n if (index !== -1) {\n handlers.splice(index, 1);\n }\n }\n }\n\n /**\n * Destroy the session manager\n */\n destroy(): void {\n this.cancel();\n this.session = null;\n Object.keys(this.events).forEach(key => {\n delete this.events[key as SessionEventKey];\n });\n }\n\n private emit<K extends SessionEventKey>(\n event: K,\n payload: Parameters<SessionEventMap[K]>[0]\n ): void {\n const handlers = this.events[event];\n if (!handlers) return;\n\n for (const handler of handlers) {\n try {\n handler(payload as any);\n } catch (error) {\n console.error(`Error in session event handler for ${event}:`, error);\n }\n }\n }\n\n private cancel(): void {\n if (this.timer) {\n clearTimeout(this.timer);\n this.timer = null;\n }\n }\n\n /**\n * Calculate backoff delay with exponential increase, capped at maxBackoffMs\n */\n private getBackoffDelay(): number {\n // Exponential backoff: 2s, 4s, 8s, 16s, 30s (capped)\n // consecutiveFailures is 1 after first failure, so use (n-1) as exponent\n const delay = Math.min(\n this.baseBackoffMs * Math.pow(2, Math.max(0, this.consecutiveFailures - 1)),\n this.maxBackoffMs\n );\n return delay;\n }\n\n /**\n * Schedule a retry after a failed refresh attempt\n */\n private scheduleRetry(session: AuthSession): void {\n this.cancel();\n\n const now = Date.now();\n const ttl = session.expiresAt - now;\n\n // If already expired, don't retry\n if (ttl <= 0) {\n this.emit('sessionExpired', session);\n return;\n }\n\n // Calculate backoff, but don't exceed remaining TTL\n const backoff = Math.min(this.getBackoffDelay(), ttl - 1000); // Leave 1s buffer\n\n if (backoff <= 0) {\n // No time left to retry, just wait for expiry\n this.timer = setTimeout(() => {\n this.emit('sessionExpired', session);\n }, ttl);\n return;\n }\n\n console.log(`[SessionManager] Refresh failed, retrying in ${backoff}ms (attempt ${this.consecutiveFailures + 1})`);\n\n this.timer = setTimeout(async () => {\n if (!this.onRefresh) {\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n }\n return;\n }\n\n try {\n const refreshed = await this.onRefresh(session);\n // Check if we got a genuinely NEW session (different expiresAt)\n if (refreshed?.expiresAt && refreshed.authToken && refreshed.expiresAt !== session.expiresAt) {\n // Success! Reset failures and schedule next refresh\n this.consecutiveFailures = 0;\n this.setSession(refreshed);\n this.emit('sessionRefreshed', refreshed);\n } else {\n // Still failed - increment failures and retry with backoff\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n } catch (error) {\n console.error('Session refresh error:', error);\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n }, backoff);\n }\n\n private schedule(): void {\n this.cancel();\n\n const session = this.session;\n if (!session?.expiresAt) return;\n\n const now = Date.now();\n const ttl = session.expiresAt - now;\n\n if (ttl <= 0) {\n this.emit('sessionExpired', session);\n return;\n }\n\n // Reset consecutive failures when scheduling a fresh refresh\n this.consecutiveFailures = 0;\n\n const refreshIn = Math.max(0, ttl - this.refreshSkewMs);\n this.emit('sessionWillRefresh', { inMs: refreshIn, ttl });\n\n this.timer = setTimeout(async () => {\n if (!this.onRefresh) {\n // No refresh hook; check if expired\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n }\n return;\n }\n\n try {\n const refreshed = await this.onRefresh(session);\n // Check if we got a genuinely NEW session (different expiresAt)\n if (refreshed?.expiresAt && refreshed.authToken && refreshed.expiresAt !== session.expiresAt) {\n // Success! Schedule next refresh\n this.consecutiveFailures = 0;\n this.setSession(refreshed);\n this.emit('sessionRefreshed', refreshed);\n } else {\n // Refresh failed - start retry with backoff\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n } catch (error) {\n console.error('Session refresh error:', error);\n this.consecutiveFailures++;\n if (Date.now() >= session.expiresAt) {\n this.emit('sessionExpired', session);\n } else {\n this.scheduleRetry(session);\n }\n }\n }, refreshIn);\n }\n}\n","import { SessionManager } from './SessionManager';\nimport type {\n EmblemAuthConfig,\n AuthSession,\n WalletAuthParams,\n AuthInitResponse,\n AuthError,\n PostMessageData,\n AuthEventMap,\n AuthEventKey,\n AuthEventHandler,\n VaultInfo,\n Hex,\n SignerVaultInfo,\n EmailSendOtpParams,\n EmailVerifyOtpParams,\n EmailLoginParams,\n OAuthProvider,\n} from './types';\n\n// Signer types only - actual implementations are dynamically imported\n// to keep peer dependencies (ethers, viem, @solana/web3.js) truly optional\nimport type { EmblemEthersWallet } from './signers/ethers';\nimport type { EmblemSolanaSigner } from './signers/solana';\nimport type { EmblemWeb3Adapter } from './signers/web3';\nimport type { EmblemBitcoinSigner } from './signers/bitcoin';\n\nexport class EmblemAuthSDK {\n private readonly config: EmblemAuthConfig & {\n authUrl: string;\n apiUrl: string;\n persistSession: boolean;\n };\n private session: AuthSession | null = null;\n private pendingNonce: string | null = null;\n private readonly messageHandler: (event: MessageEvent) => void;\n private overlayEl: HTMLElement | null = null;\n private _iframeEl: HTMLIFrameElement | null = null;\n private overlayCleanup: (() => void) | null = null;\n private readonly sessionMgr: SessionManager;\n private readonly events: Partial<Record<AuthEventKey, AuthEventHandler<any>[]>> = {};\n private _cachedVaultInfo: VaultInfo | null = null;\n private readonly storageKey: string;\n private readonly visitorIdKey: string;\n private _visitorId: string | null = null;\n\n constructor(config: EmblemAuthConfig) {\n if (!config?.appId) {\n throw new Error('appId is required');\n }\n\n this.config = {\n ...config,\n authUrl: config.authUrl ?? 'https://auth.emblemvault.ai',\n apiUrl: config.apiUrl ?? 'https://api.emblemvault.ai',\n persistSession: config.persistSession ?? true,\n };\n this.storageKey = `emblem_session_${config.appId}`;\n this.visitorIdKey = `emblem_visitorId_${config.appId}`;\n this.messageHandler = this.onMessage.bind(this);\n // Only add message listener in browser environments\n if (typeof window !== 'undefined') {\n window.addEventListener('message', this.messageHandler);\n }\n\n this.sessionMgr = new SessionManager({\n onRefresh: async current => {\n try {\n const refreshed = await this.refreshSession();\n return refreshed || current;\n } catch {\n return current;\n }\n },\n });\n\n // Forward session manager events\n this.sessionMgr.on('sessionExpired', s => this.emit('sessionExpired', s));\n this.sessionMgr.on('sessionRefreshed', s => this.emit('sessionRefreshed', s));\n this.sessionMgr.on('sessionWillRefresh', info => this.emit('sessionWillRefresh', info));\n\n // Restore persisted session if enabled\n if (this.config.persistSession) {\n const restored = this.loadPersistedSession();\n if (restored) {\n this.hydrateSession(restored);\n }\n // Also restore visitorId\n this._visitorId = this.loadPersistedVisitorId();\n }\n\n // Fallback for OAuth providers that break window.opener via COOP:\n // backend can redirect to the app origin with the session in the URL hash.\n this.tryConsumeSessionFromHash();\n }\n\n private tryConsumeSessionFromHash(): void {\n if (typeof window === 'undefined') return;\n try {\n const raw = String(window.location.hash || '').replace(/^#/, '');\n if (!raw) return;\n const params = new URLSearchParams(raw);\n const encoded = params.get('emblemAuthSession');\n if (!encoded) return;\n\n const b64 = decodeURIComponent(encoded);\n const json = decodeURIComponent(escape(atob(b64)));\n const session = JSON.parse(json) as AuthSession;\n\n // Basic safety: only accept if appId matches this SDK instance\n if (session?.appId && session.appId !== this.config.appId) {\n this.authDebug('consumeHash:ignored (appId mismatch)', {\n expected: this.config.appId,\n received: session.appId,\n });\n return;\n }\n\n this.authDebug('consumeHash:accepted', { appId: session?.appId });\n\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.config.onSuccess?.(session);\n this.emit('session', session);\n\n // Clear hash to avoid leaking tokens in copy/paste, history, etc.\n try {\n window.history.replaceState(null, '', window.location.pathname + window.location.search);\n } catch {\n // ignore\n }\n } catch (e) {\n this.authDebug('consumeHash:failed', { error: (e as Error)?.message || String(e) });\n }\n }\n\n /**\n * Authenticate with a wallet signature (programmatic/headless auth)\n * Uses the external verification endpoint for cross-origin compatibility\n */\n async authenticateWallet(params: WalletAuthParams): Promise<AuthSession | null> {\n const { network, message, signature, publicKey, address } = params;\n\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required for authenticateWallet');\n }\n if (!network || !message || !signature) {\n throw new Error('network, message, signature are required');\n }\n\n const url = `${this.config.apiUrl.replace(/\\/$/, '')}/api/auth/wallet/verify-external`;\n const response = await fetch(url, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: this.config.appId,\n network,\n message,\n signature,\n publicKey,\n address,\n }),\n });\n\n if (!response.ok) {\n const errorData = await this.safeJson(response);\n const error = new Error(errorData?.error || `wallet_verify_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = errorData;\n throw error;\n }\n\n const data = await response.json();\n const session = data?.session as AuthSession | null;\n\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.config.onSuccess?.(session);\n this.emit('session', session);\n }\n\n return session;\n }\n\n /**\n * Start OAuth sign-in (google/twitter) using authUrl's /auth/oauth/init proxy flow.\n * This uses the same postMessage contract as openAuthModal().\n */\n async openOAuth(provider: OAuthProvider): Promise<void> {\n if (typeof window === 'undefined') {\n throw new Error('openOAuth() must be called in a browser environment');\n }\n\n const origin = window.location.origin;\n this.authDebug('openOAuth:start', { provider, origin, apiUrl: this.config.apiUrl });\n\n // Use authUrl (registration-site host) for OAuth so callback can be proxied there.\n // getAuthInit already prefers authUrl and falls back to apiUrl if needed.\n const initData = await this.getAuthInit({ origin });\n\n const nonce = (initData?.nonce as string) || this.randomId();\n const state = initData?.state as string;\n this.pendingNonce = nonce;\n this.authDebug('openOAuth:init ok', {\n noncePrefix: String(nonce).slice(0, 8),\n hasState: !!state,\n statePrefix: String(state || '').slice(0, 16),\n });\n\n const authOrigin = this.normalizeBaseUrl(this.config.authUrl, 'authUrl');\n const url = new URL(`${authOrigin}/api/auth/oauth/init`);\n url.searchParams.set('provider', provider);\n url.searchParams.set('state', state);\n this.authDebug('openOAuth:navigate', { url: url.toString() });\n\n // OAuth providers frequently block being embedded in iframes.\n // Always use a popup/new tab, and fallback to same-window navigation if popups are blocked.\n const win = window.open(url.toString(), 'emblem-auth', this.popupFeatures());\n if (win) {\n try {\n win.focus();\n } catch {}\n return;\n }\n\n // Popup blocked: fall back to same-window navigation (works in top-level browsing contexts).\n try {\n this.authDebug('openOAuth:popup blocked, using same-window navigation');\n window.location.assign(url.toString());\n } catch {\n const error = new Error('Popup blocked. Please allow popups for this site.') as AuthError;\n this.emitError(error);\n }\n }\n\n /**\n * Email registration: request OTP (server will send email; optionally returns OTP in dev).\n */\n async sendEmailOtp(\n params: EmailSendOtpParams\n ): Promise<{ success: boolean; expiresAt?: string; otp?: string }> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/send-otp`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_send_otp_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n return data;\n }\n\n /**\n * Email registration: verify OTP and create a session.\n */\n async verifyEmailOtp(params: EmailVerifyOtpParams): Promise<AuthSession | null> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/verify-otp`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n otp: params.otp,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_verify_otp_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Email login (email + password) -> session.\n */\n async authenticateEmail(params: EmailLoginParams): Promise<AuthSession | null> {\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const response = await fetch(`${apiBase}/api/auth/email/login`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: params.appId ?? this.config.appId,\n email: params.email,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `email_login_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Authenticate with a password (for AI agents / headless auth)\n * Password is hashed with appId to create a deterministic identifier.\n * Same password = same vault, different password = different vault.\n * No email or browser required - ideal for AI agents.\n *\n * @param params.password - Must be at least 16 characters (use long random strings like API keys)\n *\n * @example\n * ```typescript\n * const session = await sdk.authenticatePassword({\n * password: 'my-super-secret-agent-password-123'\n * });\n * ```\n */\n async authenticatePassword(params: { password: string }): Promise<AuthSession | null> {\n const authBase = this.config.authUrl.replace(/\\/$/, '');\n const response = await fetch(`${authBase}/api/auth/password/verify`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify({\n appId: this.config.appId,\n password: params.password,\n }),\n });\n const data = await response.json().catch(() => null);\n if (!response.ok) {\n const error = new Error(data?.error || `password_verify_${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data;\n throw error;\n }\n const session = data?.session as AuthSession | null;\n if (session) {\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n return session;\n }\n\n /**\n * Open the authentication modal\n */\n async openAuthModal(): Promise<void> {\n const origin = window.location.origin;\n let initData: AuthInitResponse | null = null;\n let initError: AuthError | null = null;\n\n try {\n initData = await this.getAuthInit({ origin });\n } catch (error) {\n initError = error as AuthError;\n console.warn('[EmblemAuthSDK] /api/auth/init failed:', initError?.message || error);\n }\n\n const nonce = initData?.nonce || this.randomId();\n this.pendingNonce = nonce;\n\n let modalUrl = this.resolveModalUrl({ nonce, origin, state: initData?.state });\n\n // If origin not allowed, open modal error page directly\n if (initError?.payload?.error === 'origin_not_allowed') {\n try {\n const base = new URL('/connect', this.config.authUrl);\n base.searchParams.set('error', 'origin_not_allowed');\n base.searchParams.set('appId', this.config.appId);\n base.searchParams.set('origin', origin);\n modalUrl = base.toString();\n } catch {\n // Ignore URL construction errors\n }\n }\n\n const mode = this.config.modalMode || 'auto';\n let opened = false;\n\n if (mode === 'iframe' || mode === 'auto') {\n try {\n opened = this.openIframeModal(modalUrl);\n } catch (error) {\n console.warn(\n '[EmblemAuthSDK] iframe modal failed, will fallback to popup:',\n (error as Error)?.message\n );\n }\n }\n\n if (!opened) {\n const features = this.popupFeatures();\n const win = window.open(modalUrl, 'emblem-auth', features);\n if (!win) {\n const error = new Error('Popup blocked. Please allow popups for this site.') as AuthError;\n this.emitError(error);\n }\n }\n }\n\n /**\n * Get the current session\n */\n getSession(): AuthSession | null {\n return this.session;\n }\n\n /**\n * Get the visitor ID from the last authentication\n * This is the VaultFP fingerprint ID captured during auth\n */\n getVisitorId(): string | null {\n return this._visitorId;\n }\n\n /**\n * Refresh the current session\n * Supports two modes:\n * - Web apps: Uses httpOnly cookies (credentials: include, no body)\n * - Mobile/Native apps: Uses refresh token from session (sent in body)\n */\n async refreshSession(): Promise<AuthSession | null> {\n try {\n if (!this.session) return null;\n\n // Extract origin from authUrl for refresh endpoint\n const authOrigin = this.tryGetOriginFromConfig();\n if (!authOrigin) return this.session;\n\n const refreshUrl = `${authOrigin}/api/auth/refresh`;\n\n // Check if we have a refresh token in session (mobile/native mode)\n // If so, send it in the body. Otherwise, rely on httpOnly cookie (web mode)\n const hasTokenInSession = Boolean(this.session.refreshToken);\n\n const response = await fetch(refreshUrl, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body: JSON.stringify(hasTokenInSession ? { refreshToken: this.session.refreshToken } : {}),\n // Always include credentials - needed for cookie mode, harmless for token mode\n credentials: 'include',\n });\n\n if (!response.ok) return this.session;\n\n const data = await response.json();\n const nextSession = data?.session as AuthSession | null;\n\n if (nextSession) {\n // For mobile/native: preserve the new refresh token if returned\n // For web: refreshToken will be undefined (handled by cookies)\n this.session = nextSession;\n this.persistSession(nextSession);\n this.sessionMgr.setSession(nextSession);\n this.emit('session', nextSession);\n }\n\n return this.session;\n } catch {\n return this.session;\n }\n }\n\n /**\n * Get vault information\n */\n async getVaultInfo(): Promise<VaultInfo> {\n if (this._cachedVaultInfo) return this._cachedVaultInfo;\n\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No session');\n }\n\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required');\n }\n\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const resp = await fetch(`${apiBase}/vault/info`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${session.authToken}`,\n 'Content-Type': 'application/json',\n },\n body: '{}',\n });\n\n if (!resp.ok) {\n throw new Error('Failed to fetch vault info');\n }\n\n const rawVaultInfo = await resp.json();\n\n // Normalize the response to match the VaultInfo type\n const vaultInfo: VaultInfo = {\n ...rawVaultInfo,\n // Ensure tokenId is populated (alias for vaultId)\n tokenId: rawVaultInfo.tokenId || rawVaultInfo.vaultId,\n // Populate solanaAddress from address if not already set\n // The 'address' field from the API is the Solana address\n solanaAddress: rawVaultInfo.solanaAddress || rawVaultInfo.address,\n };\n\n this._cachedVaultInfo = vaultInfo;\n return vaultInfo;\n }\n\n /**\n * Get or create the vault API key\n */\n async getVaultApiKey(): Promise<string> {\n if (!this.config.apiUrl) {\n throw new Error('apiUrl is required');\n }\n\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No active session');\n }\n\n const apiBase = this.config.apiUrl.replace(/\\/$/, '');\n const token = session.authToken;\n const vaultId = session.user?.vaultId;\n\n // Try to get API key hash from vault info\n let apiKeyHash: string | null = null;\n\n try {\n const infoRes = await fetch(`${apiBase}/vault/info-complete`, {\n method: 'POST',\n headers: { Authorization: `Bearer ${token}` },\n });\n\n if (infoRes.ok) {\n const infoJson = await infoRes.json();\n apiKeyHash = infoJson?.raw?.pkp?.api_key_hash || infoJson?.raw?.pkp?.apiKeyHash || null;\n }\n } catch {\n // Ignore errors\n }\n\n // Fallback: list by created_by if info-complete didn't return a hash\n if (!apiKeyHash) {\n try {\n const appId = session.appId;\n const rawIdentifier = session.user?.identifier || '';\n const scopedIdentifier = appId ? `${appId}:${rawIdentifier}` : rawIdentifier;\n\n if (scopedIdentifier) {\n const vaultsRes = await fetch(\n `${apiBase}/api/vaults/${encodeURIComponent(scopedIdentifier)}`\n );\n if (vaultsRes.ok) {\n const vaults = await vaultsRes.json();\n const match = Array.isArray(vaults)\n ? vaults.find(v => String(v.tokenId || v.token_id) === String(vaultId)) || vaults[0]\n : null;\n apiKeyHash = match?.api_key_hash || match?.apiKeyHash || null;\n }\n }\n } catch {\n // Ignore errors\n }\n }\n\n // If no hash, generate a new key\n if (!apiKeyHash) {\n const genRes = await fetch(`${apiBase}/api/vaults/${encodeURIComponent(vaultId)}/api-key`, {\n method: 'POST',\n headers: { Authorization: `Bearer ${token}` },\n });\n\n if (!genRes.ok) {\n throw new Error(`gen_key_${genRes.status}`);\n }\n\n const genJson = await genRes.json();\n const apiKey = genJson?.apiKey || genJson?.key || null;\n\n if (!apiKey) {\n throw new Error('missing_apiKey');\n }\n\n return apiKey;\n }\n\n // Decrypt existing key\n const decRes = await fetch(`${apiBase}/decrypt`, {\n method: 'POST',\n headers: {\n Authorization: `Bearer ${token}`,\n 'Content-Type': 'application/json',\n },\n body: JSON.stringify({ tokenId: vaultId, dataToEncryptHash: apiKeyHash }),\n });\n\n if (!decRes.ok) {\n throw new Error(`decrypt_${decRes.status}`);\n }\n\n const decJson = await decRes.json();\n const decrypted = decJson?.decryptedString || null;\n\n if (!decrypted) {\n throw new Error('missing_decrypted');\n }\n\n return decrypted;\n }\n\n /**\n * Hydrate a previously saved session\n */\n hydrateSession(session: AuthSession): void {\n if (!session?.authToken) return;\n\n this.session = session;\n this.persistSession(session);\n this._cachedVaultInfo = null; // Clear cache on session change\n this.sessionMgr.setSession(session);\n this.emit('session', session);\n }\n\n /**\n * Logout and clear the session\n */\n logout(): void {\n this.session = null;\n this.persistSession(null);\n this._visitorId = null;\n this.persistVisitorId(null);\n this._cachedVaultInfo = null; // Clear cache on logout\n this.sessionMgr.clear();\n this.emit('session', null);\n }\n\n /**\n * Subscribe to auth events\n */\n on<K extends AuthEventKey>(event: K, handler: AuthEventHandler<K>): void {\n if (!this.events[event]) {\n this.events[event] = [];\n }\n this.events[event]!.push(handler as any);\n }\n\n /**\n * Unsubscribe from auth events\n */\n off<K extends AuthEventKey>(event: K, handler: AuthEventHandler<K>): void {\n const handlers = this.events[event];\n if (handlers) {\n const index = handlers.indexOf(handler as any);\n if (index !== -1) {\n handlers.splice(index, 1);\n }\n }\n }\n\n // ============================================================================\n // Signer Adapters\n // ============================================================================\n\n /**\n * Helper to get signer config and vault info\n */\n private async getSignerContext(): Promise<{\n config: { baseUrl?: string; getJwt: () => string | null | undefined };\n vaultInfo: SignerVaultInfo;\n }> {\n const session = this.getSession();\n if (!session?.authToken) {\n throw new Error('No active session. Call openAuthModal() or authenticateWallet() first.');\n }\n\n const vaultInfo = await this.getVaultInfo();\n\n return {\n config: {\n baseUrl: this.config.apiUrl,\n getJwt: () => this.getSession()?.authToken,\n },\n vaultInfo: {\n vaultId: vaultInfo.vaultId,\n evmAddress: (vaultInfo.evmAddress || '0x') as Hex,\n address: vaultInfo.solanaAddress || vaultInfo.address || '',\n tokenId: vaultInfo.tokenId,\n created_by: vaultInfo.created_by,\n },\n };\n }\n\n /**\n * Create a viem-compatible account adapter for EVM signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const account = await sdk.toViemAccount();\n * const signature = await account.signMessage({ message: 'Hello' });\n * ```\n */\n async toViemAccount(): Promise<{\n address: Hex;\n signMessage: (args: { message: unknown }) => Promise<Hex>;\n signTypedData: (typedData: unknown) => Promise<Hex>;\n signTransaction: (tx: unknown, opts?: unknown) => Promise<Hex>;\n type: 'local';\n source: 'custom';\n }> {\n const { toViemAccount } = await import('./signers/viem');\n const { config, vaultInfo } = await this.getSignerContext();\n return toViemAccount(config, vaultInfo);\n }\n\n /**\n * Create an ethers v6 compatible wallet adapter for EVM signing\n * Requires an active session with authToken\n *\n * @param provider - Optional ethers Provider for transaction population\n *\n * @example\n * ```typescript\n * const wallet = await sdk.toEthersWallet(provider);\n * const signature = await wallet.signMessage('Hello');\n * const tx = await wallet.sendTransaction({ to, value });\n * ```\n */\n async toEthersWallet(provider?: unknown | null): Promise<EmblemEthersWallet> {\n const { toEthersWallet } = await import('./signers/ethers');\n const { config, vaultInfo } = await this.getSignerContext();\n return toEthersWallet(config, provider, vaultInfo);\n }\n\n /**\n * Create a Web3.js compatible adapter for EVM signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const adapter = await sdk.toWeb3Adapter();\n * const signature = await adapter.signMessage('Hello');\n * ```\n */\n async toWeb3Adapter(): Promise<EmblemWeb3Adapter> {\n const { toWeb3Adapter } = await import('./signers/web3');\n const { config, vaultInfo } = await this.getSignerContext();\n return toWeb3Adapter(config, vaultInfo);\n }\n\n /**\n * Create a Solana Web3.js compatible signer\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toSolanaWeb3Signer();\n * const signature = await signer.signMessage('Hello');\n * const signedTx = await signer.signTransaction(tx);\n * ```\n */\n async toSolanaWeb3Signer(): Promise<EmblemSolanaSigner> {\n const { toSolanaWeb3Signer } = await import('./signers/solana');\n const { config, vaultInfo } = await this.getSignerContext();\n return toSolanaWeb3Signer(config, vaultInfo);\n }\n\n /**\n * Create a Solana Kit compatible signer\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toSolanaKitSigner();\n * const signature = await signer.signMessage('Hello');\n * ```\n */\n async toSolanaKitSigner(): Promise<EmblemSolanaSigner> {\n const { toSolanaKitSigner } = await import('./signers/solana');\n const { config, vaultInfo } = await this.getSignerContext();\n return toSolanaKitSigner(config, vaultInfo);\n }\n\n /**\n * Create a Bitcoin signer for PSBT signing\n * Requires an active session with authToken\n *\n * @example\n * ```typescript\n * const signer = await sdk.toBitcoinSigner();\n * console.log('Bitcoin addresses:', signer.addresses);\n *\n * // Sign a PSBT\n * const result = await signer.signPsbt(psbtBase64, {\n * transactionType: 'p2wpkh'\n * });\n * console.log('Signed TX:', result.signedTxHex);\n * ```\n */\n async toBitcoinSigner(): Promise<EmblemBitcoinSigner> {\n const { toBitcoinSigner, fetchBitcoinVaultInfo } = await import('./signers/bitcoin');\n const { config } = await this.getSignerContext();\n // Bitcoin signer needs its own vault info with btcPubkey\n const btcVaultInfo = await fetchBitcoinVaultInfo(config);\n return toBitcoinSigner(config, btcVaultInfo);\n }\n\n /**\n * Clean up event listeners\n */\n destroy(): void {\n // Only remove message listener in browser environments\n if (typeof window !== 'undefined') {\n window.removeEventListener('message', this.messageHandler);\n }\n this.sessionMgr.destroy();\n this.closeOverlay();\n Object.keys(this.events).forEach(key => {\n delete this.events[key as AuthEventKey];\n });\n }\n\n private resolveModalUrl(params: { nonce: string; origin: string; state?: string }): string {\n // Derive modal URL from authUrl\n const base = `${this.config.authUrl.replace(/\\/$/, '')}/connect`;\n const url = new URL(base, window.location.href);\n url.searchParams.set('appId', this.config.appId);\n url.searchParams.set('origin', params.origin);\n url.searchParams.set('nonce', params.nonce);\n if (params.state) {\n url.searchParams.set('state', params.state);\n }\n return url.toString();\n }\n\n private authDebugEnabled(): boolean {\n // Browser: allow enabling via localStorage.AUTH_DEBUG=\"true\"\n try {\n const v = window?.localStorage?.getItem?.('AUTH_DEBUG');\n if (String(v).toLowerCase() === 'true') return true;\n } catch {\n // ignore\n }\n\n // Bundler envs: allow NEXT_PUBLIC_AUTH_DEBUG / AUTH_DEBUG if present\n try {\n // eslint-disable-next-line @typescript-eslint/no-explicit-any\n const p: any = typeof process !== 'undefined' ? process : null;\n const env = p?.env || {};\n const v = env.NEXT_PUBLIC_AUTH_DEBUG ?? env.AUTH_DEBUG;\n if (!v) return false;\n const s = String(v).toLowerCase().trim();\n return s === '1' || s === 'true' || s === 'yes' || s === 'on';\n } catch {\n return false;\n }\n }\n\n private authDebug(...args: unknown[]): void {\n if (!this.authDebugEnabled()) return;\n // eslint-disable-next-line no-console\n console.log('[AUTH_DEBUG]', ...args);\n }\n\n /**\n * Normalize a configured URL. Accepts absolute URLs (https://...) or relative paths (/...).\n * If a host-like string is provided without a scheme (e.g. \"api.emblemvault.ai\"),\n * we assume https://.\n */\n private normalizeBaseUrl(input: string, label: 'apiUrl' | 'authUrl'): string {\n if (!input) throw new Error(`${label} is required`);\n const trimmed = String(input).trim();\n const base = typeof window !== 'undefined' ? window.location.href : 'http://localhost';\n\n // First attempt: standard URL parsing (supports relative paths in browser)\n try {\n const u = new URL(trimmed, base);\n return u.toString().replace(/\\/$/, '');\n } catch {\n // continue\n }\n\n // Second attempt: treat as host-like and assume https://\n try {\n const u = new URL(`https://${trimmed.replace(/^\\/+/, '')}`);\n return u.toString().replace(/\\/$/, '');\n } catch {\n // continue\n }\n\n throw new Error(\n `${label} must be an absolute URL (e.g. \"https://api.emblemvault.ai\") or a relative path (e.g. \"/\")`\n );\n }\n\n private onMessage(event: MessageEvent): void {\n try {\n // Validate origin\n const allowedOrigins = new Set(\n [\n window.location.origin,\n this.tryGetOriginFromConfig(),\n this.tryGetOriginFromApiUrl(),\n ].filter(Boolean)\n );\n\n if (!allowedOrigins.has(event.origin)) {\n this.authDebug('onMessage:ignored (origin)', {\n eventOrigin: event.origin,\n allowedOrigins: Array.from(allowedOrigins),\n });\n return;\n }\n\n const data = event.data as PostMessageData;\n\n // Handle cancel message\n if (data?.type === 'emblem-auth-cancelled') {\n // Nonce check for cancel\n if (!this.pendingNonce || data.nonce !== this.pendingNonce) {\n return;\n }\n\n this.pendingNonce = null;\n this.closeOverlay();\n\n // Call onCancel callback if provided\n if (this.config.onCancel) {\n this.config.onCancel();\n }\n\n // Emit cancelled event\n this.emit('cancelled', undefined as never);\n return;\n }\n\n if (data?.type !== 'emblem-auth-success') return;\n\n // Nonce check\n if (!this.pendingNonce || data.nonce !== this.pendingNonce) {\n console.error('[EmblemAuthSDK] Nonce mismatch', {\n expected: this.pendingNonce,\n received: data?.nonce,\n origin: event.origin,\n });\n this.authDebug('onMessage:ignored (nonce)', {\n expected: this.pendingNonce,\n received: data?.nonce,\n origin: event.origin,\n type: data?.type,\n });\n return;\n }\n\n this.pendingNonce = null;\n this.authDebug('onMessage:accepted', { origin: event.origin });\n\n // Accept the session\n const session = data.session as AuthSession | null;\n this.session = session;\n this.persistSession(session);\n this.sessionMgr.setSession(session);\n\n // Store visitorId if provided\n if (data.visitorId) {\n this._visitorId = data.visitorId;\n this.persistVisitorId(data.visitorId);\n }\n\n if (session && this.config.onSuccess) {\n this.config.onSuccess(session);\n }\n\n this.emit('session', session);\n this.closeOverlay();\n } catch (error) {\n this.emitError(error as AuthError);\n }\n }\n\n private emit<K extends AuthEventKey>(event: K, payload: Parameters<AuthEventMap[K]>[0]): void {\n const handlers = this.events[event];\n if (!handlers) return;\n\n for (const handler of handlers) {\n try {\n handler(payload as any);\n } catch (error) {\n console.error(`Error in auth event handler for ${event}:`, error);\n }\n }\n }\n\n private emitError(error: AuthError): void {\n this.config.onError?.(error);\n this.emit('authError', error);\n }\n\n private popupFeatures(): string {\n // Slightly wider for better UX, still reasonable on small screens\n const width = 520;\n const height = 680;\n const top = Math.max(0, (window.outerHeight - height) / 2);\n const left = Math.max(0, (window.outerWidth - width) / 2);\n return `popup=yes,width=${width},height=${height},left=${left},top=${top}`;\n }\n\n private randomId(): string {\n const array = new Uint8Array(16);\n if (window.crypto?.getRandomValues) {\n window.crypto.getRandomValues(array);\n } else {\n for (let i = 0; i < array.length; i++) {\n array[i] = Math.floor(Math.random() * 256);\n }\n }\n return Array.from(array, b => b.toString(16).padStart(2, '0')).join('');\n }\n\n private tryGetOriginFromConfig(): string | null {\n try {\n if (!this.config.authUrl) return null;\n // Use window.location.href as base in browser (supports relative authUrl)\n // In Node.js, authUrl must be absolute\n const normalized = this.normalizeBaseUrl(this.config.authUrl, 'authUrl');\n return new URL(normalized).origin;\n } catch {\n return null;\n }\n }\n\n private tryGetOriginFromApiUrl(): string | null {\n try {\n if (!this.config.apiUrl) return null;\n const normalized = this.normalizeBaseUrl(this.config.apiUrl, 'apiUrl');\n return new URL(normalized).origin;\n } catch {\n return null;\n }\n }\n\n private async getAuthInit(params: { origin: string }): Promise<AuthInitResponse> {\n const body = JSON.stringify({\n appId: this.config.appId,\n origin: params.origin,\n });\n\n const tryInit = async (baseUrl: string): Promise<AuthInitResponse> => {\n const response = await fetch(`${baseUrl.replace(/\\/$/, '')}/api/auth/init`, {\n method: 'POST',\n headers: { 'Content-Type': 'application/json' },\n body,\n });\n\n const data = await response.json().catch(() => null);\n\n if (!response.ok) {\n const error = new Error(`init ${response.status}`) as AuthError;\n error.status = response.status;\n error.payload = data || {};\n throw error;\n }\n\n return data as AuthInitResponse;\n };\n\n // Prefer authUrl (registration site) for single-origin setups, but fallback to apiUrl\n // so modal can still open with a valid state even if the authUrl proxy route isn't deployed.\n try {\n return await tryInit(this.config.authUrl);\n } catch (error) {\n const firstError = error as AuthError;\n try {\n return await tryInit(this.config.apiUrl);\n } catch (fallbackError) {\n // Preserve original failure details (often more actionable), but include fallback in payload.\n const merged = firstError;\n merged.payload = {\n ...(firstError?.payload || {}),\n fallback: (fallbackError as AuthError)?.payload || undefined,\n };\n throw merged;\n }\n }\n }\n\n private openIframeModal(url: string): boolean {\n // Clean up any existing overlay\n if (this.overlayEl) {\n this.closeOverlay();\n }\n\n // Create overlay\n const overlay = document.createElement('div');\n overlay.setAttribute('data-emblem-overlay', '');\n overlay.style.position = 'fixed';\n overlay.style.inset = '0';\n overlay.style.background = 'rgba(0,0,0,0.55)';\n // Backdrop blur where supported (nice polish)\n (overlay.style as any).backdropFilter = 'blur(6px)';\n (overlay.style as any).webkitBackdropFilter = 'blur(6px)';\n overlay.style.zIndex = '999999';\n overlay.style.display = 'flex';\n overlay.style.alignItems = 'center';\n overlay.style.justifyContent = 'center';\n overlay.style.padding = '12px';\n\n // Create container\n const container = document.createElement('div');\n container.style.width = 'min(520px, 96vw)';\n container.style.height = 'min(680px, 92vh)';\n container.style.background = '#12161b';\n container.style.border = '1px solid #222b35';\n container.style.borderRadius = '12px';\n container.style.boxShadow = '0 12px 48px rgba(0,0,0,0.7)';\n container.style.overflow = 'hidden';\n container.style.position = 'relative';\n container.style.display = 'flex';\n container.style.flexDirection = 'column';\n\n // Header bar (keeps close button from overlapping iframe content)\n const header = document.createElement('div');\n header.style.height = '52px';\n header.style.display = 'flex';\n header.style.alignItems = 'center';\n header.style.justifyContent = 'space-between';\n header.style.padding = '0 12px';\n header.style.borderBottom = '1px solid rgba(255, 255, 255, 0.06)';\n header.style.background = '#12161b';\n\n const title = document.createElement('div');\n title.textContent = 'Emblem';\n title.style.fontFamily =\n 'ui-sans-serif, system-ui, -apple-system, Segoe UI, Roboto, Helvetica, Arial';\n title.style.fontSize = '13px';\n title.style.letterSpacing = '0.08em';\n title.style.textTransform = 'uppercase';\n title.style.color = 'rgba(230, 238, 248, 0.75)';\n\n const closeBtn = document.createElement('button');\n closeBtn.type = 'button';\n closeBtn.textContent = '×';\n closeBtn.setAttribute('aria-label', 'Close');\n closeBtn.setAttribute('title', 'Close');\n closeBtn.style.width = '40px';\n closeBtn.style.height = '40px';\n closeBtn.style.display = 'flex';\n closeBtn.style.alignItems = 'center';\n closeBtn.style.justifyContent = 'center';\n closeBtn.style.background = 'rgba(255, 255, 255, 0.04)';\n closeBtn.style.color = '#e6eef8';\n closeBtn.style.border = '1px solid rgba(255, 255, 255, 0.08)';\n closeBtn.style.borderRadius = '10px';\n closeBtn.style.fontSize = '24px';\n closeBtn.style.lineHeight = '1';\n closeBtn.style.cursor = 'pointer';\n closeBtn.style.userSelect = 'none';\n closeBtn.onclick = () => this.cancelAuth();\n\n header.appendChild(title);\n header.appendChild(closeBtn);\n\n // Create iframe\n const iframe = document.createElement('iframe');\n iframe.src = url;\n iframe.style.width = '100%';\n iframe.style.height = '100%';\n iframe.style.border = '0';\n iframe.referrerPolicy = 'no-referrer';\n iframe.allow = 'clipboard-read; clipboard-write;';\n\n container.appendChild(header);\n container.appendChild(iframe);\n overlay.appendChild(container);\n document.body.appendChild(overlay);\n\n // Close when clicking outside the modal content\n overlay.addEventListener('click', e => {\n if (e.target === overlay) this.cancelAuth();\n });\n\n // Close on Escape\n const onKey = (e: KeyboardEvent): void => {\n if (e.key === 'Escape') {\n this.cancelAuth();\n }\n };\n document.addEventListener('keydown', onKey, { capture: true });\n\n this.overlayEl = overlay;\n this._iframeEl = iframe;\n this.overlayCleanup = () => {\n document.removeEventListener('keydown', onKey, { capture: true });\n };\n\n return true;\n }\n\n private closeOverlay(): void {\n try {\n this.overlayCleanup?.();\n } catch {\n // Ignore errors\n }\n this.overlayCleanup = null;\n\n if (this.overlayEl?.parentNode) {\n this.overlayEl.parentNode.removeChild(this.overlayEl);\n }\n\n this.overlayEl = null;\n this._iframeEl = null;\n }\n\n /**\n * Cancel authentication (called when user closes modal via X button or Escape)\n */\n private cancelAuth(): void {\n this.pendingNonce = null;\n this.closeOverlay();\n\n // Call onCancel callback if provided\n if (this.config.onCancel) {\n this.config.onCancel();\n }\n\n // Emit cancelled event\n this.emit('cancelled', undefined as never);\n }\n\n private async safeJson(response: Response): Promise<any> {\n try {\n return await response.json();\n } catch {\n return null;\n }\n }\n\n private loadPersistedSession(): AuthSession | null {\n try {\n if (typeof localStorage === 'undefined') return null;\n const stored = localStorage.getItem(this.storageKey);\n if (!stored) return null;\n\n const session = JSON.parse(stored) as AuthSession;\n\n // Validate session has required fields and hasn't expired\n if (!session?.authToken || !session?.expiresAt) return null;\n if (Date.now() >= session.expiresAt) {\n localStorage.removeItem(this.storageKey);\n return null;\n }\n\n return session;\n } catch {\n return null;\n }\n }\n\n private persistSession(session: AuthSession | null): void {\n try {\n if (typeof localStorage === 'undefined') return;\n\n if (session && this.config.persistSession) {\n localStorage.setItem(this.storageKey, JSON.stringify(session));\n } else {\n localStorage.removeItem(this.storageKey);\n }\n } catch {\n // Ignore storage errors (e.g., private browsing mode)\n }\n }\n\n private loadPersistedVisitorId(): string | null {\n try {\n if (typeof localStorage === 'undefined') return null;\n return localStorage.getItem(this.visitorIdKey);\n } catch {\n return null;\n }\n }\n\n private persistVisitorId(visitorId: string | null): void {\n try {\n if (typeof localStorage === 'undefined') return;\n\n if (visitorId && this.config.persistSession) {\n localStorage.setItem(this.visitorIdKey, visitorId);\n } else {\n localStorage.removeItem(this.visitorIdKey);\n }\n } catch {\n // Ignore storage errors (e.g., private browsing mode)\n }\n }\n}\n","import type { SignerConfig } from '../types/signers';\n\nfunction sanitizeErrorMessage(status: number, text: string): string {\n // Sanitize error messages to avoid leaking sensitive server information\n let errorMessage = `Emblem signer error ${status}`;\n\n if (status >= 500) {\n errorMessage += ': Internal server error';\n } else if (status === 401 || status === 403) {\n errorMessage += ': Authentication failed';\n } else if (status === 404) {\n errorMessage += ': Resource not found';\n } else if (status === 405) {\n errorMessage += ': Method not allowed';\n } else if (text) {\n // For 4xx client errors, include limited error details\n errorMessage += `: ${text.substring(0, 200)}`; // Limit to 200 chars\n }\n\n return errorMessage;\n}\n\nasync function resolveAuthHeaders(config: SignerConfig): Promise<Record<string, string>> {\n // Priority: custom headers -> jwt/getJwt/sdk -> apiKey (deprecated)\n if (typeof config.getAuthHeaders === 'function') {\n const h = await config.getAuthHeaders();\n if (h && typeof h === 'object') return h;\n }\n\n const tok =\n config.jwt ??\n (typeof config.getJwt === 'function' ? await config.getJwt() : undefined) ??\n config.sdk?.getSession()?.authToken ??\n undefined;\n\n if (tok) {\n return { Authorization: `Bearer ${tok}` };\n }\n\n // apiKey is deprecated but still supported as fallback\n if (config.apiKey) {\n return { 'x-api-key': config.apiKey };\n }\n\n throw new Error(\n 'No authentication available: provide jwt, getJwt(), getAuthHeaders(), sdk, or apiKey'\n );\n}\n\nexport async function emblemPost<T = unknown>(\n path: string,\n body: unknown,\n config: SignerConfig\n): Promise<T> {\n const baseUrl = config.baseUrl ?? 'https://api.emblemvault.ai';\n const authHeaders = await resolveAuthHeaders(config);\n const res = await fetch(`${baseUrl}${path}`, {\n method: 'POST',\n headers: {\n 'content-type': 'application/json',\n ...authHeaders,\n },\n body: JSON.stringify(body, (_key: string, value: unknown) =>\n typeof value === 'bigint' ? value.toString() : value\n ),\n });\n\n if (!res.ok) {\n const text = await res.text().catch(() => '');\n throw new Error(sanitizeErrorMessage(res.status, text));\n }\n\n return res.json() as Promise<T>;\n}\n\nexport async function emblemGet<T = unknown>(path: string, config: SignerConfig): Promise<T> {\n const baseUrl = config.baseUrl ?? 'https://api.emblemvault.ai';\n const authHeaders = await resolveAuthHeaders(config);\n const res = await fetch(`${baseUrl}${path}`, {\n method: 'GET',\n headers: authHeaders,\n });\n\n if (!res.ok) {\n const text = await res.text().catch(() => '');\n throw new Error(sanitizeErrorMessage(res.status, text));\n }\n\n return res.json() as Promise<T>;\n}\n","import type { SignerConfig } from '../types/signers';\n\n/**\n * Environment detection utilities for warning about unsafe usage patterns\n */\n\n/**\n * Detect if code is running in a browser environment\n */\nexport function isBrowserEnvironment(): boolean {\n return typeof window !== 'undefined' && typeof document !== 'undefined';\n}\n\n/**\n * Check if we're in a Node.js server environment\n */\nexport function isNodeEnvironment(): boolean {\n return (\n typeof process !== 'undefined' && process.versions != null && process.versions.node != null\n );\n}\n\n/**\n * Validate baseUrl format\n */\nexport function validateBaseUrl(baseUrl?: string): void {\n if (!baseUrl) return; // undefined is ok, will use default\n\n if (!baseUrl.startsWith('http://') && !baseUrl.startsWith('https://')) {\n throw new Error('baseUrl must be a valid HTTP(S) URL');\n }\n\n // Warn about http (not https)\n if (\n baseUrl.startsWith('http://') &&\n !baseUrl.includes('localhost') &&\n !baseUrl.includes('127.0.0.1')\n ) {\n console.warn(\n '[Emblem Security Warning] baseUrl uses HTTP instead of HTTPS. This is insecure for production use.'\n );\n }\n}\n\n/**\n * Validate Ethereum address format\n */\nexport function validateEthereumAddress(address: string): void {\n if (!address || typeof address !== 'string') {\n throw new Error('Address is required');\n }\n\n if (!address.startsWith('0x')) {\n throw new Error('Address must start with 0x');\n }\n\n if (!/^0x[0-9a-fA-F]{40}$/.test(address)) {\n throw new Error('Invalid Ethereum address format');\n }\n}\n\n/**\n * Validate vault ID\n */\nexport function validateVaultId(vaultId: string): void {\n if (!vaultId || typeof vaultId !== 'string') {\n throw new Error('vaultId is required');\n }\n\n if (vaultId.trim() === '') {\n throw new Error('vaultId cannot be empty');\n }\n}\n\n/**\n * Safe number conversion with bounds checking\n */\nexport function toSafeNumber(value: unknown, fieldName: string): number {\n const num = Number(value);\n\n if (!Number.isSafeInteger(num)) {\n throw new Error(\n `${fieldName} value ${value} exceeds safe integer range (max: ${Number.MAX_SAFE_INTEGER})`\n );\n }\n\n return num;\n}\n\n/**\n * Extended config with security options\n */\nexport interface SignerSecurityConfig extends SignerConfig {\n /**\n * Enable debug logging for security-related checks\n * @default false\n */\n debugSecurity?: boolean;\n}\n\n/**\n * Validate signer configuration\n */\nexport function validateSignerConfig(config: SignerSecurityConfig): void {\n // Validate auth: require at least one method\n const hasJwt = !!config.jwt;\n const hasGetJwt = typeof config.getJwt === 'function';\n const hasHeaders = typeof config.getAuthHeaders === 'function';\n const hasSdk = !!config.sdk && typeof config.sdk.getSession === 'function';\n const hasApiKey = !!config.apiKey;\n\n if (!hasJwt && !hasGetJwt && !hasHeaders && !hasSdk && !hasApiKey) {\n throw new Error('Authentication required: provide jwt, getJwt(), getAuthHeaders(), sdk, or apiKey');\n }\n\n // Validate baseUrl if provided\n if (config.baseUrl) {\n validateBaseUrl(config.baseUrl);\n }\n\n // Security audit logging\n if (config.debugSecurity) {\n console.log('[Emblem Security Debug]', {\n environment: isBrowserEnvironment() ? 'browser' : 'node',\n hasBaseUrl: !!config.baseUrl,\n timestamp: new Date().toISOString(),\n });\n }\n}\n","import type { Hex } from '../types/signers';\nimport { toSafeNumber } from './validation';\n\nexport function toHexIfBigInt(v: unknown): unknown {\n return typeof v === 'bigint' ? '0x' + v.toString(16) : v;\n}\n\n/**\n * viem txs sometimes have bigint / hex / optional fields. Ethers serializers\n * accept hex strings for numeric fields. Normalize where helpful.\n */\nexport function normalizeTxForEmblem(tx: Record<string, unknown>): Record<string, unknown> {\n const out: Record<string, unknown> = { ...tx };\n\n if (out.value !== undefined) out.value = toHexIfBigInt(out.value);\n if (out.gas !== undefined) {\n out.gasLimit = toHexIfBigInt(out.gas);\n delete out.gas;\n }\n if (out.gasLimit !== undefined) out.gasLimit = toHexIfBigInt(out.gasLimit);\n if (out.gasPrice !== undefined) out.gasPrice = toHexIfBigInt(out.gasPrice);\n if (out.maxFeePerGas !== undefined) out.maxFeePerGas = toHexIfBigInt(out.maxFeePerGas);\n if (out.maxPriorityFeePerGas !== undefined)\n out.maxPriorityFeePerGas = toHexIfBigInt(out.maxPriorityFeePerGas);\n if (out.nonce !== undefined) out.nonce = toSafeNumber(out.nonce, 'nonce');\n if (out.chainId !== undefined) out.chainId = toSafeNumber(out.chainId, 'chainId');\n\n // Some backends only accept legacy fields; fold EIP-1559 into gasPrice and drop unsupported keys\n if (out.maxFeePerGas !== undefined || out.maxPriorityFeePerGas !== undefined) {\n if (out.gasPrice === undefined && out.maxFeePerGas !== undefined) {\n out.gasPrice = out.maxFeePerGas;\n }\n delete out.maxFeePerGas;\n delete out.maxPriorityFeePerGas;\n }\n\n // Remove fields commonly unsupported by legacy serializers\n delete out.type;\n delete out.accessList;\n delete out.account;\n delete out.chain;\n delete out.from;\n\n return out;\n}\n\nexport function isHexString(value: unknown): value is Hex {\n return typeof value === 'string' && /^0x[0-9a-fA-F]*$/.test(value);\n}\n\nexport function bytesToHex(bytes: ArrayLike<number>): Hex {\n let out = '0x';\n for (let i = 0; i < bytes.length; i++) {\n out += (bytes[i] as number).toString(16).padStart(2, '0');\n }\n return out as Hex;\n}\n","import type { SignerConfig, SignerVaultInfo, Hex } from '../types/signers';\nimport { emblemPost } from './http';\n\nexport async function fetchVaultInfo(config: SignerConfig): Promise<SignerVaultInfo> {\n // Note: The server only supports POST for /vault/info\n const data: Partial<{\n vaultId: string;\n address: string;\n evmAddress: Hex;\n created_by?: string;\n }> = await emblemPost('/vault/info', {}, config);\n\n // Validate required response data (vaultId + evmAddress are required for EVM)\n if (!data || !data.vaultId || !data.evmAddress) {\n throw new Error('Invalid vault info response: missing required fields');\n }\n\n if (!String(data.evmAddress).startsWith('0x')) {\n throw new Error('Invalid evmAddress format in response');\n }\n\n return {\n vaultId: data.vaultId,\n tokenId: data.vaultId,\n address: data.address || '', // Solana address may be absent; keep optional\n evmAddress: data.evmAddress as Hex,\n created_by: data.created_by,\n };\n}\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, isHexString, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\n// Minimal viem types to avoid hard dependency\ninterface ViemAccount {\n address: Hex;\n signMessage: (args: { message: unknown }) => Promise<Hex>;\n signTypedData: (typedData: unknown) => Promise<Hex>;\n signTransaction: (tx: unknown, opts?: unknown) => Promise<Hex>;\n type: 'local';\n source: 'custom';\n publicKey?: Hex;\n}\n\nexport async function toViemAccount(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<ViemAccount> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n const { evmAddress, vaultId } = info;\n\n // Dynamically import viem's toAccount\n // String concatenation prevents bundlers from statically analyzing the import\n // DO NOT CHANGE THIS PATTERN - using a literal import('viem/accounts') breaks Next.js/Webpack builds\n // when viem is not installed. The variable indirection is intentional. - Shannon\n const moduleName = 'viem/accounts';\n const { toAccount } = await import(/* @vite-ignore */ moduleName);\n\n return toAccount({\n address: evmAddress,\n\n async signMessage({ message }: { message: unknown }): Promise<Hex> {\n let payload: string;\n let isRaw = false;\n\n if (typeof message === 'string') {\n payload = message;\n isRaw = false;\n } else if (message && typeof (message as { raw?: unknown }).raw !== 'undefined') {\n const raw = (message as { raw: unknown }).raw;\n payload = typeof raw === 'string' ? raw : bytesToHex(raw as ArrayLike<number>);\n isRaw = true;\n } else if (message instanceof Uint8Array) {\n payload = bytesToHex(message);\n isRaw = false;\n } else if (isHexString(message)) {\n payload = message as string;\n isRaw = false;\n } else {\n // Don't silently convert objects to \"[object Object]\"\n throw new Error(\n `Unsupported message type: ${typeof message}. Expected string, Uint8Array, or hex string.`\n );\n }\n\n const data = await emblemPost<{\n signerAddress: string;\n signature: Hex;\n }>('/sign-eth-message', { vaultId, message: payload, raw: isRaw }, config);\n\n return data.signature;\n },\n\n async signTypedData(typedData: unknown): Promise<Hex> {\n const { domain, types, primaryType, message } = typedData as {\n domain: unknown;\n types: unknown;\n primaryType?: string;\n message: unknown;\n };\n const data = await emblemPost<{\n signerAddress: string;\n signature: Hex;\n }>('/sign-typed-message', { vaultId, domain, types, primaryType, message }, config);\n\n return data.signature;\n },\n\n async signTransaction(tx: unknown, _opts?: unknown): Promise<Hex> {\n const normalizedTx = normalizeTxForEmblem(tx as Record<string, unknown>);\n\n const data = await emblemPost<{\n signedTransaction: Hex;\n }>('/sign-eth-tx', { vaultId, transaction: normalizedTx }, config);\n\n return data.signedTransaction;\n },\n }) as ViemAccount;\n}\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\n// ethers v6 compatible interface (like solana pattern - no runtime dependency)\nexport interface EmblemEthersWallet {\n getAddress(): Promise<string>;\n signMessage(message: string | Uint8Array): Promise<string>;\n signTypedData(\n domain: unknown,\n types: Record<string, Array<{ name: string; type: string }>>,\n value: Record<string, unknown>\n ): Promise<string>;\n signTransaction(tx: unknown): Promise<string>;\n sendTransaction(tx: unknown): Promise<unknown>;\n connect(provider: unknown): EmblemEthersWallet;\n provider: unknown;\n // Additional methods\n initialize(): Promise<void>;\n getVaultId(): string;\n setChainId(chainId: number): void;\n getChainId(): number;\n signAndBroadcast(transaction: unknown, waitForReceipt?: boolean): Promise<string>;\n}\n\nexport async function toEthersWallet(\n config: SignerConfig,\n provider?: unknown | null,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemEthersWallet> {\n // Dynamic import - only loads ethers when this function is called\n // String concatenation prevents bundlers from statically analyzing the import\n // DO NOT CHANGE THIS PATTERN - using a literal import('ethers') breaks Next.js/Webpack builds\n // when ethers is not installed. The variable indirection is intentional. - Shannon\n let ethers: typeof import('ethers');\n try {\n const moduleName = 'ethers';\n ethers = await import(/* @vite-ignore */ moduleName);\n } catch {\n throw new Error('ethers is required for toEthersWallet(). Install it with: npm install ethers');\n }\n\n const { AbstractSigner, resolveAddress } = ethers;\n type AbstractProvider = import('ethers').AbstractProvider;\n type TransactionRequest = import('ethers').TransactionRequest;\n type TransactionResponse = import('ethers').TransactionResponse;\n type TransactionLike = import('ethers').TransactionLike<string>;\n type TypedDataDomain = import('ethers').TypedDataDomain;\n type TypedDataField = import('ethers').TypedDataField;\n\n const info = infoOverride ?? (await fetchVaultInfo(config));\n\n // Class defined inside function after dynamic import\n class EmblemEthersWalletImpl extends AbstractSigner {\n private readonly _config: SignerConfig;\n private _address: Hex | null = null;\n private _vaultId: string | null = null;\n private _chainId = 1;\n private _initPromise?: Promise<void>;\n\n constructor(\n signerConfig: SignerConfig,\n signerProvider?: AbstractProvider | null,\n seed?: { address?: Hex; vaultId?: string; chainId?: number }\n ) {\n super(signerProvider ?? null);\n this._config = signerConfig;\n if (seed?.address) this._address = seed.address;\n if (seed?.vaultId) this._vaultId = seed.vaultId;\n if (seed?.chainId) this._chainId = seed.chainId;\n }\n\n async initialize(): Promise<void> {\n if (this._initPromise) return this._initPromise;\n\n this._initPromise = fetchVaultInfo(this._config)\n .then((vaultInfo) => {\n this._address = vaultInfo.evmAddress;\n this._vaultId = vaultInfo.vaultId;\n })\n .catch((err) => {\n this._initPromise = undefined;\n throw err;\n });\n\n return this._initPromise;\n }\n\n async getAddress(): Promise<string> {\n if (!this._address) await this.initialize();\n return this._address!;\n }\n\n getVaultId(): string {\n if (!this._vaultId) throw new Error('Wallet not initialized. Call initialize() first.');\n return this._vaultId;\n }\n\n setChainId(chainId: number): void {\n this._chainId = chainId;\n }\n\n getChainId(): number {\n return this._chainId;\n }\n\n connect(newProvider: AbstractProvider): EmblemEthersWalletImpl {\n if (!newProvider) throw new Error('Provider cannot be null');\n return new EmblemEthersWalletImpl(this._config, newProvider, {\n address: this._address ?? undefined,\n vaultId: this._vaultId ?? undefined,\n chainId: this._chainId,\n });\n }\n\n async signMessage(message: string | Uint8Array): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const payload = typeof message === 'string' ? message : bytesToHex(message);\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-eth-message',\n { vaultId: this._vaultId!, message: payload },\n this._config\n );\n return data.signature;\n }\n\n async signTypedData(\n domain: TypedDataDomain,\n types: Record<string, Array<TypedDataField>>,\n value: Record<string, unknown>\n ): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const cleanTypes = { ...types };\n if (cleanTypes && (cleanTypes as Record<string, unknown>).EIP712Domain) {\n delete (cleanTypes as Record<string, unknown>).EIP712Domain;\n }\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-typed-message',\n { vaultId: this._vaultId!, domain, types: cleanTypes, message: value },\n this._config\n );\n return data.signature;\n }\n\n async _signTypedData(\n domain: TypedDataDomain,\n types: Record<string, Array<TypedDataField>>,\n value: Record<string, unknown>\n ): Promise<string> {\n return this.signTypedData(domain, types, value);\n }\n\n async signTransaction(tx: TransactionRequest): Promise<string> {\n if (!this._vaultId) await this.initialize();\n const from = (tx as Record<string, unknown>).from as string | undefined;\n const addr = await this.getAddress();\n\n if (from && from.toLowerCase() !== addr.toLowerCase()) {\n throw new Error('transaction from does not match signer address');\n }\n\n const toSign = this.provider\n ? ({ ...await this.populateTransaction(tx) } as Record<string, unknown>)\n : ({ ...tx } as Record<string, unknown>);\n if (toSign.from) delete toSign.from;\n if (!('to' in toSign) || !toSign.to) {\n throw new Error(\"Transaction must have a 'to' address\");\n }\n if (toSign.nonce === undefined || toSign.nonce === null) {\n throw new Error('Transaction must have a nonce');\n }\n const normalized = normalizeTxForEmblem(toSign);\n const resp = await emblemPost<{ signedTransaction: Hex }>(\n '/sign-eth-tx',\n { vaultId: this._vaultId!, transaction: normalized, options: { chainId: this._chainId } },\n this._config\n );\n return resp.signedTransaction;\n }\n\n async sendTransaction(tx: TransactionRequest): Promise<TransactionResponse> {\n if (!this.provider) throw new Error('Provider required to send transaction');\n const signed = await this.signTransaction(tx);\n return await this.provider.broadcastTransaction(signed);\n }\n\n async populateTransaction(transaction: TransactionRequest): Promise<TransactionLike> {\n const tx = { ...transaction } as TransactionRequest;\n if (!this.provider) throw new Error('Provider required to populate transaction');\n const fromAddress = tx.from\n ? await resolveAddress(tx.from, this.provider)\n : await this.getAddress();\n\n let chainId: bigint;\n if (!tx.chainId) {\n const network = await this.provider.getNetwork();\n chainId = network.chainId;\n this._chainId = Number(network.chainId);\n } else {\n chainId = BigInt(tx.chainId);\n this._chainId = Number(tx.chainId);\n }\n\n const nonce =\n tx.nonce != null\n ? Number(tx.nonce)\n : await this.provider.getTransactionCount(fromAddress, 'pending');\n const toAddress = tx.to ? await resolveAddress(tx.to, this.provider) : null;\n const value = tx.value ? BigInt(tx.value.toString()) : 0n;\n\n let gasLimit: bigint;\n if (!tx.gasLimit) {\n try {\n gasLimit = await this.provider.estimateGas({ ...tx, from: fromAddress });\n } catch {\n gasLimit = 21000n;\n }\n } else {\n gasLimit = BigInt(tx.gasLimit.toString());\n }\n\n let gasPrice: bigint | null = null;\n if (!tx.gasPrice && tx.type !== 2) {\n const feeData = await this.provider.getFeeData();\n gasPrice = feeData.gasPrice ?? null;\n } else if (tx.gasPrice) {\n gasPrice = BigInt(tx.gasPrice.toString());\n }\n\n const populated: TransactionLike = {\n from: fromAddress,\n to: toAddress,\n value,\n nonce,\n gasLimit,\n data: tx.data as string | undefined,\n chainId,\n type: tx.type || undefined,\n };\n if (gasPrice !== null) populated.gasPrice = gasPrice;\n if (tx.maxFeePerGas) populated.maxFeePerGas = BigInt(tx.maxFeePerGas.toString());\n if (tx.maxPriorityFeePerGas)\n populated.maxPriorityFeePerGas = BigInt(tx.maxPriorityFeePerGas.toString());\n return populated;\n }\n\n async signAndBroadcast(\n transaction: TransactionRequest,\n waitForReceipt: boolean = false\n ): Promise<string> {\n if (!this.provider) throw new Error('Provider required to send transaction');\n const signed = await this.signTransaction(transaction);\n const resp = await this.provider.broadcastTransaction(signed);\n const hash = resp.hash as string;\n if (waitForReceipt) {\n await this.provider.waitForTransaction(hash);\n }\n return hash;\n }\n }\n\n return new EmblemEthersWalletImpl(config, provider as AbstractProvider | null, {\n address: info.evmAddress,\n vaultId: info.vaultId,\n });\n}\n","/******************************************************************************\r\nCopyright (c) Microsoft Corporation.\r\n\r\nPermission to use, copy, modify, and/or distribute this software for any\r\npurpose with or without fee is hereby granted.\r\n\r\nTHE SOFTWARE IS PROVIDED \"AS IS\" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH\r\nREGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY\r\nAND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT,\r\nINDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM\r\nLOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR\r\nOTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR\r\nPERFORMANCE OF THIS SOFTWARE.\r\n***************************************************************************** */\r\n/* global Reflect, Promise, SuppressedError, Symbol, Iterator */\r\n\r\nvar extendStatics = function(d, b) {\r\n extendStatics = Object.setPrototypeOf ||\r\n ({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||\r\n function (d, b) { for (var p in b) if (Object.prototype.hasOwnProperty.call(b, p)) d[p] = b[p]; };\r\n return extendStatics(d, b);\r\n};\r\n\r\nexport function __extends(d, b) {\r\n if (typeof b !== \"function\" && b !== null)\r\n throw new TypeError(\"Class extends value \" + String(b) + \" is not a constructor or null\");\r\n extendStatics(d, b);\r\n function __() { this.constructor = d; }\r\n d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());\r\n}\r\n\r\nexport var __assign = function() {\r\n __assign = Object.assign || function __assign(t) {\r\n for (var s, i = 1, n = arguments.length; i < n; i++) {\r\n s = arguments[i];\r\n for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p)) t[p] = s[p];\r\n }\r\n return t;\r\n }\r\n return __assign.apply(this, arguments);\r\n}\r\n\r\nexport function __rest(s, e) {\r\n var t = {};\r\n for (var p in s) if (Object.prototype.hasOwnProperty.call(s, p) && e.indexOf(p) < 0)\r\n t[p] = s[p];\r\n if (s != null && typeof Object.getOwnPropertySymbols === \"function\")\r\n for (var i = 0, p = Object.getOwnPropertySymbols(s); i < p.length; i++) {\r\n if (e.indexOf(p[i]) < 0 && Object.prototype.propertyIsEnumerable.call(s, p[i]))\r\n t[p[i]] = s[p[i]];\r\n }\r\n return t;\r\n}\r\n\r\nexport function __decorate(decorators, target, key, desc) {\r\n var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;\r\n if (typeof Reflect === \"object\" && typeof Reflect.decorate === \"function\") r = Reflect.decorate(decorators, target, key, desc);\r\n else for (var i = decorators.length - 1; i >= 0; i--) if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;\r\n return c > 3 && r && Object.defineProperty(target, key, r), r;\r\n}\r\n\r\nexport function __param(paramIndex, decorator) {\r\n return function (target, key) { decorator(target, key, paramIndex); }\r\n}\r\n\r\nexport function __esDecorate(ctor, descriptorIn, decorators, contextIn, initializers, extraInitializers) {\r\n function accept(f) { if (f !== void 0 && typeof f !== \"function\") throw new TypeError(\"Function expected\"); return f; }\r\n var kind = contextIn.kind, key = kind === \"getter\" ? \"get\" : kind === \"setter\" ? \"set\" : \"value\";\r\n var target = !descriptorIn && ctor ? contextIn[\"static\"] ? ctor : ctor.prototype : null;\r\n var descriptor = descriptorIn || (target ? Object.getOwnPropertyDescriptor(target, contextIn.name) : {});\r\n var _, done = false;\r\n for (var i = decorators.length - 1; i >= 0; i--) {\r\n var context = {};\r\n for (var p in contextIn) context[p] = p === \"access\" ? {} : contextIn[p];\r\n for (var p in contextIn.access) context.access[p] = contextIn.access[p];\r\n context.addInitializer = function (f) { if (done) throw new TypeError(\"Cannot add initializers after decoration has completed\"); extraInitializers.push(accept(f || null)); };\r\n var result = (0, decorators[i])(kind === \"accessor\" ? { get: descriptor.get, set: descriptor.set } : descriptor[key], context);\r\n if (kind === \"accessor\") {\r\n if (result === void 0) continue;\r\n if (result === null || typeof result !== \"object\") throw new TypeError(\"Object expected\");\r\n if (_ = accept(result.get)) descriptor.get = _;\r\n if (_ = accept(result.set)) descriptor.set = _;\r\n if (_ = accept(result.init)) initializers.unshift(_);\r\n }\r\n else if (_ = accept(result)) {\r\n if (kind === \"field\") initializers.unshift(_);\r\n else descriptor[key] = _;\r\n }\r\n }\r\n if (target) Object.defineProperty(target, contextIn.name, descriptor);\r\n done = true;\r\n};\r\n\r\nexport function __runInitializers(thisArg, initializers, value) {\r\n var useValue = arguments.length > 2;\r\n for (var i = 0; i < initializers.length; i++) {\r\n value = useValue ? initializers[i].call(thisArg, value) : initializers[i].call(thisArg);\r\n }\r\n return useValue ? value : void 0;\r\n};\r\n\r\nexport function __propKey(x) {\r\n return typeof x === \"symbol\" ? x : \"\".concat(x);\r\n};\r\n\r\nexport function __setFunctionName(f, name, prefix) {\r\n if (typeof name === \"symbol\") name = name.description ? \"[\".concat(name.description, \"]\") : \"\";\r\n return Object.defineProperty(f, \"name\", { configurable: true, value: prefix ? \"\".concat(prefix, \" \", name) : name });\r\n};\r\n\r\nexport function __metadata(metadataKey, metadataValue) {\r\n if (typeof Reflect === \"object\" && typeof Reflect.metadata === \"function\") return Reflect.metadata(metadataKey, metadataValue);\r\n}\r\n\r\nexport function __awaiter(thisArg, _arguments, P, generator) {\r\n function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }\r\n return new (P || (P = Promise))(function (resolve, reject) {\r\n function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }\r\n function rejected(value) { try { step(generator[\"throw\"](value)); } catch (e) { reject(e); } }\r\n function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }\r\n step((generator = generator.apply(thisArg, _arguments || [])).next());\r\n });\r\n}\r\n\r\nexport function __generator(thisArg, body) {\r\n var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g = Object.create((typeof Iterator === \"function\" ? Iterator : Object).prototype);\r\n return g.next = verb(0), g[\"throw\"] = verb(1), g[\"return\"] = verb(2), typeof Symbol === \"function\" && (g[Symbol.iterator] = function() { return this; }), g;\r\n function verb(n) { return function (v) { return step([n, v]); }; }\r\n function step(op) {\r\n if (f) throw new TypeError(\"Generator is already executing.\");\r\n while (g && (g = 0, op[0] && (_ = 0)), _) try {\r\n if (f = 1, y && (t = op[0] & 2 ? y[\"return\"] : op[0] ? y[\"throw\"] || ((t = y[\"return\"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;\r\n if (y = 0, t) op = [op[0] & 2, t.value];\r\n switch (op[0]) {\r\n case 0: case 1: t = op; break;\r\n case 4: _.label++; return { value: op[1], done: false };\r\n case 5: _.label++; y = op[1]; op = [0]; continue;\r\n case 7: op = _.ops.pop(); _.trys.pop(); continue;\r\n default:\r\n if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }\r\n if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }\r\n if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }\r\n if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }\r\n if (t[2]) _.ops.pop();\r\n _.trys.pop(); continue;\r\n }\r\n op = body.call(thisArg, _);\r\n } catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }\r\n if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };\r\n }\r\n}\r\n\r\nexport var __createBinding = Object.create ? (function(o, m, k, k2) {\r\n if (k2 === undefined) k2 = k;\r\n var desc = Object.getOwnPropertyDescriptor(m, k);\r\n if (!desc || (\"get\" in desc ? !m.__esModule : desc.writable || desc.configurable)) {\r\n desc = { enumerable: true, get: function() { return m[k]; } };\r\n }\r\n Object.defineProperty(o, k2, desc);\r\n}) : (function(o, m, k, k2) {\r\n if (k2 === undefined) k2 = k;\r\n o[k2] = m[k];\r\n});\r\n\r\nexport function __exportStar(m, o) {\r\n for (var p in m) if (p !== \"default\" && !Object.prototype.hasOwnProperty.call(o, p)) __createBinding(o, m, p);\r\n}\r\n\r\nexport function __values(o) {\r\n var s = typeof Symbol === \"function\" && Symbol.iterator, m = s && o[s], i = 0;\r\n if (m) return m.call(o);\r\n if (o && typeof o.length === \"number\") return {\r\n next: function () {\r\n if (o && i >= o.length) o = void 0;\r\n return { value: o && o[i++], done: !o };\r\n }\r\n };\r\n throw new TypeError(s ? \"Object is not iterable.\" : \"Symbol.iterator is not defined.\");\r\n}\r\n\r\nexport function __read(o, n) {\r\n var m = typeof Symbol === \"function\" && o[Symbol.iterator];\r\n if (!m) return o;\r\n var i = m.call(o), r, ar = [], e;\r\n try {\r\n while ((n === void 0 || n-- > 0) && !(r = i.next()).done) ar.push(r.value);\r\n }\r\n catch (error) { e = { error: error }; }\r\n finally {\r\n try {\r\n if (r && !r.done && (m = i[\"return\"])) m.call(i);\r\n }\r\n finally { if (e) throw e.error; }\r\n }\r\n return ar;\r\n}\r\n\r\n/** @deprecated */\r\nexport function __spread() {\r\n for (var ar = [], i = 0; i < arguments.length; i++)\r\n ar = ar.concat(__read(arguments[i]));\r\n return ar;\r\n}\r\n\r\n/** @deprecated */\r\nexport function __spreadArrays() {\r\n for (var s = 0, i = 0, il = arguments.length; i < il; i++) s += arguments[i].length;\r\n for (var r = Array(s), k = 0, i = 0; i < il; i++)\r\n for (var a = arguments[i], j = 0, jl = a.length; j < jl; j++, k++)\r\n r[k] = a[j];\r\n return r;\r\n}\r\n\r\nexport function __spreadArray(to, from, pack) {\r\n if (pack || arguments.length === 2) for (var i = 0, l = from.length, ar; i < l; i++) {\r\n if (ar || !(i in from)) {\r\n if (!ar) ar = Array.prototype.slice.call(from, 0, i);\r\n ar[i] = from[i];\r\n }\r\n }\r\n return to.concat(ar || Array.prototype.slice.call(from));\r\n}\r\n\r\nexport function __await(v) {\r\n return this instanceof __await ? (this.v = v, this) : new __await(v);\r\n}\r\n\r\nexport function __asyncGenerator(thisArg, _arguments, generator) {\r\n if (!Symbol.asyncIterator) throw new TypeError(\"Symbol.asyncIterator is not defined.\");\r\n var g = generator.apply(thisArg, _arguments || []), i, q = [];\r\n return i = Object.create((typeof AsyncIterator === \"function\" ? AsyncIterator : Object).prototype), verb(\"next\"), verb(\"throw\"), verb(\"return\", awaitReturn), i[Symbol.asyncIterator] = function () { return this; }, i;\r\n function awaitReturn(f) { return function (v) { return Promise.resolve(v).then(f, reject); }; }\r\n function verb(n, f) { if (g[n]) { i[n] = function (v) { return new Promise(function (a, b) { q.push([n, v, a, b]) > 1 || resume(n, v); }); }; if (f) i[n] = f(i[n]); } }\r\n function resume(n, v) { try { step(g[n](v)); } catch (e) { settle(q[0][3], e); } }\r\n function step(r) { r.value instanceof __await ? Promise.resolve(r.value.v).then(fulfill, reject) : settle(q[0][2], r); }\r\n function fulfill(value) { resume(\"next\", value); }\r\n function reject(value) { resume(\"throw\", value); }\r\n function settle(f, v) { if (f(v), q.shift(), q.length) resume(q[0][0], q[0][1]); }\r\n}\r\n\r\nexport function __asyncDelegator(o) {\r\n var i, p;\r\n return i = {}, verb(\"next\"), verb(\"throw\", function (e) { throw e; }), verb(\"return\"), i[Symbol.iterator] = function () { return this; }, i;\r\n function verb(n, f) { i[n] = o[n] ? function (v) { return (p = !p) ? { value: __await(o[n](v)), done: false } : f ? f(v) : v; } : f; }\r\n}\r\n\r\nexport function __asyncValues(o) {\r\n if (!Symbol.asyncIterator) throw new TypeError(\"Symbol.asyncIterator is not defined.\");\r\n var m = o[Symbol.asyncIterator], i;\r\n return m ? m.call(o) : (o = typeof __values === \"function\" ? __values(o) : o[Symbol.iterator](), i = {}, verb(\"next\"), verb(\"throw\"), verb(\"return\"), i[Symbol.asyncIterator] = function () { return this; }, i);\r\n function verb(n) { i[n] = o[n] && function (v) { return new Promise(function (resolve, reject) { v = o[n](v), settle(resolve, reject, v.done, v.value); }); }; }\r\n function settle(resolve, reject, d, v) { Promise.resolve(v).then(function(v) { resolve({ value: v, done: d }); }, reject); }\r\n}\r\n\r\nexport function __makeTemplateObject(cooked, raw) {\r\n if (Object.defineProperty) { Object.defineProperty(cooked, \"raw\", { value: raw }); } else { cooked.raw = raw; }\r\n return cooked;\r\n};\r\n\r\nvar __setModuleDefault = Object.create ? (function(o, v) {\r\n Object.defineProperty(o, \"default\", { enumerable: true, value: v });\r\n}) : function(o, v) {\r\n o[\"default\"] = v;\r\n};\r\n\r\nvar ownKeys = function(o) {\r\n ownKeys = Object.getOwnPropertyNames || function (o) {\r\n var ar = [];\r\n for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;\r\n return ar;\r\n };\r\n return ownKeys(o);\r\n};\r\n\r\nexport function __importStar(mod) {\r\n if (mod && mod.__esModule) return mod;\r\n var result = {};\r\n if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== \"default\") __createBinding(result, mod, k[i]);\r\n __setModuleDefault(result, mod);\r\n return result;\r\n}\r\n\r\nexport function __importDefault(mod) {\r\n return (mod && mod.__esModule) ? mod : { default: mod };\r\n}\r\n\r\nexport function __classPrivateFieldGet(receiver, state, kind, f) {\r\n if (kind === \"a\" && !f) throw new TypeError(\"Private accessor was defined without a getter\");\r\n if (typeof state === \"function\" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError(\"Cannot read private member from an object whose class did not declare it\");\r\n return kind === \"m\" ? f : kind === \"a\" ? f.call(receiver) : f ? f.value : state.get(receiver);\r\n}\r\n\r\nexport function __classPrivateFieldSet(receiver, state, value, kind, f) {\r\n if (kind === \"m\") throw new TypeError(\"Private method is not writable\");\r\n if (kind === \"a\" && !f) throw new TypeError(\"Private accessor was defined without a setter\");\r\n if (typeof state === \"function\" ? receiver !== state || !f : !state.has(receiver)) throw new TypeError(\"Cannot write private member to an object whose class did not declare it\");\r\n return (kind === \"a\" ? f.call(receiver, value) : f ? f.value = value : state.set(receiver, value)), value;\r\n}\r\n\r\nexport function __classPrivateFieldIn(state, receiver) {\r\n if (receiver === null || (typeof receiver !== \"object\" && typeof receiver !== \"function\")) throw new TypeError(\"Cannot use 'in' operator on non-object\");\r\n return typeof state === \"function\" ? receiver === state : state.has(receiver);\r\n}\r\n\r\nexport function __addDisposableResource(env, value, async) {\r\n if (value !== null && value !== void 0) {\r\n if (typeof value !== \"object\" && typeof value !== \"function\") throw new TypeError(\"Object expected.\");\r\n var dispose, inner;\r\n if (async) {\r\n if (!Symbol.asyncDispose) throw new TypeError(\"Symbol.asyncDispose is not defined.\");\r\n dispose = value[Symbol.asyncDispose];\r\n }\r\n if (dispose === void 0) {\r\n if (!Symbol.dispose) throw new TypeError(\"Symbol.dispose is not defined.\");\r\n dispose = value[Symbol.dispose];\r\n if (async) inner = dispose;\r\n }\r\n if (typeof dispose !== \"function\") throw new TypeError(\"Object not disposable.\");\r\n if (inner) dispose = function() { try { inner.call(this); } catch (e) { return Promise.reject(e); } };\r\n env.stack.push({ value: value, dispose: dispose, async: async });\r\n }\r\n else if (async) {\r\n env.stack.push({ async: true });\r\n }\r\n return value;\r\n\r\n}\r\n\r\nvar _SuppressedError = typeof SuppressedError === \"function\" ? SuppressedError : function (error, suppressed, message) {\r\n var e = new Error(message);\r\n return e.name = \"SuppressedError\", e.error = error, e.suppressed = suppressed, e;\r\n};\r\n\r\nexport function __disposeResources(env) {\r\n function fail(e) {\r\n env.error = env.hasError ? new _SuppressedError(e, env.error, \"An error was suppressed during disposal.\") : e;\r\n env.hasError = true;\r\n }\r\n var r, s = 0;\r\n function next() {\r\n while (r = env.stack.pop()) {\r\n try {\r\n if (!r.async && s === 1) return s = 0, env.stack.push(r), Promise.resolve().then(next);\r\n if (r.dispose) {\r\n var result = r.dispose.call(r.value);\r\n if (r.async) return s |= 2, Promise.resolve(result).then(next, function(e) { fail(e); return next(); });\r\n }\r\n else s |= 1;\r\n }\r\n catch (e) {\r\n fail(e);\r\n }\r\n }\r\n if (s === 1) return env.hasError ? Promise.reject(env.error) : Promise.resolve();\r\n if (env.hasError) throw env.error;\r\n }\r\n return next();\r\n}\r\n\r\nexport function __rewriteRelativeImportExtension(path, preserveJsx) {\r\n if (typeof path === \"string\" && /^\\.\\.?\\//.test(path)) {\r\n return path.replace(/\\.(tsx)$|((?:\\.d)?)((?:\\.[^./]+?)?)\\.([cm]?)ts$/i, function (m, tsx, d, ext, cm) {\r\n return tsx ? preserveJsx ? \".jsx\" : \".js\" : d && (!ext || !cm) ? m : (d + ext + \".\" + cm.toLowerCase() + \"js\");\r\n });\r\n }\r\n return path;\r\n}\r\n\r\nexport default {\r\n __extends: __extends,\r\n __assign: __assign,\r\n __rest: __rest,\r\n __decorate: __decorate,\r\n __param: __param,\r\n __esDecorate: __esDecorate,\r\n __runInitializers: __runInitializers,\r\n __propKey: __propKey,\r\n __setFunctionName: __setFunctionName,\r\n __metadata: __metadata,\r\n __awaiter: __awaiter,\r\n __generator: __generator,\r\n __createBinding: __createBinding,\r\n __exportStar: __exportStar,\r\n __values: __values,\r\n __read: __read,\r\n __spread: __spread,\r\n __spreadArrays: __spreadArrays,\r\n __spreadArray: __spreadArray,\r\n __await: __await,\r\n __asyncGenerator: __asyncGenerator,\r\n __asyncDelegator: __asyncDelegator,\r\n __asyncValues: __asyncValues,\r\n __makeTemplateObject: __makeTemplateObject,\r\n __importStar: __importStar,\r\n __importDefault: __importDefault,\r\n __classPrivateFieldGet: __classPrivateFieldGet,\r\n __classPrivateFieldSet: __classPrivateFieldSet,\r\n __classPrivateFieldIn: __classPrivateFieldIn,\r\n __addDisposableResource: __addDisposableResource,\r\n __disposeResources: __disposeResources,\r\n __rewriteRelativeImportExtension: __rewriteRelativeImportExtension,\r\n};\r\n","import type { Hex, SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { bytesToHex, normalizeTxForEmblem } from './utils';\nimport { fetchVaultInfo } from './vault';\n\nexport class EmblemWeb3Adapter {\n readonly address: Hex;\n readonly #vaultId: string;\n readonly #config: SignerConfig;\n\n constructor(address: Hex, vaultId: string, config: SignerConfig) {\n this.address = address;\n this.#vaultId = vaultId;\n this.#config = config;\n }\n\n async signMessage(message: string | Uint8Array): Promise<Hex> {\n const payload = typeof message === 'string' ? message : bytesToHex(message);\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-eth-message',\n { vaultId: this.#vaultId, message: payload },\n this.#config\n );\n return data.signature;\n }\n\n async signTypedData(\n domain: Record<string, unknown>,\n types: Record<string, unknown>,\n message: Record<string, unknown>\n ): Promise<Hex> {\n const data = await emblemPost<{ signerAddress: string; signature: Hex }>(\n '/sign-typed-message',\n { vaultId: this.#vaultId, domain, types, message },\n this.#config\n );\n return data.signature;\n }\n\n async signTransaction(tx: Record<string, unknown>): Promise<{ rawTransaction: Hex }> {\n const normalized = normalizeTxForEmblem(tx);\n const resp = await emblemPost<{ signedTransaction: Hex }>(\n '/sign-eth-tx',\n { vaultId: this.#vaultId, transaction: normalized },\n this.#config\n );\n return { rawTransaction: resp.signedTransaction };\n }\n}\n\nexport async function toWeb3Adapter(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemWeb3Adapter> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemWeb3Adapter(info.evmAddress, info.vaultId, config);\n}\n","import type { SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { fetchVaultInfo } from './vault';\n\n// @solana/web3.js compatible interfaces\nexport interface SolanaSignerInterface {\n publicKey: string;\n signMessage(message: Uint8Array | string): Promise<Uint8Array>;\n signTransaction(transaction: unknown): Promise<unknown>;\n}\n\n// For Solana Kit compatibility\nexport interface SolanaKitSignerInterface {\n publicKey: string;\n signMessage(message: Uint8Array | string): Promise<Uint8Array>;\n signTransaction(transaction: unknown): Promise<unknown>;\n}\n\nexport class EmblemSolanaSigner implements SolanaSignerInterface, SolanaKitSignerInterface {\n readonly publicKey: string; // base58 address\n private readonly config: SignerConfig;\n private readonly vaultId: string;\n\n constructor(config: SignerConfig, vaultInfo: SignerVaultInfo) {\n this.publicKey = vaultInfo.address;\n this.config = config;\n this.vaultId = vaultInfo.vaultId;\n }\n\n async signMessage(message: Uint8Array | string): Promise<Uint8Array> {\n // Convert message to bytes if it's a string\n const messageBytes = typeof message === 'string' ? new TextEncoder().encode(message) : message;\n\n // Convert to base64 for API transmission\n const messageBase64 = btoa(String.fromCharCode(...messageBytes));\n\n const response = await emblemPost<{ signature: string }>(\n '/sign-solana-message',\n { vaultId: this.vaultId, message: messageBase64 },\n this.config\n );\n\n // The server returns a signature - could be base64, base58, or hex\n // Let's check what format we're getting and handle accordingly\n\n // Try to decode as base58 first (Solana standard)\n try {\n // Use @solana/web3.js bs58 decoder if available, otherwise fallback\n const win = typeof window !== 'undefined' ? (window as unknown as { bs58?: { decode(s: string): Uint8Array } }) : undefined;\n if (win?.bs58) {\n return win.bs58.decode(response.signature);\n }\n // For Node.js environments or if bs58 is not globally available\n // The signature might be base64 encoded\n const signatureBytes = Uint8Array.from(atob(response.signature), (c) => c.charCodeAt(0));\n return signatureBytes;\n } catch (e) {\n // If base64 decode fails, try treating as hex\n if (response.signature.startsWith('0x')) {\n const hex = response.signature.slice(2);\n const bytes = new Uint8Array(hex.length / 2);\n for (let i = 0; i < hex.length; i += 2) {\n bytes[i / 2] = parseInt(hex.substr(i, 2), 16);\n }\n return bytes;\n }\n throw new Error(`Unable to decode signature format: ${e}`);\n }\n }\n\n async signTransaction(transaction: unknown): Promise<unknown> {\n // Serialize transaction for API transmission\n const serializedTransaction = this.serializeTransaction(transaction);\n\n const response = await emblemPost<{\n serializedSignedTransaction?: string;\n signedTransaction?: string;\n }>(\n '/sign-solana-transaction',\n {\n vaultId: this.vaultId,\n transactionToSign: serializedTransaction, // Pass the base64 string directly\n broadcast: false, // Don't broadcast, just sign\n versionedTransaction: true, // Match API test format\n },\n this.config\n );\n\n // Parse the signed transaction response - handle both response formats\n const signedTxData = response.serializedSignedTransaction || response.signedTransaction;\n if (!signedTxData) {\n throw new Error('No signed transaction data received from server');\n }\n\n return this.deserializeTransaction(signedTxData);\n }\n\n private serializeTransaction(tx: unknown): string {\n // Handle different transaction formats from @solana/web3.js\n if (tx && typeof tx === 'object') {\n // For VersionedTransaction or Transaction objects\n if ((tx as { serialize?: () => Uint8Array }).serialize) {\n // Server expects just the base64 string, not an object\n const serialized = (tx as { serialize: () => Uint8Array }).serialize();\n const base64 = btoa(String.fromCharCode(...serialized));\n return base64;\n }\n // For transaction objects with instructions\n if (\n (tx as { instructions?: unknown }).instructions ||\n (tx as { recentBlockhash?: unknown }).recentBlockhash\n ) {\n throw new Error(\n 'Cannot serialize unsigned transaction objects. Please use VersionedTransaction.'\n );\n }\n }\n\n // Fallback: assume it's already a string\n return tx as string;\n }\n\n private deserializeTransaction(signedTxData: unknown): unknown {\n // If it's already an object (shouldn't happen based on type), handle it\n if (\n typeof signedTxData === 'object' &&\n signedTxData &&\n (signedTxData as { serializedSignedTransaction?: string }).serializedSignedTransaction\n ) {\n signedTxData = (signedTxData as { serializedSignedTransaction: string })\n .serializedSignedTransaction;\n }\n\n // If it's a string, decode from base64\n if (typeof signedTxData === 'string') {\n try {\n // The server returns base64, so decode it\n const decoded = atob(signedTxData);\n return new Uint8Array(decoded.split('').map((c) => c.charCodeAt(0)));\n } catch (e) {\n console.error('Failed to decode transaction:', e);\n throw new Error(`Unable to deserialize transaction response: ${e}`);\n }\n }\n\n // If it's already a Uint8Array or other type, return as-is\n return signedTxData;\n }\n\n // Additional utility methods for @solana/web3.js compatibility\n\n /** Get the vault ID for this signer */\n getVaultId(): string {\n return this.vaultId;\n }\n\n /** Sign multiple transactions in batch */\n async signAllTransactions(transactions: unknown[]): Promise<unknown[]> {\n // Sign each transaction individually for now\n // Could be optimized with a batch API endpoint in the future\n const results = [];\n for (const tx of transactions) {\n results.push(await this.signTransaction(tx));\n }\n return results;\n }\n\n /** Check if this signer can sign for a given public key */\n canSign(publicKey: string): boolean {\n return publicKey === this.publicKey;\n }\n\n /** Sign and optionally broadcast a transaction */\n async signAndBroadcast(transaction: unknown, broadcast: boolean = true): Promise<string> {\n // Serialize transaction for API transmission\n const serializedTransaction = this.serializeTransaction(transaction);\n\n const response = await emblemPost<{\n transactionSignature?: string;\n serializedSignedTransaction?: string;\n }>(\n '/sign-solana-transaction',\n {\n vaultId: this.vaultId,\n transactionToSign: serializedTransaction, // Pass the base64 string directly\n broadcast: broadcast,\n versionedTransaction: true, // Match API test format\n },\n this.config\n );\n\n if (broadcast) {\n // Return the transaction signature\n if (!response.transactionSignature) {\n throw new Error('No transaction signature received from broadcast');\n }\n return response.transactionSignature;\n } else {\n // Return the signed transaction data\n if (!response.serializedSignedTransaction) {\n throw new Error('No signed transaction data received from server');\n }\n return response.serializedSignedTransaction;\n }\n }\n}\n\nexport async function toSolanaWeb3Signer(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemSolanaSigner> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemSolanaSigner(config, info);\n}\n\nexport async function toSolanaKitSigner(\n config: SignerConfig,\n infoOverride?: SignerVaultInfo\n): Promise<EmblemSolanaSigner> {\n const info = infoOverride ?? (await fetchVaultInfo(config));\n return new EmblemSolanaSigner(config, info);\n}\n","import type { SignerConfig, SignerVaultInfo } from '../types/signers';\nimport { emblemPost } from './http';\nimport { fetchVaultInfo } from './vault';\n\n/**\n * Bitcoin address types\n */\nexport type BitcoinAddressType = 'p2pkh' | 'p2wpkh' | 'p2tr' | 'p2sh';\n\n/**\n * Bitcoin network type\n */\nexport type BitcoinNetwork = 'mainnet' | 'testnet';\n\n/**\n * Input signing instruction for PSBTs\n * Compatible with UniSat wallet-api's UserToSignInput format\n */\nexport interface BitcoinToSignInput {\n /** Input index in the PSBT */\n index: number;\n /** Bitcoin address associated with this input */\n address?: string;\n /** Public key (hex) for this input */\n publicKey?: string;\n /** Sighash types for signing */\n sighashTypes?: number[];\n /** Tap leaf hash to sign (hex) for Taproot script path spending */\n tapLeafHashToSign?: string;\n /** Use tweaked signer for Taproot */\n useTweakedSigner?: boolean;\n /** Disable tweak signer for Taproot */\n disableTweakSigner?: boolean;\n}\n\n/**\n * Bitcoin sign transaction options\n */\nexport interface BitcoinSignOptions {\n /** Transaction type determines signing algorithm (ECDSA for p2pkh/p2wpkh, Schnorr for p2tr) */\n transactionType: 'p2pkh' | 'p2wpkh' | 'p2tr';\n /** Per-input signing instructions for complex PSBTs */\n toSignInputs?: BitcoinToSignInput[];\n}\n\n/**\n * Response from signing a Bitcoin PSBT\n */\nexport interface BitcoinSignResult {\n success: boolean;\n /** Signed PSBT in base64 format */\n signedPsbt: string;\n /** Final transaction hex (ready for broadcast) */\n signedTxHex: string;\n /** Raw signature */\n signature: string;\n}\n\n/**\n * Extended vault info including Bitcoin public key and derived addresses\n */\nexport interface BitcoinVaultInfo extends SignerVaultInfo {\n /** Bitcoin public key (compressed, hex) */\n btcPubkey: string;\n /** Derived Bitcoin addresses */\n btcAddresses?: {\n /** Legacy (1...) */\n p2pkh: string;\n /** Native SegWit (bc1q...) */\n p2wpkh: string;\n /** Taproot (bc1p...) */\n p2tr: string;\n };\n}\n\n/**\n * Bitcoin signer interface compatible with common Bitcoin libraries\n */\nexport interface BitcoinSignerInterface {\n /** Bitcoin public key (compressed, hex) */\n publicKey: string;\n /** Derived Bitcoin addresses */\n addresses: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n /** Sign a PSBT */\n signPsbt(psbtBase64: string, options: BitcoinSignOptions): Promise<BitcoinSignResult>;\n /** Sign multiple PSBTs */\n signAllPsbts(\n psbts: Array<{ psbt: string; options: BitcoinSignOptions }>\n ): Promise<BitcoinSignResult[]>;\n /** Get the vault ID */\n getVaultId(): string;\n /** Get public key as hex */\n getPublicKey(): string;\n}\n\n/**\n * Constants for Bitcoin calculations\n */\nexport const SATS_PER_BTC = 100_000_000;\n\n/**\n * Emblem Bitcoin Signer implementation\n */\nexport class EmblemBitcoinSigner implements BitcoinSignerInterface {\n readonly publicKey: string; // Compressed public key (hex)\n readonly addresses: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n private readonly config: SignerConfig;\n private readonly vaultId: string;\n\n constructor(config: SignerConfig, vaultInfo: BitcoinVaultInfo) {\n if (!vaultInfo.btcPubkey) {\n throw new Error('Bitcoin public key is required in vault info');\n }\n this.publicKey = vaultInfo.btcPubkey;\n this.addresses = vaultInfo.btcAddresses ?? {\n p2pkh: '',\n p2wpkh: '',\n p2tr: '',\n };\n this.config = config;\n this.vaultId = vaultInfo.vaultId;\n }\n\n /**\n * Sign a Bitcoin PSBT\n * @param psbtBase64 - PSBT in base64 format\n * @param options - Signing options including transaction type and per-input instructions\n */\n async signPsbt(psbtBase64: string, options: BitcoinSignOptions): Promise<BitcoinSignResult> {\n const { transactionType, toSignInputs } = options;\n\n // Normalize toSignInputs for JSON transmission\n const normalizedInputs = toSignInputs?.map(input => ({\n ...input,\n // Ensure tapLeafHashToSign is a string (some libs pass Buffer/Uint8Array)\n tapLeafHashToSign: this.normalizeToHex(input.tapLeafHashToSign),\n }));\n\n const response = await emblemPost<BitcoinSignResult>(\n '/sign-btc-transaction',\n {\n vaultId: this.vaultId,\n psbt: psbtBase64,\n transactionType,\n toSignInputs: normalizedInputs,\n },\n this.config\n );\n\n return response;\n }\n\n /**\n * Sign multiple PSBTs\n * @param psbts - Array of PSBTs with their signing options\n */\n async signAllPsbts(\n psbts: Array<{ psbt: string; options: BitcoinSignOptions }>\n ): Promise<BitcoinSignResult[]> {\n const results: BitcoinSignResult[] = [];\n for (const { psbt, options } of psbts) {\n results.push(await this.signPsbt(psbt, options));\n }\n return results;\n }\n\n /**\n * Get the vault ID\n */\n getVaultId(): string {\n return this.vaultId;\n }\n\n /**\n * Get public key as hex\n */\n getPublicKey(): string {\n return this.publicKey;\n }\n\n /**\n * Check if a given address belongs to this signer\n */\n ownsAddress(address: string): boolean {\n return (\n address === this.addresses.p2pkh ||\n address === this.addresses.p2wpkh ||\n address === this.addresses.p2tr\n );\n }\n\n /**\n * Get the appropriate address for a given type\n */\n getAddress(type: BitcoinAddressType = 'p2wpkh'): string {\n switch (type) {\n case 'p2pkh':\n return this.addresses.p2pkh;\n case 'p2wpkh':\n return this.addresses.p2wpkh;\n case 'p2tr':\n return this.addresses.p2tr;\n case 'p2sh':\n // P2SH is typically wrapped SegWit, return p2wpkh as fallback\n return this.addresses.p2wpkh;\n default:\n return this.addresses.p2wpkh;\n }\n }\n\n /**\n * Normalize a value to hex string (handles string, Buffer, Uint8Array)\n */\n private normalizeToHex(value: string | ArrayLike<number> | undefined): string | undefined {\n if (value === undefined || value === null) return undefined;\n if (typeof value === 'string') return value;\n // Handle Buffer/Uint8Array\n const bytes = value as ArrayLike<number>;\n let hex = '';\n for (let i = 0; i < bytes.length; i++) {\n hex += (bytes[i] as number).toString(16).padStart(2, '0');\n }\n return hex;\n }\n}\n\n/**\n * Create an Emblem Bitcoin signer from config\n * @param config - Signer configuration with authentication\n * @param infoOverride - Optional vault info to skip API call\n */\nexport async function toBitcoinSigner(\n config: SignerConfig,\n infoOverride?: BitcoinVaultInfo\n): Promise<EmblemBitcoinSigner> {\n const info = infoOverride ?? (await fetchBitcoinVaultInfo(config));\n return new EmblemBitcoinSigner(config, info);\n}\n\n/**\n * Fetch vault info with Bitcoin-specific fields\n */\nexport async function fetchBitcoinVaultInfo(config: SignerConfig): Promise<BitcoinVaultInfo> {\n const data = await emblemPost<{\n vaultId: string;\n address?: string;\n evmAddress?: string;\n btcPubkey?: string;\n btcAddresses?: {\n p2pkh: string;\n p2wpkh: string;\n p2tr: string;\n };\n created_by?: string;\n }>('/vault/info', {}, config);\n\n if (!data || !data.vaultId) {\n throw new Error('Invalid vault info response: missing vaultId');\n }\n\n if (!data.btcPubkey) {\n throw new Error('Invalid vault info response: missing btcPubkey (Bitcoin public key)');\n }\n\n return {\n vaultId: data.vaultId,\n address: data.address || '',\n evmAddress: (data.evmAddress || '0x') as `0x${string}`,\n btcPubkey: data.btcPubkey,\n btcAddresses: data.btcAddresses,\n created_by: data.created_by,\n };\n}\n\n/**\n * Utility: Detect Bitcoin address type from address string\n */\nexport function detectAddressType(address: string): BitcoinAddressType | 'unknown' {\n if (address.startsWith('bc1p')) return 'p2tr'; // Taproot (bech32m)\n if (address.startsWith('bc1q')) return 'p2wpkh'; // Native SegWit (bech32)\n if (address.startsWith('1')) return 'p2pkh'; // Legacy\n if (address.startsWith('3')) return 'p2sh'; // Script Hash\n // Testnet addresses\n if (address.startsWith('tb1p')) return 'p2tr';\n if (address.startsWith('tb1q')) return 'p2wpkh';\n if (address.startsWith('m') || address.startsWith('n')) return 'p2pkh';\n if (address.startsWith('2')) return 'p2sh';\n return 'unknown';\n}\n\n/**\n * Utility: Convert satoshis to BTC\n */\nexport function satsToBTC(sats: number): number {\n return sats / SATS_PER_BTC;\n}\n\n/**\n * Utility: Convert BTC to satoshis\n */\nexport function btcToSats(btc: number): number {\n return Math.round(btc * SATS_PER_BTC);\n}\n\n/**\n * Utility: Format satoshis for display\n */\nexport function formatSats(sats: number): string {\n return `${sats.toLocaleString()} sats (${satsToBTC(sats).toFixed(8)} BTC)`;\n}\n\n/**\n * Utility: Estimate transaction size in vbytes\n */\nexport function estimateTransactionSize(\n inputCount: number,\n outputCount: number,\n inputType: BitcoinAddressType = 'p2wpkh'\n): number {\n let inputSize: number;\n switch (inputType) {\n case 'p2pkh':\n inputSize = 148; // Legacy (no witness discount)\n break;\n case 'p2tr':\n inputSize = 58; // Taproot (approx vbytes)\n break;\n case 'p2wpkh':\n default:\n inputSize = 68; // Native SegWit (approx vbytes)\n break;\n }\n\n const outputSize = 31; // Bech32 output (approx vbytes)\n const overhead = 10; // Version, locktime, etc.\n\n return overhead + inputCount * inputSize + outputCount * outputSize;\n}\n\n/**\n * Utility: Calculate estimated fee\n */\nexport function calculateFee(vsize: number, feeRate: number): number {\n return Math.ceil(vsize * feeRate);\n}\n\n/**\n * Utility: Check if amount is above dust threshold\n */\nexport function isDust(sats: number, addressType: BitcoinAddressType = 'p2wpkh'): boolean {\n // Dust threshold: ~546 sats for legacy, ~294 for SegWit\n const dustThreshold = addressType === 'p2wpkh' || addressType === 'p2tr' ? 294 : 546;\n return sats < dustThreshold;\n}\n"],"names":["SessionManager","constructor","config","this","session","timer","events","consecutiveFailures","maxBackoffMs","baseBackoffMs","onRefresh","refreshSkewMs","setSession","schedule","emit","getSession","clear","cancel","on","event","handler","push","off","handlers","index","indexOf","splice","destroy","Object","keys","forEach","key","payload","error","clearTimeout","getBackoffDelay","Math","min","pow","max","scheduleRetry","now","Date","ttl","expiresAt","backoff","setTimeout","async","refreshed","authToken","refreshIn","inMs","EmblemAuthSDK","pendingNonce","overlayEl","_iframeEl","overlayCleanup","_cachedVaultInfo","_visitorId","appId","Error","authUrl","apiUrl","persistSession","storageKey","visitorIdKey","messageHandler","onMessage","bind","window","addEventListener","sessionMgr","current","refreshSession","s","info","restored","loadPersistedSession","hydrateSession","loadPersistedVisitorId","tryConsumeSessionFromHash","raw","String","location","hash","replace","encoded","URLSearchParams","get","b64","decodeURIComponent","json","escape","atob","JSON","parse","authDebug","expected","received","onSuccess","history","replaceState","pathname","search","e","message","authenticateWallet","params","network","signature","publicKey","address","url","response","fetch","method","headers","body","stringify","ok","errorData","safeJson","status","data","openOAuth","provider","origin","initData","getAuthInit","nonce","randomId","state","noncePrefix","slice","hasState","statePrefix","authOrigin","normalizeBaseUrl","URL","searchParams","set","toString","win","open","popupFeatures","focus","assign","emitError","sendEmailOtp","apiBase","email","password","catch","verifyEmailOtp","otp","authenticateEmail","authenticatePassword","authBase","openAuthModal","initError","modalUrl","resolveModalUrl","base","mode","modalMode","opened","openIframeModal","features","getVisitorId","tryGetOriginFromConfig","refreshUrl","hasTokenInSession","Boolean","refreshToken","credentials","nextSession","getVaultInfo","resp","Authorization","rawVaultInfo","vaultInfo","tokenId","vaultId","solanaAddress","getVaultApiKey","token","user","apiKeyHash","infoRes","infoJson","pkp","api_key_hash","rawIdentifier","identifier","scopedIdentifier","vaultsRes","encodeURIComponent","vaults","match","Array","isArray","find","v","token_id","genRes","genJson","apiKey","decRes","dataToEncryptHash","decJson","decrypted","decryptedString","logout","persistVisitorId","getSignerContext","baseUrl","getJwt","evmAddress","created_by","toViemAccount","Promise","toEthersWallet","toWeb3Adapter","toSolanaWeb3Signer","toSolanaKitSigner","toBitcoinSigner","fetchBitcoinVaultInfo","resolve","then","bitcoin","removeEventListener","closeOverlay","href","authDebugEnabled","localStorage","getItem","toLowerCase","p","process","env","NEXT_PUBLIC_AUTH_DEBUG","AUTH_DEBUG","trim","args","input","label","trimmed","allowedOrigins","Set","tryGetOriginFromApiUrl","filter","has","eventOrigin","from","type","onCancel","undefined","visitorId","onError","top","outerHeight","outerWidth","array","Uint8Array","crypto","getRandomValues","i","length","floor","random","b","padStart","join","normalized","tryInit","firstError","fallbackError","merged","fallback","overlay","document","createElement","setAttribute","style","position","inset","background","backdropFilter","webkitBackdropFilter","zIndex","display","alignItems","justifyContent","padding","container","width","height","border","borderRadius","boxShadow","overflow","flexDirection","header","borderBottom","title","textContent","fontFamily","fontSize","letterSpacing","textTransform","color","closeBtn","lineHeight","cursor","userSelect","onclick","cancelAuth","appendChild","iframe","src","referrerPolicy","allow","target","onKey","capture","parentNode","removeChild","stored","removeItem","setItem","emblemPost","path","authHeaders","getAuthHeaders","h","tok","jwt","sdk","resolveAuthHeaders","res","_key","value","text","errorMessage","substring","sanitizeErrorMessage","toSafeNumber","fieldName","num","Number","isSafeInteger","MAX_SAFE_INTEGER","toHexIfBigInt","normalizeTxForEmblem","tx","out","gas","gasLimit","gasPrice","maxFeePerGas","maxPriorityFeePerGas","chainId","accessList","account","chain","bytesToHex","bytes","fetchVaultInfo","startsWith","infoOverride","toAccount","import","signMessage","isRaw","test","signTypedData","typedData","domain","types","primaryType","signTransaction","_opts","normalizedTx","transaction","signedTransaction","ethers","moduleName","AbstractSigner","resolveAddress","EmblemEthersWalletImpl","signerConfig","signerProvider","seed","super","_address","_vaultId","_chainId","_config","initialize","_initPromise","err","getAddress","getVaultId","setChainId","getChainId","connect","newProvider","cleanTypes","EIP712Domain","_signTypedData","addr","toSign","populateTransaction","to","options","sendTransaction","signed","broadcastTransaction","fromAddress","BigInt","getNetwork","getTransactionCount","toAddress","estimateGas","getFeeData","populated","signAndBroadcast","waitForReceipt","waitForTransaction","__classPrivateFieldGet","receiver","kind","f","TypeError","call","__classPrivateFieldSet","SuppressedError","EmblemWeb3Adapter","_EmblemWeb3Adapter_vaultId","_EmblemWeb3Adapter_config","rawTransaction","EmblemSolanaSigner","messageBytes","TextEncoder","encode","messageBase64","btoa","fromCharCode","bs58","decode","c","charCodeAt","hex","parseInt","substr","serializedTransaction","serializeTransaction","transactionToSign","broadcast","versionedTransaction","signedTxData","serializedSignedTransaction","deserializeTransaction","serialize","serialized","instructions","recentBlockhash","decoded","split","map","signAllTransactions","transactions","results","canSign","transactionSignature","SATS_PER_BTC","EmblemBitcoinSigner","btcPubkey","addresses","btcAddresses","p2pkh","p2wpkh","p2tr","signPsbt","psbtBase64","transactionType","toSignInputs","normalizedInputs","tapLeafHashToSign","normalizeToHex","psbt","signAllPsbts","psbts","getPublicKey","ownsAddress","satsToBTC","sats","btc","round","toLocaleString","toFixed","inputCount","outputCount","inputType","inputSize","vsize","feeRate","ceil","addressType"],"mappings":"uPAyBaA,EAUX,WAAAC,CAAYC,EAA+B,IATnCC,KAAOC,QAAuB,KAC9BD,KAAKE,MAA0B,KAEtBF,KAAMG,OAAiE,GAEhFH,KAAmBI,oBAAW,EACrBJ,KAAAK,aAAuB,IACvBL,KAAAM,cAAwB,IAGvCN,KAAKO,UAAYR,EAAOQ,UACxBP,KAAKQ,cAAgBT,EAAOS,eAAiB,GAC9C,CAKD,UAAAC,CAAWR,GACTD,KAAKC,QAAUA,EACfD,KAAKU,WACLV,KAAKW,KAAK,UAAWV,EACtB,CAKD,UAAAW,GACE,OAAOZ,KAAKC,OACb,CAKD,KAAAY,GACEb,KAAKC,QAAU,KACfD,KAAKc,SACLd,KAAKW,KAAK,UAAW,KACtB,CAKD,EAAAI,CAA8BC,EAAUC,GACjCjB,KAAKG,OAAOa,KACfhB,KAAKG,OAAOa,GAAS,IAEvBhB,KAAKG,OAAOa,GAAQE,KAAKD,EAC1B,CAKD,GAAAE,CAA+BH,EAAUC,GACvC,MAAMG,EAAWpB,KAAKG,OAAOa,GAC7B,GAAII,EAAU,CACZ,MAAMC,EAAQD,EAASE,QAAQL,IAChB,IAAXI,GACFD,EAASG,OAAOF,EAAO,EAE1B,CACF,CAKD,OAAAG,GACExB,KAAKc,SACLd,KAAKC,QAAU,KACfwB,OAAOC,KAAK1B,KAAKG,QAAQwB,QAAQC,WACxB5B,KAAKG,OAAOyB,IAEtB,CAEO,IAAAjB,CACNK,EACAa,GAEA,MAAMT,EAAWpB,KAAKG,OAAOa,GAC7B,GAAKI,EAEL,IAAK,MAAMH,KAAWG,EACpB,IACEH,EAAQY,EACT,CAAC,MAAOC,GAER,CAEJ,CAEO,MAAAhB,GACFd,KAAKE,QACP6B,aAAa/B,KAAKE,OAClBF,KAAKE,MAAQ,KAEhB,CAKO,eAAA8B,GAON,OAJcC,KAAKC,IACjBlC,KAAKM,cAAgB2B,KAAKE,IAAI,EAAGF,KAAKG,IAAI,EAAGpC,KAAKI,oBAAsB,IACxEJ,KAAKK,aAGR,CAKO,aAAAgC,CAAcpC,GACpBD,KAAKc,SAEL,MAAMwB,EAAMC,KAAKD,MACXE,EAAMvC,EAAQwC,UAAYH,EAGhC,GAAIE,GAAO,EAET,YADAxC,KAAKW,KAAK,iBAAkBV,GAK9B,MAAMyC,EAAUT,KAAKC,IAAIlC,KAAKgC,kBAAmBQ,EAAM,KAIrDxC,KAAKE,MAFHwC,GAAW,EAEAC,WAAW,KACtB3C,KAAKW,KAAK,iBAAkBV,IAC3BuC,GAMQG,WAAWC,UACtB,GAAK5C,KAAKO,UAOV,IACE,MAAMsC,QAAkB7C,KAAKO,UAAUN,GAEnC4C,GAAWJ,WAAaI,EAAUC,WAAaD,EAAUJ,YAAcxC,EAAQwC,WAEjFzC,KAAKI,oBAAsB,EAC3BJ,KAAKS,WAAWoC,GAChB7C,KAAKW,KAAK,mBAAoBkC,KAG9B7C,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,GAGxB,CAAC,MAAO6B,GAEP9B,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,EAEtB,MA/BKsC,KAAKD,OAASrC,EAAQwC,WACxBzC,KAAKW,KAAK,iBAAkBV,IA+B/ByC,EACJ,CAEO,QAAAhC,GACNV,KAAKc,SAEL,MAAMb,EAAUD,KAAKC,QACrB,IAAKA,GAASwC,UAAW,OAEzB,MAAMH,EAAMC,KAAKD,MACXE,EAAMvC,EAAQwC,UAAYH,EAEhC,GAAIE,GAAO,EAET,YADAxC,KAAKW,KAAK,iBAAkBV,GAK9BD,KAAKI,oBAAsB,EAE3B,MAAM2C,EAAYd,KAAKG,IAAI,EAAGI,EAAMxC,KAAKQ,eACzCR,KAAKW,KAAK,qBAAsB,CAAEqC,KAAMD,EAAWP,QAEnDxC,KAAKE,MAAQyC,WAAWC,UACtB,GAAK5C,KAAKO,UAQV,IACE,MAAMsC,QAAkB7C,KAAKO,UAAUN,GAEnC4C,GAAWJ,WAAaI,EAAUC,WAAaD,EAAUJ,YAAcxC,EAAQwC,WAEjFzC,KAAKI,oBAAsB,EAC3BJ,KAAKS,WAAWoC,GAChB7C,KAAKW,KAAK,mBAAoBkC,KAG9B7C,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,GAGxB,CAAC,MAAO6B,GAEP9B,KAAKI,sBACDmC,KAAKD,OAASrC,EAAQwC,UACxBzC,KAAKW,KAAK,iBAAkBV,GAE5BD,KAAKqC,cAAcpC,EAEtB,MA/BKsC,KAAKD,OAASrC,EAAQwC,WACxBzC,KAAKW,KAAK,iBAAkBV,IA+B/B8C,EACJ,QCrOUE,EAmBX,WAAAnD,CAAYC,GACV,GAdMC,KAAOC,QAAuB,KAC9BD,KAAYkD,aAAkB,KAE9BlD,KAASmD,UAAuB,KAChCnD,KAASoD,UAA6B,KACtCpD,KAAcqD,eAAwB,KAE7BrD,KAAMG,OAA2D,GAC1EH,KAAgBsD,iBAAqB,KAGrCtD,KAAUuD,WAAkB,MAG7BxD,GAAQyD,MACX,MAAM,IAAIC,MAAM,qBAkClB,GA/BAzD,KAAKD,OAAS,IACTA,EACH2D,QAAS3D,EAAO2D,SAAW,8BAC3BC,OAAQ5D,EAAO4D,QAAU,6BACzBC,eAAgB7D,EAAO6D,iBAAkB,GAE3C5D,KAAK6D,WAAa,kBAAkB9D,EAAOyD,QAC3CxD,KAAK8D,aAAe,oBAAoB/D,EAAOyD,QAC/CxD,KAAK+D,eAAiB/D,KAAKgE,UAAUC,KAAKjE,MAEpB,oBAAXkE,QACTA,OAAOC,iBAAiB,UAAWnE,KAAK+D,gBAG1C/D,KAAKoE,WAAa,IAAIvE,EAAe,CACnCU,UAAWqC,MAAMyB,IACf,IAEE,aADwBrE,KAAKsE,kBACTD,CACrB,CAAC,MACA,OAAOA,CACR,KAKLrE,KAAKoE,WAAWrD,GAAG,iBAAkBwD,GAAKvE,KAAKW,KAAK,iBAAkB4D,IACtEvE,KAAKoE,WAAWrD,GAAG,mBAAoBwD,GAAKvE,KAAKW,KAAK,mBAAoB4D,IAC1EvE,KAAKoE,WAAWrD,GAAG,qBAAsByD,GAAQxE,KAAKW,KAAK,qBAAsB6D,IAG7ExE,KAAKD,OAAO6D,eAAgB,CAC9B,MAAMa,EAAWzE,KAAK0E,uBAClBD,GACFzE,KAAK2E,eAAeF,GAGtBzE,KAAKuD,WAAavD,KAAK4E,wBACxB,CAID5E,KAAK6E,2BACN,CAEO,yBAAAA,GACN,GAAsB,oBAAXX,OACX,IACE,MAAMY,EAAMC,OAAOb,OAAOc,SAASC,MAAQ,IAAIC,QAAQ,KAAM,IAC7D,IAAKJ,EAAK,OACV,MACMK,EADS,IAAIC,gBAAgBN,GACZO,IAAI,qBAC3B,IAAKF,EAAS,OAEd,MAAMG,EAAMC,mBAAmBJ,GACzBK,EAAOD,mBAAmBE,OAAOC,KAAKJ,KACtCrF,EAAU0F,KAAKC,MAAMJ,GAG3B,GAAIvF,GAASuD,OAASvD,EAAQuD,QAAUxD,KAAKD,OAAOyD,MAKlD,YAJAxD,KAAK6F,UAAU,uCAAwC,CACrDC,SAAU9F,KAAKD,OAAOyD,MACtBuC,SAAU9F,EAAQuD,QAKtBxD,KAAK6F,UAAU,uBAAwB,CAAErC,MAAOvD,GAASuD,QAEzDxD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKD,OAAOiG,YAAY/F,GACxBD,KAAKW,KAAK,UAAWV,GAGrB,IACEiE,OAAO+B,QAAQC,aAAa,KAAM,GAAIhC,OAAOc,SAASmB,SAAWjC,OAAOc,SAASoB,OAClF,CAAC,MAED,CACF,CAAC,MAAOC,GACPrG,KAAK6F,UAAU,qBAAsB,CAAE/D,MAAQuE,GAAaC,SAAWvB,OAAOsB,IAC/E,CACF,CAMD,wBAAME,CAAmBC,GACvB,MAAMC,QAAEA,EAAOH,QAAEA,EAAOI,UAAEA,EAASC,UAAEA,EAASC,QAAEA,GAAYJ,EAE5D,IAAKxG,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,6CAElB,IAAKgD,IAAYH,IAAYI,EAC3B,MAAM,IAAIjD,MAAM,4CAGlB,MAAMoD,EAAM,GAAG7G,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,sCAC3C4B,QAAiBC,MAAMF,EAAK,CAChCG,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOxD,KAAKD,OAAOyD,MACnBiD,UACAH,UACAI,YACAC,YACAC,cAIJ,IAAKE,EAASM,GAAI,CAChB,MAAMC,QAAkBrH,KAAKsH,SAASR,GAChChF,EAAQ,IAAI2B,MAAM4D,GAAWvF,OAAS,iBAAiBgF,EAASS,UAGtE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAUwF,EACVvF,CACP,CAED,MAAM0F,QAAaV,EAAStB,OACtBvF,EAAUuH,GAAMvH,QAUtB,OARIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKD,OAAOiG,YAAY/F,GACxBD,KAAKW,KAAK,UAAWV,IAGhBA,CACR,CAMD,eAAMwH,CAAUC,GACd,GAAsB,oBAAXxD,OACT,MAAM,IAAIT,MAAM,uDAGlB,MAAMkE,EAASzD,OAAOc,SAAS2C,OAC/B3H,KAAK6F,UAAU,kBAAmB,CAAE6B,WAAUC,SAAQhE,OAAQ3D,KAAKD,OAAO4D,SAI1E,MAAMiE,QAAiB5H,KAAK6H,YAAY,CAAEF,WAEpCG,EAASF,GAAUE,OAAoB9H,KAAK+H,WAC5CC,EAAQJ,GAAUI,MACxBhI,KAAKkD,aAAe4E,EACpB9H,KAAK6F,UAAU,oBAAqB,CAClCoC,YAAalD,OAAO+C,GAAOI,MAAM,EAAG,GACpCC,WAAYH,EACZI,YAAarD,OAAOiD,GAAS,IAAIE,MAAM,EAAG,MAG5C,MAAMG,EAAarI,KAAKsI,iBAAiBtI,KAAKD,OAAO2D,QAAS,WACxDmD,EAAM,IAAI0B,IAAI,GAAGF,yBACvBxB,EAAI2B,aAAaC,IAAI,WAAYf,GACjCb,EAAI2B,aAAaC,IAAI,QAAST,GAC9BhI,KAAK6F,UAAU,qBAAsB,CAAEgB,IAAKA,EAAI6B,aAIhD,MAAMC,EAAMzE,OAAO0E,KAAK/B,EAAI6B,WAAY,cAAe1I,KAAK6I,iBAC5D,GAAIF,EACF,IACEA,EAAIG,OACL,CAAC,MAAQ,MAKZ,IACE9I,KAAK6F,UAAU,yDACf3B,OAAOc,SAAS+D,OAAOlC,EAAI6B,WAC5B,CAAC,MACA,MAAM5G,EAAQ,IAAI2B,MAAM,qDACxBzD,KAAKgJ,UAAUlH,EAChB,CACF,CAKD,kBAAMmH,CACJzC,GAEA,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,4BAAmC,CACjElC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdC,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,kBAAkBgF,EAASS,UAGlE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,OAAO0F,CACR,CAKD,oBAAM8B,CAAe9C,GACnB,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,8BAAqC,CACnElC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdI,IAAK/C,EAAO+C,IACZH,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,oBAAoBgF,EAASS,UAGpE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAKD,uBAAMuJ,CAAkBhD,GACtB,MAAM0C,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4B,QAAiBC,MAAM,GAAGmC,yBAAgC,CAC9DlC,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOgD,EAAOhD,OAASxD,KAAKD,OAAOyD,MACnC2F,MAAO3C,EAAO2C,MACdC,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,eAAegF,EAASS,UAG/D,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAiBD,0BAAMwJ,CAAqBjD,GACzB,MAAMkD,EAAW1J,KAAKD,OAAO2D,QAAQwB,QAAQ,MAAO,IAC9C4B,QAAiBC,MAAM,GAAG2C,6BAAqC,CACnE1C,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAU,CACnB3D,MAAOxD,KAAKD,OAAOyD,MACnB4F,SAAU5C,EAAO4C,aAGf5B,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAC/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM+D,GAAM1F,OAAS,mBAAmBgF,EAASS,UAGnE,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,EACV1F,CACP,CACD,MAAM7B,EAAUuH,GAAMvH,QAOtB,OANIA,IACFD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,IAEhBA,CACR,CAKD,mBAAM0J,GACJ,MAAMhC,EAASzD,OAAOc,SAAS2C,OAC/B,IAAIC,EAAoC,KACpCgC,EAA8B,KAElC,IACEhC,QAAiB5H,KAAK6H,YAAY,CAAEF,UACrC,CAAC,MAAO7F,GACP8H,EAAY9H,CAEb,CAED,MAAMgG,EAAQF,GAAUE,OAAS9H,KAAK+H,WACtC/H,KAAKkD,aAAe4E,EAEpB,IAAI+B,EAAW7J,KAAK8J,gBAAgB,CAAEhC,QAAOH,SAAQK,MAAOJ,GAAUI,QAGtE,GAAkC,uBAA9B4B,GAAW/H,SAASC,MACtB,IACE,MAAMiI,EAAO,IAAIxB,IAAI,WAAYvI,KAAKD,OAAO2D,SAC7CqG,EAAKvB,aAAaC,IAAI,QAAS,sBAC/BsB,EAAKvB,aAAaC,IAAI,QAASzI,KAAKD,OAAOyD,OAC3CuG,EAAKvB,aAAaC,IAAI,SAAUd,GAChCkC,EAAWE,EAAKrB,UACjB,CAAC,MAED,CAGH,MAAMsB,EAAOhK,KAAKD,OAAOkK,WAAa,OACtC,IAAIC,GAAS,EAEb,GAAa,WAATF,GAA8B,SAATA,EACvB,IACEE,EAASlK,KAAKmK,gBAAgBN,EAC/B,CAAC,MAAO/H,GAKR,CAGH,IAAKoI,EAAQ,CACX,MAAME,EAAWpK,KAAK6I,gBAEtB,IADY3E,OAAO0E,KAAKiB,EAAU,cAAeO,GACvC,CACR,MAAMtI,EAAQ,IAAI2B,MAAM,qDACxBzD,KAAKgJ,UAAUlH,EAChB,CACF,CACF,CAKD,UAAAlB,GACE,OAAOZ,KAAKC,OACb,CAMD,YAAAoK,GACE,OAAOrK,KAAKuD,UACb,CAQD,oBAAMe,GACJ,IACE,IAAKtE,KAAKC,QAAS,OAAO,KAG1B,MAAMoI,EAAarI,KAAKsK,yBACxB,IAAKjC,EAAY,OAAOrI,KAAKC,QAE7B,MAAMsK,EAAa,GAAGlC,qBAIhBmC,EAAoBC,QAAQzK,KAAKC,QAAQyK,cAEzC5D,QAAiBC,MAAMwD,EAAY,CACvCvD,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,KAAMvB,KAAKwB,UAAUqD,EAAoB,CAAEE,aAAc1K,KAAKC,QAAQyK,cAAiB,IAEvFC,YAAa,YAGf,IAAK7D,EAASM,GAAI,OAAOpH,KAAKC,QAE9B,MAAMuH,QAAaV,EAAStB,OACtBoF,EAAcpD,GAAMvH,QAW1B,OATI2K,IAGF5K,KAAKC,QAAU2K,EACf5K,KAAK4D,eAAegH,GACpB5K,KAAKoE,WAAW3D,WAAWmK,GAC3B5K,KAAKW,KAAK,UAAWiK,IAGhB5K,KAAKC,OACb,CAAC,MACA,OAAOD,KAAKC,OACb,CACF,CAKD,kBAAM4K,GACJ,GAAI7K,KAAKsD,iBAAkB,OAAOtD,KAAKsD,iBAEvC,MAAMrD,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,cAGlB,IAAKzD,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,sBAGlB,MAAMyF,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5C4F,QAAa/D,MAAM,GAAGmC,eAAsB,CAChDlC,OAAQ,OACRC,QAAS,CACP8D,cAAe,UAAU9K,EAAQ6C,YACjC,eAAgB,oBAElBoE,KAAM,OAGR,IAAK4D,EAAK1D,GACR,MAAM,IAAI3D,MAAM,8BAGlB,MAAMuH,QAAqBF,EAAKtF,OAG1ByF,EAAuB,IACxBD,EAEHE,QAASF,EAAaE,SAAWF,EAAaG,QAG9CC,cAAeJ,EAAaI,eAAiBJ,EAAapE,SAI5D,OADA5G,KAAKsD,iBAAmB2H,EACjBA,CACR,CAKD,oBAAMI,GACJ,IAAKrL,KAAKD,OAAO4D,OACf,MAAM,IAAIF,MAAM,sBAGlB,MAAMxD,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,qBAGlB,MAAMyF,EAAUlJ,KAAKD,OAAO4D,OAAOuB,QAAQ,MAAO,IAC5CoG,EAAQrL,EAAQ6C,UAChBqI,EAAUlL,EAAQsL,MAAMJ,QAG9B,IAAIK,EAA4B,KAEhC,IACE,MAAMC,QAAgB1E,MAAM,GAAGmC,wBAA+B,CAC5DlC,OAAQ,OACRC,QAAS,CAAE8D,cAAe,UAAUO,OAGtC,GAAIG,EAAQrE,GAAI,CACd,MAAMsE,QAAiBD,EAAQjG,OAC/BgG,EAAaE,GAAU5G,KAAK6G,KAAKC,cAAgBF,GAAU5G,KAAK6G,KAAKH,YAAc,IACpF,CACF,CAAC,MAED,CAGD,IAAKA,EACH,IACE,MAAMhI,EAAQvD,EAAQuD,MAChBqI,EAAgB5L,EAAQsL,MAAMO,YAAc,GAC5CC,EAAmBvI,EAAQ,GAAGA,KAASqI,IAAkBA,EAE/D,GAAIE,EAAkB,CACpB,MAAMC,QAAkBjF,MACtB,GAAGmC,gBAAsB+C,mBAAmBF,MAE9C,GAAIC,EAAU5E,GAAI,CAChB,MAAM8E,QAAeF,EAAUxG,OACzB2G,EAAQC,MAAMC,QAAQH,GACxBA,EAAOI,KAAKC,GAAKxH,OAAOwH,EAAErB,SAAWqB,EAAEC,YAAczH,OAAOoG,KAAae,EAAO,GAChF,KACJV,EAAaW,GAAOP,cAAgBO,GAAOX,YAAc,IAC1D,CACF,CACF,CAAC,MAED,CAIH,IAAKA,EAAY,CACf,MAAMiB,QAAe1F,MAAM,GAAGmC,gBAAsB+C,mBAAmBd,aAAoB,CACzFnE,OAAQ,OACRC,QAAS,CAAE8D,cAAe,UAAUO,OAGtC,IAAKmB,EAAOrF,GACV,MAAM,IAAI3D,MAAM,WAAWgJ,EAAOlF,UAGpC,MAAMmF,QAAgBD,EAAOjH,OACvBmH,EAASD,GAASC,QAAUD,GAAS9K,KAAO,KAElD,IAAK+K,EACH,MAAM,IAAIlJ,MAAM,kBAGlB,OAAOkJ,CACR,CAGD,MAAMC,QAAe7F,MAAM,GAAGmC,YAAmB,CAC/ClC,OAAQ,OACRC,QAAS,CACP8D,cAAe,UAAUO,IACzB,eAAgB,oBAElBpE,KAAMvB,KAAKwB,UAAU,CAAE+D,QAASC,EAAS0B,kBAAmBrB,MAG9D,IAAKoB,EAAOxF,GACV,MAAM,IAAI3D,MAAM,WAAWmJ,EAAOrF,UAGpC,MAAMuF,QAAgBF,EAAOpH,OACvBuH,EAAYD,GAASE,iBAAmB,KAE9C,IAAKD,EACH,MAAM,IAAItJ,MAAM,qBAGlB,OAAOsJ,CACR,CAKD,cAAApI,CAAe1E,GACRA,GAAS6C,YAEd9C,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKsD,iBAAmB,KACxBtD,KAAKoE,WAAW3D,WAAWR,GAC3BD,KAAKW,KAAK,UAAWV,GACtB,CAKD,MAAAgN,GACEjN,KAAKC,QAAU,KACfD,KAAK4D,eAAe,MACpB5D,KAAKuD,WAAa,KAClBvD,KAAKkN,iBAAiB,MACtBlN,KAAKsD,iBAAmB,KACxBtD,KAAKoE,WAAWvD,QAChBb,KAAKW,KAAK,UAAW,KACtB,CAKD,EAAAI,CAA2BC,EAAUC,GAC9BjB,KAAKG,OAAOa,KACfhB,KAAKG,OAAOa,GAAS,IAEvBhB,KAAKG,OAAOa,GAAQE,KAAKD,EAC1B,CAKD,GAAAE,CAA4BH,EAAUC,GACpC,MAAMG,EAAWpB,KAAKG,OAAOa,GAC7B,GAAII,EAAU,CACZ,MAAMC,EAAQD,EAASE,QAAQL,IAChB,IAAXI,GACFD,EAASG,OAAOF,EAAO,EAE1B,CACF,CASO,sBAAM8L,GAIZ,MAAMlN,EAAUD,KAAKY,aACrB,IAAKX,GAAS6C,UACZ,MAAM,IAAIW,MAAM,0EAGlB,MAAMwH,QAAkBjL,KAAK6K,eAE7B,MAAO,CACL9K,OAAQ,CACNqN,QAASpN,KAAKD,OAAO4D,OACrB0J,OAAQ,IAAMrN,KAAKY,cAAckC,WAEnCmI,UAAW,CACTE,QAASF,EAAUE,QACnBmC,WAAarC,EAAUqC,YAAc,KACrC1G,QAASqE,EAAUG,eAAiBH,EAAUrE,SAAW,GACzDsE,QAASD,EAAUC,QACnBqC,WAAYtC,EAAUsC,YAG3B,CAYD,mBAAMC,GAQJ,MAAMA,cAAEA,SAAwBC,8CAC1B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOK,EAAczN,EAAQkL,EAC9B,CAeD,oBAAMyC,CAAehG,GACnB,MAAMgG,eAAEA,SAAyBD,8CAC3B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOO,EAAe3N,EAAQ2H,EAAUuD,EACzC,CAYD,mBAAM0C,GACJ,MAAMA,cAAEA,SAAwBF,8CAC1B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOQ,EAAc5N,EAAQkL,EAC9B,CAaD,wBAAM2C,GACJ,MAAMA,mBAAEA,SAA6BH,8CAC/B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOS,EAAmB7N,EAAQkL,EACnC,CAYD,uBAAM4C,GACJ,MAAMA,kBAAEA,SAA4BJ,8CAC9B1N,OAAEA,EAAMkL,UAAEA,SAAoBjL,KAAKmN,mBACzC,OAAOU,EAAkB9N,EAAQkL,EAClC,CAkBD,qBAAM6C,GACJ,MAAMA,gBAAEA,EAAeC,sBAAEA,SAAgCN,QAAAO,UAAAC,KAAA,WAAA,OAAAC,CAAA,IACnDnO,OAAEA,SAAiBC,KAAKmN,mBAG9B,OAAOW,EAAgB/N,QADIgO,EAAsBhO,GAElD,CAKD,OAAAyB,GAEwB,oBAAX0C,QACTA,OAAOiK,oBAAoB,UAAWnO,KAAK+D,gBAE7C/D,KAAKoE,WAAW5C,UAChBxB,KAAKoO,eACL3M,OAAOC,KAAK1B,KAAKG,QAAQwB,QAAQC,WACxB5B,KAAKG,OAAOyB,IAEtB,CAEO,eAAAkI,CAAgBtD,GAEtB,MAAMuD,EAAO,GAAG/J,KAAKD,OAAO2D,QAAQwB,QAAQ,MAAO,cAC7C2B,EAAM,IAAI0B,IAAIwB,EAAM7F,OAAOc,SAASqJ,MAO1C,OANAxH,EAAI2B,aAAaC,IAAI,QAASzI,KAAKD,OAAOyD,OAC1CqD,EAAI2B,aAAaC,IAAI,SAAUjC,EAAOmB,QACtCd,EAAI2B,aAAaC,IAAI,QAASjC,EAAOsB,OACjCtB,EAAOwB,OACTnB,EAAI2B,aAAaC,IAAI,QAASjC,EAAOwB,OAEhCnB,EAAI6B,UACZ,CAEO,gBAAA4F,GAEN,IACE,MAAM/B,EAAIrI,QAAQqK,cAAcC,UAAU,cAC1C,GAAgC,SAA5BzJ,OAAOwH,GAAGkC,cAA0B,OAAO,CAChD,CAAC,MAED,CAGD,IAEE,MAAMC,EAA4B,oBAAZC,QAA0BA,QAAU,KACpDC,EAAMF,GAAGE,KAAO,GAChBrC,EAAIqC,EAAIC,wBAA0BD,EAAIE,WAC5C,IAAKvC,EAAG,OAAO,EACf,MAAMhI,EAAIQ,OAAOwH,GAAGkC,cAAcM,OAClC,MAAa,MAANxK,GAAmB,SAANA,GAAsB,QAANA,GAAqB,OAANA,CACpD,CAAC,MACA,OAAO,CACR,CACF,CAEO,SAAAsB,IAAamJ,GACdhP,KAAKsO,kBAGX,CAOO,gBAAAhG,CAAiB2G,EAAeC,GACtC,IAAKD,EAAO,MAAM,IAAIxL,MAAM,GAAGyL,iBAC/B,MAAMC,EAAUpK,OAAOkK,GAAOF,OACxBhF,EAAyB,oBAAX7F,OAAyBA,OAAOc,SAASqJ,KAAO,mBAGpE,IAEE,OADU,IAAI9F,IAAI4G,EAASpF,GAClBrB,WAAWxD,QAAQ,MAAO,GACpC,CAAC,MAED,CAGD,IAEE,OADU,IAAIqD,IAAI,WAAW4G,EAAQjK,QAAQ,OAAQ,OAC5CwD,WAAWxD,QAAQ,MAAO,GACpC,CAAC,MAED,CAED,MAAM,IAAIzB,MACR,GAAGyL,8FAEN,CAEO,SAAAlL,CAAUhD,GAChB,IAEE,MAAMoO,EAAiB,IAAIC,IACzB,CACEnL,OAAOc,SAAS2C,OAChB3H,KAAKsK,yBACLtK,KAAKsP,0BACLC,OAAO9E,UAGX,IAAK2E,EAAeI,IAAIxO,EAAM2G,QAK5B,YAJA3H,KAAK6F,UAAU,6BAA8B,CAC3C4J,YAAazO,EAAM2G,OACnByH,eAAgBhD,MAAMsD,KAAKN,KAK/B,MAAM5H,EAAOxG,EAAMwG,KAGnB,GAAmB,0BAAfA,GAAMmI,KAAkC,CAE1C,IAAK3P,KAAKkD,cAAgBsE,EAAKM,QAAU9H,KAAKkD,aAC5C,OAaF,OAVAlD,KAAKkD,aAAe,KACpBlD,KAAKoO,eAGDpO,KAAKD,OAAO6P,UACd5P,KAAKD,OAAO6P,gBAId5P,KAAKW,KAAK,iBAAakP,EAExB,CAED,GAAmB,wBAAfrI,GAAMmI,KAAgC,OAG1C,IAAK3P,KAAKkD,cAAgBsE,EAAKM,QAAU9H,KAAKkD,aAY5C,YANAlD,KAAK6F,UAAU,4BAA6B,CAC1CC,SAAU9F,KAAKkD,aACf6C,SAAUyB,GAAMM,MAChBH,OAAQ3G,EAAM2G,OACdgI,KAAMnI,GAAMmI,OAKhB3P,KAAKkD,aAAe,KACpBlD,KAAK6F,UAAU,qBAAsB,CAAE8B,OAAQ3G,EAAM2G,SAGrD,MAAM1H,EAAUuH,EAAKvH,QACrBD,KAAKC,QAAUA,EACfD,KAAK4D,eAAe3D,GACpBD,KAAKoE,WAAW3D,WAAWR,GAGvBuH,EAAKsI,YACP9P,KAAKuD,WAAaiE,EAAKsI,UACvB9P,KAAKkN,iBAAiB1F,EAAKsI,YAGzB7P,GAAWD,KAAKD,OAAOiG,WACzBhG,KAAKD,OAAOiG,UAAU/F,GAGxBD,KAAKW,KAAK,UAAWV,GACrBD,KAAKoO,cACN,CAAC,MAAOtM,GACP9B,KAAKgJ,UAAUlH,EAChB,CACF,CAEO,IAAAnB,CAA6BK,EAAUa,GAC7C,MAAMT,EAAWpB,KAAKG,OAAOa,GAC7B,GAAKI,EAEL,IAAK,MAAMH,KAAWG,EACpB,IACEH,EAAQY,EACT,CAAC,MAAOC,GAER,CAEJ,CAEO,SAAAkH,CAAUlH,GAChB9B,KAAKD,OAAOgQ,UAAUjO,GACtB9B,KAAKW,KAAK,YAAamB,EACxB,CAEO,aAAA+G,GAEN,MAEMmH,EAAM/N,KAAKG,IAAI,GAAI8B,OAAO+L,YADjB,KACyC,GAExD,MAAO,uCADMhO,KAAKG,IAAI,GAAI8B,OAAOgM,WAHnB,KAGyC,UACcF,GACtE,CAEO,QAAAjI,GACN,MAAMoI,EAAQ,IAAIC,WAAW,IAC7B,GAAIlM,OAAOmM,QAAQC,gBACjBpM,OAAOmM,OAAOC,gBAAgBH,QAE9B,IAAK,IAAII,EAAI,EAAGA,EAAIJ,EAAMK,OAAQD,IAChCJ,EAAMI,GAAKtO,KAAKwO,MAAsB,IAAhBxO,KAAKyO,UAG/B,OAAOtE,MAAMsD,KAAKS,EAAOQ,GAAKA,EAAEjI,SAAS,IAAIkI,SAAS,EAAG,MAAMC,KAAK,GACrE,CAEO,sBAAAvG,GACN,IACE,IAAKtK,KAAKD,OAAO2D,QAAS,OAAO,KAGjC,MAAMoN,EAAa9Q,KAAKsI,iBAAiBtI,KAAKD,OAAO2D,QAAS,WAC9D,OAAO,IAAI6E,IAAIuI,GAAYnJ,MAC5B,CAAC,MACA,OAAO,IACR,CACF,CAEO,sBAAA2H,GACN,IACE,IAAKtP,KAAKD,OAAO4D,OAAQ,OAAO,KAChC,MAAMmN,EAAa9Q,KAAKsI,iBAAiBtI,KAAKD,OAAO4D,OAAQ,UAC7D,OAAO,IAAI4E,IAAIuI,GAAYnJ,MAC5B,CAAC,MACA,OAAO,IACR,CACF,CAEO,iBAAME,CAAYrB,GACxB,MAAMU,EAAOvB,KAAKwB,UAAU,CAC1B3D,MAAOxD,KAAKD,OAAOyD,MACnBmE,OAAQnB,EAAOmB,SAGXoJ,EAAUnO,MAAOwK,IACrB,MAAMtG,QAAiBC,MAAM,GAAGqG,EAAQlI,QAAQ,MAAO,oBAAqB,CAC1E8B,OAAQ,OACRC,QAAS,CAAE,eAAgB,oBAC3BC,SAGIM,QAAaV,EAAStB,OAAO6D,MAAM,IAAM,MAE/C,IAAKvC,EAASM,GAAI,CAChB,MAAMtF,EAAQ,IAAI2B,MAAM,QAAQqD,EAASS,UAGzC,MAFAzF,EAAMyF,OAAST,EAASS,OACxBzF,EAAMD,QAAU2F,GAAQ,GAClB1F,CACP,CAED,OAAO0F,GAKT,IACE,aAAauJ,EAAQ/Q,KAAKD,OAAO2D,QAClC,CAAC,MAAO5B,GACP,MAAMkP,EAAalP,EACnB,IACE,aAAaiP,EAAQ/Q,KAAKD,OAAO4D,OAClC,CAAC,MAAOsN,GAEP,MAAMC,EAASF,EAKf,MAJAE,EAAOrP,QAAU,IACXmP,GAAYnP,SAAW,GAC3BsP,SAAWF,GAA6BpP,cAAWgO,GAE/CqB,CACP,CACF,CACF,CAEO,eAAA/G,CAAgBtD,GAElB7G,KAAKmD,WACPnD,KAAKoO,eAIP,MAAMgD,EAAUC,SAASC,cAAc,OACvCF,EAAQG,aAAa,sBAAuB,IAC5CH,EAAQI,MAAMC,SAAW,QACzBL,EAAQI,MAAME,MAAQ,IACtBN,EAAQI,MAAMG,WAAa,mBAE1BP,EAAQI,MAAcI,eAAiB,YACvCR,EAAQI,MAAcK,qBAAuB,YAC9CT,EAAQI,MAAMM,OAAS,SACvBV,EAAQI,MAAMO,QAAU,OACxBX,EAAQI,MAAMQ,WAAa,SAC3BZ,EAAQI,MAAMS,eAAiB,SAC/Bb,EAAQI,MAAMU,QAAU,OAGxB,MAAMC,EAAYd,SAASC,cAAc,OACzCa,EAAUX,MAAMY,MAAQ,mBACxBD,EAAUX,MAAMa,OAAS,mBACzBF,EAAUX,MAAMG,WAAa,UAC7BQ,EAAUX,MAAMc,OAAS,oBACzBH,EAAUX,MAAMe,aAAe,OAC/BJ,EAAUX,MAAMgB,UAAY,8BAC5BL,EAAUX,MAAMiB,SAAW,SAC3BN,EAAUX,MAAMC,SAAW,WAC3BU,EAAUX,MAAMO,QAAU,OAC1BI,EAAUX,MAAMkB,cAAgB,SAGhC,MAAMC,EAAStB,SAASC,cAAc,OACtCqB,EAAOnB,MAAMa,OAAS,OACtBM,EAAOnB,MAAMO,QAAU,OACvBY,EAAOnB,MAAMQ,WAAa,SAC1BW,EAAOnB,MAAMS,eAAiB,gBAC9BU,EAAOnB,MAAMU,QAAU,SACvBS,EAAOnB,MAAMoB,aAAe,sCAC5BD,EAAOnB,MAAMG,WAAa,UAE1B,MAAMkB,EAAQxB,SAASC,cAAc,OACrCuB,EAAMC,YAAc,SACpBD,EAAMrB,MAAMuB,WACV,8EACFF,EAAMrB,MAAMwB,SAAW,OACvBH,EAAMrB,MAAMyB,cAAgB,SAC5BJ,EAAMrB,MAAM0B,cAAgB,YAC5BL,EAAMrB,MAAM2B,MAAQ,4BAEpB,MAAMC,EAAW/B,SAASC,cAAc,UACxC8B,EAASzD,KAAO,SAChByD,EAASN,YAAc,IACvBM,EAAS7B,aAAa,aAAc,SACpC6B,EAAS7B,aAAa,QAAS,SAC/B6B,EAAS5B,MAAMY,MAAQ,OACvBgB,EAAS5B,MAAMa,OAAS,OACxBe,EAAS5B,MAAMO,QAAU,OACzBqB,EAAS5B,MAAMQ,WAAa,SAC5BoB,EAAS5B,MAAMS,eAAiB,SAChCmB,EAAS5B,MAAMG,WAAa,4BAC5ByB,EAAS5B,MAAM2B,MAAQ,UACvBC,EAAS5B,MAAMc,OAAS,sCACxBc,EAAS5B,MAAMe,aAAe,OAC9Ba,EAAS5B,MAAMwB,SAAW,OAC1BI,EAAS5B,MAAM6B,WAAa,IAC5BD,EAAS5B,MAAM8B,OAAS,UACxBF,EAAS5B,MAAM+B,WAAa,OAC5BH,EAASI,QAAU,IAAMxT,KAAKyT,aAE9Bd,EAAOe,YAAYb,GACnBF,EAAOe,YAAYN,GAGnB,MAAMO,EAAStC,SAASC,cAAc,UACtCqC,EAAOC,IAAM/M,EACb8M,EAAOnC,MAAMY,MAAQ,OACrBuB,EAAOnC,MAAMa,OAAS,OACtBsB,EAAOnC,MAAMc,OAAS,IACtBqB,EAAOE,eAAiB,cACxBF,EAAOG,MAAQ,mCAEf3B,EAAUuB,YAAYf,GACtBR,EAAUuB,YAAYC,GACtBvC,EAAQsC,YAAYvB,GACpBd,SAASnK,KAAKwM,YAAYtC,GAG1BA,EAAQjN,iBAAiB,QAASkC,IAC5BA,EAAE0N,SAAW3C,GAASpR,KAAKyT,eAIjC,MAAMO,EAAS3N,IACC,WAAVA,EAAEzE,KACJ5B,KAAKyT,cAWT,OARApC,SAASlN,iBAAiB,UAAW6P,EAAO,CAAEC,SAAS,IAEvDjU,KAAKmD,UAAYiO,EACjBpR,KAAKoD,UAAYuQ,EACjB3T,KAAKqD,eAAiB,KACpBgO,SAASlD,oBAAoB,UAAW6F,EAAO,CAAEC,SAAS,MAGrD,CACR,CAEO,YAAA7F,GACN,IACEpO,KAAKqD,kBACN,CAAC,MAED,CACDrD,KAAKqD,eAAiB,KAElBrD,KAAKmD,WAAW+Q,YAClBlU,KAAKmD,UAAU+Q,WAAWC,YAAYnU,KAAKmD,WAG7CnD,KAAKmD,UAAY,KACjBnD,KAAKoD,UAAY,IAClB,CAKO,UAAAqQ,GACNzT,KAAKkD,aAAe,KACpBlD,KAAKoO,eAGDpO,KAAKD,OAAO6P,UACd5P,KAAKD,OAAO6P,WAId5P,KAAKW,KAAK,iBAAakP,EACxB,CAEO,cAAMvI,CAASR,GACrB,IACE,aAAaA,EAAStB,MACvB,CAAC,MACA,OAAO,IACR,CACF,CAEO,oBAAAd,GACN,IACE,GAA4B,oBAAjB6J,aAA8B,OAAO,KAChD,MAAM6F,EAAS7F,aAAaC,QAAQxO,KAAK6D,YACzC,IAAKuQ,EAAQ,OAAO,KAEpB,MAAMnU,EAAU0F,KAAKC,MAAMwO,GAG3B,OAAKnU,GAAS6C,WAAc7C,GAASwC,UACjCF,KAAKD,OAASrC,EAAQwC,WACxB8L,aAAa8F,WAAWrU,KAAK6D,YACtB,MAGF5D,EANgD,IAOxD,CAAC,MACA,OAAO,IACR,CACF,CAEO,cAAA2D,CAAe3D,GACrB,IACE,GAA4B,oBAAjBsO,aAA8B,OAErCtO,GAAWD,KAAKD,OAAO6D,eACzB2K,aAAa+F,QAAQtU,KAAK6D,WAAY8B,KAAKwB,UAAUlH,IAErDsO,aAAa8F,WAAWrU,KAAK6D,WAEhC,CAAC,MAED,CACF,CAEO,sBAAAe,GACN,IACE,MAA4B,oBAAjB2J,aAAqC,KACzCA,aAAaC,QAAQxO,KAAK8D,aAClC,CAAC,MACA,OAAO,IACR,CACF,CAEO,gBAAAoJ,CAAiB4C,GACvB,IACE,GAA4B,oBAAjBvB,aAA8B,OAErCuB,GAAa9P,KAAKD,OAAO6D,eAC3B2K,aAAa+F,QAAQtU,KAAK8D,aAAcgM,GAExCvB,aAAa8F,WAAWrU,KAAK8D,aAEhC,CAAC,MAED,CACF,ECxvCIlB,eAAe2R,EACpBC,EACAtN,EACAnH,GAEA,MAAMqN,EAAUrN,EAAOqN,SAAW,6BAC5BqH,QAjCR7R,eAAkC7C,GAEhC,GAAqC,mBAA1BA,EAAO2U,eAA+B,CAC/C,MAAMC,QAAU5U,EAAO2U,iBACvB,GAAIC,GAAkB,iBAANA,EAAgB,OAAOA,CACxC,CAED,MAAMC,EACJ7U,EAAO8U,MACmB,mBAAlB9U,EAAOsN,aAA8BtN,EAAOsN,cAAWwC,IAC/D9P,EAAO+U,KAAKlU,cAAckC,gBAC1B+M,EAEF,GAAI+E,EACF,MAAO,CAAE7J,cAAe,UAAU6J,KAIpC,GAAI7U,EAAO4M,OACT,MAAO,CAAE,YAAa5M,EAAO4M,QAG/B,MAAM,IAAIlJ,MACR,uFAEJ,CAQ4BsR,CAAmBhV,GACvCiV,QAAYjO,MAAM,GAAGqG,IAAUoH,IAAQ,CAC3CxN,OAAQ,OACRC,QAAS,CACP,eAAgB,sBACbwN,GAELvN,KAAMvB,KAAKwB,UAAUD,EAAM,CAAC+N,EAAcC,IACvB,iBAAVA,EAAqBA,EAAMxM,WAAawM,KAInD,IAAKF,EAAI5N,GAAI,CACX,MAAM+N,QAAaH,EAAIG,OAAO9L,MAAM,IAAM,IAC1C,MAAM,IAAI5F,MAnEd,SAA8B8D,EAAgB4N,GAE5C,IAAIC,EAAe,uBAAuB7N,IAe1C,OAbIA,GAAU,IACZ6N,GAAgB,0BACI,MAAX7N,GAA6B,MAAXA,EAC3B6N,GAAgB,0BACI,MAAX7N,EACT6N,GAAgB,uBACI,MAAX7N,EACT6N,GAAgB,uBACPD,IAETC,GAAgB,KAAKD,EAAKE,UAAU,EAAG,QAGlCD,CACT,CAiDoBE,CAAqBN,EAAIzN,OAAQ4N,GAClD,CAED,OAAOH,EAAIxP,MACb,CCIgB,SAAA+P,EAAaL,EAAgBM,GAC3C,MAAMC,EAAMC,OAAOR,GAEnB,IAAKQ,OAAOC,cAAcF,GACxB,MAAM,IAAIhS,MACR,GAAG+R,WAAmBN,sCAA0CQ,OAAOE,qBAI3E,OAAOH,CACT,CCpFM,SAAUI,EAActJ,GAC5B,MAAoB,iBAANA,EAAiB,KAAOA,EAAE7D,SAAS,IAAM6D,CACzD,CAMM,SAAUuJ,EAAqBC,GACnC,MAAMC,EAA+B,IAAKD,GA+B1C,YA7BkBlG,IAAdmG,EAAId,QAAqBc,EAAId,MAAQW,EAAcG,EAAId,aAC3CrF,IAAZmG,EAAIC,MACND,EAAIE,SAAWL,EAAcG,EAAIC,YAC1BD,EAAIC,UAEQpG,IAAjBmG,EAAIE,WAAwBF,EAAIE,SAAWL,EAAcG,EAAIE,gBAC5CrG,IAAjBmG,EAAIG,WAAwBH,EAAIG,SAAWN,EAAcG,EAAIG,gBACxCtG,IAArBmG,EAAII,eAA4BJ,EAAII,aAAeP,EAAcG,EAAII,oBACxCvG,IAA7BmG,EAAIK,uBACNL,EAAIK,qBAAuBR,EAAcG,EAAIK,4BAC7BxG,IAAdmG,EAAIlO,QAAqBkO,EAAIlO,MAAQyN,EAAaS,EAAIlO,MAAO,eAC7C+H,IAAhBmG,EAAIM,UAAuBN,EAAIM,QAAUf,EAAaS,EAAIM,QAAS,iBAG9CzG,IAArBmG,EAAII,mBAA2DvG,IAA7BmG,EAAIK,4BACnBxG,IAAjBmG,EAAIG,eAA+CtG,IAArBmG,EAAII,eACpCJ,EAAIG,SAAWH,EAAII,qBAEdJ,EAAII,oBACJJ,EAAIK,6BAINL,EAAIrG,YACJqG,EAAIO,kBACJP,EAAIQ,eACJR,EAAIS,aACJT,EAAItG,KAEJsG,CACT,CAMM,SAAUU,EAAWC,GACzB,IAAIX,EAAM,KACV,IAAK,IAAIzF,EAAI,EAAGA,EAAIoG,EAAMnG,OAAQD,IAChCyF,GAAQW,EAAMpG,GAAc7H,SAAS,IAAIkI,SAAS,EAAG,KAEvD,OAAOoF,CACT,CCrDOpT,eAAegU,EAAe7W,GAEnC,MAAMyH,QAKK+M,EAAW,cAAe,CAAE,EAAExU,GAGzC,IAAKyH,IAASA,EAAK2D,UAAY3D,EAAK8F,WAClC,MAAM,IAAI7J,MAAM,wDAGlB,IAAKsB,OAAOyC,EAAK8F,YAAYuJ,WAAW,MACtC,MAAM,IAAIpT,MAAM,yCAGlB,MAAO,CACL0H,QAAS3D,EAAK2D,QACdD,QAAS1D,EAAK2D,QACdvE,QAASY,EAAKZ,SAAW,GACzB0G,WAAY9F,EAAK8F,WACjBC,WAAY/F,EAAK+F,WAErB,mDCZO3K,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,IAC7CuN,WAAEA,EAAUnC,QAAEA,GAAY3G,GAO1BuS,UAAEA,SAAoBC,OADT,iBAGnB,OAAOD,EAAU,CACfnQ,QAAS0G,EAET,iBAAM2J,EAAY3Q,QAAEA,IAClB,IAAIzE,EACAqV,GAAQ,EAEZ,GAAuB,iBAAZ5Q,EACTzE,EAAUyE,EACV4Q,GAAQ,OACH,GAAI5Q,QAAyD,IAAtCA,EAA8BxB,IAAqB,CAC/E,MAAMA,EAAOwB,EAA6BxB,IAC1CjD,EAAyB,iBAARiD,EAAmBA,EAAM4R,EAAW5R,GACrDoS,GAAQ,CACT,MAAM,GAAI5Q,aAAmB8J,WAC5BvO,EAAU6U,EAAWpQ,GACrB4Q,GAAQ,MACH,IFAa,iBADEhC,EECC5O,KFAS,mBAAmB6Q,KAAKjC,GEKtD,MAAM,IAAIzR,MACR,oCAAoC6C,kDALtCzE,EAAUyE,EACV4Q,GAAQ,CAMT,CFTD,IAAsBhC,EEgBtB,aALmBX,EAGhB,oBAAqB,CAAEpJ,UAAS7E,QAASzE,EAASiD,IAAKoS,GAASnX,IAEvD2G,SACb,EAED,mBAAM0Q,CAAcC,GAClB,MAAMC,OAAEA,EAAMC,MAAEA,EAAKC,YAAEA,EAAWlR,QAAEA,GAAY+Q,EAWhD,aALmB9C,EAGhB,sBAAuB,CAAEpJ,UAASmM,SAAQC,QAAOC,cAAalR,WAAWvG,IAEhE2G,SACb,EAED,qBAAM+Q,CAAgB1B,EAAa2B,GACjC,MAAMC,EAAe7B,EAAqBC,GAM1C,aAJmBxB,EAEhB,eAAgB,CAAEpJ,UAASyM,YAAaD,GAAgB5X,IAE/C8X,iBACb,GAEL,2DChEOjV,eACL7C,EACA2H,EACAoP,GAMA,IAAIgB,EACJ,IACE,MAAMC,EAAa,SACnBD,QAAed,OAA0Be,EAC1C,CAAC,MACA,MAAM,IAAItU,MAAM,+EACjB,CAED,MAAMuU,eAAEA,EAAcC,eAAEA,GAAmBH,EAQrCtT,EAAOsS,SAAuBF,EAAe7W,GAGnD,MAAMmY,UAA+BF,EAOnC,WAAAlY,CACEqY,EACAC,EACAC,GAEAC,MAAMF,GAAkB,MAVlBpY,KAAQuY,SAAe,KACvBvY,KAAQwY,SAAkB,KAC1BxY,KAAQyY,SAAG,EASjBzY,KAAK0Y,QAAUP,EACXE,GAAMzR,UAAS5G,KAAKuY,SAAWF,EAAKzR,SACpCyR,GAAMlN,UAASnL,KAAKwY,SAAWH,EAAKlN,SACpCkN,GAAM/B,UAAStW,KAAKyY,SAAWJ,EAAK/B,QACzC,CAED,gBAAMqC,GACJ,OAAI3Y,KAAK4Y,eAET5Y,KAAK4Y,aAAehC,EAAe5W,KAAK0Y,SACrCzK,KAAMhD,IACLjL,KAAKuY,SAAWtN,EAAUqC,WAC1BtN,KAAKwY,SAAWvN,EAAUE,UAE3B9B,MAAOwP,IAEN,MADA7Y,KAAK4Y,kBAAe/I,EACdgJ,KAToB7Y,KAAK4Y,YAapC,CAED,gBAAME,GAEJ,OADK9Y,KAAKuY,gBAAgBvY,KAAK2Y,aACxB3Y,KAAKuY,QACb,CAED,UAAAQ,GACE,IAAK/Y,KAAKwY,SAAU,MAAM,IAAI/U,MAAM,oDACpC,OAAOzD,KAAKwY,QACb,CAED,UAAAQ,CAAW1C,GACTtW,KAAKyY,SAAWnC,CACjB,CAED,UAAA2C,GACE,OAAOjZ,KAAKyY,QACb,CAED,OAAAS,CAAQC,GACN,IAAKA,EAAa,MAAM,IAAI1V,MAAM,2BAClC,OAAO,IAAIyU,EAAuBlY,KAAK0Y,QAASS,EAAa,CAC3DvS,QAAS5G,KAAKuY,eAAY1I,EAC1B1E,QAASnL,KAAKwY,eAAY3I,EAC1ByG,QAAStW,KAAKyY,UAEjB,CAED,iBAAMxB,CAAY3Q,GACXtG,KAAKwY,gBAAgBxY,KAAK2Y,aAC/B,MAAM9W,EAA6B,iBAAZyE,EAAuBA,EAAUoQ,EAAWpQ,GAMnE,aALmBiO,EACjB,oBACA,CAAEpJ,QAASnL,KAAKwY,SAAWlS,QAASzE,GACpC7B,KAAK0Y,UAEKhS,SACb,CAED,mBAAM0Q,CACJE,EACAC,EACArC,GAEKlV,KAAKwY,gBAAgBxY,KAAK2Y,aAC/B,MAAMS,EAAa,IAAK7B,GACpB6B,GAAeA,EAAuCC,qBAChDD,EAAuCC,aAOjD,aALmB9E,EACjB,sBACA,CAAEpJ,QAASnL,KAAKwY,SAAWlB,SAAQC,MAAO6B,EAAY9S,QAAS4O,GAC/DlV,KAAK0Y,UAEKhS,SACb,CAED,oBAAM4S,CACJhC,EACAC,EACArC,GAEA,OAAOlV,KAAKoX,cAAcE,EAAQC,EAAOrC,EAC1C,CAED,qBAAMuC,CAAgB1B,GACf/V,KAAKwY,gBAAgBxY,KAAK2Y,aAC/B,MAAMjJ,EAAQqG,EAA+BrG,KACvC6J,QAAavZ,KAAK8Y,aAExB,GAAIpJ,GAAQA,EAAKjB,gBAAkB8K,EAAK9K,cACtC,MAAM,IAAIhL,MAAM,kDAGlB,MAAM+V,EAASxZ,KAAK0H,SACf,UAAW1H,KAAKyZ,oBAAoB1D,IACpC,IAAKA,GAEV,GADIyD,EAAO9J,aAAa8J,EAAO9J,OACzB,OAAQ8J,KAAYA,EAAOE,GAC/B,MAAM,IAAIjW,MAAM,wCAElB,QAAqBoM,IAAjB2J,EAAO1R,OAAwC,OAAjB0R,EAAO1R,MACvC,MAAM,IAAIrE,MAAM,iCAElB,MAAMqN,EAAagF,EAAqB0D,GAMxC,aALmBjF,EACjB,eACA,CAAEpJ,QAASnL,KAAKwY,SAAWZ,YAAa9G,EAAY6I,QAAS,CAAErD,QAAStW,KAAKyY,WAC7EzY,KAAK0Y,UAEKb,iBACb,CAED,qBAAM+B,CAAgB7D,GACpB,IAAK/V,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,yCACpC,MAAMoW,QAAe7Z,KAAKyX,gBAAgB1B,GAC1C,aAAa/V,KAAK0H,SAASoS,qBAAqBD,EACjD,CAED,yBAAMJ,CAAoB7B,GACxB,MAAM7B,EAAK,IAAK6B,GAChB,IAAK5X,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,6CACpC,MAAMsW,EAAchE,EAAGrG,WACbuI,EAAelC,EAAGrG,KAAM1P,KAAK0H,gBAC7B1H,KAAK8Y,aAEf,IAAIxC,EACJ,GAAKP,EAAGO,QAKNA,EAAU0D,OAAOjE,EAAGO,SACpBtW,KAAKyY,SAAW/C,OAAOK,EAAGO,aANX,CACf,MAAM7P,QAAgBzG,KAAK0H,SAASuS,aACpC3D,EAAU7P,EAAQ6P,QAClBtW,KAAKyY,SAAW/C,OAAOjP,EAAQ6P,QAChC,CAKD,MAAMxO,EACQ,MAAZiO,EAAGjO,MACC4N,OAAOK,EAAGjO,aACJ9H,KAAK0H,SAASwS,oBAAoBH,EAAa,WACrDI,EAAYpE,EAAG2D,SAAWzB,EAAelC,EAAG2D,GAAI1Z,KAAK0H,UAAY,KACjEwN,EAAQa,EAAGb,MAAQ8E,OAAOjE,EAAGb,MAAMxM,YAAc,GAEvD,IAAIwN,EACJ,GAAKH,EAAGG,SAONA,EAAW8D,OAAOjE,EAAGG,SAASxN,iBAN9B,IACEwN,QAAiBlW,KAAK0H,SAAS0S,YAAY,IAAKrE,EAAIrG,KAAMqK,GAC3D,CAAC,MACA7D,EAAW,MACZ,CAKH,IAAIC,EAA0B,KAC9B,GAAKJ,EAAGI,UAAwB,IAAZJ,EAAGpG,KAGZoG,EAAGI,WACZA,EAAW6D,OAAOjE,EAAGI,SAASzN,iBAJG,CAEjCyN,SADsBnW,KAAK0H,SAAS2S,cACjBlE,UAAY,IAChC,CAID,MAAMmE,EAA6B,CACjC5K,KAAMqK,EACNL,GAAIS,EACJjF,QACApN,QACAoO,WACA1O,KAAMuO,EAAGvO,KACT8O,UACA3G,KAAMoG,EAAGpG,WAAQE,GAMnB,OAJiB,OAAbsG,IAAmBmE,EAAUnE,SAAWA,GACxCJ,EAAGK,eAAckE,EAAUlE,aAAe4D,OAAOjE,EAAGK,aAAa1N,aACjEqN,EAAGM,uBACLiE,EAAUjE,qBAAuB2D,OAAOjE,EAAGM,qBAAqB3N,aAC3D4R,CACR,CAED,sBAAMC,CACJ3C,EACA4C,GAA0B,GAE1B,IAAKxa,KAAK0H,SAAU,MAAM,IAAIjE,MAAM,yCACpC,MAAMoW,QAAe7Z,KAAKyX,gBAAgBG,GAEpC3S,SADajF,KAAK0H,SAASoS,qBAAqBD,IACpC5U,KAIlB,OAHIuV,SACIxa,KAAK0H,SAAS+S,mBAAmBxV,GAElCA,CACR,EAGH,OAAO,IAAIiT,EAAuBnY,EAAQ2H,EAAqC,CAC7Ed,QAASpC,EAAK8I,WACdnC,QAAS3G,EAAK2G,SAElB,ICoBO,SAASuP,EAAuBC,EAAU3S,EAAO4S,EAAMC,GAC1D,GAAa,MAATD,IAAiBC,EAAG,MAAM,IAAIC,UAAU,iDAC5C,GAAqB,mBAAV9S,EAAuB2S,IAAa3S,IAAU6S,GAAK7S,EAAMwH,IAAImL,GAAW,MAAM,IAAIG,UAAU,4EACvG,MAAgB,MAATF,EAAeC,EAAa,MAATD,EAAeC,EAAEE,KAAKJ,GAAYE,EAAIA,EAAE3F,MAAQlN,EAAM3C,IAAIsV,EACxF,CAEO,SAASK,EAAuBL,EAAU3S,EAAOkN,EAAO0F,EAAMC,GACjE,GAAa,MAATD,EAAc,MAAM,IAAIE,UAAU,kCACtC,GAAa,MAATF,IAAiBC,EAAG,MAAM,IAAIC,UAAU,iDAC5C,GAAqB,mBAAV9S,EAAuB2S,IAAa3S,IAAU6S,GAAK7S,EAAMwH,IAAImL,GAAW,MAAM,IAAIG,UAAU,2EACvG,MAAiB,MAATF,EAAeC,EAAEE,KAAKJ,EAAUzF,GAAS2F,EAAIA,EAAE3F,MAAQA,EAAQlN,EAAMS,IAAIkS,EAAUzF,GAASA,CACxG,CA+BkD,mBAApB+F,iBAAiCA,sBCnUlDC,EAKX,WAAApb,CAAY8G,EAAcuE,EAAiBpL,GAHlCob,EAAiB1S,IAAAzI,UAAA,GACjBob,EAAsB3S,IAAAzI,UAAA,GAG7BA,KAAK4G,QAAUA,EACfoU,EAAAhb,KAAImb,EAAYhQ,EAAO,KACvB6P,EAAAhb,KAAIob,EAAWrb,EAAM,IACtB,CAED,iBAAMkX,CAAY3Q,GAChB,MAAMzE,EAA6B,iBAAZyE,EAAuBA,EAAUoQ,EAAWpQ,GAMnE,aALmBiO,EACjB,oBACA,CAAEpJ,QAASuP,EAAA1a,KAAamb,EAAA,KAAE7U,QAASzE,GACnC6Y,EAAA1a,KAAYob,EAAA,OAEF1U,SACb,CAED,mBAAM0Q,CACJE,EACAC,EACAjR,GAOA,aALmBiO,EACjB,sBACA,CAAEpJ,QAASuP,EAAA1a,YAAesX,SAAQC,QAAOjR,WACzCoU,EAAA1a,KAAYob,EAAA,OAEF1U,SACb,CAED,qBAAM+Q,CAAgB1B,GACpB,MAAMjF,EAAagF,EAAqBC,GAMxC,MAAO,CAAEsF,sBALU9G,EACjB,eACA,CAAEpJ,QAASuP,EAAA1a,KAAamb,EAAA,KAAEvD,YAAa9G,GACvC4J,EAAA1a,KAAYob,EAAA,OAEgBvD,kBAC/B,oGAGIjV,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAImb,EAAkB1W,EAAK8I,WAAY9I,EAAK2G,QAASpL,EAC9D,UCtCaub,EAKX,WAAAxb,CAAYC,EAAsBkL,GAChCjL,KAAK2G,UAAYsE,EAAUrE,QAC3B5G,KAAKD,OAASA,EACdC,KAAKmL,QAAUF,EAAUE,OAC1B,CAED,iBAAM8L,CAAY3Q,GAEhB,MAAMiV,EAAkC,iBAAZjV,GAAuB,IAAIkV,aAAcC,OAAOnV,GAAWA,EAGjFoV,EAAgBC,KAAK5W,OAAO6W,gBAAgBL,IAE5CzU,QAAiByN,EACrB,uBACA,CAAEpJ,QAASnL,KAAKmL,QAAS7E,QAASoV,GAClC1b,KAAKD,QAOP,IAEE,MAAM4I,EAAwB,oBAAXzE,OAA0BA,YAAqE2L,EAClH,GAAIlH,GAAKkT,KACP,OAAOlT,EAAIkT,KAAKC,OAAOhV,EAASJ,WAKlC,OADuB0J,WAAWV,KAAKhK,KAAKoB,EAASJ,WAAaqV,GAAMA,EAAEC,WAAW,GAEtF,CAAC,MAAO3V,GAEP,GAAIS,EAASJ,UAAUmQ,WAAW,MAAO,CACvC,MAAMoF,EAAMnV,EAASJ,UAAUwB,MAAM,GAC/ByO,EAAQ,IAAIvG,WAAW6L,EAAIzL,OAAS,GAC1C,IAAK,IAAID,EAAI,EAAGA,EAAI0L,EAAIzL,OAAQD,GAAK,EACnCoG,EAAMpG,EAAI,GAAK2L,SAASD,EAAIE,OAAO5L,EAAG,GAAI,IAE5C,OAAOoG,CACR,CACD,MAAM,IAAIlT,MAAM,sCAAsC4C,IACvD,CACF,CAED,qBAAMoR,CAAgBG,GAEpB,MAAMwE,EAAwBpc,KAAKqc,qBAAqBzE,GAElD9Q,QAAiByN,EAIrB,2BACA,CACEpJ,QAASnL,KAAKmL,QACdmR,kBAAmBF,EACnBG,WAAW,EACXC,sBAAsB,GAExBxc,KAAKD,QAID0c,EAAe3V,EAAS4V,6BAA+B5V,EAAS+Q,kBACtE,IAAK4E,EACH,MAAM,IAAIhZ,MAAM,mDAGlB,OAAOzD,KAAK2c,uBAAuBF,EACpC,CAEO,oBAAAJ,CAAqBtG,GAE3B,GAAIA,GAAoB,iBAAPA,EAAiB,CAEhC,GAAKA,EAAwC6G,UAAW,CAEtD,MAAMC,EAAc9G,EAAuC6G,YAE3D,OADejB,KAAK5W,OAAO6W,gBAAgBiB,GAE5C,CAED,GACG9G,EAAkC+G,cAClC/G,EAAqCgH,gBAEtC,MAAM,IAAItZ,MACR,kFAGL,CAGD,OAAOsS,CACR,CAEO,sBAAA4G,CAAuBF,GAY7B,GAT0B,iBAAjBA,GACPA,GACCA,EAA0DC,8BAE3DD,EAAgBA,EACbC,6BAIuB,iBAAjBD,EACT,IAEE,MAAMO,EAAUtX,KAAK+W,GACrB,OAAO,IAAIrM,WAAW4M,EAAQC,MAAM,IAAIC,IAAKnB,GAAMA,EAAEC,WAAW,IACjE,CAAC,MAAO3V,GAEP,MAAM,IAAI5C,MAAM,+CAA+C4C,IAChE,CAIH,OAAOoW,CACR,CAKD,UAAA1D,GACE,OAAO/Y,KAAKmL,OACb,CAGD,yBAAMgS,CAAoBC,GAGxB,MAAMC,EAAU,GAChB,IAAK,MAAMtH,KAAMqH,EACfC,EAAQnc,WAAWlB,KAAKyX,gBAAgB1B,IAE1C,OAAOsH,CACR,CAGD,OAAAC,CAAQ3W,GACN,OAAOA,IAAc3G,KAAK2G,SAC3B,CAGD,sBAAM4T,CAAiB3C,EAAsB2E,GAAqB,GAEhE,MAAMH,EAAwBpc,KAAKqc,qBAAqBzE,GAElD9Q,QAAiByN,EAIrB,2BACA,CACEpJ,QAASnL,KAAKmL,QACdmR,kBAAmBF,EACnBG,UAAWA,EACXC,sBAAsB,GAExBxc,KAAKD,QAGP,GAAIwc,EAAW,CAEb,IAAKzV,EAASyW,qBACZ,MAAM,IAAI9Z,MAAM,oDAElB,OAAOqD,EAASyW,oBACjB,CAEC,IAAKzW,EAAS4V,4BACZ,MAAM,IAAIjZ,MAAM,mDAElB,OAAOqD,EAAS4V,2BAEnB,8EAGI9Z,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAIub,EAAmBvb,EAAQyE,EACxC,oBAEO5B,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuBF,EAAe7W,GACnD,OAAO,IAAIub,EAAmBvb,EAAQyE,EACxC,ICvHO,MAAMgZ,EAAe,UAKfC,EAUX,WAAA3d,CAAYC,EAAsBkL,GAChC,IAAKA,EAAUyS,UACb,MAAM,IAAIja,MAAM,gDAElBzD,KAAK2G,UAAYsE,EAAUyS,UAC3B1d,KAAK2d,UAAY1S,EAAU2S,cAAgB,CACzCC,MAAO,GACPC,OAAQ,GACRC,KAAM,IAER/d,KAAKD,OAASA,EACdC,KAAKmL,QAAUF,EAAUE,OAC1B,CAOD,cAAM6S,CAASC,EAAoBtE,GACjC,MAAMuE,gBAAEA,EAAeC,aAAEA,GAAiBxE,EAGpCyE,EAAmBD,GAAcjB,IAAIjO,IAAU,IAChDA,EAEHoP,kBAAmBre,KAAKse,eAAerP,EAAMoP,sBAc/C,aAXuB9J,EACrB,wBACA,CACEpJ,QAASnL,KAAKmL,QACdoT,KAAMN,EACNC,kBACAC,aAAcC,GAEhBpe,KAAKD,OAIR,CAMD,kBAAMye,CACJC,GAEA,MAAMpB,EAA+B,GACrC,IAAK,MAAMkB,KAAEA,EAAI5E,QAAEA,KAAa8E,EAC9BpB,EAAQnc,WAAWlB,KAAKge,SAASO,EAAM5E,IAEzC,OAAO0D,CACR,CAKD,UAAAtE,GACE,OAAO/Y,KAAKmL,OACb,CAKD,YAAAuT,GACE,OAAO1e,KAAK2G,SACb,CAKD,WAAAgY,CAAY/X,GACV,OACEA,IAAY5G,KAAK2d,UAAUE,OAC3BjX,IAAY5G,KAAK2d,UAAUG,QAC3BlX,IAAY5G,KAAK2d,UAAUI,IAE9B,CAKD,UAAAjF,CAAWnJ,EAA2B,UACpC,OAAQA,GACN,IAAK,QACH,OAAO3P,KAAK2d,UAAUE,MACxB,IAAK,SAIL,IAAK,OAGL,QACE,OAAO7d,KAAK2d,UAAUG,OANxB,IAAK,OACH,OAAO9d,KAAK2d,UAAUI,KAO3B,CAKO,cAAAO,CAAepJ,GACrB,GAAIA,QAAuC,OAC3C,GAAqB,iBAAVA,EAAoB,OAAOA,EAEtC,MAAMyB,EAAQzB,EACd,IAAI+G,EAAM,GACV,IAAK,IAAI1L,EAAI,EAAGA,EAAIoG,EAAMnG,OAAQD,IAChC0L,GAAQtF,EAAMpG,GAAc7H,SAAS,IAAIkI,SAAS,EAAG,KAEvD,OAAOqL,CACR,EAmBIrZ,eAAemL,EAAsBhO,GAC1C,MAAMyH,QAAa+M,EAWhB,cAAe,CAAE,EAAExU,GAEtB,IAAKyH,IAASA,EAAK2D,QACjB,MAAM,IAAI1H,MAAM,gDAGlB,IAAK+D,EAAKkW,UACR,MAAM,IAAIja,MAAM,uEAGlB,MAAO,CACL0H,QAAS3D,EAAK2D,QACdvE,QAASY,EAAKZ,SAAW,GACzB0G,WAAa9F,EAAK8F,YAAc,KAChCoQ,UAAWlW,EAAKkW,UAChBE,aAAcpW,EAAKoW,aACnBrQ,WAAY/F,EAAK+F,WAErB,CAqBM,SAAUqR,EAAUC,GACxB,OAAOA,EAAOrB,CAChB,0FAhEO5a,eACL7C,EACA+W,GAEA,MAAMtS,EAAOsS,SAAuB/I,EAAsBhO,GAC1D,OAAO,IAAI0d,EAAoB1d,EAAQyE,EACzC,4CAwCM,SAA4BoC,GAChC,OAAIA,EAAQiQ,WAAW,QAAgB,OACnCjQ,EAAQiQ,WAAW,QAAgB,SACnCjQ,EAAQiQ,WAAW,KAAa,QAChCjQ,EAAQiQ,WAAW,KAAa,OAEhCjQ,EAAQiQ,WAAW,QAAgB,OACnCjQ,EAAQiQ,WAAW,QAAgB,SACnCjQ,EAAQiQ,WAAW,MAAQjQ,EAAQiQ,WAAW,KAAa,QAC3DjQ,EAAQiQ,WAAW,KAAa,OAC7B,SACT,wBAYM,SAAoBiI,GACxB,OAAO7c,KAAK8c,MAAMD,EAAMtB,EAC1B,aAKM,SAAqBqB,GACzB,MAAO,GAAGA,EAAKG,0BAA0BJ,EAAUC,GAAMI,QAAQ,SACnE,0BAKM,SACJC,EACAC,EACAC,EAAgC,UAEhC,IAAIC,EACJ,OAAQD,GACN,IAAK,QACHC,EAAY,IACZ,MACF,IAAK,OACHA,EAAY,GACZ,MAEF,QACEA,EAAY,GAOhB,OAFiB,GAECH,EAAaG,EAHZ,GAGwBF,CAC7C,eAKgB,SAAaG,EAAeC,GAC1C,OAAOtd,KAAKud,KAAKF,EAAQC,EAC3B,kBAKuBV,EAAcY,EAAkC,UAGrE,OAAOZ,GAD+B,WAAhBY,GAA4C,SAAhBA,EAAyB,IAAM,IAEnF"}
|