@hashgraphonline/standards-sdk 0.0.155 → 0.0.156

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (23) hide show
  1. package/dist/cjs/{index-CyAbgH2f-DdtH7gNZ.cjs → index-CyAbgH2f-wGrtdU-A.cjs} +2 -2
  2. package/dist/cjs/{index-CyAbgH2f-DdtH7gNZ.cjs.map → index-CyAbgH2f-wGrtdU-A.cjs.map} +1 -1
  3. package/dist/cjs/{index-BiqAcECs.cjs → index-TDuoVu92.cjs} +7 -7
  4. package/dist/cjs/index-TDuoVu92.cjs.map +1 -0
  5. package/dist/cjs/standards-sdk.cjs +1 -1
  6. package/dist/cjs/{standards-sdk.es45-BxAtDqsy-Cl6MoCrj.cjs → standards-sdk.es45-BxAtDqsy-CgdxACc0.cjs} +2 -2
  7. package/dist/cjs/{standards-sdk.es45-BxAtDqsy-Cl6MoCrj.cjs.map → standards-sdk.es45-BxAtDqsy-CgdxACc0.cjs.map} +1 -1
  8. package/dist/cjs/{standards-sdk.es46-BI8ACeLM-BR1WD_Xw.cjs → standards-sdk.es46-BI8ACeLM-BGCe3D9D.cjs} +2 -2
  9. package/dist/cjs/{standards-sdk.es46-BI8ACeLM-BR1WD_Xw.cjs.map → standards-sdk.es46-BI8ACeLM-BGCe3D9D.cjs.map} +1 -1
  10. package/dist/cjs/{standards-sdk.es47-DbkY3FlD-BXROBhk6.cjs → standards-sdk.es47-DbkY3FlD-D_0d3__x.cjs} +2 -2
  11. package/dist/cjs/{standards-sdk.es47-DbkY3FlD-BXROBhk6.cjs.map → standards-sdk.es47-DbkY3FlD-D_0d3__x.cjs.map} +1 -1
  12. package/dist/cjs/{standards-sdk.es48-DzT9Qc3F-CUBjLzNJ.cjs → standards-sdk.es48-DzT9Qc3F-DI0jqd71.cjs} +2 -2
  13. package/dist/cjs/{standards-sdk.es48-DzT9Qc3F-CUBjLzNJ.cjs.map → standards-sdk.es48-DzT9Qc3F-DI0jqd71.cjs.map} +1 -1
  14. package/dist/cjs/utils/logger.d.ts +1 -0
  15. package/dist/cjs/utils/logger.d.ts.map +1 -1
  16. package/dist/es/standards-sdk.es26.js +37 -5
  17. package/dist/es/standards-sdk.es26.js.map +1 -1
  18. package/dist/es/standards-sdk.es31.js +15 -15
  19. package/dist/es/standards-sdk.es31.js.map +1 -1
  20. package/dist/es/utils/logger.d.ts +1 -0
  21. package/dist/es/utils/logger.d.ts.map +1 -1
  22. package/package.json +1 -1
  23. package/dist/cjs/index-BiqAcECs.cjs.map +0 -1
@@ -15,6 +15,7 @@ export declare class Logger {
15
15
  getLevel(): LogLevel;
16
16
  setSilent(silent: boolean): void;
17
17
  setModule(module: string): void;
18
+ private formatArgs;
18
19
  debug(...args: any[]): void;
19
20
  info(...args: any[]): void;
20
21
  warn(...args: any[]): void;
@@ -1 +1 @@
1
- {"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../../src/utils/logger.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,QAAQ,GAAG,OAAO,GAAG,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,QAAQ,CAAC;AAEtE,MAAM,WAAW,aAAa;IAC5B,KAAK,CAAC,EAAE,QAAQ,CAAC;IACjB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,MAAM,CAAC,EAAE,OAAO,CAAC;CAClB;AACD,qBAAa,MAAM;IACjB,OAAO,CAAC,MAAM,CAAC,SAAS,CAAkC;IAC1D,OAAO,CAAC,MAAM,CAAc;IAC5B,OAAO,CAAC,aAAa,CAAS;gBAElB,OAAO,GAAE,aAAkB;IA2BvC,MAAM,CAAC,WAAW,CAAC,OAAO,GAAE,aAAkB,GAAG,MAAM;IAmBvD,WAAW,CAAC,KAAK,EAAE,QAAQ,GAAG,IAAI;IAIlC,QAAQ,IAAI,QAAQ;IAIpB,SAAS,CAAC,MAAM,EAAE,OAAO,GAAG,IAAI;IAMhC,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI3B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI1B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI1B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI3B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;CAG5B"}
1
+ {"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../../src/utils/logger.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,QAAQ,GAAG,OAAO,GAAG,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,QAAQ,CAAC;AAEtE,MAAM,WAAW,aAAa;IAC5B,KAAK,CAAC,EAAE,QAAQ,CAAC;IACjB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,MAAM,CAAC,EAAE,OAAO,CAAC;CAClB;AACD,qBAAa,MAAM;IACjB,OAAO,CAAC,MAAM,CAAC,SAAS,CAAkC;IAC1D,OAAO,CAAC,MAAM,CAAc;IAC5B,OAAO,CAAC,aAAa,CAAS;gBAElB,OAAO,GAAE,aAAkB;IA2BvC,MAAM,CAAC,WAAW,CAAC,OAAO,GAAE,aAAkB,GAAG,MAAM;IAmBvD,WAAW,CAAC,KAAK,EAAE,QAAQ,GAAG,IAAI;IAIlC,QAAQ,IAAI,QAAQ;IAIpB,SAAS,CAAC,MAAM,EAAE,OAAO,GAAG,IAAI;IAMhC,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B,OAAO,CAAC,UAAU;IA2BlB,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM3B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM1B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM1B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM3B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;CAK5B"}
@@ -48,20 +48,52 @@ const _Logger = class _Logger {
48
48
  setModule(module) {
49
49
  this.moduleContext = module;
50
50
  }
51
+ formatArgs(args) {
52
+ if (args.length === 0) {
53
+ return { msg: "" };
54
+ }
55
+ if (args.length === 1) {
56
+ if (typeof args[0] === "string") {
57
+ return { msg: args[0] };
58
+ }
59
+ return { msg: "", data: args[0] };
60
+ }
61
+ const stringArgs = [];
62
+ const objectArgs = [];
63
+ args.forEach((arg) => {
64
+ if (typeof arg === "string" || typeof arg === "number" || typeof arg === "boolean") {
65
+ stringArgs.push(String(arg));
66
+ } else {
67
+ objectArgs.push(arg);
68
+ }
69
+ });
70
+ const msg = stringArgs.join(" ");
71
+ return objectArgs.length > 0 ? { msg, data: objectArgs } : { msg };
72
+ }
51
73
  debug(...args) {
52
- this.logger.debug({ module: this.moduleContext }, ...args);
74
+ const { msg, data } = this.formatArgs(args);
75
+ const logObj = { module: this.moduleContext, ...data && { data } };
76
+ this.logger.debug(logObj, msg);
53
77
  }
54
78
  info(...args) {
55
- this.logger.info({ module: this.moduleContext }, ...args);
79
+ const { msg, data } = this.formatArgs(args);
80
+ const logObj = { module: this.moduleContext, ...data && { data } };
81
+ this.logger.info(logObj, msg);
56
82
  }
57
83
  warn(...args) {
58
- this.logger.warn({ module: this.moduleContext }, ...args);
84
+ const { msg, data } = this.formatArgs(args);
85
+ const logObj = { module: this.moduleContext, ...data && { data } };
86
+ this.logger.warn(logObj, msg);
59
87
  }
60
88
  error(...args) {
61
- this.logger.error({ module: this.moduleContext }, ...args);
89
+ const { msg, data } = this.formatArgs(args);
90
+ const logObj = { module: this.moduleContext, ...data && { data } };
91
+ this.logger.error(logObj, msg);
62
92
  }
63
93
  trace(...args) {
64
- this.logger.trace({ module: this.moduleContext }, ...args);
94
+ const { msg, data } = this.formatArgs(args);
95
+ const logObj = { module: this.moduleContext, ...data && { data } };
96
+ this.logger.trace(logObj, msg);
65
97
  }
66
98
  };
67
99
  _Logger.instances = /* @__PURE__ */ new Map();
@@ -1 +1 @@
1
- {"version":3,"file":"standards-sdk.es26.js","sources":["../../src/utils/logger.ts"],"sourcesContent":["import pino from 'pino';\n\nexport type LogLevel = 'debug' | 'info' | 'warn' | 'error' | 'silent';\n\nexport interface LoggerOptions {\n level?: LogLevel;\n module?: string;\n prettyPrint?: boolean;\n silent?: boolean;\n}\nexport class Logger {\n private static instances: Map<string, Logger> = new Map();\n private logger: pino.Logger;\n private moduleContext: string;\n\n constructor(options: LoggerOptions = {}) {\n const globalDisable = process.env.DISABLE_LOGS === 'true';\n\n const shouldSilence = options.silent || globalDisable;\n const level = shouldSilence ? 'silent' : options.level || 'info';\n this.moduleContext = options.module || 'app';\n\n const shouldEnablePrettyPrint =\n !shouldSilence && options.prettyPrint !== false;\n const pinoOptions: pino.LoggerOptions = {\n level,\n enabled: !shouldSilence,\n transport: shouldEnablePrettyPrint\n ? {\n target: 'pino-pretty',\n options: {\n colorize: true,\n translateTime: 'SYS:standard',\n ignore: 'pid,hostname',\n },\n }\n : undefined,\n };\n\n this.logger = pino(pinoOptions);\n }\n\n static getInstance(options: LoggerOptions = {}): Logger {\n const moduleKey = options.module || 'default';\n\n const globalDisable = process.env.DISABLE_LOGS === 'true';\n\n if (globalDisable && Logger.instances.has(moduleKey)) {\n const existingLogger = Logger.instances.get(moduleKey)!;\n if (existingLogger.getLevel() !== 'silent') {\n Logger.instances.delete(moduleKey);\n }\n }\n\n if (!Logger.instances.has(moduleKey)) {\n Logger.instances.set(moduleKey, new Logger(options));\n }\n\n return Logger.instances.get(moduleKey)!;\n }\n\n setLogLevel(level: LogLevel): void {\n this.logger.level = level;\n }\n\n getLevel(): LogLevel {\n return this.logger.level as LogLevel;\n }\n\n setSilent(silent: boolean): void {\n if (silent) {\n this.logger.level = 'silent';\n }\n }\n\n setModule(module: string): void {\n this.moduleContext = module;\n }\n\n debug(...args: any[]): void {\n this.logger.debug({ module: this.moduleContext }, ...args);\n }\n\n info(...args: any[]): void {\n this.logger.info({ module: this.moduleContext }, ...args);\n }\n\n warn(...args: any[]): void {\n this.logger.warn({ module: this.moduleContext }, ...args);\n }\n\n error(...args: any[]): void {\n this.logger.error({ module: this.moduleContext }, ...args);\n }\n\n trace(...args: any[]): void {\n this.logger.trace({ module: this.moduleContext }, ...args);\n }\n}\n"],"names":[],"mappings":";AAUO,MAAM,UAAN,MAAM,QAAO;AAAA,EAKlB,YAAY,UAAyB,IAAI;AACvC,UAAM,gBAAgB,QAAQ,IAAI,iBAAiB;AAEnD,UAAM,gBAAgB,QAAQ,UAAU;AACxC,UAAM,QAAQ,gBAAgB,WAAW,QAAQ,SAAS;AAC1D,SAAK,gBAAgB,QAAQ,UAAU;AAEvC,UAAM,0BACJ,CAAC,iBAAiB,QAAQ,gBAAgB;AAC5C,UAAM,cAAkC;AAAA,MACtC;AAAA,MACA,SAAS,CAAC;AAAA,MACV,WAAW,0BACP;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,UAAU;AAAA,UACV,eAAe;AAAA,UACf,QAAQ;AAAA,QAAA;AAAA,MACV,IAEF;AAAA,IAAA;AAGN,SAAK,SAAS,KAAK,WAAW;AAAA,EAChC;AAAA,EAEA,OAAO,YAAY,UAAyB,IAAY;AACtD,UAAM,YAAY,QAAQ,UAAU;AAEpC,UAAM,gBAAgB,QAAQ,IAAI,iBAAiB;AAEnD,QAAI,iBAAiB,QAAO,UAAU,IAAI,SAAS,GAAG;AACpD,YAAM,iBAAiB,QAAO,UAAU,IAAI,SAAS;AACrD,UAAI,eAAe,SAAA,MAAe,UAAU;AAC1C,gBAAO,UAAU,OAAO,SAAS;AAAA,MACnC;AAAA,IACF;AAEA,QAAI,CAAC,QAAO,UAAU,IAAI,SAAS,GAAG;AACpC,cAAO,UAAU,IAAI,WAAW,IAAI,QAAO,OAAO,CAAC;AAAA,IACrD;AAEA,WAAO,QAAO,UAAU,IAAI,SAAS;AAAA,EACvC;AAAA,EAEA,YAAY,OAAuB;AACjC,SAAK,OAAO,QAAQ;AAAA,EACtB;AAAA,EAEA,WAAqB;AACnB,WAAO,KAAK,OAAO;AAAA,EACrB;AAAA,EAEA,UAAU,QAAuB;AAC/B,QAAI,QAAQ;AACV,WAAK,OAAO,QAAQ;AAAA,IACtB;AAAA,EACF;AAAA,EAEA,UAAU,QAAsB;AAC9B,SAAK,gBAAgB;AAAA,EACvB;AAAA,EAEA,SAAS,MAAmB;AAC1B,SAAK,OAAO,MAAM,EAAE,QAAQ,KAAK,cAAA,GAAiB,GAAG,IAAI;AAAA,EAC3D;AAAA,EAEA,QAAQ,MAAmB;AACzB,SAAK,OAAO,KAAK,EAAE,QAAQ,KAAK,cAAA,GAAiB,GAAG,IAAI;AAAA,EAC1D;AAAA,EAEA,QAAQ,MAAmB;AACzB,SAAK,OAAO,KAAK,EAAE,QAAQ,KAAK,cAAA,GAAiB,GAAG,IAAI;AAAA,EAC1D;AAAA,EAEA,SAAS,MAAmB;AAC1B,SAAK,OAAO,MAAM,EAAE,QAAQ,KAAK,cAAA,GAAiB,GAAG,IAAI;AAAA,EAC3D;AAAA,EAEA,SAAS,MAAmB;AAC1B,SAAK,OAAO,MAAM,EAAE,QAAQ,KAAK,cAAA,GAAiB,GAAG,IAAI;AAAA,EAC3D;AACF;AAvFE,QAAe,gCAAqC,IAAA;AAD/C,IAAM,SAAN;"}
1
+ {"version":3,"file":"standards-sdk.es26.js","sources":["../../src/utils/logger.ts"],"sourcesContent":["import pino from 'pino';\n\nexport type LogLevel = 'debug' | 'info' | 'warn' | 'error' | 'silent';\n\nexport interface LoggerOptions {\n level?: LogLevel;\n module?: string;\n prettyPrint?: boolean;\n silent?: boolean;\n}\nexport class Logger {\n private static instances: Map<string, Logger> = new Map();\n private logger: pino.Logger;\n private moduleContext: string;\n\n constructor(options: LoggerOptions = {}) {\n const globalDisable = process.env.DISABLE_LOGS === 'true';\n\n const shouldSilence = options.silent || globalDisable;\n const level = shouldSilence ? 'silent' : options.level || 'info';\n this.moduleContext = options.module || 'app';\n\n const shouldEnablePrettyPrint =\n !shouldSilence && options.prettyPrint !== false;\n const pinoOptions: pino.LoggerOptions = {\n level,\n enabled: !shouldSilence,\n transport: shouldEnablePrettyPrint\n ? {\n target: 'pino-pretty',\n options: {\n colorize: true,\n translateTime: 'SYS:standard',\n ignore: 'pid,hostname',\n },\n }\n : undefined,\n };\n\n this.logger = pino(pinoOptions);\n }\n\n static getInstance(options: LoggerOptions = {}): Logger {\n const moduleKey = options.module || 'default';\n\n const globalDisable = process.env.DISABLE_LOGS === 'true';\n\n if (globalDisable && Logger.instances.has(moduleKey)) {\n const existingLogger = Logger.instances.get(moduleKey)!;\n if (existingLogger.getLevel() !== 'silent') {\n Logger.instances.delete(moduleKey);\n }\n }\n\n if (!Logger.instances.has(moduleKey)) {\n Logger.instances.set(moduleKey, new Logger(options));\n }\n\n return Logger.instances.get(moduleKey)!;\n }\n\n setLogLevel(level: LogLevel): void {\n this.logger.level = level;\n }\n\n getLevel(): LogLevel {\n return this.logger.level as LogLevel;\n }\n\n setSilent(silent: boolean): void {\n if (silent) {\n this.logger.level = 'silent';\n }\n }\n\n setModule(module: string): void {\n this.moduleContext = module;\n }\n\n private formatArgs(args: any[]): { msg: string; data?: any } {\n if (args.length === 0) {\n return { msg: '' };\n }\n\n if (args.length === 1) {\n if (typeof args[0] === 'string') {\n return { msg: args[0] };\n }\n return { msg: '', data: args[0] };\n }\n\n const stringArgs: string[] = [];\n const objectArgs: any[] = [];\n\n args.forEach(arg => {\n if (typeof arg === 'string' || typeof arg === 'number' || typeof arg === 'boolean') {\n stringArgs.push(String(arg));\n } else {\n objectArgs.push(arg);\n }\n });\n\n const msg = stringArgs.join(' ');\n return objectArgs.length > 0 ? { msg, data: objectArgs } : { msg };\n }\n\n debug(...args: any[]): void {\n const { msg, data } = this.formatArgs(args);\n const logObj = { module: this.moduleContext, ...(data && { data }) };\n this.logger.debug(logObj, msg);\n }\n\n info(...args: any[]): void {\n const { msg, data } = this.formatArgs(args);\n const logObj = { module: this.moduleContext, ...(data && { data }) };\n this.logger.info(logObj, msg);\n }\n\n warn(...args: any[]): void {\n const { msg, data } = this.formatArgs(args);\n const logObj = { module: this.moduleContext, ...(data && { data }) };\n this.logger.warn(logObj, msg);\n }\n\n error(...args: any[]): void {\n const { msg, data } = this.formatArgs(args);\n const logObj = { module: this.moduleContext, ...(data && { data }) };\n this.logger.error(logObj, msg);\n }\n\n trace(...args: any[]): void {\n const { msg, data } = this.formatArgs(args);\n const logObj = { module: this.moduleContext, ...(data && { data }) };\n this.logger.trace(logObj, msg);\n }\n}\n"],"names":[],"mappings":";AAUO,MAAM,UAAN,MAAM,QAAO;AAAA,EAKlB,YAAY,UAAyB,IAAI;AACvC,UAAM,gBAAgB,QAAQ,IAAI,iBAAiB;AAEnD,UAAM,gBAAgB,QAAQ,UAAU;AACxC,UAAM,QAAQ,gBAAgB,WAAW,QAAQ,SAAS;AAC1D,SAAK,gBAAgB,QAAQ,UAAU;AAEvC,UAAM,0BACJ,CAAC,iBAAiB,QAAQ,gBAAgB;AAC5C,UAAM,cAAkC;AAAA,MACtC;AAAA,MACA,SAAS,CAAC;AAAA,MACV,WAAW,0BACP;AAAA,QACE,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,UAAU;AAAA,UACV,eAAe;AAAA,UACf,QAAQ;AAAA,QAAA;AAAA,MACV,IAEF;AAAA,IAAA;AAGN,SAAK,SAAS,KAAK,WAAW;AAAA,EAChC;AAAA,EAEA,OAAO,YAAY,UAAyB,IAAY;AACtD,UAAM,YAAY,QAAQ,UAAU;AAEpC,UAAM,gBAAgB,QAAQ,IAAI,iBAAiB;AAEnD,QAAI,iBAAiB,QAAO,UAAU,IAAI,SAAS,GAAG;AACpD,YAAM,iBAAiB,QAAO,UAAU,IAAI,SAAS;AACrD,UAAI,eAAe,SAAA,MAAe,UAAU;AAC1C,gBAAO,UAAU,OAAO,SAAS;AAAA,MACnC;AAAA,IACF;AAEA,QAAI,CAAC,QAAO,UAAU,IAAI,SAAS,GAAG;AACpC,cAAO,UAAU,IAAI,WAAW,IAAI,QAAO,OAAO,CAAC;AAAA,IACrD;AAEA,WAAO,QAAO,UAAU,IAAI,SAAS;AAAA,EACvC;AAAA,EAEA,YAAY,OAAuB;AACjC,SAAK,OAAO,QAAQ;AAAA,EACtB;AAAA,EAEA,WAAqB;AACnB,WAAO,KAAK,OAAO;AAAA,EACrB;AAAA,EAEA,UAAU,QAAuB;AAC/B,QAAI,QAAQ;AACV,WAAK,OAAO,QAAQ;AAAA,IACtB;AAAA,EACF;AAAA,EAEA,UAAU,QAAsB;AAC9B,SAAK,gBAAgB;AAAA,EACvB;AAAA,EAEQ,WAAW,MAA0C;AAC3D,QAAI,KAAK,WAAW,GAAG;AACrB,aAAO,EAAE,KAAK,GAAA;AAAA,IAChB;AAEA,QAAI,KAAK,WAAW,GAAG;AACrB,UAAI,OAAO,KAAK,CAAC,MAAM,UAAU;AAC/B,eAAO,EAAE,KAAK,KAAK,CAAC,EAAA;AAAA,MACtB;AACA,aAAO,EAAE,KAAK,IAAI,MAAM,KAAK,CAAC,EAAA;AAAA,IAChC;AAEA,UAAM,aAAuB,CAAA;AAC7B,UAAM,aAAoB,CAAA;AAE1B,SAAK,QAAQ,CAAA,QAAO;AAClB,UAAI,OAAO,QAAQ,YAAY,OAAO,QAAQ,YAAY,OAAO,QAAQ,WAAW;AAClF,mBAAW,KAAK,OAAO,GAAG,CAAC;AAAA,MAC7B,OAAO;AACL,mBAAW,KAAK,GAAG;AAAA,MACrB;AAAA,IACF,CAAC;AAED,UAAM,MAAM,WAAW,KAAK,GAAG;AAC/B,WAAO,WAAW,SAAS,IAAI,EAAE,KAAK,MAAM,eAAe,EAAE,IAAA;AAAA,EAC/D;AAAA,EAEA,SAAS,MAAmB;AAC1B,UAAM,EAAE,KAAK,KAAA,IAAS,KAAK,WAAW,IAAI;AAC1C,UAAM,SAAS,EAAE,QAAQ,KAAK,eAAe,GAAI,QAAQ,EAAE,OAAK;AAChE,SAAK,OAAO,MAAM,QAAQ,GAAG;AAAA,EAC/B;AAAA,EAEA,QAAQ,MAAmB;AACzB,UAAM,EAAE,KAAK,KAAA,IAAS,KAAK,WAAW,IAAI;AAC1C,UAAM,SAAS,EAAE,QAAQ,KAAK,eAAe,GAAI,QAAQ,EAAE,OAAK;AAChE,SAAK,OAAO,KAAK,QAAQ,GAAG;AAAA,EAC9B;AAAA,EAEA,QAAQ,MAAmB;AACzB,UAAM,EAAE,KAAK,KAAA,IAAS,KAAK,WAAW,IAAI;AAC1C,UAAM,SAAS,EAAE,QAAQ,KAAK,eAAe,GAAI,QAAQ,EAAE,OAAK;AAChE,SAAK,OAAO,KAAK,QAAQ,GAAG;AAAA,EAC9B;AAAA,EAEA,SAAS,MAAmB;AAC1B,UAAM,EAAE,KAAK,KAAA,IAAS,KAAK,WAAW,IAAI;AAC1C,UAAM,SAAS,EAAE,QAAQ,KAAK,eAAe,GAAI,QAAQ,EAAE,OAAK;AAChE,SAAK,OAAO,MAAM,QAAQ,GAAG;AAAA,EAC/B;AAAA,EAEA,SAAS,MAAmB;AAC1B,UAAM,EAAE,KAAK,KAAA,IAAS,KAAK,WAAW,IAAI;AAC1C,UAAM,SAAS,EAAE,QAAQ,KAAK,eAAe,GAAI,QAAQ,EAAE,OAAK;AAChE,SAAK,OAAO,MAAM,QAAQ,GAAG;AAAA,EAC/B;AACF;AA5HE,QAAe,gCAAqC,IAAA;AAD/C,IAAM,SAAN;"}
@@ -11,20 +11,20 @@ const _KeyTypeDetector = class _KeyTypeDetector {
11
11
  *
12
12
  * This detector is designed for private keys only. It uses various heuristics to determine
13
13
  * the key type for ambiguous 32-byte keys, including byte patterns and statistical analysis.
14
- *
14
+ *
15
15
  * For ambiguous cases (where confidence is 'uncertain'), if you have the associated account ID,
16
16
  * you can use the Hedera mirror node to confirm the key type.
17
17
  *
18
18
  * @param keyInput - The key to detect, can be a string (hex, base64, PEM), Buffer, or Uint8Array
19
19
  * @returns KeyInfo object containing the detected key type and metadata
20
- *
20
+ *
21
21
  * @example
22
22
  * // Detect from hex string
23
23
  * const info1 = KeyTypeDetector.detect('0x7f96cea0c0d9d5bfb3ab8a42cf0cea44d57f62f2e068f8e5a3251914a9252b04');
24
- *
24
+ *
25
25
  * // Detect from DER-encoded string
26
26
  * const info2 = KeyTypeDetector.detect(privateKey.toStringDer());
27
- *
27
+ *
28
28
  * // Detect from PEM format
29
29
  * const info3 = KeyTypeDetector.detect(`-----BEGIN PRIVATE KEY-----
30
30
  * MC4CAQAwBQYDK2VwBCIEIGRchBsQGQduAAGBQ7GAkKCKkmQ3EGCARwHsHiRqTNR9
@@ -73,7 +73,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
73
73
  }
74
74
  /**
75
75
  * Detect key type from raw bytes
76
- *
76
+ *
77
77
  * @param bytes - The raw bytes of the key
78
78
  * @param format - The original format of the key
79
79
  * @returns KeyInfo object with detection results
@@ -186,7 +186,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
186
186
  }
187
187
  /**
188
188
  * Detect key type from PEM format
189
- *
189
+ *
190
190
  * @param pem - The PEM-encoded key string
191
191
  * @returns KeyInfo object with detection results
192
192
  * @private
@@ -246,7 +246,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
246
246
  }
247
247
  /**
248
248
  * Try to create a key using Hedera SDK to validate the type
249
- *
249
+ *
250
250
  * @param keyInput - The key input string or bytes
251
251
  * @returns KeyInfo object with detection results
252
252
  * @private
@@ -292,12 +292,12 @@ const _KeyTypeDetector = class _KeyTypeDetector {
292
292
  }
293
293
  /**
294
294
  * Detect key type by attempting to sign a message with both algorithms
295
- *
295
+ *
296
296
  * For ambiguous cases where both algorithms can use the key, this method
297
297
  * uses heuristics to make a best-effort determination. For production use
298
298
  * with ambiguous keys, consider using the Hedera mirror node to confirm
299
299
  * the key type if you have the associated account ID.
300
- *
300
+ *
301
301
  * @param hexKey - The hex string representation of the key
302
302
  * @returns Object containing type, confidence level, and optional warning
303
303
  * @private
@@ -385,7 +385,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
385
385
  }
386
386
  /**
387
387
  * Check if a string is valid hexadecimal with even length
388
- *
388
+ *
389
389
  * @param str - The string to check
390
390
  * @returns True if the string is valid hex with even length
391
391
  * @private
@@ -395,7 +395,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
395
395
  }
396
396
  /**
397
397
  * Check if a string is valid base64
398
- *
398
+ *
399
399
  * @param str - The string to check
400
400
  * @returns True if the string is valid base64
401
401
  * @private
@@ -409,7 +409,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
409
409
  }
410
410
  /**
411
411
  * Convert a hex string to bytes
412
- *
412
+ *
413
413
  * @param hex - The hex string to convert
414
414
  * @returns Uint8Array of bytes
415
415
  * @private
@@ -423,7 +423,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
423
423
  }
424
424
  /**
425
425
  * Check if bytes start with a specific prefix
426
- *
426
+ *
427
427
  * @param bytes - The bytes to check
428
428
  * @param prefix - The prefix to look for
429
429
  * @returns True if bytes start with the prefix
@@ -438,7 +438,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
438
438
  }
439
439
  /**
440
440
  * Check if bytes contain an ECDSA private key pattern
441
- *
441
+ *
442
442
  * @param bytes - The bytes to check
443
443
  * @returns True if ECDSA private key pattern is found
444
444
  * @private
@@ -453,7 +453,7 @@ const _KeyTypeDetector = class _KeyTypeDetector {
453
453
  }
454
454
  /**
455
455
  * Extract ECDSA private key from DER structure
456
- *
456
+ *
457
457
  * @param bytes - The DER encoded bytes
458
458
  * @returns The extracted private key bytes
459
459
  * @private
@@ -1 +1 @@
1
- {"version":3,"file":"standards-sdk.es31.js","sources":["../../src/utils/key-type-detector.ts"],"sourcesContent":["import { PrivateKey } from '@hashgraph/sdk';\n\n/**\n * Enumeration of supported key types\n */\nexport enum KeyType {\n ED25519 = 'ed25519',\n ECDSA = 'ecdsa',\n UNKNOWN = 'unknown',\n}\n\n/**\n * Result of key type detection\n */\nexport interface KeyInfo {\n /** Detected key type (ED25519, ECDSA, or UNKNOWN) */\n type: KeyType;\n /** Format of the provided key */\n format: 'hex' | 'der' | 'pem' | 'raw';\n /** Whether the key is a private key */\n isPrivateKey: boolean;\n /** Raw bytes of the key (if available) */\n rawBytes?: Uint8Array;\n /** Confidence level of the detection */\n confidence: 'certain' | 'uncertain';\n /** Warning message for uncertain detections */\n warning?: string;\n}\n\n/**\n * Legacy interface for backward compatibility\n */\nexport interface KeyDetectionResult {\n /** Detected key type */\n detectedType: 'ed25519' | 'ecdsa';\n /** Parsed private key */\n privateKey: PrivateKey;\n /** Optional warning for ambiguous keys */\n warning?: string;\n}\n\n/**\n * Utility class for detecting cryptographic key types used in Hedera\n *\n * This class provides methods to determine whether a key is ED25519 or ECDSA\n * based on various input formats (hex, DER, PEM) and detection strategies.\n *\n * For ambiguous 32-byte raw keys, it uses heuristics and signature testing\n * to make a best-effort determination. When confidence is 'uncertain',\n * consider using the Hedera mirror node to confirm the key type if you have\n * the associated account ID.\n *\n * @example\n * // Detect key type from a hex string\n * const keyInfo = KeyTypeDetector.detect('0x' + privateKey.toStringRaw());\n * if (keyInfo.confidence === 'uncertain') {\n * console.warn(keyInfo.warning);\n * // Consider checking mirror node if account ID is available\n * }\n */\nexport class KeyTypeDetector {\n private static readonly ED25519_PUBLIC_KEY_LENGTH = 32;\n private static readonly ED25519_EXPANDED_PRIVATE_KEY_LENGTH = 64;\n\n private static readonly ED25519_PUBLIC_KEY_PREFIX = Buffer.from([\n 0x30, 0x2a, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70, 0x03, 0x21, 0x00,\n ]);\n private static readonly ED25519_PRIVATE_KEY_PREFIX = Buffer.from([\n 0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70,\n 0x04, 0x22, 0x04, 0x20,\n ]);\n\n private static readonly ECDSA_SECP256K1_PUBLIC_KEY_PREFIX = Buffer.from([\n 0x30, 0x56, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02,\n 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x0a, 0x03, 0x42, 0x00,\n ]);\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX = Buffer.from([\n 0x30, 0x74, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT =\n Buffer.from([\n 0x30, 0x30, 0x02, 0x01, 0x00, 0x30, 0x07, 0x06, 0x05, 0x2b, 0x81, 0x04,\n 0x00, 0x0a, 0x04, 0x22, 0x04, 0x20,\n ]);\n\n // Additional ECDSA private key variants\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG = Buffer.from(\n [0x30, 0x77, 0x02, 0x01, 0x01, 0x04, 0x20],\n );\n\n /**\n * Detects private key type from various input formats without throwing errors\n *\n * This detector is designed for private keys only. It uses various heuristics to determine\n * the key type for ambiguous 32-byte keys, including byte patterns and statistical analysis.\n *\n * For ambiguous cases (where confidence is 'uncertain'), if you have the associated account ID,\n * you can use the Hedera mirror node to confirm the key type.\n *\n * @param keyInput - The key to detect, can be a string (hex, base64, PEM), Buffer, or Uint8Array\n * @returns KeyInfo object containing the detected key type and metadata\n *\n * @example\n * // Detect from hex string\n * const info1 = KeyTypeDetector.detect('0x7f96cea0c0d9d5bfb3ab8a42cf0cea44d57f62f2e068f8e5a3251914a9252b04');\n *\n * // Detect from DER-encoded string\n * const info2 = KeyTypeDetector.detect(privateKey.toStringDer());\n *\n * // Detect from PEM format\n * const info3 = KeyTypeDetector.detect(`-----BEGIN PRIVATE KEY-----\n * MC4CAQAwBQYDK2VwBCIEIGRchBsQGQduAAGBQ7GAkKCKkmQ3EGCARwHsHiRqTNR9\n * -----END PRIVATE KEY-----`);\n */\n static detect(keyInput: string | Uint8Array | Buffer): KeyInfo {\n try {\n let keyBytes: Uint8Array;\n let originalFormat: 'hex' | 'der' | 'pem' | 'raw' = 'raw';\n\n if (typeof keyInput === 'string') {\n let trimmed = keyInput.trim();\n\n if (trimmed.includes('-----BEGIN')) {\n return this.detectFromPem(trimmed);\n }\n\n if (trimmed.toLowerCase().startsWith('0x')) {\n trimmed = trimmed.substring(2);\n }\n\n if (this.isValidHex(trimmed)) {\n keyBytes = this.hexToBytes(trimmed);\n originalFormat = 'hex';\n } else if (this.isBase64(trimmed)) {\n keyBytes = Buffer.from(trimmed, 'base64');\n originalFormat = 'der';\n } else {\n return {\n type: KeyType.UNKNOWN,\n format: 'raw',\n isPrivateKey: false,\n confidence: 'certain',\n };\n }\n } else if (keyInput instanceof Buffer) {\n keyBytes = new Uint8Array(keyInput);\n } else {\n keyBytes = keyInput as Uint8Array;\n }\n\n return this.detectFromBytes(keyBytes, originalFormat);\n } catch (error) {\n return {\n type: KeyType.UNKNOWN,\n format: 'raw',\n isPrivateKey: false,\n confidence: 'certain',\n };\n }\n }\n\n /**\n * Detect key type from raw bytes\n *\n * @param bytes - The raw bytes of the key\n * @param format - The original format of the key\n * @returns KeyInfo object with detection results\n * @private\n */\n private static detectFromBytes(\n bytes: Uint8Array,\n format: 'hex' | 'der' | 'pem' | 'raw',\n ): KeyInfo {\n if (this.hasPrefix(bytes, this.ED25519_PUBLIC_KEY_PREFIX)) {\n const keyStart = this.ED25519_PUBLIC_KEY_PREFIX.length;\n return {\n type: KeyType.ED25519,\n format: 'der',\n isPrivateKey: false,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ED25519_PRIVATE_KEY_PREFIX)) {\n const keyStart = this.ED25519_PRIVATE_KEY_PREFIX.length;\n if (bytes.length >= keyStart + 32) {\n return {\n type: KeyType.ED25519,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX)) {\n const keyStart = this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: false,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n\n if (bytes.length > 36 && this.containsECDSAPrivateKeyPattern(bytes)) {\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: this.extractECDSAPrivateKey(bytes),\n confidence: 'certain',\n };\n }\n\n switch (bytes.length) {\n case this.ED25519_PUBLIC_KEY_LENGTH:\n // 32-byte keys are ambiguous - could be either ED25519 or ECDSA private keys\n if (format === 'hex') {\n const hexStr = Array.from(bytes)\n .map(b => b.toString(16).padStart(2, '0'))\n .join('');\n\n // Try as private key\n const privateResult = this.tryCreateKey(hexStr);\n if (privateResult.type !== KeyType.UNKNOWN) {\n return privateResult;\n }\n }\n // Cannot determine type for 32-byte keys without additional context\n return {\n type: KeyType.UNKNOWN,\n format: format,\n isPrivateKey: false,\n rawBytes: bytes,\n confidence: 'certain',\n };\n\n case this.ED25519_EXPANDED_PRIVATE_KEY_LENGTH:\n return {\n type: KeyType.ED25519,\n format: format,\n isPrivateKey: true,\n rawBytes: bytes,\n confidence: 'certain',\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: format,\n isPrivateKey: false,\n rawBytes: bytes,\n confidence: 'certain',\n };\n }\n\n /**\n * Detect key type from PEM format\n *\n * @param pem - The PEM-encoded key string\n * @returns KeyInfo object with detection results\n * @private\n */\n private static detectFromPem(pem: string): KeyInfo {\n const trimmedPem = pem.trim();\n const isPrivateKey = trimmedPem.includes('PRIVATE KEY');\n\n const pemTypes = {\n EC_PRIVATE: /-----BEGIN EC PRIVATE KEY-----/,\n EC_PUBLIC: /-----BEGIN EC PUBLIC KEY-----/,\n PRIVATE: /-----BEGIN PRIVATE KEY-----/,\n PUBLIC: /-----BEGIN PUBLIC KEY-----/,\n };\n\n let isECKey = false;\n for (const [type, regex] of Object.entries(pemTypes)) {\n if (regex.test(trimmedPem) && type.includes('EC')) {\n isECKey = true;\n break;\n }\n }\n\n const base64Match = trimmedPem.match(\n /-----BEGIN[\\s\\S]+?-----[\\r\\n]+([\\s\\S]+?)[\\r\\n]+-----END/,\n );\n if (!base64Match) {\n return {\n type: KeyType.UNKNOWN,\n format: 'pem',\n isPrivateKey,\n confidence: 'certain',\n };\n }\n\n const base64Content = base64Match[1].replace(/\\s/g, '');\n try {\n const derBytes = Buffer.from(base64Content, 'base64');\n const result = this.detectFromBytes(new Uint8Array(derBytes), 'der');\n\n if (result.type === KeyType.UNKNOWN && isECKey) {\n return {\n type: KeyType.ECDSA,\n format: 'pem',\n isPrivateKey,\n rawBytes: derBytes,\n confidence: 'certain',\n };\n }\n\n return {\n ...result,\n format: 'pem',\n };\n } catch {\n return {\n type: KeyType.UNKNOWN,\n format: 'pem',\n isPrivateKey,\n confidence: 'certain',\n };\n }\n }\n\n /**\n * Try to create a key using Hedera SDK to validate the type\n *\n * @param keyInput - The key input string or bytes\n * @returns KeyInfo object with detection results\n * @private\n */\n private static tryCreateKey(keyInput: string | Uint8Array): KeyInfo {\n try {\n if (typeof keyInput === 'string') {\n let keyStr = keyInput.trim();\n if (keyStr.toLowerCase().startsWith('0x')) {\n keyStr = keyStr.substring(2);\n }\n\n if (this.isValidHex(keyStr) && keyStr.length === 64) {\n const keyBytes = this.hexToBytes(keyStr);\n\n // Try signature-based detection for ambiguous cases\n const signatureResult = this.detectBySignature(keyStr);\n if (signatureResult.type !== KeyType.UNKNOWN) {\n return {\n type: signatureResult.type,\n format: 'hex',\n isPrivateKey: true,\n rawBytes: keyBytes,\n confidence: signatureResult.confidence,\n warning: signatureResult.warning,\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: 'hex',\n isPrivateKey: false,\n rawBytes: keyBytes,\n confidence: 'certain',\n };\n }\n }\n } catch {\n // SDK creation failed\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: 'hex',\n isPrivateKey: false,\n rawBytes: new Uint8Array(),\n confidence: 'certain',\n };\n }\n\n /**\n * Detect key type by attempting to sign a message with both algorithms\n *\n * For ambiguous cases where both algorithms can use the key, this method\n * uses heuristics to make a best-effort determination. For production use\n * with ambiguous keys, consider using the Hedera mirror node to confirm\n * the key type if you have the associated account ID.\n *\n * @param hexKey - The hex string representation of the key\n * @returns Object containing type, confidence level, and optional warning\n * @private\n */\n private static detectBySignature(hexKey: string): {\n type: KeyType;\n confidence: 'certain' | 'uncertain';\n warning?: string;\n } {\n // ECDSA keys must be in range [1, secp256k1_order - 1]\n // ED25519 accepts any 32-byte value\n const keyBigInt = BigInt('0x' + hexKey);\n const secp256k1Order = BigInt(\n '0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141',\n );\n\n // If the key is 0, it can only be ED25519 (ECDSA requires [1..N-1])\n if (keyBigInt === 0n) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n // If the key is >= secp256k1 order, it can only be ED25519\n if (keyBigInt >= secp256k1Order) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n // For keys below the order, try both algorithms\n let ed25519CanSign = false;\n let ecdsaCanSign = false;\n\n // Try signing with ED25519\n try {\n const ed25519Key = PrivateKey.fromStringED25519(hexKey);\n const testMessage = new Uint8Array([1, 2, 3, 4, 5]);\n const signature = ed25519Key.sign(testMessage);\n if (ed25519Key.publicKey.verify(testMessage, signature)) {\n ed25519CanSign = true;\n }\n } catch {\n // ED25519 signing failed\n }\n\n // Try signing with ECDSA\n try {\n const ecdsaKey = PrivateKey.fromStringECDSA(hexKey);\n const testMessage = new Uint8Array([1, 2, 3, 4, 5]);\n const signature = ecdsaKey.sign(testMessage);\n if (ecdsaKey.publicKey.verify(testMessage, signature)) {\n ecdsaCanSign = true;\n }\n } catch {\n // ECDSA signing failed\n }\n\n // Both can sign for keys below the order\n if (ed25519CanSign && ecdsaCanSign) {\n // Use key characteristics as a tiebreaker\n const keyBytes = this.hexToBytes(hexKey);\n\n // Check for known patterns\n if (keyBytes[0] === 0xa8 && keyBytes[1] === 0x01) {\n return {\n type: KeyType.ED25519,\n confidence: 'uncertain',\n warning:\n 'Detection based on byte pattern heuristic. Both ED25519 and ECDSA accept this key.',\n };\n }\n\n // Count high entropy bytes\n let highBytes = 0;\n for (const byte of keyBytes) {\n if (byte >= 0x80) highBytes++;\n }\n\n // ECDSA keys tend to have more balanced byte distribution\n const highByteRatio = highBytes / keyBytes.length;\n if (highByteRatio >= 0.4 && highByteRatio <= 0.6) {\n return {\n type: KeyType.ECDSA,\n confidence: 'uncertain',\n warning:\n 'Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key.',\n };\n }\n\n // Default to ECDSA for ambiguous keys\n return {\n type: KeyType.ECDSA,\n confidence: 'uncertain',\n warning:\n 'Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key. Defaulting to ECDSA.',\n };\n }\n\n // Only one can sign\n if (ed25519CanSign && !ecdsaCanSign) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n if (ecdsaCanSign && !ed25519CanSign) {\n return {\n type: KeyType.ECDSA,\n confidence: 'certain',\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n confidence: 'certain',\n };\n }\n\n /**\n * Check if a string is valid hexadecimal with even length\n *\n * @param str - The string to check\n * @returns True if the string is valid hex with even length\n * @private\n */\n private static isValidHex(str: string): boolean {\n return /^[0-9a-fA-F]+$/.test(str) && str.length % 2 === 0;\n }\n\n /**\n * Check if a string is valid base64\n *\n * @param str - The string to check\n * @returns True if the string is valid base64\n * @private\n */\n private static isBase64(str: string): boolean {\n try {\n return Buffer.from(str, 'base64').toString('base64') === str;\n } catch {\n return false;\n }\n }\n\n /**\n * Convert a hex string to bytes\n *\n * @param hex - The hex string to convert\n * @returns Uint8Array of bytes\n * @private\n */\n private static hexToBytes(hex: string): Uint8Array {\n const bytes = new Uint8Array(hex.length / 2);\n for (let i = 0; i < hex.length; i += 2) {\n bytes[i / 2] = parseInt(hex.substr(i, 2), 16);\n }\n return bytes;\n }\n\n /**\n * Check if bytes start with a specific prefix\n *\n * @param bytes - The bytes to check\n * @param prefix - The prefix to look for\n * @returns True if bytes start with the prefix\n * @private\n */\n private static hasPrefix(bytes: Uint8Array, prefix: Buffer): boolean {\n if (bytes.length < prefix.length) return false;\n for (let i = 0; i < prefix.length; i++) {\n if (bytes[i] !== prefix[i]) return false;\n }\n return true;\n }\n\n /**\n * Check if bytes contain an ECDSA private key pattern\n *\n * @param bytes - The bytes to check\n * @returns True if ECDSA private key pattern is found\n * @private\n */\n private static containsECDSAPrivateKeyPattern(bytes: Uint8Array): boolean {\n // Look for the ECDSA private key pattern in DER encoding\n for (let i = 0; i < bytes.length - 7; i++) {\n if (\n bytes[i] === 0x30 &&\n bytes[i + 1] === 0x74 &&\n bytes[i + 2] === 0x02 &&\n bytes[i + 3] === 0x01 &&\n bytes[i + 4] === 0x01 &&\n bytes[i + 5] === 0x04 &&\n bytes[i + 6] === 0x20\n ) {\n return true;\n }\n }\n return false;\n }\n\n /**\n * Extract ECDSA private key from DER structure\n *\n * @param bytes - The DER encoded bytes\n * @returns The extracted private key bytes\n * @private\n */\n private static extractECDSAPrivateKey(bytes: Uint8Array): Uint8Array {\n // Find and extract the 32-byte private key from DER structure\n for (let i = 0; i < bytes.length - 32; i++) {\n if (bytes[i] === 0x04 && bytes[i + 1] === 0x20) {\n return bytes.slice(i + 2, i + 34);\n }\n }\n return bytes;\n }\n}\n\n/**\n * Detects the key type from a private key string and returns the parsed PrivateKey\n *\n * This function leverages the KeyTypeDetector class to determine whether a key is\n * ED25519 or ECDSA. It handles parsing the key and provides appropriate warnings\n * for uncertain detections.\n *\n * Note: For ambiguous keys, if you have the associated account ID, consider using\n * the Hedera mirror node to confirm the key type for production use.\n *\n * @param privateKeyString The private key string to detect type from\n * @returns The detected key type, parsed PrivateKey, and optional warning\n * @throws Error if the private key cannot be parsed\n */\nexport function detectKeyTypeFromString(\n privateKeyString: string,\n): KeyDetectionResult {\n // First, use the KeyTypeDetector for advanced detection\n const keyInfo = KeyTypeDetector.detect(privateKeyString);\n\n // If we have a detection of ED25519 or ECDSA, try to use it\n if (keyInfo.type !== KeyType.UNKNOWN) {\n try {\n const privateKey =\n keyInfo.type === KeyType.ECDSA\n ? PrivateKey.fromStringECDSA(privateKeyString)\n : PrivateKey.fromStringED25519(privateKeyString);\n\n // Include warning for uncertain detections\n const result: KeyDetectionResult = {\n detectedType: keyInfo.type as 'ed25519' | 'ecdsa',\n privateKey,\n };\n\n if (keyInfo.confidence === 'uncertain') {\n result.warning =\n `Key type detection is uncertain. If you have the associated account ID, ` +\n `consider using the Hedera mirror node to confirm the key type.`;\n }\n\n return result;\n } catch (error) {\n // If parsing fails despite detection, continue to direct parsing\n }\n }\n\n // If the detector couldn't determine the type or parsing failed,\n // try direct parsing with both key types\n\n // Try ECDSA first (default) as requested\n try {\n const privateKey = PrivateKey.fromStringECDSA(privateKeyString);\n return {\n detectedType: 'ecdsa',\n privateKey,\n warning: `Using ECDSA as default. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`,\n };\n } catch (ecdsaError) {\n // If ECDSA fails, try ED25519\n try {\n const privateKey = PrivateKey.fromStringED25519(privateKeyString);\n return {\n detectedType: 'ed25519',\n privateKey,\n warning: `Using ED25519 as fallback. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`,\n };\n } catch (ed25519Error) {\n // If both fail, throw an error with details\n throw new Error(\n `Failed to parse private key as either ECDSA or ED25519: ${ecdsaError}`,\n );\n }\n }\n}\n"],"names":["KeyType"],"mappings":";AAKO,IAAK,4BAAAA,aAAL;AACLA,WAAA,SAAA,IAAU;AACVA,WAAA,OAAA,IAAQ;AACRA,WAAA,SAAA,IAAU;AAHA,SAAAA;AAAA,GAAA,WAAA,CAAA,CAAA;AAuDL,MAAM,mBAAN,MAAM,iBAAgB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAsD3B,OAAO,OAAO,UAAiD;AAC7D,QAAI;AACF,UAAI;AACJ,UAAI,iBAAgD;AAEpD,UAAI,OAAO,aAAa,UAAU;AAChC,YAAI,UAAU,SAAS,KAAA;AAEvB,YAAI,QAAQ,SAAS,YAAY,GAAG;AAClC,iBAAO,KAAK,cAAc,OAAO;AAAA,QACnC;AAEA,YAAI,QAAQ,YAAA,EAAc,WAAW,IAAI,GAAG;AAC1C,oBAAU,QAAQ,UAAU,CAAC;AAAA,QAC/B;AAEA,YAAI,KAAK,WAAW,OAAO,GAAG;AAC5B,qBAAW,KAAK,WAAW,OAAO;AAClC,2BAAiB;AAAA,QACnB,WAAW,KAAK,SAAS,OAAO,GAAG;AACjC,qBAAW,OAAO,KAAK,SAAS,QAAQ;AACxC,2BAAiB;AAAA,QACnB,OAAO;AACL,iBAAO;AAAA,YACL,MAAM;AAAA,YACN,QAAQ;AAAA,YACR,cAAc;AAAA,YACd,YAAY;AAAA,UAAA;AAAA,QAEhB;AAAA,MACF,WAAW,oBAAoB,QAAQ;AACrC,mBAAW,IAAI,WAAW,QAAQ;AAAA,MACpC,OAAO;AACL,mBAAW;AAAA,MACb;AAEA,aAAO,KAAK,gBAAgB,UAAU,cAAc;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,YAAY;AAAA,MAAA;AAAA,IAEhB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,OAAe,gBACb,OACA,QACS;AACT,QAAI,KAAK,UAAU,OAAO,KAAK,yBAAyB,GAAG;AACzD,YAAM,WAAW,KAAK,0BAA0B;AAChD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,0BAA0B,GAAG;AAC1D,YAAM,WAAW,KAAK,2BAA2B;AACjD,UAAI,MAAM,UAAU,WAAW,IAAI;AACjC,eAAO;AAAA,UACL,MAAM;AAAA,UACN,QAAQ;AAAA,UACR,cAAc;AAAA,UACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,UAC7C,YAAY;AAAA,QAAA;AAAA,MAEhB;AAAA,IACF;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,iCAAiC,GAAG;AACjE,YAAM,WAAW,KAAK,kCAAkC;AACxD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,wCAAwC,GAAG;AACxE,YAAM,WAAW,KAAK,yCAAyC;AAC/D,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,kCAAkC,GAAG;AAClE,YAAM,WAAW,KAAK,mCAAmC;AACzD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,QAC7C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,uCAAuC,GAAG;AACvE,YAAM,WAAW,KAAK,wCAAwC;AAC9D,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,QAC7C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,MAAM,SAAS,MAAM,KAAK,+BAA+B,KAAK,GAAG;AACnE,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,KAAK,uBAAuB,KAAK;AAAA,QAC3C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,YAAQ,MAAM,QAAA;AAAA,MACZ,KAAK,KAAK;AAER,YAAI,WAAW,OAAO;AACpB,gBAAM,SAAS,MAAM,KAAK,KAAK,EAC5B,IAAI,CAAA,MAAK,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EACxC,KAAK,EAAE;AAGV,gBAAM,gBAAgB,KAAK,aAAa,MAAM;AAC9C,cAAI,cAAc,SAAS,WAAiB;AAC1C,mBAAO;AAAA,UACT;AAAA,QACF;AAEA,eAAO;AAAA,UACL,MAAM;AAAA,UACN;AAAA,UACA,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,MAGhB,KAAK,KAAK;AACR,eAAO;AAAA,UACL,MAAM;AAAA,UACN;AAAA,UACA,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,IACd;AAGJ,WAAO;AAAA,MACL,MAAM;AAAA,MACN;AAAA,MACA,cAAc;AAAA,MACd,UAAU;AAAA,MACV,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,cAAc,KAAsB;AACjD,UAAM,aAAa,IAAI,KAAA;AACvB,UAAM,eAAe,WAAW,SAAS,aAAa;AAEtD,UAAM,WAAW;AAAA,MACf,YAAY;AAAA,MACZ,WAAW;AAAA,MACX,SAAS;AAAA,MACT,QAAQ;AAAA,IAAA;AAGV,QAAI,UAAU;AACd,eAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,QAAQ,GAAG;AACpD,UAAI,MAAM,KAAK,UAAU,KAAK,KAAK,SAAS,IAAI,GAAG;AACjD,kBAAU;AACV;AAAA,MACF;AAAA,IACF;AAEA,UAAM,cAAc,WAAW;AAAA,MAC7B;AAAA,IAAA;AAEF,QAAI,CAAC,aAAa;AAChB,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR;AAAA,QACA,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,UAAM,gBAAgB,YAAY,CAAC,EAAE,QAAQ,OAAO,EAAE;AACtD,QAAI;AACF,YAAM,WAAW,OAAO,KAAK,eAAe,QAAQ;AACpD,YAAM,SAAS,KAAK,gBAAgB,IAAI,WAAW,QAAQ,GAAG,KAAK;AAEnE,UAAI,OAAO,SAAS,aAAmB,SAAS;AAC9C,eAAO;AAAA,UACL,MAAM;AAAA,UACN,QAAQ;AAAA,UACR;AAAA,UACA,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,MAEhB;AAEA,aAAO;AAAA,QACL,GAAG;AAAA,QACH,QAAQ;AAAA,MAAA;AAAA,IAEZ,QAAQ;AACN,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR;AAAA,QACA,YAAY;AAAA,MAAA;AAAA,IAEhB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,aAAa,UAAwC;AAClE,QAAI;AACF,UAAI,OAAO,aAAa,UAAU;AAChC,YAAI,SAAS,SAAS,KAAA;AACtB,YAAI,OAAO,YAAA,EAAc,WAAW,IAAI,GAAG;AACzC,mBAAS,OAAO,UAAU,CAAC;AAAA,QAC7B;AAEA,YAAI,KAAK,WAAW,MAAM,KAAK,OAAO,WAAW,IAAI;AACnD,gBAAM,WAAW,KAAK,WAAW,MAAM;AAGvC,gBAAM,kBAAkB,KAAK,kBAAkB,MAAM;AACrD,cAAI,gBAAgB,SAAS,WAAiB;AAC5C,mBAAO;AAAA,cACL,MAAM,gBAAgB;AAAA,cACtB,QAAQ;AAAA,cACR,cAAc;AAAA,cACd,UAAU;AAAA,cACV,YAAY,gBAAgB;AAAA,cAC5B,SAAS,gBAAgB;AAAA,YAAA;AAAA,UAE7B;AAEA,iBAAO;AAAA,YACL,MAAM;AAAA,YACN,QAAQ;AAAA,YACR,cAAc;AAAA,YACd,UAAU;AAAA,YACV,YAAY;AAAA,UAAA;AAAA,QAEhB;AAAA,MACF;AAAA,IACF,QAAQ;AAAA,IAER;AAEA,WAAO;AAAA,MACL,MAAM;AAAA,MACN,QAAQ;AAAA,MACR,cAAc;AAAA,MACd,UAAU,IAAI,WAAA;AAAA,MACd,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAcA,OAAe,kBAAkB,QAI/B;AAGA,UAAM,YAAY,OAAO,OAAO,MAAM;AACtC,UAAM,iBAAiB;AAAA,MACrB;AAAA,IAAA;AAIF,QAAI,cAAc,IAAI;AACpB,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAGA,QAAI,aAAa,gBAAgB;AAC/B,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAGA,QAAI,iBAAiB;AACrB,QAAI,eAAe;AAGnB,QAAI;AACF,YAAM,aAAa,WAAW,kBAAkB,MAAM;AACtD,YAAM,cAAc,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,GAAG,CAAC,CAAC;AAClD,YAAM,YAAY,WAAW,KAAK,WAAW;AAC7C,UAAI,WAAW,UAAU,OAAO,aAAa,SAAS,GAAG;AACvD,yBAAiB;AAAA,MACnB;AAAA,IACF,QAAQ;AAAA,IAER;AAGA,QAAI;AACF,YAAM,WAAW,WAAW,gBAAgB,MAAM;AAClD,YAAM,cAAc,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,GAAG,CAAC,CAAC;AAClD,YAAM,YAAY,SAAS,KAAK,WAAW;AAC3C,UAAI,SAAS,UAAU,OAAO,aAAa,SAAS,GAAG;AACrD,uBAAe;AAAA,MACjB;AAAA,IACF,QAAQ;AAAA,IAER;AAGA,QAAI,kBAAkB,cAAc;AAElC,YAAM,WAAW,KAAK,WAAW,MAAM;AAGvC,UAAI,SAAS,CAAC,MAAM,OAAQ,SAAS,CAAC,MAAM,GAAM;AAChD,eAAO;AAAA,UACL,MAAM;AAAA,UACN,YAAY;AAAA,UACZ,SACE;AAAA,QAAA;AAAA,MAEN;AAGA,UAAI,YAAY;AAChB,iBAAW,QAAQ,UAAU;AAC3B,YAAI,QAAQ,IAAM;AAAA,MACpB;AAGA,YAAM,gBAAgB,YAAY,SAAS;AAC3C,UAAI,iBAAiB,OAAO,iBAAiB,KAAK;AAChD,eAAO;AAAA,UACL,MAAM;AAAA,UACN,YAAY;AAAA,UACZ,SACE;AAAA,QAAA;AAAA,MAEN;AAGA,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,QACZ,SACE;AAAA,MAAA;AAAA,IAEN;AAGA,QAAI,kBAAkB,CAAC,cAAc;AACnC,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,gBAAgB,CAAC,gBAAgB;AACnC,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,WAAO;AAAA,MACL,MAAM;AAAA,MACN,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,WAAW,KAAsB;AAC9C,WAAO,iBAAiB,KAAK,GAAG,KAAK,IAAI,SAAS,MAAM;AAAA,EAC1D;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,SAAS,KAAsB;AAC5C,QAAI;AACF,aAAO,OAAO,KAAK,KAAK,QAAQ,EAAE,SAAS,QAAQ,MAAM;AAAA,IAC3D,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,WAAW,KAAyB;AACjD,UAAM,QAAQ,IAAI,WAAW,IAAI,SAAS,CAAC;AAC3C,aAAS,IAAI,GAAG,IAAI,IAAI,QAAQ,KAAK,GAAG;AACtC,YAAM,IAAI,CAAC,IAAI,SAAS,IAAI,OAAO,GAAG,CAAC,GAAG,EAAE;AAAA,IAC9C;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,OAAe,UAAU,OAAmB,QAAyB;AACnE,QAAI,MAAM,SAAS,OAAO,OAAQ,QAAO;AACzC,aAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACtC,UAAI,MAAM,CAAC,MAAM,OAAO,CAAC,EAAG,QAAO;AAAA,IACrC;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,+BAA+B,OAA4B;AAExE,aAAS,IAAI,GAAG,IAAI,MAAM,SAAS,GAAG,KAAK;AACzC,UACE,MAAM,CAAC,MAAM,MACb,MAAM,IAAI,CAAC,MAAM,OACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,IACjB;AACA,eAAO;AAAA,MACT;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,uBAAuB,OAA+B;AAEnE,aAAS,IAAI,GAAG,IAAI,MAAM,SAAS,IAAI,KAAK;AAC1C,UAAI,MAAM,CAAC,MAAM,KAAQ,MAAM,IAAI,CAAC,MAAM,IAAM;AAC9C,eAAO,MAAM,MAAM,IAAI,GAAG,IAAI,EAAE;AAAA,MAClC;AAAA,IACF;AACA,WAAO;AAAA,EACT;AACF;AApkBE,iBAAwB,4BAA4B;AACpD,iBAAwB,sCAAsC;AAE9D,iBAAwB,4BAA4B,OAAO,KAAK;AAAA,EAC9D;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACnE;AACD,iBAAwB,6BAA6B,OAAO,KAAK;AAAA,EAC/D;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACnB;AAED,iBAAwB,oCAAoC,OAAO,KAAK;AAAA,EACtE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CAC7D;AACD,iBAAwB,qCAAqC,OAAO,KAAK;AAAA,EACvE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACrC;AACD,iBAAwB,2CACtB,OAAO,KAAK;AAAA,EACV;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CAC/B;AAGH,iBAAwB,0CAA0C,OAAO;AAAA,EACvE,CAAC,IAAM,KAAM,GAAM,GAAM,GAAM,GAAM,EAAI;AAAA;AA3BtC,IAAM,kBAAN;AAqlBA,SAAS,wBACd,kBACoB;AAEpB,QAAM,UAAU,gBAAgB,OAAO,gBAAgB;AAGvD,MAAI,QAAQ,SAAS,WAAiB;AACpC,QAAI;AACF,YAAM,aACJ,QAAQ,SAAS,UACb,WAAW,gBAAgB,gBAAgB,IAC3C,WAAW,kBAAkB,gBAAgB;AAGnD,YAAM,SAA6B;AAAA,QACjC,cAAc,QAAQ;AAAA,QACtB;AAAA,MAAA;AAGF,UAAI,QAAQ,eAAe,aAAa;AACtC,eAAO,UACL;AAAA,MAEJ;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AAAA,IAEhB;AAAA,EACF;AAMA,MAAI;AACF,UAAM,aAAa,WAAW,gBAAgB,gBAAgB;AAC9D,WAAO;AAAA,MACL,cAAc;AAAA,MACd;AAAA,MACA,SAAS;AAAA,IAAA;AAAA,EAEb,SAAS,YAAY;AAEnB,QAAI;AACF,YAAM,aAAa,WAAW,kBAAkB,gBAAgB;AAChE,aAAO;AAAA,QACL,cAAc;AAAA,QACd;AAAA,QACA,SAAS;AAAA,MAAA;AAAA,IAEb,SAAS,cAAc;AAErB,YAAM,IAAI;AAAA,QACR,2DAA2D,UAAU;AAAA,MAAA;AAAA,IAEzE;AAAA,EACF;AACF;"}
1
+ {"version":3,"file":"standards-sdk.es31.js","sources":["../../src/utils/key-type-detector.ts"],"sourcesContent":["import { PrivateKey } from '@hashgraph/sdk';\n\n/**\n * Enumeration of supported key types\n */\nexport enum KeyType {\n ED25519 = 'ed25519',\n ECDSA = 'ecdsa',\n UNKNOWN = 'unknown',\n}\n\n/**\n * Result of key type detection\n */\nexport interface KeyInfo {\n /** Detected key type (ED25519, ECDSA, or UNKNOWN) */\n type: KeyType;\n /** Format of the provided key */\n format: 'hex' | 'der' | 'pem' | 'raw';\n /** Whether the key is a private key */\n isPrivateKey: boolean;\n /** Raw bytes of the key (if available) */\n rawBytes?: Uint8Array;\n /** Confidence level of the detection */\n confidence: 'certain' | 'uncertain';\n /** Warning message for uncertain detections */\n warning?: string;\n}\n\n/**\n * Legacy interface for backward compatibility\n */\nexport interface KeyDetectionResult {\n /** Detected key type */\n detectedType: 'ed25519' | 'ecdsa';\n /** Parsed private key */\n privateKey: PrivateKey;\n /** Optional warning for ambiguous keys */\n warning?: string;\n}\n\n/**\n * Utility class for detecting cryptographic key types used in Hedera\n * \n * This class provides methods to determine whether a key is ED25519 or ECDSA\n * based on various input formats (hex, DER, PEM) and detection strategies.\n * \n * For ambiguous 32-byte raw keys, it uses heuristics and signature testing\n * to make a best-effort determination. When confidence is 'uncertain',\n * consider using the Hedera mirror node to confirm the key type if you have\n * the associated account ID.\n * \n * @example\n * // Detect key type from a hex string\n * const keyInfo = KeyTypeDetector.detect('0x' + privateKey.toStringRaw());\n * if (keyInfo.confidence === 'uncertain') {\n * console.warn(keyInfo.warning);\n * // Consider checking mirror node if account ID is available\n * }\n */\nexport class KeyTypeDetector {\n private static readonly ED25519_PUBLIC_KEY_LENGTH = 32;\n private static readonly ED25519_EXPANDED_PRIVATE_KEY_LENGTH = 64;\n\n private static readonly ED25519_PUBLIC_KEY_PREFIX = Buffer.from([\n 0x30, 0x2a, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70, 0x03, 0x21, 0x00,\n ]);\n private static readonly ED25519_PRIVATE_KEY_PREFIX = Buffer.from([\n 0x30, 0x2e, 0x02, 0x01, 0x00, 0x30, 0x05, 0x06, 0x03, 0x2b, 0x65, 0x70,\n 0x04, 0x22, 0x04, 0x20,\n ]);\n\n private static readonly ECDSA_SECP256K1_PUBLIC_KEY_PREFIX = Buffer.from([\n 0x30, 0x56, 0x30, 0x10, 0x06, 0x07, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02,\n 0x01, 0x06, 0x05, 0x2b, 0x81, 0x04, 0x00, 0x0a, 0x03, 0x42, 0x00,\n ]);\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX = Buffer.from([\n 0x30, 0x74, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT =\n Buffer.from([\n 0x30, 0x30, 0x02, 0x01, 0x00, 0x30, 0x07, 0x06, 0x05, 0x2b, 0x81, 0x04,\n 0x00, 0x0a, 0x04, 0x22, 0x04, 0x20,\n ]);\n\n // Additional ECDSA private key variants\n private static readonly ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG = Buffer.from(\n [0x30, 0x77, 0x02, 0x01, 0x01, 0x04, 0x20],\n );\n\n /**\n * Detects private key type from various input formats without throwing errors\n *\n * This detector is designed for private keys only. It uses various heuristics to determine\n * the key type for ambiguous 32-byte keys, including byte patterns and statistical analysis.\n * \n * For ambiguous cases (where confidence is 'uncertain'), if you have the associated account ID,\n * you can use the Hedera mirror node to confirm the key type.\n *\n * @param keyInput - The key to detect, can be a string (hex, base64, PEM), Buffer, or Uint8Array\n * @returns KeyInfo object containing the detected key type and metadata\n * \n * @example\n * // Detect from hex string\n * const info1 = KeyTypeDetector.detect('0x7f96cea0c0d9d5bfb3ab8a42cf0cea44d57f62f2e068f8e5a3251914a9252b04');\n * \n * // Detect from DER-encoded string\n * const info2 = KeyTypeDetector.detect(privateKey.toStringDer());\n * \n * // Detect from PEM format\n * const info3 = KeyTypeDetector.detect(`-----BEGIN PRIVATE KEY-----\n * MC4CAQAwBQYDK2VwBCIEIGRchBsQGQduAAGBQ7GAkKCKkmQ3EGCARwHsHiRqTNR9\n * -----END PRIVATE KEY-----`);\n */\n static detect(keyInput: string | Uint8Array | Buffer): KeyInfo {\n try {\n let keyBytes: Uint8Array;\n let originalFormat: 'hex' | 'der' | 'pem' | 'raw' = 'raw';\n\n if (typeof keyInput === 'string') {\n let trimmed = keyInput.trim();\n\n if (trimmed.includes('-----BEGIN')) {\n return this.detectFromPem(trimmed);\n }\n\n if (trimmed.toLowerCase().startsWith('0x')) {\n trimmed = trimmed.substring(2);\n }\n\n if (this.isValidHex(trimmed)) {\n keyBytes = this.hexToBytes(trimmed);\n originalFormat = 'hex';\n } else if (this.isBase64(trimmed)) {\n keyBytes = Buffer.from(trimmed, 'base64');\n originalFormat = 'der';\n } else {\n return {\n type: KeyType.UNKNOWN,\n format: 'raw',\n isPrivateKey: false,\n confidence: 'certain',\n };\n }\n } else if (keyInput instanceof Buffer) {\n keyBytes = new Uint8Array(keyInput);\n } else {\n keyBytes = keyInput as Uint8Array;\n }\n\n return this.detectFromBytes(keyBytes, originalFormat);\n } catch (error) {\n return {\n type: KeyType.UNKNOWN,\n format: 'raw',\n isPrivateKey: false,\n confidence: 'certain',\n };\n }\n }\n\n /**\n * Detect key type from raw bytes\n * \n * @param bytes - The raw bytes of the key\n * @param format - The original format of the key\n * @returns KeyInfo object with detection results\n * @private\n */\n private static detectFromBytes(\n bytes: Uint8Array,\n format: 'hex' | 'der' | 'pem' | 'raw',\n ): KeyInfo {\n if (this.hasPrefix(bytes, this.ED25519_PUBLIC_KEY_PREFIX)) {\n const keyStart = this.ED25519_PUBLIC_KEY_PREFIX.length;\n return {\n type: KeyType.ED25519,\n format: 'der',\n isPrivateKey: false,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ED25519_PRIVATE_KEY_PREFIX)) {\n const keyStart = this.ED25519_PRIVATE_KEY_PREFIX.length;\n if (bytes.length >= keyStart + 32) {\n return {\n type: KeyType.ED25519,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX)) {\n const keyStart = this.ECDSA_SECP256K1_PUBLIC_KEY_PREFIX.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: false,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_SHORT.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n\n if (this.hasPrefix(bytes, this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG)) {\n const keyStart = this.ECDSA_SECP256K1_PRIVATE_KEY_PREFIX_LONG.length;\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: bytes.slice(keyStart, keyStart + 32),\n confidence: 'certain',\n };\n }\n\n if (bytes.length > 36 && this.containsECDSAPrivateKeyPattern(bytes)) {\n return {\n type: KeyType.ECDSA,\n format: 'der',\n isPrivateKey: true,\n rawBytes: this.extractECDSAPrivateKey(bytes),\n confidence: 'certain',\n };\n }\n\n switch (bytes.length) {\n case this.ED25519_PUBLIC_KEY_LENGTH:\n // 32-byte keys are ambiguous - could be either ED25519 or ECDSA private keys\n if (format === 'hex') {\n const hexStr = Array.from(bytes)\n .map(b => b.toString(16).padStart(2, '0'))\n .join('');\n\n // Try as private key\n const privateResult = this.tryCreateKey(hexStr);\n if (privateResult.type !== KeyType.UNKNOWN) {\n return privateResult;\n }\n }\n // Cannot determine type for 32-byte keys without additional context\n return {\n type: KeyType.UNKNOWN,\n format: format,\n isPrivateKey: false,\n rawBytes: bytes,\n confidence: 'certain',\n };\n\n case this.ED25519_EXPANDED_PRIVATE_KEY_LENGTH:\n return {\n type: KeyType.ED25519,\n format: format,\n isPrivateKey: true,\n rawBytes: bytes,\n confidence: 'certain',\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: format,\n isPrivateKey: false,\n rawBytes: bytes,\n confidence: 'certain',\n };\n }\n\n /**\n * Detect key type from PEM format\n * \n * @param pem - The PEM-encoded key string\n * @returns KeyInfo object with detection results\n * @private\n */\n private static detectFromPem(pem: string): KeyInfo {\n const trimmedPem = pem.trim();\n const isPrivateKey = trimmedPem.includes('PRIVATE KEY');\n\n const pemTypes = {\n EC_PRIVATE: /-----BEGIN EC PRIVATE KEY-----/,\n EC_PUBLIC: /-----BEGIN EC PUBLIC KEY-----/,\n PRIVATE: /-----BEGIN PRIVATE KEY-----/,\n PUBLIC: /-----BEGIN PUBLIC KEY-----/,\n };\n\n let isECKey = false;\n for (const [type, regex] of Object.entries(pemTypes)) {\n if (regex.test(trimmedPem) && type.includes('EC')) {\n isECKey = true;\n break;\n }\n }\n\n const base64Match = trimmedPem.match(\n /-----BEGIN[\\s\\S]+?-----[\\r\\n]+([\\s\\S]+?)[\\r\\n]+-----END/,\n );\n if (!base64Match) {\n return {\n type: KeyType.UNKNOWN,\n format: 'pem',\n isPrivateKey,\n confidence: 'certain',\n };\n }\n\n const base64Content = base64Match[1].replace(/\\s/g, '');\n try {\n const derBytes = Buffer.from(base64Content, 'base64');\n const result = this.detectFromBytes(new Uint8Array(derBytes), 'der');\n\n if (result.type === KeyType.UNKNOWN && isECKey) {\n return {\n type: KeyType.ECDSA,\n format: 'pem',\n isPrivateKey,\n rawBytes: derBytes,\n confidence: 'certain',\n };\n }\n\n return {\n ...result,\n format: 'pem',\n };\n } catch {\n return {\n type: KeyType.UNKNOWN,\n format: 'pem',\n isPrivateKey,\n confidence: 'certain',\n };\n }\n }\n\n /**\n * Try to create a key using Hedera SDK to validate the type\n * \n * @param keyInput - The key input string or bytes\n * @returns KeyInfo object with detection results\n * @private\n */\n private static tryCreateKey(keyInput: string | Uint8Array): KeyInfo {\n try {\n if (typeof keyInput === 'string') {\n let keyStr = keyInput.trim();\n if (keyStr.toLowerCase().startsWith('0x')) {\n keyStr = keyStr.substring(2);\n }\n\n if (this.isValidHex(keyStr) && keyStr.length === 64) {\n const keyBytes = this.hexToBytes(keyStr);\n\n // Try signature-based detection for ambiguous cases\n const signatureResult = this.detectBySignature(keyStr);\n if (signatureResult.type !== KeyType.UNKNOWN) {\n return {\n type: signatureResult.type,\n format: 'hex',\n isPrivateKey: true,\n rawBytes: keyBytes,\n confidence: signatureResult.confidence,\n warning: signatureResult.warning,\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: 'hex',\n isPrivateKey: false,\n rawBytes: keyBytes,\n confidence: 'certain',\n };\n }\n }\n } catch {\n // SDK creation failed\n }\n\n return {\n type: KeyType.UNKNOWN,\n format: 'hex',\n isPrivateKey: false,\n rawBytes: new Uint8Array(),\n confidence: 'certain',\n };\n }\n\n /**\n * Detect key type by attempting to sign a message with both algorithms\n * \n * For ambiguous cases where both algorithms can use the key, this method\n * uses heuristics to make a best-effort determination. For production use\n * with ambiguous keys, consider using the Hedera mirror node to confirm\n * the key type if you have the associated account ID.\n * \n * @param hexKey - The hex string representation of the key\n * @returns Object containing type, confidence level, and optional warning\n * @private\n */\n private static detectBySignature(hexKey: string): {\n type: KeyType;\n confidence: 'certain' | 'uncertain';\n warning?: string;\n } {\n // ECDSA keys must be in range [1, secp256k1_order - 1]\n // ED25519 accepts any 32-byte value\n const keyBigInt = BigInt('0x' + hexKey);\n const secp256k1Order = BigInt(\n '0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141',\n );\n\n // If the key is 0, it can only be ED25519 (ECDSA requires [1..N-1])\n if (keyBigInt === 0n) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n // If the key is >= secp256k1 order, it can only be ED25519\n if (keyBigInt >= secp256k1Order) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n // For keys below the order, try both algorithms\n let ed25519CanSign = false;\n let ecdsaCanSign = false;\n\n // Try signing with ED25519\n try {\n const ed25519Key = PrivateKey.fromStringED25519(hexKey);\n const testMessage = new Uint8Array([1, 2, 3, 4, 5]);\n const signature = ed25519Key.sign(testMessage);\n if (ed25519Key.publicKey.verify(testMessage, signature)) {\n ed25519CanSign = true;\n }\n } catch {\n // ED25519 signing failed\n }\n\n // Try signing with ECDSA\n try {\n const ecdsaKey = PrivateKey.fromStringECDSA(hexKey);\n const testMessage = new Uint8Array([1, 2, 3, 4, 5]);\n const signature = ecdsaKey.sign(testMessage);\n if (ecdsaKey.publicKey.verify(testMessage, signature)) {\n ecdsaCanSign = true;\n }\n } catch {\n // ECDSA signing failed\n }\n\n // Both can sign for keys below the order\n if (ed25519CanSign && ecdsaCanSign) {\n // Use key characteristics as a tiebreaker\n const keyBytes = this.hexToBytes(hexKey);\n\n // Check for known patterns\n if (keyBytes[0] === 0xa8 && keyBytes[1] === 0x01) {\n return {\n type: KeyType.ED25519,\n confidence: 'uncertain',\n warning:\n 'Detection based on byte pattern heuristic. Both ED25519 and ECDSA accept this key.',\n };\n }\n\n // Count high entropy bytes\n let highBytes = 0;\n for (const byte of keyBytes) {\n if (byte >= 0x80) highBytes++;\n }\n\n // ECDSA keys tend to have more balanced byte distribution\n const highByteRatio = highBytes / keyBytes.length;\n if (highByteRatio >= 0.4 && highByteRatio <= 0.6) {\n return {\n type: KeyType.ECDSA,\n confidence: 'uncertain',\n warning:\n 'Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key.',\n };\n }\n\n // Default to ECDSA for ambiguous keys\n return {\n type: KeyType.ECDSA,\n confidence: 'uncertain',\n warning:\n 'Detection based on entropy heuristic. Both ED25519 and ECDSA accept this key. Defaulting to ECDSA.',\n };\n }\n\n // Only one can sign\n if (ed25519CanSign && !ecdsaCanSign) {\n return {\n type: KeyType.ED25519,\n confidence: 'certain',\n };\n }\n\n if (ecdsaCanSign && !ed25519CanSign) {\n return {\n type: KeyType.ECDSA,\n confidence: 'certain',\n };\n }\n\n return {\n type: KeyType.UNKNOWN,\n confidence: 'certain',\n };\n }\n\n /**\n * Check if a string is valid hexadecimal with even length\n * \n * @param str - The string to check\n * @returns True if the string is valid hex with even length\n * @private\n */\n private static isValidHex(str: string): boolean {\n return /^[0-9a-fA-F]+$/.test(str) && str.length % 2 === 0;\n }\n\n /**\n * Check if a string is valid base64\n * \n * @param str - The string to check\n * @returns True if the string is valid base64\n * @private\n */\n private static isBase64(str: string): boolean {\n try {\n return Buffer.from(str, 'base64').toString('base64') === str;\n } catch {\n return false;\n }\n }\n\n /**\n * Convert a hex string to bytes\n * \n * @param hex - The hex string to convert\n * @returns Uint8Array of bytes\n * @private\n */\n private static hexToBytes(hex: string): Uint8Array {\n const bytes = new Uint8Array(hex.length / 2);\n for (let i = 0; i < hex.length; i += 2) {\n bytes[i / 2] = parseInt(hex.substr(i, 2), 16);\n }\n return bytes;\n }\n\n /**\n * Check if bytes start with a specific prefix\n * \n * @param bytes - The bytes to check\n * @param prefix - The prefix to look for\n * @returns True if bytes start with the prefix\n * @private\n */\n private static hasPrefix(bytes: Uint8Array, prefix: Buffer): boolean {\n if (bytes.length < prefix.length) return false;\n for (let i = 0; i < prefix.length; i++) {\n if (bytes[i] !== prefix[i]) return false;\n }\n return true;\n }\n\n /**\n * Check if bytes contain an ECDSA private key pattern\n * \n * @param bytes - The bytes to check\n * @returns True if ECDSA private key pattern is found\n * @private\n */\n private static containsECDSAPrivateKeyPattern(bytes: Uint8Array): boolean {\n // Look for the ECDSA private key pattern in DER encoding\n for (let i = 0; i < bytes.length - 7; i++) {\n if (\n bytes[i] === 0x30 &&\n bytes[i + 1] === 0x74 &&\n bytes[i + 2] === 0x02 &&\n bytes[i + 3] === 0x01 &&\n bytes[i + 4] === 0x01 &&\n bytes[i + 5] === 0x04 &&\n bytes[i + 6] === 0x20\n ) {\n return true;\n }\n }\n return false;\n }\n\n /**\n * Extract ECDSA private key from DER structure\n * \n * @param bytes - The DER encoded bytes\n * @returns The extracted private key bytes\n * @private\n */\n private static extractECDSAPrivateKey(bytes: Uint8Array): Uint8Array {\n // Find and extract the 32-byte private key from DER structure\n for (let i = 0; i < bytes.length - 32; i++) {\n if (bytes[i] === 0x04 && bytes[i + 1] === 0x20) {\n return bytes.slice(i + 2, i + 34);\n }\n }\n return bytes;\n }\n}\n\n/**\n * Detects the key type from a private key string and returns the parsed PrivateKey\n * \n * This function leverages the KeyTypeDetector class to determine whether a key is \n * ED25519 or ECDSA. It handles parsing the key and provides appropriate warnings\n * for uncertain detections.\n * \n * Note: For ambiguous keys, if you have the associated account ID, consider using\n * the Hedera mirror node to confirm the key type for production use.\n * \n * @param privateKeyString The private key string to detect type from\n * @returns The detected key type, parsed PrivateKey, and optional warning\n * @throws Error if the private key cannot be parsed\n */\nexport function detectKeyTypeFromString(\n privateKeyString: string,\n): KeyDetectionResult {\n // First, use the KeyTypeDetector for advanced detection\n const keyInfo = KeyTypeDetector.detect(privateKeyString);\n \n // If we have a detection of ED25519 or ECDSA, try to use it\n if (keyInfo.type !== KeyType.UNKNOWN) {\n try {\n const privateKey = \n keyInfo.type === KeyType.ECDSA\n ? PrivateKey.fromStringECDSA(privateKeyString)\n : PrivateKey.fromStringED25519(privateKeyString);\n \n // Include warning for uncertain detections\n const result: KeyDetectionResult = {\n detectedType: keyInfo.type as 'ed25519' | 'ecdsa',\n privateKey,\n };\n \n if (keyInfo.confidence === 'uncertain') {\n result.warning = \n `Key type detection is uncertain. If you have the associated account ID, ` +\n `consider using the Hedera mirror node to confirm the key type.`;\n }\n \n return result;\n } catch (error) {\n // If parsing fails despite detection, continue to direct parsing\n }\n }\n \n // If the detector couldn't determine the type or parsing failed,\n // try direct parsing with both key types\n \n // Try ECDSA first (default) as requested\n try {\n const privateKey = PrivateKey.fromStringECDSA(privateKeyString);\n return { \n detectedType: 'ecdsa', \n privateKey,\n warning: `Using ECDSA as default. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`\n };\n } catch (ecdsaError) {\n // If ECDSA fails, try ED25519\n try {\n const privateKey = PrivateKey.fromStringED25519(privateKeyString);\n return { \n detectedType: 'ed25519', \n privateKey,\n warning: `Using ED25519 as fallback. If you have the associated account ID, consider using the Hedera mirror node to confirm the key type.`\n };\n } catch (ed25519Error) {\n // If both fail, throw an error with details\n throw new Error(\n `Failed to parse private key as either ECDSA or ED25519: ${ecdsaError}`\n );\n }\n }\n}\n"],"names":["KeyType"],"mappings":";AAKO,IAAK,4BAAAA,aAAL;AACLA,WAAA,SAAA,IAAU;AACVA,WAAA,OAAA,IAAQ;AACRA,WAAA,SAAA,IAAU;AAHA,SAAAA;AAAA,GAAA,WAAA,CAAA,CAAA;AAuDL,MAAM,mBAAN,MAAM,iBAAgB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAsD3B,OAAO,OAAO,UAAiD;AAC7D,QAAI;AACF,UAAI;AACJ,UAAI,iBAAgD;AAEpD,UAAI,OAAO,aAAa,UAAU;AAChC,YAAI,UAAU,SAAS,KAAA;AAEvB,YAAI,QAAQ,SAAS,YAAY,GAAG;AAClC,iBAAO,KAAK,cAAc,OAAO;AAAA,QACnC;AAEA,YAAI,QAAQ,YAAA,EAAc,WAAW,IAAI,GAAG;AAC1C,oBAAU,QAAQ,UAAU,CAAC;AAAA,QAC/B;AAEA,YAAI,KAAK,WAAW,OAAO,GAAG;AAC5B,qBAAW,KAAK,WAAW,OAAO;AAClC,2BAAiB;AAAA,QACnB,WAAW,KAAK,SAAS,OAAO,GAAG;AACjC,qBAAW,OAAO,KAAK,SAAS,QAAQ;AACxC,2BAAiB;AAAA,QACnB,OAAO;AACL,iBAAO;AAAA,YACL,MAAM;AAAA,YACN,QAAQ;AAAA,YACR,cAAc;AAAA,YACd,YAAY;AAAA,UAAA;AAAA,QAEhB;AAAA,MACF,WAAW,oBAAoB,QAAQ;AACrC,mBAAW,IAAI,WAAW,QAAQ;AAAA,MACpC,OAAO;AACL,mBAAW;AAAA,MACb;AAEA,aAAO,KAAK,gBAAgB,UAAU,cAAc;AAAA,IACtD,SAAS,OAAO;AACd,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,YAAY;AAAA,MAAA;AAAA,IAEhB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,OAAe,gBACb,OACA,QACS;AACT,QAAI,KAAK,UAAU,OAAO,KAAK,yBAAyB,GAAG;AACzD,YAAM,WAAW,KAAK,0BAA0B;AAChD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,0BAA0B,GAAG;AAC1D,YAAM,WAAW,KAAK,2BAA2B;AACjD,UAAI,MAAM,UAAU,WAAW,IAAI;AACjC,eAAO;AAAA,UACL,MAAM;AAAA,UACN,QAAQ;AAAA,UACR,cAAc;AAAA,UACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,UAC7C,YAAY;AAAA,QAAA;AAAA,MAEhB;AAAA,IACF;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,iCAAiC,GAAG;AACjE,YAAM,WAAW,KAAK,kCAAkC;AACxD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,wCAAwC,GAAG;AACxE,YAAM,WAAW,KAAK,yCAAyC;AAC/D,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,QAAQ;AAAA,QAC9B,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,kCAAkC,GAAG;AAClE,YAAM,WAAW,KAAK,mCAAmC;AACzD,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,QAC7C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,KAAK,UAAU,OAAO,KAAK,uCAAuC,GAAG;AACvE,YAAM,WAAW,KAAK,wCAAwC;AAC9D,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,MAAM,MAAM,UAAU,WAAW,EAAE;AAAA,QAC7C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,MAAM,SAAS,MAAM,KAAK,+BAA+B,KAAK,GAAG;AACnE,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR,cAAc;AAAA,QACd,UAAU,KAAK,uBAAuB,KAAK;AAAA,QAC3C,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,YAAQ,MAAM,QAAA;AAAA,MACZ,KAAK,KAAK;AAER,YAAI,WAAW,OAAO;AACpB,gBAAM,SAAS,MAAM,KAAK,KAAK,EAC5B,IAAI,CAAA,MAAK,EAAE,SAAS,EAAE,EAAE,SAAS,GAAG,GAAG,CAAC,EACxC,KAAK,EAAE;AAGV,gBAAM,gBAAgB,KAAK,aAAa,MAAM;AAC9C,cAAI,cAAc,SAAS,WAAiB;AAC1C,mBAAO;AAAA,UACT;AAAA,QACF;AAEA,eAAO;AAAA,UACL,MAAM;AAAA,UACN;AAAA,UACA,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,MAGhB,KAAK,KAAK;AACR,eAAO;AAAA,UACL,MAAM;AAAA,UACN;AAAA,UACA,cAAc;AAAA,UACd,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,IACd;AAGJ,WAAO;AAAA,MACL,MAAM;AAAA,MACN;AAAA,MACA,cAAc;AAAA,MACd,UAAU;AAAA,MACV,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,cAAc,KAAsB;AACjD,UAAM,aAAa,IAAI,KAAA;AACvB,UAAM,eAAe,WAAW,SAAS,aAAa;AAEtD,UAAM,WAAW;AAAA,MACf,YAAY;AAAA,MACZ,WAAW;AAAA,MACX,SAAS;AAAA,MACT,QAAQ;AAAA,IAAA;AAGV,QAAI,UAAU;AACd,eAAW,CAAC,MAAM,KAAK,KAAK,OAAO,QAAQ,QAAQ,GAAG;AACpD,UAAI,MAAM,KAAK,UAAU,KAAK,KAAK,SAAS,IAAI,GAAG;AACjD,kBAAU;AACV;AAAA,MACF;AAAA,IACF;AAEA,UAAM,cAAc,WAAW;AAAA,MAC7B;AAAA,IAAA;AAEF,QAAI,CAAC,aAAa;AAChB,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR;AAAA,QACA,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,UAAM,gBAAgB,YAAY,CAAC,EAAE,QAAQ,OAAO,EAAE;AACtD,QAAI;AACF,YAAM,WAAW,OAAO,KAAK,eAAe,QAAQ;AACpD,YAAM,SAAS,KAAK,gBAAgB,IAAI,WAAW,QAAQ,GAAG,KAAK;AAEnE,UAAI,OAAO,SAAS,aAAmB,SAAS;AAC9C,eAAO;AAAA,UACL,MAAM;AAAA,UACN,QAAQ;AAAA,UACR;AAAA,UACA,UAAU;AAAA,UACV,YAAY;AAAA,QAAA;AAAA,MAEhB;AAEA,aAAO;AAAA,QACL,GAAG;AAAA,QACH,QAAQ;AAAA,MAAA;AAAA,IAEZ,QAAQ;AACN,aAAO;AAAA,QACL,MAAM;AAAA,QACN,QAAQ;AAAA,QACR;AAAA,QACA,YAAY;AAAA,MAAA;AAAA,IAEhB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,aAAa,UAAwC;AAClE,QAAI;AACF,UAAI,OAAO,aAAa,UAAU;AAChC,YAAI,SAAS,SAAS,KAAA;AACtB,YAAI,OAAO,YAAA,EAAc,WAAW,IAAI,GAAG;AACzC,mBAAS,OAAO,UAAU,CAAC;AAAA,QAC7B;AAEA,YAAI,KAAK,WAAW,MAAM,KAAK,OAAO,WAAW,IAAI;AACnD,gBAAM,WAAW,KAAK,WAAW,MAAM;AAGvC,gBAAM,kBAAkB,KAAK,kBAAkB,MAAM;AACrD,cAAI,gBAAgB,SAAS,WAAiB;AAC5C,mBAAO;AAAA,cACL,MAAM,gBAAgB;AAAA,cACtB,QAAQ;AAAA,cACR,cAAc;AAAA,cACd,UAAU;AAAA,cACV,YAAY,gBAAgB;AAAA,cAC5B,SAAS,gBAAgB;AAAA,YAAA;AAAA,UAE7B;AAEA,iBAAO;AAAA,YACL,MAAM;AAAA,YACN,QAAQ;AAAA,YACR,cAAc;AAAA,YACd,UAAU;AAAA,YACV,YAAY;AAAA,UAAA;AAAA,QAEhB;AAAA,MACF;AAAA,IACF,QAAQ;AAAA,IAER;AAEA,WAAO;AAAA,MACL,MAAM;AAAA,MACN,QAAQ;AAAA,MACR,cAAc;AAAA,MACd,UAAU,IAAI,WAAA;AAAA,MACd,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAcA,OAAe,kBAAkB,QAI/B;AAGA,UAAM,YAAY,OAAO,OAAO,MAAM;AACtC,UAAM,iBAAiB;AAAA,MACrB;AAAA,IAAA;AAIF,QAAI,cAAc,IAAI;AACpB,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAGA,QAAI,aAAa,gBAAgB;AAC/B,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAGA,QAAI,iBAAiB;AACrB,QAAI,eAAe;AAGnB,QAAI;AACF,YAAM,aAAa,WAAW,kBAAkB,MAAM;AACtD,YAAM,cAAc,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,GAAG,CAAC,CAAC;AAClD,YAAM,YAAY,WAAW,KAAK,WAAW;AAC7C,UAAI,WAAW,UAAU,OAAO,aAAa,SAAS,GAAG;AACvD,yBAAiB;AAAA,MACnB;AAAA,IACF,QAAQ;AAAA,IAER;AAGA,QAAI;AACF,YAAM,WAAW,WAAW,gBAAgB,MAAM;AAClD,YAAM,cAAc,IAAI,WAAW,CAAC,GAAG,GAAG,GAAG,GAAG,CAAC,CAAC;AAClD,YAAM,YAAY,SAAS,KAAK,WAAW;AAC3C,UAAI,SAAS,UAAU,OAAO,aAAa,SAAS,GAAG;AACrD,uBAAe;AAAA,MACjB;AAAA,IACF,QAAQ;AAAA,IAER;AAGA,QAAI,kBAAkB,cAAc;AAElC,YAAM,WAAW,KAAK,WAAW,MAAM;AAGvC,UAAI,SAAS,CAAC,MAAM,OAAQ,SAAS,CAAC,MAAM,GAAM;AAChD,eAAO;AAAA,UACL,MAAM;AAAA,UACN,YAAY;AAAA,UACZ,SACE;AAAA,QAAA;AAAA,MAEN;AAGA,UAAI,YAAY;AAChB,iBAAW,QAAQ,UAAU;AAC3B,YAAI,QAAQ,IAAM;AAAA,MACpB;AAGA,YAAM,gBAAgB,YAAY,SAAS;AAC3C,UAAI,iBAAiB,OAAO,iBAAiB,KAAK;AAChD,eAAO;AAAA,UACL,MAAM;AAAA,UACN,YAAY;AAAA,UACZ,SACE;AAAA,QAAA;AAAA,MAEN;AAGA,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,QACZ,SACE;AAAA,MAAA;AAAA,IAEN;AAGA,QAAI,kBAAkB,CAAC,cAAc;AACnC,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,QAAI,gBAAgB,CAAC,gBAAgB;AACnC,aAAO;AAAA,QACL,MAAM;AAAA,QACN,YAAY;AAAA,MAAA;AAAA,IAEhB;AAEA,WAAO;AAAA,MACL,MAAM;AAAA,MACN,YAAY;AAAA,IAAA;AAAA,EAEhB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,WAAW,KAAsB;AAC9C,WAAO,iBAAiB,KAAK,GAAG,KAAK,IAAI,SAAS,MAAM;AAAA,EAC1D;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,SAAS,KAAsB;AAC5C,QAAI;AACF,aAAO,OAAO,KAAK,KAAK,QAAQ,EAAE,SAAS,QAAQ,MAAM;AAAA,IAC3D,QAAQ;AACN,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,WAAW,KAAyB;AACjD,UAAM,QAAQ,IAAI,WAAW,IAAI,SAAS,CAAC;AAC3C,aAAS,IAAI,GAAG,IAAI,IAAI,QAAQ,KAAK,GAAG;AACtC,YAAM,IAAI,CAAC,IAAI,SAAS,IAAI,OAAO,GAAG,CAAC,GAAG,EAAE;AAAA,IAC9C;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAUA,OAAe,UAAU,OAAmB,QAAyB;AACnE,QAAI,MAAM,SAAS,OAAO,OAAQ,QAAO;AACzC,aAAS,IAAI,GAAG,IAAI,OAAO,QAAQ,KAAK;AACtC,UAAI,MAAM,CAAC,MAAM,OAAO,CAAC,EAAG,QAAO;AAAA,IACrC;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,+BAA+B,OAA4B;AAExE,aAAS,IAAI,GAAG,IAAI,MAAM,SAAS,GAAG,KAAK;AACzC,UACE,MAAM,CAAC,MAAM,MACb,MAAM,IAAI,CAAC,MAAM,OACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,KACjB,MAAM,IAAI,CAAC,MAAM,IACjB;AACA,eAAO;AAAA,MACT;AAAA,IACF;AACA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EASA,OAAe,uBAAuB,OAA+B;AAEnE,aAAS,IAAI,GAAG,IAAI,MAAM,SAAS,IAAI,KAAK;AAC1C,UAAI,MAAM,CAAC,MAAM,KAAQ,MAAM,IAAI,CAAC,MAAM,IAAM;AAC9C,eAAO,MAAM,MAAM,IAAI,GAAG,IAAI,EAAE;AAAA,MAClC;AAAA,IACF;AACA,WAAO;AAAA,EACT;AACF;AApkBE,iBAAwB,4BAA4B;AACpD,iBAAwB,sCAAsC;AAE9D,iBAAwB,4BAA4B,OAAO,KAAK;AAAA,EAC9D;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACnE;AACD,iBAAwB,6BAA6B,OAAO,KAAK;AAAA,EAC/D;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACnB;AAED,iBAAwB,oCAAoC,OAAO,KAAK;AAAA,EACtE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CAC7D;AACD,iBAAwB,qCAAqC,OAAO,KAAK;AAAA,EACvE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CACrC;AACD,iBAAwB,2CACtB,OAAO,KAAK;AAAA,EACV;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAClE;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,EAAM;AAAA,CAC/B;AAGH,iBAAwB,0CAA0C,OAAO;AAAA,EACvE,CAAC,IAAM,KAAM,GAAM,GAAM,GAAM,GAAM,EAAI;AAAA;AA3BtC,IAAM,kBAAN;AAqlBA,SAAS,wBACd,kBACoB;AAEpB,QAAM,UAAU,gBAAgB,OAAO,gBAAgB;AAGvD,MAAI,QAAQ,SAAS,WAAiB;AACpC,QAAI;AACF,YAAM,aACJ,QAAQ,SAAS,UACb,WAAW,gBAAgB,gBAAgB,IAC3C,WAAW,kBAAkB,gBAAgB;AAGnD,YAAM,SAA6B;AAAA,QACjC,cAAc,QAAQ;AAAA,QACtB;AAAA,MAAA;AAGF,UAAI,QAAQ,eAAe,aAAa;AACtC,eAAO,UACL;AAAA,MAEJ;AAEA,aAAO;AAAA,IACT,SAAS,OAAO;AAAA,IAEhB;AAAA,EACF;AAMA,MAAI;AACF,UAAM,aAAa,WAAW,gBAAgB,gBAAgB;AAC9D,WAAO;AAAA,MACL,cAAc;AAAA,MACd;AAAA,MACA,SAAS;AAAA,IAAA;AAAA,EAEb,SAAS,YAAY;AAEnB,QAAI;AACF,YAAM,aAAa,WAAW,kBAAkB,gBAAgB;AAChE,aAAO;AAAA,QACL,cAAc;AAAA,QACd;AAAA,QACA,SAAS;AAAA,MAAA;AAAA,IAEb,SAAS,cAAc;AAErB,YAAM,IAAI;AAAA,QACR,2DAA2D,UAAU;AAAA,MAAA;AAAA,IAEzE;AAAA,EACF;AACF;"}
@@ -15,6 +15,7 @@ export declare class Logger {
15
15
  getLevel(): LogLevel;
16
16
  setSilent(silent: boolean): void;
17
17
  setModule(module: string): void;
18
+ private formatArgs;
18
19
  debug(...args: any[]): void;
19
20
  info(...args: any[]): void;
20
21
  warn(...args: any[]): void;
@@ -1 +1 @@
1
- {"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../../src/utils/logger.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,QAAQ,GAAG,OAAO,GAAG,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,QAAQ,CAAC;AAEtE,MAAM,WAAW,aAAa;IAC5B,KAAK,CAAC,EAAE,QAAQ,CAAC;IACjB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,MAAM,CAAC,EAAE,OAAO,CAAC;CAClB;AACD,qBAAa,MAAM;IACjB,OAAO,CAAC,MAAM,CAAC,SAAS,CAAkC;IAC1D,OAAO,CAAC,MAAM,CAAc;IAC5B,OAAO,CAAC,aAAa,CAAS;gBAElB,OAAO,GAAE,aAAkB;IA2BvC,MAAM,CAAC,WAAW,CAAC,OAAO,GAAE,aAAkB,GAAG,MAAM;IAmBvD,WAAW,CAAC,KAAK,EAAE,QAAQ,GAAG,IAAI;IAIlC,QAAQ,IAAI,QAAQ;IAIpB,SAAS,CAAC,MAAM,EAAE,OAAO,GAAG,IAAI;IAMhC,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI3B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI1B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI1B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAI3B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;CAG5B"}
1
+ {"version":3,"file":"logger.d.ts","sourceRoot":"","sources":["../../../src/utils/logger.ts"],"names":[],"mappings":"AAEA,MAAM,MAAM,QAAQ,GAAG,OAAO,GAAG,MAAM,GAAG,MAAM,GAAG,OAAO,GAAG,QAAQ,CAAC;AAEtE,MAAM,WAAW,aAAa;IAC5B,KAAK,CAAC,EAAE,QAAQ,CAAC;IACjB,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,WAAW,CAAC,EAAE,OAAO,CAAC;IACtB,MAAM,CAAC,EAAE,OAAO,CAAC;CAClB;AACD,qBAAa,MAAM;IACjB,OAAO,CAAC,MAAM,CAAC,SAAS,CAAkC;IAC1D,OAAO,CAAC,MAAM,CAAc;IAC5B,OAAO,CAAC,aAAa,CAAS;gBAElB,OAAO,GAAE,aAAkB;IA2BvC,MAAM,CAAC,WAAW,CAAC,OAAO,GAAE,aAAkB,GAAG,MAAM;IAmBvD,WAAW,CAAC,KAAK,EAAE,QAAQ,GAAG,IAAI;IAIlC,QAAQ,IAAI,QAAQ;IAIpB,SAAS,CAAC,MAAM,EAAE,OAAO,GAAG,IAAI;IAMhC,SAAS,CAAC,MAAM,EAAE,MAAM,GAAG,IAAI;IAI/B,OAAO,CAAC,UAAU;IA2BlB,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM3B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM1B,IAAI,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM1B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;IAM3B,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,EAAE,GAAG,IAAI;CAK5B"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@hashgraphonline/standards-sdk",
3
- "version": "0.0.155",
3
+ "version": "0.0.156",
4
4
  "description": "The Hashgraph Online Standards SDK provides a complete implementation of the Hashgraph Consensus Standards (HCS), giving developers all the tools needed to build applications on Hedera.",
5
5
  "type": "module",
6
6
  "files": [