@hashgraphonline/standards-sdk 0.0.57 → 0.0.59
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/es/hcs-10/agent-builder.d.ts +1 -2
- package/dist/es/hcs-10/agent-builder.d.ts.map +1 -1
- package/dist/es/hcs-10/base-client.d.ts +2 -1
- package/dist/es/hcs-10/base-client.d.ts.map +1 -1
- package/dist/es/hcs-10/browser.d.ts +1 -1
- package/dist/es/hcs-10/browser.d.ts.map +1 -1
- package/dist/es/hcs-10/index.d.ts +1 -0
- package/dist/es/hcs-10/index.d.ts.map +1 -1
- package/dist/es/hcs-10/registrations.d.ts +1 -60
- package/dist/es/hcs-10/registrations.d.ts.map +1 -1
- package/dist/es/hcs-10/sdk.d.ts +3 -32
- package/dist/es/hcs-10/sdk.d.ts.map +1 -1
- package/dist/es/hcs-10/types.d.ts +89 -6
- package/dist/es/hcs-10/types.d.ts.map +1 -1
- package/dist/es/hcs-11/index.d.ts +1 -1
- package/dist/es/hcs-11/index.d.ts.map +1 -1
- package/dist/es/inscribe/types.d.ts +1 -1
- package/dist/es/inscribe/types.d.ts.map +1 -1
- package/dist/es/standards-sdk.es.js +7 -7
- package/dist/es/standards-sdk.es10.js +14 -11
- package/dist/es/standards-sdk.es10.js.map +1 -1
- package/dist/es/standards-sdk.es100.js +142 -38
- package/dist/es/standards-sdk.es100.js.map +1 -1
- package/dist/es/standards-sdk.es101.js +86 -13
- package/dist/es/standards-sdk.es101.js.map +1 -1
- package/dist/es/standards-sdk.es102.js +79 -56
- package/dist/es/standards-sdk.es102.js.map +1 -1
- package/dist/es/standards-sdk.es103.js +25 -1282
- package/dist/es/standards-sdk.es103.js.map +1 -1
- package/dist/es/standards-sdk.es104.js +5 -31
- package/dist/es/standards-sdk.es104.js.map +1 -1
- package/dist/es/standards-sdk.es105.js +158 -5
- package/dist/es/standards-sdk.es105.js.map +1 -1
- package/dist/es/standards-sdk.es106.js +22 -158
- package/dist/es/standards-sdk.es106.js.map +1 -1
- package/dist/es/standards-sdk.es107.js +2 -2
- package/dist/es/standards-sdk.es109.js +2 -2
- package/dist/es/standards-sdk.es110.js +1 -1
- package/dist/es/standards-sdk.es12.js +7 -739
- package/dist/es/standards-sdk.es12.js.map +1 -1
- package/dist/es/standards-sdk.es13.js +722 -52
- package/dist/es/standards-sdk.es13.js.map +1 -1
- package/dist/es/standards-sdk.es14.js +67 -20
- package/dist/es/standards-sdk.es14.js.map +1 -1
- package/dist/es/standards-sdk.es15.js +18 -156
- package/dist/es/standards-sdk.es15.js.map +1 -1
- package/dist/es/standards-sdk.es16.js +138 -385
- package/dist/es/standards-sdk.es16.js.map +1 -1
- package/dist/es/standards-sdk.es17.js +385 -211
- package/dist/es/standards-sdk.es17.js.map +1 -1
- package/dist/es/standards-sdk.es18.js +233 -7
- package/dist/es/standards-sdk.es18.js.map +1 -1
- package/dist/es/standards-sdk.es2.js +1 -1
- package/dist/es/standards-sdk.es26.js +9 -9
- package/dist/es/standards-sdk.es3.js +1 -1
- package/dist/es/standards-sdk.es4.js +1 -1
- package/dist/es/standards-sdk.es5.js +16 -12
- package/dist/es/standards-sdk.es5.js.map +1 -1
- package/dist/es/standards-sdk.es7.js +1 -1
- package/dist/es/standards-sdk.es7.js.map +1 -1
- package/dist/es/standards-sdk.es8.js +10 -5
- package/dist/es/standards-sdk.es8.js.map +1 -1
- package/dist/es/standards-sdk.es88.js +185 -74
- package/dist/es/standards-sdk.es88.js.map +1 -1
- package/dist/es/standards-sdk.es89.js +433 -18
- package/dist/es/standards-sdk.es89.js.map +1 -1
- package/dist/es/standards-sdk.es9.js +1 -1
- package/dist/es/standards-sdk.es9.js.map +1 -1
- package/dist/es/standards-sdk.es90.js +21 -144
- package/dist/es/standards-sdk.es90.js.map +1 -1
- package/dist/es/standards-sdk.es91.js +130 -82
- package/dist/es/standards-sdk.es91.js.map +1 -1
- package/dist/es/standards-sdk.es92.js +14 -191
- package/dist/es/standards-sdk.es92.js.map +1 -1
- package/dist/es/standards-sdk.es93.js +21 -430
- package/dist/es/standards-sdk.es93.js.map +1 -1
- package/dist/es/standards-sdk.es94.js +19 -15
- package/dist/es/standards-sdk.es94.js.map +1 -1
- package/dist/es/standards-sdk.es95.js +13 -131
- package/dist/es/standards-sdk.es95.js.map +1 -1
- package/dist/es/standards-sdk.es96.js +35 -9
- package/dist/es/standards-sdk.es96.js.map +1 -1
- package/dist/es/standards-sdk.es97.js +11 -22
- package/dist/es/standards-sdk.es97.js.map +1 -1
- package/dist/es/standards-sdk.es98.js +49 -17
- package/dist/es/standards-sdk.es98.js.map +1 -1
- package/dist/es/standards-sdk.es99.js +1283 -15
- package/dist/es/standards-sdk.es99.js.map +1 -1
- package/dist/umd/hcs-10/agent-builder.d.ts +1 -2
- package/dist/umd/hcs-10/agent-builder.d.ts.map +1 -1
- package/dist/umd/hcs-10/base-client.d.ts +2 -1
- package/dist/umd/hcs-10/base-client.d.ts.map +1 -1
- package/dist/umd/hcs-10/browser.d.ts +1 -1
- package/dist/umd/hcs-10/browser.d.ts.map +1 -1
- package/dist/umd/hcs-10/index.d.ts +1 -0
- package/dist/umd/hcs-10/index.d.ts.map +1 -1
- package/dist/umd/hcs-10/registrations.d.ts +1 -60
- package/dist/umd/hcs-10/registrations.d.ts.map +1 -1
- package/dist/umd/hcs-10/sdk.d.ts +3 -32
- package/dist/umd/hcs-10/sdk.d.ts.map +1 -1
- package/dist/umd/hcs-10/types.d.ts +89 -6
- package/dist/umd/hcs-10/types.d.ts.map +1 -1
- package/dist/umd/hcs-11/index.d.ts +1 -1
- package/dist/umd/hcs-11/index.d.ts.map +1 -1
- package/dist/umd/inscribe/types.d.ts +1 -1
- package/dist/umd/inscribe/types.d.ts.map +1 -1
- package/dist/umd/standards-sdk.umd.js +1 -1
- package/dist/umd/standards-sdk.umd.js.map +1 -1
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"standards-sdk.es17.js","sources":["../../src/services/mirror-node.ts"],"sourcesContent":["import { PublicKey, Timestamp } from '@hashgraph/sdk';\nimport axios from 'axios';\nimport { Logger } from '../utils/logger';\nimport { HCSMessage } from '../hcs-10/base-client';\nimport { proto } from '@hashgraph/proto';\nimport {\n AccountResponse,\n CustomFees,\n HBARPrice,\n NetworkType,\n TopicMessagesResponse,\n TopicResponse,\n} from './types';\n\nexport class HederaMirrorNode {\n private network: NetworkType;\n private baseUrl: string;\n private logger: Logger;\n private isServerEnvironment: boolean;\n\n constructor(network: NetworkType, logger: Logger) {\n this.network = network;\n this.baseUrl = this.getMirrorNodeUrl();\n this.logger = logger;\n this.isServerEnvironment = typeof window === 'undefined';\n }\n\n private getMirrorNodeUrl(): string {\n return this.network === 'mainnet'\n ? 'https://mainnet-public.mirrornode.hedera.com'\n : 'https://testnet.mirrornode.hedera.com';\n }\n\n getBaseUrl(): string {\n return this.baseUrl;\n }\n\n async getPublicKey(accountId: string): Promise<PublicKey> {\n this.logger.info(`Getting public key for account ${accountId}`);\n\n const accountInfo = await this.requestAccount(accountId);\n\n try {\n if (!accountInfo || !accountInfo.key) {\n throw new Error(\n `Failed to retrieve public key for account ID: ${accountId}`\n );\n }\n\n return PublicKey.fromString(accountInfo.key.key);\n } catch (error: any) {\n throw new Error(\n `Error fetching public key from Mirror Node: ${error.message}`\n );\n }\n }\n\n async getAccountMemo(accountId: string): Promise<string | null> {\n const maxRetries = 3;\n\n for (let attempt = 0; attempt < maxRetries; attempt++) {\n try {\n const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;\n\n const response = await axios.get(accountInfoUrl);\n const accountInfo = response.data;\n\n if (accountInfo && accountInfo.memo) {\n return accountInfo.memo;\n }\n\n this.logger.error(`No memo found for account ${accountId}`);\n\n if (attempt < maxRetries - 1) {\n await new Promise((resolve) => setTimeout(resolve, 2000));\n }\n } catch (error: any) {\n this.logger.error(\n `Error getting account memo (attempt ${attempt + 1}): ${\n error.message\n }`\n );\n\n if (attempt < maxRetries - 1) {\n await new Promise((resolve) => setTimeout(resolve, 2000));\n }\n }\n }\n\n return null;\n }\n\n async getTopicInfo(topicId: string): Promise<TopicResponse> {\n try {\n const topicInfoUrl = `${this.baseUrl}/api/v1/topics/${topicId}`;\n const response = await axios.get(topicInfoUrl);\n return response.data;\n } catch (error: any) {\n this.logger.error(`Error retrieving topic information: ${error.message}`);\n throw new Error(`Failed to retrieve topic information: ${error.message}`);\n }\n }\n\n async getTopicFees(topicId: string): Promise<CustomFees | null> {\n try {\n const topicInfo = await this.getTopicInfo(topicId);\n return topicInfo.custom_fees;\n } catch (error: any) {\n this.logger.error(`Error retrieving topic fees: ${error.message}`);\n return null;\n }\n }\n\n async getHBARPrice(date: Date): Promise<number | null> {\n try {\n const timestamp = Timestamp.fromDate(date).toString();\n\n const request = await fetch(\n `https://mainnet-public.mirrornode.hedera.com/api/v1/network/exchangerate?timestamp=${timestamp}`\n );\n const response = (await request.json()) as HBARPrice;\n\n const usdPrice =\n Number(response?.current_rate?.cent_equivalent) /\n Number(response?.current_rate?.hbar_equivalent) /\n 100;\n\n return usdPrice;\n } catch (e) {\n return null;\n }\n }\n\n async getTopicMessages(topicId: string): Promise<HCSMessage[]> {\n this.logger.info(`Querying messages for topic ${topicId}`);\n\n let nextUrl = `${this.baseUrl}/api/v1/topics/${topicId}/messages`;\n const messages: HCSMessage[] = [];\n\n while (nextUrl) {\n try {\n const response = await axios.get<TopicMessagesResponse>(nextUrl);\n const data = response.data;\n\n if (data.messages && data.messages.length > 0) {\n for (const message of data.messages) {\n try {\n if (!message.message) {\n continue;\n }\n\n let messageContent: string;\n try {\n if (this.isServerEnvironment) {\n messageContent = Buffer.from(\n message.message,\n 'base64'\n ).toString('utf-8');\n } else {\n messageContent = new TextDecoder().decode(\n Uint8Array.from(atob(message.message), (c) =>\n c.charCodeAt(0)\n )\n );\n }\n } catch (error) {\n this.logger.error(`Error decoding message: ${error}`);\n continue;\n }\n\n let messageJson;\n try {\n messageJson = JSON.parse(messageContent);\n } catch (error) {\n this.logger.error(\n `Invalid JSON message content: ${messageContent}`\n );\n return;\n }\n\n messageJson.sequence_number = message.sequence_number;\n messages.push({\n ...messageJson,\n consensus_timestamp: message.consensus_timestamp,\n sequence_number: message.sequence_number,\n created: new Date(\n Number(message.consensus_timestamp) * 1000\n ),\n });\n } catch (error: any) {\n this.logger.error(`Error processing message: ${error.message}`);\n }\n }\n }\n\n nextUrl = data.links?.next ? `${this.baseUrl}${data.links.next}` : '';\n } catch (error: any) {\n this.logger.error(`Error querying topic messages: ${error.message}`);\n throw new Error(`Failed to query topic messages: ${error.message}`);\n }\n }\n\n return messages;\n }\n\n async requestAccount(accountId: string): Promise<AccountResponse> {\n try {\n const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;\n const response = await axios.get(accountInfoUrl);\n if (!response.data) {\n throw new Error(\n `Failed to make request to mirror node for account: ${accountId}`\n );\n }\n return response.data;\n } catch (error: any) {\n this.logger.error(`Failed to fetch account: ${error.message}`);\n throw new Error(`Failed to fetch account: ${error.message}`);\n }\n }\n\n async checkKeyListAccess(\n keyBytes: Buffer,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n try {\n const key = proto.Key.decode(keyBytes);\n return this.evaluateKeyAccess(key, userPublicKey);\n } catch (error) {\n this.logger.error(\n `Error decoding protobuf key: ${\n error instanceof Error ? error.message : String(error)\n }`\n );\n return false;\n }\n }\n\n private async evaluateKeyAccess(\n key: proto.IKey,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n if (key.ed25519) {\n return this.compareEd25519Key(key.ed25519, userPublicKey);\n }\n\n if (key.keyList) {\n return this.evaluateKeyList(key.keyList, userPublicKey);\n }\n\n if (key.thresholdKey && key.thresholdKey.keys) {\n return this.evaluateKeyList(key.thresholdKey.keys, userPublicKey);\n }\n\n return false;\n }\n\n private async evaluateKeyList(\n keyList: proto.IKeyList,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n const keys = keyList.keys || [];\n\n for (const listKey of keys) {\n if (!listKey) continue;\n\n if (listKey.ed25519) {\n if (this.compareEd25519Key(listKey.ed25519, userPublicKey)) {\n return true;\n }\n } else if (listKey.keyList || listKey.thresholdKey) {\n try {\n const nestedKeyBytes = proto.Key.encode({\n ...(listKey.keyList ? { keyList: listKey.keyList } : {}),\n ...(listKey.thresholdKey\n ? { thresholdKey: listKey.thresholdKey }\n : {}),\n }).finish();\n\n const hasNestedAccess = await this.checkKeyListAccess(\n Buffer.from(nestedKeyBytes),\n userPublicKey\n );\n\n if (hasNestedAccess) {\n return true;\n }\n } catch (err) {\n this.logger.debug(\n `Error in nested key: ${\n err instanceof Error ? err.message : String(err)\n }`\n );\n }\n }\n }\n\n return false;\n }\n\n private compareEd25519Key(\n keyData: Uint8Array,\n userPublicKey: PublicKey\n ): boolean {\n try {\n const decodedKey = PublicKey.fromBytes(Buffer.from(keyData));\n return decodedKey.toString() === userPublicKey.toString();\n } catch (err) {\n return false;\n }\n }\n}\n"],"names":[],"mappings":";;;;;AAcO,MAAM,iBAAiB;AAAA,EAM5B,YAAY,SAAsB,QAAgB;AAChD,SAAK,UAAU;AACV,SAAA,UAAU,KAAK,iBAAiB;AACrC,SAAK,SAAS;AACT,SAAA,sBAAsB,OAAO,WAAW;AAAA,EAAA;AAAA,EAGvC,mBAA2B;AAC1B,WAAA,KAAK,YAAY,YACpB,iDACA;AAAA,EAAA;AAAA,EAGN,aAAqB;AACnB,WAAO,KAAK;AAAA,EAAA;AAAA,EAGd,MAAM,aAAa,WAAuC;AACxD,SAAK,OAAO,KAAK,kCAAkC,SAAS,EAAE;AAE9D,UAAM,cAAc,MAAM,KAAK,eAAe,SAAS;AAEnD,QAAA;AACF,UAAI,CAAC,eAAe,CAAC,YAAY,KAAK;AACpC,cAAM,IAAI;AAAA,UACR,iDAAiD,SAAS;AAAA,QAC5D;AAAA,MAAA;AAGF,aAAO,UAAU,WAAW,YAAY,IAAI,GAAG;AAAA,aACxC,OAAY;AACnB,YAAM,IAAI;AAAA,QACR,+CAA+C,MAAM,OAAO;AAAA,MAC9D;AAAA,IAAA;AAAA,EACF;AAAA,EAGF,MAAM,eAAe,WAA2C;AAC9D,UAAM,aAAa;AAEnB,aAAS,UAAU,GAAG,UAAU,YAAY,WAAW;AACjD,UAAA;AACF,cAAM,iBAAiB,GAAG,KAAK,OAAO,oBAAoB,SAAS;AAEnE,cAAM,WAAW,MAAM,MAAM,IAAI,cAAc;AAC/C,cAAM,cAAc,SAAS;AAEzB,YAAA,eAAe,YAAY,MAAM;AACnC,iBAAO,YAAY;AAAA,QAAA;AAGrB,aAAK,OAAO,MAAM,6BAA6B,SAAS,EAAE;AAEtD,YAAA,UAAU,aAAa,GAAG;AAC5B,gBAAM,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,GAAI,CAAC;AAAA,QAAA;AAAA,eAEnD,OAAY;AACnB,aAAK,OAAO;AAAA,UACV,uCAAuC,UAAU,CAAC,MAChD,MAAM,OACR;AAAA,QACF;AAEI,YAAA,UAAU,aAAa,GAAG;AAC5B,gBAAM,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,GAAI,CAAC;AAAA,QAAA;AAAA,MAC1D;AAAA,IACF;AAGK,WAAA;AAAA,EAAA;AAAA,EAGT,MAAM,aAAa,SAAyC;AACtD,QAAA;AACF,YAAM,eAAe,GAAG,KAAK,OAAO,kBAAkB,OAAO;AAC7D,YAAM,WAAW,MAAM,MAAM,IAAI,YAAY;AAC7C,aAAO,SAAS;AAAA,aACT,OAAY;AACnB,WAAK,OAAO,MAAM,uCAAuC,MAAM,OAAO,EAAE;AACxE,YAAM,IAAI,MAAM,yCAAyC,MAAM,OAAO,EAAE;AAAA,IAAA;AAAA,EAC1E;AAAA,EAGF,MAAM,aAAa,SAA6C;AAC1D,QAAA;AACF,YAAM,YAAY,MAAM,KAAK,aAAa,OAAO;AACjD,aAAO,UAAU;AAAA,aACV,OAAY;AACnB,WAAK,OAAO,MAAM,gCAAgC,MAAM,OAAO,EAAE;AAC1D,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAM,aAAa,MAAoC;AACjD,QAAA;AACF,YAAM,YAAY,UAAU,SAAS,IAAI,EAAE,SAAS;AAEpD,YAAM,UAAU,MAAM;AAAA,QACpB,sFAAsF,SAAS;AAAA,MACjG;AACM,YAAA,WAAY,MAAM,QAAQ,KAAK;AAE/B,YAAA,WACJ,OAAO,UAAU,cAAc,eAAe,IAC9C,OAAO,UAAU,cAAc,eAAe,IAC9C;AAEK,aAAA;AAAA,aACA,GAAG;AACH,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAM,iBAAiB,SAAwC;AAC7D,SAAK,OAAO,KAAK,+BAA+B,OAAO,EAAE;AAEzD,QAAI,UAAU,GAAG,KAAK,OAAO,kBAAkB,OAAO;AACtD,UAAM,WAAyB,CAAC;AAEhC,WAAO,SAAS;AACV,UAAA;AACF,cAAM,WAAW,MAAM,MAAM,IAA2B,OAAO;AAC/D,cAAM,OAAO,SAAS;AAEtB,YAAI,KAAK,YAAY,KAAK,SAAS,SAAS,GAAG;AAClC,qBAAA,WAAW,KAAK,UAAU;AAC/B,gBAAA;AACE,kBAAA,CAAC,QAAQ,SAAS;AACpB;AAAA,cAAA;AAGE,kBAAA;AACA,kBAAA;AACF,oBAAI,KAAK,qBAAqB;AAC5B,mCAAiB,OAAO;AAAA,oBACtB,QAAQ;AAAA,oBACR;AAAA,kBAAA,EACA,SAAS,OAAO;AAAA,gBAAA,OACb;AACY,mCAAA,IAAI,cAAc;AAAA,oBACjC,WAAW;AAAA,sBAAK,KAAK,QAAQ,OAAO;AAAA,sBAAG,CAAC,MACtC,EAAE,WAAW,CAAC;AAAA,oBAAA;AAAA,kBAElB;AAAA,gBAAA;AAAA,uBAEK,OAAO;AACd,qBAAK,OAAO,MAAM,2BAA2B,KAAK,EAAE;AACpD;AAAA,cAAA;AAGE,kBAAA;AACA,kBAAA;AACY,8BAAA,KAAK,MAAM,cAAc;AAAA,uBAChC,OAAO;AACd,qBAAK,OAAO;AAAA,kBACV,iCAAiC,cAAc;AAAA,gBACjD;AACA;AAAA,cAAA;AAGF,0BAAY,kBAAkB,QAAQ;AACtC,uBAAS,KAAK;AAAA,gBACZ,GAAG;AAAA,gBACH,qBAAqB,QAAQ;AAAA,gBAC7B,iBAAiB,QAAQ;AAAA,gBACzB,SAAS,IAAI;AAAA,kBACX,OAAO,QAAQ,mBAAmB,IAAI;AAAA,gBAAA;AAAA,cACxC,CACD;AAAA,qBACM,OAAY;AACnB,mBAAK,OAAO,MAAM,6BAA6B,MAAM,OAAO,EAAE;AAAA,YAAA;AAAA,UAChE;AAAA,QACF;AAGQ,kBAAA,KAAK,OAAO,OAAO,GAAG,KAAK,OAAO,GAAG,KAAK,MAAM,IAAI,KAAK;AAAA,eAC5D,OAAY;AACnB,aAAK,OAAO,MAAM,kCAAkC,MAAM,OAAO,EAAE;AACnE,cAAM,IAAI,MAAM,mCAAmC,MAAM,OAAO,EAAE;AAAA,MAAA;AAAA,IACpE;AAGK,WAAA;AAAA,EAAA;AAAA,EAGT,MAAM,eAAe,WAA6C;AAC5D,QAAA;AACF,YAAM,iBAAiB,GAAG,KAAK,OAAO,oBAAoB,SAAS;AACnE,YAAM,WAAW,MAAM,MAAM,IAAI,cAAc;AAC3C,UAAA,CAAC,SAAS,MAAM;AAClB,cAAM,IAAI;AAAA,UACR,sDAAsD,SAAS;AAAA,QACjE;AAAA,MAAA;AAEF,aAAO,SAAS;AAAA,aACT,OAAY;AACnB,WAAK,OAAO,MAAM,4BAA4B,MAAM,OAAO,EAAE;AAC7D,YAAM,IAAI,MAAM,4BAA4B,MAAM,OAAO,EAAE;AAAA,IAAA;AAAA,EAC7D;AAAA,EAGF,MAAM,mBACJ,UACA,eACkB;AACd,QAAA;AACF,YAAM,MAAM,MAAM,IAAI,OAAO,QAAQ;AAC9B,aAAA,KAAK,kBAAkB,KAAK,aAAa;AAAA,aACzC,OAAO;AACd,WAAK,OAAO;AAAA,QACV,gCACE,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,CACvD;AAAA,MACF;AACO,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAc,kBACZ,KACA,eACkB;AAClB,QAAI,IAAI,SAAS;AACf,aAAO,KAAK,kBAAkB,IAAI,SAAS,aAAa;AAAA,IAAA;AAG1D,QAAI,IAAI,SAAS;AACf,aAAO,KAAK,gBAAgB,IAAI,SAAS,aAAa;AAAA,IAAA;AAGxD,QAAI,IAAI,gBAAgB,IAAI,aAAa,MAAM;AAC7C,aAAO,KAAK,gBAAgB,IAAI,aAAa,MAAM,aAAa;AAAA,IAAA;AAG3D,WAAA;AAAA,EAAA;AAAA,EAGT,MAAc,gBACZ,SACA,eACkB;AACZ,UAAA,OAAO,QAAQ,QAAQ,CAAC;AAE9B,eAAW,WAAW,MAAM;AAC1B,UAAI,CAAC,QAAS;AAEd,UAAI,QAAQ,SAAS;AACnB,YAAI,KAAK,kBAAkB,QAAQ,SAAS,aAAa,GAAG;AACnD,iBAAA;AAAA,QAAA;AAAA,MAEA,WAAA,QAAQ,WAAW,QAAQ,cAAc;AAC9C,YAAA;AACI,gBAAA,iBAAiB,MAAM,IAAI,OAAO;AAAA,YACtC,GAAI,QAAQ,UAAU,EAAE,SAAS,QAAQ,QAAA,IAAY,CAAC;AAAA,YACtD,GAAI,QAAQ,eACR,EAAE,cAAc,QAAQ,aAAA,IACxB,CAAA;AAAA,UACL,CAAA,EAAE,OAAO;AAEJ,gBAAA,kBAAkB,MAAM,KAAK;AAAA,YACjC,OAAO,KAAK,cAAc;AAAA,YAC1B;AAAA,UACF;AAEA,cAAI,iBAAiB;AACZ,mBAAA;AAAA,UAAA;AAAA,iBAEF,KAAK;AACZ,eAAK,OAAO;AAAA,YACV,wBACE,eAAe,QAAQ,IAAI,UAAU,OAAO,GAAG,CACjD;AAAA,UACF;AAAA,QAAA;AAAA,MACF;AAAA,IACF;AAGK,WAAA;AAAA,EAAA;AAAA,EAGD,kBACN,SACA,eACS;AACL,QAAA;AACF,YAAM,aAAa,UAAU,UAAU,OAAO,KAAK,OAAO,CAAC;AAC3D,aAAO,WAAW,eAAe,cAAc,SAAS;AAAA,aACjD,KAAK;AACL,aAAA;AAAA,IAAA;AAAA,EACT;AAEJ;"}
|
|
1
|
+
{"version":3,"file":"standards-sdk.es17.js","sources":["../../src/inscribe/inscriber.ts"],"sourcesContent":["import { InscriptionSDK } from '@kiloscribe/inscription-sdk';\nimport {\n InscriptionOptions,\n InscriptionResult,\n RetrievedInscriptionResult,\n HederaClientConfig,\n} from './types';\nimport type { DAppSigner } from '@hashgraph/hedera-wallet-connect';\nimport { Logger } from '../utils/logger';\nimport { ProgressCallback, ProgressReporter } from '../utils/progress-reporter';\n\nexport type InscriptionInput =\n | { type: 'url'; url: string }\n | { type: 'file'; path: string }\n | {\n type: 'buffer';\n buffer: ArrayBuffer | Buffer;\n fileName: string;\n mimeType?: string;\n };\n\nexport type InscriptionResponse =\n | { confirmed: false; result: InscriptionResult; sdk: InscriptionSDK }\n | {\n confirmed: true;\n result: InscriptionResult;\n inscription: RetrievedInscriptionResult;\n sdk: InscriptionSDK;\n };\n\nexport async function inscribe(\n input: InscriptionInput,\n clientConfig: HederaClientConfig,\n options: InscriptionOptions,\n existingSDK?: InscriptionSDK\n): Promise<InscriptionResponse> {\n const logger = Logger.getInstance({\n module: 'Inscriber',\n ...options.logging,\n });\n\n logger.info('Starting inscription process', {\n type: input.type,\n mode: options.mode || 'file',\n ...(input.type === 'url' ? { url: input.url } : {}),\n ...(input.type === 'file' ? { path: input.path } : {}),\n ...(input.type === 'buffer'\n ? { fileName: input.fileName, bufferSize: input.buffer.byteLength }\n : {}),\n });\n\n try {\n if (options.mode === 'hashinal' && options.metadata) {\n validateHashinalMetadata(options.metadata, logger);\n }\n\n let sdk: InscriptionSDK;\n\n if (existingSDK) {\n logger.debug('Using existing InscriptionSDK instance');\n sdk = existingSDK;\n } else if (options.apiKey) {\n logger.debug('Initializing InscriptionSDK with API key');\n sdk = new InscriptionSDK({\n apiKey: options.apiKey,\n network: clientConfig.network || 'mainnet',\n });\n } else {\n logger.debug('Initializing InscriptionSDK with server auth');\n sdk = await InscriptionSDK.createWithAuth({\n type: 'server',\n accountId: clientConfig.accountId,\n privateKey: clientConfig.privateKey,\n network: clientConfig.network || 'mainnet',\n });\n }\n\n const baseRequest = {\n holderId: clientConfig.accountId,\n metadata: options.metadata || {},\n tags: options.tags || [],\n mode: options.mode || 'file',\n chunkSize: options.chunkSize,\n };\n\n let request: any;\n switch (input.type) {\n case 'url':\n request = {\n ...baseRequest,\n file: {\n type: 'url',\n url: input.url,\n },\n };\n break;\n\n case 'file':\n request = {\n ...baseRequest,\n file: {\n type: 'path',\n path: input.path,\n },\n };\n break;\n\n case 'buffer':\n request = {\n ...baseRequest,\n file: {\n type: 'base64',\n base64: Buffer.from(input.buffer).toString('base64'),\n fileName: input.fileName,\n mimeType: input.mimeType,\n },\n };\n break;\n }\n\n if (options.mode === 'hashinal') {\n request.metadataObject = options.metadata;\n request.creator = options.metadata?.creator || clientConfig.accountId;\n request.description = options.metadata?.description;\n\n if (options.jsonFileURL) {\n request.jsonFileURL = options.jsonFileURL;\n }\n }\n\n logger.debug('Preparing to inscribe content', {\n type: input.type,\n mode: options.mode || 'file',\n holderId: clientConfig.accountId,\n });\n\n const result = await sdk.inscribeAndExecute(request, clientConfig);\n logger.info('Starting to inscribe.', {\n type: input.type,\n mode: options.mode || 'file',\n transactionId: result.jobId,\n });\n\n if (options.waitForConfirmation) {\n logger.debug('Waiting for inscription confirmation', {\n transactionId: result.jobId,\n maxAttempts: options.waitMaxAttempts,\n intervalMs: options.waitIntervalMs,\n });\n\n const inscription = await waitForInscriptionConfirmation(\n sdk,\n result.jobId,\n options.waitMaxAttempts,\n options.waitIntervalMs,\n options.progressCallback\n );\n\n logger.info('Inscription confirmation received', {\n transactionId: result.jobId,\n });\n\n return {\n confirmed: true,\n result,\n inscription,\n sdk,\n };\n }\n\n return {\n confirmed: false,\n result,\n sdk,\n };\n } catch (error) {\n logger.error('Error during inscription process', error);\n throw error;\n }\n}\n\nexport async function inscribeWithSigner(\n input: InscriptionInput,\n signer: DAppSigner,\n options: InscriptionOptions,\n existingSDK?: InscriptionSDK\n): Promise<InscriptionResponse> {\n const logger = Logger.getInstance({\n module: 'Inscriber',\n ...options.logging,\n });\n\n logger.info('Starting inscription process with signer', {\n type: input.type,\n mode: options.mode || 'file',\n ...(input.type === 'url' ? { url: input.url } : {}),\n ...(input.type === 'file' ? { path: input.path } : {}),\n ...(input.type === 'buffer'\n ? { fileName: input.fileName, bufferSize: input.buffer.byteLength }\n : {}),\n });\n\n try {\n if (options.mode === 'hashinal' && options.metadata) {\n validateHashinalMetadata(options.metadata, logger);\n }\n\n const accountId = signer.getAccountId().toString();\n logger.debug('Using account ID from signer', { accountId });\n\n let sdk: InscriptionSDK;\n\n if (existingSDK) {\n logger.debug('Using existing InscriptionSDK instance');\n sdk = existingSDK;\n } else if (options.apiKey) {\n logger.debug('Initializing InscriptionSDK with API key');\n sdk = new InscriptionSDK({\n apiKey: options.apiKey,\n network: options.network || 'mainnet',\n });\n } else {\n logger.debug('Initializing InscriptionSDK with client auth');\n sdk = await InscriptionSDK.createWithAuth({\n type: 'client',\n accountId,\n signer: signer,\n network: options.network || 'mainnet',\n });\n }\n\n const baseRequest = {\n holderId: accountId,\n metadata: options.metadata || {},\n tags: options.tags || [],\n mode: options.mode || 'file',\n chunkSize: options.chunkSize,\n };\n\n let request: any;\n switch (input.type) {\n case 'url':\n request = {\n ...baseRequest,\n file: {\n type: 'url',\n url: input.url,\n },\n };\n break;\n\n case 'file':\n request = {\n ...baseRequest,\n file: {\n type: 'path',\n path: input.path,\n },\n };\n break;\n\n case 'buffer':\n request = {\n ...baseRequest,\n file: {\n type: 'base64',\n base64: Buffer.from(input.buffer).toString('base64'),\n fileName: input.fileName,\n mimeType: input.mimeType,\n },\n };\n break;\n }\n\n if (options.mode === 'hashinal') {\n request.metadataObject = options.metadata;\n request.creator = options.metadata?.creator || accountId;\n request.description = options.metadata?.description;\n\n if (options.jsonFileURL) {\n request.jsonFileURL = options.jsonFileURL;\n }\n }\n\n logger.debug('Preparing to inscribe content with signer', {\n type: input.type,\n mode: options.mode || 'file',\n holderId: accountId,\n });\n\n const result = await sdk.inscribe(\n {\n ...request,\n holderId: accountId,\n },\n signer\n );\n logger.info('Inscription started', {\n type: input.type,\n mode: options.mode || 'file',\n transactionId: result.jobId,\n });\n\n if (options.waitForConfirmation) {\n logger.debug('Waiting for inscription confirmation', {\n transactionId: result.jobId,\n maxAttempts: options.waitMaxAttempts,\n intervalMs: options.waitIntervalMs,\n });\n\n const inscription = await waitForInscriptionConfirmation(\n sdk,\n result.jobId,\n options.waitMaxAttempts,\n options.waitIntervalMs,\n options.progressCallback\n );\n\n logger.info('Inscription confirmation received', {\n transactionId: result.jobId,\n });\n\n return {\n confirmed: true,\n result,\n inscription,\n sdk,\n };\n }\n\n return {\n confirmed: false,\n result,\n sdk,\n };\n } catch (error) {\n logger.error('Error during inscription process', error);\n throw error;\n }\n}\n\nexport async function retrieveInscription(\n transactionId: string,\n options: InscriptionOptions & { accountId?: string; privateKey?: string }\n): Promise<RetrievedInscriptionResult> {\n const logger = Logger.getInstance({\n module: 'Inscriber',\n ...options?.logging || {},\n });\n\n const formattedTransactionId = transactionId.includes('@')\n ? `${transactionId.split('@')[0]}-${transactionId\n .split('@')[1]\n .replace(/\\./g, '-')}`\n : transactionId;\n\n logger.info('Retrieving inscription', {\n originalTransactionId: transactionId,\n formattedTransactionId,\n });\n\n try {\n let sdk: InscriptionSDK;\n\n if (options?.apiKey) {\n logger.debug('Initializing InscriptionSDK with API key');\n sdk = new InscriptionSDK({\n apiKey: options.apiKey,\n network: options.network || 'mainnet',\n });\n } else if (options?.accountId && options?.privateKey) {\n logger.debug('Initializing InscriptionSDK with server auth');\n sdk = await InscriptionSDK.createWithAuth({\n type: 'server',\n accountId: options.accountId,\n privateKey: options.privateKey,\n network: options.network || 'mainnet',\n });\n } else {\n const error = new Error(\n 'Either API key or account ID and private key are required for retrieving inscriptions'\n );\n logger.error('Missing authentication credentials', {\n hasApiKey: Boolean(options?.apiKey),\n hasAccountId: Boolean(options?.accountId),\n hasPrivateKey: Boolean(options?.privateKey),\n });\n throw error;\n }\n\n logger.debug('Initialized SDK for inscription retrieval', {\n formattedTransactionId,\n network: options.network || 'mainnet',\n });\n\n const result = await sdk.retrieveInscription(formattedTransactionId);\n logger.info('Successfully retrieved inscription', {\n formattedTransactionId,\n });\n\n return result;\n } catch (error) {\n logger.error('Error retrieving inscription', {\n formattedTransactionId,\n error,\n });\n throw error;\n }\n}\n\nfunction validateHashinalMetadata(metadata: any, logger: any): void {\n const requiredFields = ['name', 'creator', 'description', 'type'];\n const missingFields = requiredFields.filter((field) => !metadata[field]);\n\n if (missingFields.length > 0) {\n const error = new Error(\n `Missing required Hashinal metadata fields: ${missingFields.join(', ')}`\n );\n logger.error('Hashinal metadata validation failed', { missingFields });\n throw error;\n }\n\n logger.debug('Hashinal metadata validation passed', {\n name: metadata.name,\n creator: metadata.creator,\n description: metadata.description,\n type: metadata.type,\n hasAttributes: !!metadata.attributes,\n hasProperties: !!metadata.properties,\n });\n}\n\nasync function waitForInscriptionConfirmation(\n sdk: InscriptionSDK,\n transactionId: string,\n maxAttempts: number = 30,\n intervalMs: number = 4000,\n progressCallback?: ProgressCallback\n): Promise<RetrievedInscriptionResult> {\n const logger = Logger.getInstance({ module: 'Inscriber' });\n const progressReporter = new ProgressReporter({\n module: 'Inscriber',\n logger,\n callback: progressCallback,\n });\n\n try {\n logger.debug('Waiting for inscription confirmation', {\n transactionId,\n maxAttempts,\n intervalMs,\n });\n\n progressReporter.preparing('Preparing for inscription confirmation', 5, {\n transactionId,\n maxAttempts,\n intervalMs,\n });\n\n try {\n const waitMethod = sdk.waitForInscription.bind(sdk) as (\n txId: string,\n maxAttempts: number,\n intervalMs: number,\n checkCompletion: boolean,\n progressCallback?: Function\n ) => Promise<RetrievedInscriptionResult>;\n\n const wrappedCallback = (data: any) => {\n const stage = data.stage || 'confirming';\n const message = data.message || 'Processing inscription';\n const percent = data.progressPercent || 50;\n\n progressReporter.report({\n stage: stage,\n message: message,\n progressPercent: percent,\n details: {},\n });\n };\n\n return await waitMethod(\n transactionId,\n maxAttempts,\n intervalMs,\n true,\n wrappedCallback\n );\n } catch (e) {\n console.log(e);\n // Fall back to standard method if progress callback fails\n logger.debug('Falling back to standard waitForInscription method', {\n error: e,\n });\n progressReporter.verifying('Verifying inscription status', 50, {\n error: e,\n });\n\n return await sdk.waitForInscription(\n transactionId,\n maxAttempts,\n intervalMs,\n true\n );\n }\n } catch (error) {\n logger.error('Error waiting for inscription confirmation', {\n transactionId,\n maxAttempts,\n intervalMs,\n error,\n });\n\n progressReporter.failed('Inscription confirmation failed', {\n transactionId,\n error,\n });\n\n throw error;\n }\n}\n"],"names":[],"mappings":";;;;AA8BA,eAAsB,SACpB,OACA,cACA,SACA,aAC8B;AACxB,QAAA,SAAS,OAAO,YAAY;AAAA,IAChC,QAAQ;AAAA,IACR,GAAG,QAAQ;AAAA,EAAA,CACZ;AAED,SAAO,KAAK,gCAAgC;AAAA,IAC1C,MAAM,MAAM;AAAA,IACZ,MAAM,QAAQ,QAAQ;AAAA,IACtB,GAAI,MAAM,SAAS,QAAQ,EAAE,KAAK,MAAM,IAAI,IAAI,CAAC;AAAA,IACjD,GAAI,MAAM,SAAS,SAAS,EAAE,MAAM,MAAM,KAAK,IAAI,CAAC;AAAA,IACpD,GAAI,MAAM,SAAS,WACf,EAAE,UAAU,MAAM,UAAU,YAAY,MAAM,OAAO,WAAA,IACrD,CAAA;AAAA,EAAC,CACN;AAEG,MAAA;AACF,QAAI,QAAQ,SAAS,cAAc,QAAQ,UAAU;AAC1B,+BAAA,QAAQ,UAAU,MAAM;AAAA,IAAA;AAG/C,QAAA;AAEJ,QAAI,aAAa;AACf,aAAO,MAAM,wCAAwC;AAC/C,YAAA;AAAA,IAAA,WACG,QAAQ,QAAQ;AACzB,aAAO,MAAM,0CAA0C;AACvD,YAAM,IAAI,eAAe;AAAA,QACvB,QAAQ,QAAQ;AAAA,QAChB,SAAS,aAAa,WAAW;AAAA,MAAA,CAClC;AAAA,IAAA,OACI;AACL,aAAO,MAAM,8CAA8C;AACrD,YAAA,MAAM,eAAe,eAAe;AAAA,QACxC,MAAM;AAAA,QACN,WAAW,aAAa;AAAA,QACxB,YAAY,aAAa;AAAA,QACzB,SAAS,aAAa,WAAW;AAAA,MAAA,CAClC;AAAA,IAAA;AAGH,UAAM,cAAc;AAAA,MAClB,UAAU,aAAa;AAAA,MACvB,UAAU,QAAQ,YAAY,CAAC;AAAA,MAC/B,MAAM,QAAQ,QAAQ,CAAC;AAAA,MACvB,MAAM,QAAQ,QAAQ;AAAA,MACtB,WAAW,QAAQ;AAAA,IACrB;AAEI,QAAA;AACJ,YAAQ,MAAM,MAAM;AAAA,MAClB,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,KAAK,MAAM;AAAA,UAAA;AAAA,QAEf;AACA;AAAA,MAEF,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,MAAM,MAAM;AAAA,UAAA;AAAA,QAEhB;AACA;AAAA,MAEF,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,QAAQ,OAAO,KAAK,MAAM,MAAM,EAAE,SAAS,QAAQ;AAAA,YACnD,UAAU,MAAM;AAAA,YAChB,UAAU,MAAM;AAAA,UAAA;AAAA,QAEpB;AACA;AAAA,IAAA;AAGA,QAAA,QAAQ,SAAS,YAAY;AAC/B,cAAQ,iBAAiB,QAAQ;AACjC,cAAQ,UAAU,QAAQ,UAAU,WAAW,aAAa;AACpD,cAAA,cAAc,QAAQ,UAAU;AAExC,UAAI,QAAQ,aAAa;AACvB,gBAAQ,cAAc,QAAQ;AAAA,MAAA;AAAA,IAChC;AAGF,WAAO,MAAM,iCAAiC;AAAA,MAC5C,MAAM,MAAM;AAAA,MACZ,MAAM,QAAQ,QAAQ;AAAA,MACtB,UAAU,aAAa;AAAA,IAAA,CACxB;AAED,UAAM,SAAS,MAAM,IAAI,mBAAmB,SAAS,YAAY;AACjE,WAAO,KAAK,yBAAyB;AAAA,MACnC,MAAM,MAAM;AAAA,MACZ,MAAM,QAAQ,QAAQ;AAAA,MACtB,eAAe,OAAO;AAAA,IAAA,CACvB;AAED,QAAI,QAAQ,qBAAqB;AAC/B,aAAO,MAAM,wCAAwC;AAAA,QACnD,eAAe,OAAO;AAAA,QACtB,aAAa,QAAQ;AAAA,QACrB,YAAY,QAAQ;AAAA,MAAA,CACrB;AAED,YAAM,cAAc,MAAM;AAAA,QACxB;AAAA,QACA,OAAO;AAAA,QACP,QAAQ;AAAA,QACR,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAEA,aAAO,KAAK,qCAAqC;AAAA,QAC/C,eAAe,OAAO;AAAA,MAAA,CACvB;AAEM,aAAA;AAAA,QACL,WAAW;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,IAAA;AAGK,WAAA;AAAA,MACL,WAAW;AAAA,MACX;AAAA,MACA;AAAA,IACF;AAAA,WACO,OAAO;AACP,WAAA,MAAM,oCAAoC,KAAK;AAChD,UAAA;AAAA,EAAA;AAEV;AAEA,eAAsB,mBACpB,OACA,QACA,SACA,aAC8B;AACxB,QAAA,SAAS,OAAO,YAAY;AAAA,IAChC,QAAQ;AAAA,IACR,GAAG,QAAQ;AAAA,EAAA,CACZ;AAED,SAAO,KAAK,4CAA4C;AAAA,IACtD,MAAM,MAAM;AAAA,IACZ,MAAM,QAAQ,QAAQ;AAAA,IACtB,GAAI,MAAM,SAAS,QAAQ,EAAE,KAAK,MAAM,IAAI,IAAI,CAAC;AAAA,IACjD,GAAI,MAAM,SAAS,SAAS,EAAE,MAAM,MAAM,KAAK,IAAI,CAAC;AAAA,IACpD,GAAI,MAAM,SAAS,WACf,EAAE,UAAU,MAAM,UAAU,YAAY,MAAM,OAAO,WAAA,IACrD,CAAA;AAAA,EAAC,CACN;AAEG,MAAA;AACF,QAAI,QAAQ,SAAS,cAAc,QAAQ,UAAU;AAC1B,+BAAA,QAAQ,UAAU,MAAM;AAAA,IAAA;AAGnD,UAAM,YAAY,OAAO,aAAa,EAAE,SAAS;AACjD,WAAO,MAAM,gCAAgC,EAAE,UAAA,CAAW;AAEtD,QAAA;AAEJ,QAAI,aAAa;AACf,aAAO,MAAM,wCAAwC;AAC/C,YAAA;AAAA,IAAA,WACG,QAAQ,QAAQ;AACzB,aAAO,MAAM,0CAA0C;AACvD,YAAM,IAAI,eAAe;AAAA,QACvB,QAAQ,QAAQ;AAAA,QAChB,SAAS,QAAQ,WAAW;AAAA,MAAA,CAC7B;AAAA,IAAA,OACI;AACL,aAAO,MAAM,8CAA8C;AACrD,YAAA,MAAM,eAAe,eAAe;AAAA,QACxC,MAAM;AAAA,QACN;AAAA,QACA;AAAA,QACA,SAAS,QAAQ,WAAW;AAAA,MAAA,CAC7B;AAAA,IAAA;AAGH,UAAM,cAAc;AAAA,MAClB,UAAU;AAAA,MACV,UAAU,QAAQ,YAAY,CAAC;AAAA,MAC/B,MAAM,QAAQ,QAAQ,CAAC;AAAA,MACvB,MAAM,QAAQ,QAAQ;AAAA,MACtB,WAAW,QAAQ;AAAA,IACrB;AAEI,QAAA;AACJ,YAAQ,MAAM,MAAM;AAAA,MAClB,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,KAAK,MAAM;AAAA,UAAA;AAAA,QAEf;AACA;AAAA,MAEF,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,MAAM,MAAM;AAAA,UAAA;AAAA,QAEhB;AACA;AAAA,MAEF,KAAK;AACO,kBAAA;AAAA,UACR,GAAG;AAAA,UACH,MAAM;AAAA,YACJ,MAAM;AAAA,YACN,QAAQ,OAAO,KAAK,MAAM,MAAM,EAAE,SAAS,QAAQ;AAAA,YACnD,UAAU,MAAM;AAAA,YAChB,UAAU,MAAM;AAAA,UAAA;AAAA,QAEpB;AACA;AAAA,IAAA;AAGA,QAAA,QAAQ,SAAS,YAAY;AAC/B,cAAQ,iBAAiB,QAAQ;AACzB,cAAA,UAAU,QAAQ,UAAU,WAAW;AACvC,cAAA,cAAc,QAAQ,UAAU;AAExC,UAAI,QAAQ,aAAa;AACvB,gBAAQ,cAAc,QAAQ;AAAA,MAAA;AAAA,IAChC;AAGF,WAAO,MAAM,6CAA6C;AAAA,MACxD,MAAM,MAAM;AAAA,MACZ,MAAM,QAAQ,QAAQ;AAAA,MACtB,UAAU;AAAA,IAAA,CACX;AAEK,UAAA,SAAS,MAAM,IAAI;AAAA,MACvB;AAAA,QACE,GAAG;AAAA,QACH,UAAU;AAAA,MACZ;AAAA,MACA;AAAA,IACF;AACA,WAAO,KAAK,uBAAuB;AAAA,MACjC,MAAM,MAAM;AAAA,MACZ,MAAM,QAAQ,QAAQ;AAAA,MACtB,eAAe,OAAO;AAAA,IAAA,CACvB;AAED,QAAI,QAAQ,qBAAqB;AAC/B,aAAO,MAAM,wCAAwC;AAAA,QACnD,eAAe,OAAO;AAAA,QACtB,aAAa,QAAQ;AAAA,QACrB,YAAY,QAAQ;AAAA,MAAA,CACrB;AAED,YAAM,cAAc,MAAM;AAAA,QACxB;AAAA,QACA,OAAO;AAAA,QACP,QAAQ;AAAA,QACR,QAAQ;AAAA,QACR,QAAQ;AAAA,MACV;AAEA,aAAO,KAAK,qCAAqC;AAAA,QAC/C,eAAe,OAAO;AAAA,MAAA,CACvB;AAEM,aAAA;AAAA,QACL,WAAW;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,IAAA;AAGK,WAAA;AAAA,MACL,WAAW;AAAA,MACX;AAAA,MACA;AAAA,IACF;AAAA,WACO,OAAO;AACP,WAAA,MAAM,oCAAoC,KAAK;AAChD,UAAA;AAAA,EAAA;AAEV;AAEsB,eAAA,oBACpB,eACA,SACqC;AAC/B,QAAA,SAAS,OAAO,YAAY;AAAA,IAChC,QAAQ;AAAA,IACR,GAAG,SAAS,WAAW,CAAA;AAAA,EAAC,CACzB;AAEK,QAAA,yBAAyB,cAAc,SAAS,GAAG,IACrD,GAAG,cAAc,MAAM,GAAG,EAAE,CAAC,CAAC,IAAI,cAC/B,MAAM,GAAG,EAAE,CAAC,EACZ,QAAQ,OAAO,GAAG,CAAC,KACtB;AAEJ,SAAO,KAAK,0BAA0B;AAAA,IACpC,uBAAuB;AAAA,IACvB;AAAA,EAAA,CACD;AAEG,MAAA;AACE,QAAA;AAEJ,QAAI,SAAS,QAAQ;AACnB,aAAO,MAAM,0CAA0C;AACvD,YAAM,IAAI,eAAe;AAAA,QACvB,QAAQ,QAAQ;AAAA,QAChB,SAAS,QAAQ,WAAW;AAAA,MAAA,CAC7B;AAAA,IACQ,WAAA,SAAS,aAAa,SAAS,YAAY;AACpD,aAAO,MAAM,8CAA8C;AACrD,YAAA,MAAM,eAAe,eAAe;AAAA,QACxC,MAAM;AAAA,QACN,WAAW,QAAQ;AAAA,QACnB,YAAY,QAAQ;AAAA,QACpB,SAAS,QAAQ,WAAW;AAAA,MAAA,CAC7B;AAAA,IAAA,OACI;AACL,YAAM,QAAQ,IAAI;AAAA,QAChB;AAAA,MACF;AACA,aAAO,MAAM,sCAAsC;AAAA,QACjD,WAAW,QAAQ,SAAS,MAAM;AAAA,QAClC,cAAc,QAAQ,SAAS,SAAS;AAAA,QACxC,eAAe,QAAQ,SAAS,UAAU;AAAA,MAAA,CAC3C;AACK,YAAA;AAAA,IAAA;AAGR,WAAO,MAAM,6CAA6C;AAAA,MACxD;AAAA,MACA,SAAS,QAAQ,WAAW;AAAA,IAAA,CAC7B;AAED,UAAM,SAAS,MAAM,IAAI,oBAAoB,sBAAsB;AACnE,WAAO,KAAK,sCAAsC;AAAA,MAChD;AAAA,IAAA,CACD;AAEM,WAAA;AAAA,WACA,OAAO;AACd,WAAO,MAAM,gCAAgC;AAAA,MAC3C;AAAA,MACA;AAAA,IAAA,CACD;AACK,UAAA;AAAA,EAAA;AAEV;AAEA,SAAS,yBAAyB,UAAe,QAAmB;AAClE,QAAM,iBAAiB,CAAC,QAAQ,WAAW,eAAe,MAAM;AAC1D,QAAA,gBAAgB,eAAe,OAAO,CAAC,UAAU,CAAC,SAAS,KAAK,CAAC;AAEnE,MAAA,cAAc,SAAS,GAAG;AAC5B,UAAM,QAAQ,IAAI;AAAA,MAChB,8CAA8C,cAAc,KAAK,IAAI,CAAC;AAAA,IACxE;AACA,WAAO,MAAM,uCAAuC,EAAE,cAAA,CAAe;AAC/D,UAAA;AAAA,EAAA;AAGR,SAAO,MAAM,uCAAuC;AAAA,IAClD,MAAM,SAAS;AAAA,IACf,SAAS,SAAS;AAAA,IAClB,aAAa,SAAS;AAAA,IACtB,MAAM,SAAS;AAAA,IACf,eAAe,CAAC,CAAC,SAAS;AAAA,IAC1B,eAAe,CAAC,CAAC,SAAS;AAAA,EAAA,CAC3B;AACH;AAEA,eAAe,+BACb,KACA,eACA,cAAsB,IACtB,aAAqB,KACrB,kBACqC;AACrC,QAAM,SAAS,OAAO,YAAY,EAAE,QAAQ,aAAa;AACnD,QAAA,mBAAmB,IAAI,iBAAiB;AAAA,IAC5C,QAAQ;AAAA,IACR;AAAA,IACA,UAAU;AAAA,EAAA,CACX;AAEG,MAAA;AACF,WAAO,MAAM,wCAAwC;AAAA,MACnD;AAAA,MACA;AAAA,MACA;AAAA,IAAA,CACD;AAEgB,qBAAA,UAAU,0CAA0C,GAAG;AAAA,MACtE;AAAA,MACA;AAAA,MACA;AAAA,IAAA,CACD;AAEG,QAAA;AACF,YAAM,aAAa,IAAI,mBAAmB,KAAK,GAAG;AAQ5C,YAAA,kBAAkB,CAAC,SAAc;AAC/B,cAAA,QAAQ,KAAK,SAAS;AACtB,cAAA,UAAU,KAAK,WAAW;AAC1B,cAAA,UAAU,KAAK,mBAAmB;AAExC,yBAAiB,OAAO;AAAA,UACtB;AAAA,UACA;AAAA,UACA,iBAAiB;AAAA,UACjB,SAAS,CAAA;AAAA,QAAC,CACX;AAAA,MACH;AAEA,aAAO,MAAM;AAAA,QACX;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,aACO,GAAG;AACV,cAAQ,IAAI,CAAC;AAEb,aAAO,MAAM,sDAAsD;AAAA,QACjE,OAAO;AAAA,MAAA,CACR;AACgB,uBAAA,UAAU,gCAAgC,IAAI;AAAA,QAC7D,OAAO;AAAA,MAAA,CACR;AAED,aAAO,MAAM,IAAI;AAAA,QACf;AAAA,QACA;AAAA,QACA;AAAA,QACA;AAAA,MACF;AAAA,IAAA;AAAA,WAEK,OAAO;AACd,WAAO,MAAM,8CAA8C;AAAA,MACzD;AAAA,MACA;AAAA,MACA;AAAA,MACA;AAAA,IAAA,CACD;AAED,qBAAiB,OAAO,mCAAmC;AAAA,MACzD;AAAA,MACA;AAAA,IAAA,CACD;AAEK,UAAA;AAAA,EAAA;AAEV;"}
|
|
@@ -1,10 +1,236 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
1
|
+
import Buffer from "./standards-sdk.es19.js";
|
|
2
|
+
import { PublicKey, Timestamp } from "@hashgraph/sdk";
|
|
3
|
+
import "./standards-sdk.es23.js";
|
|
4
|
+
import { proto } from "@hashgraph/proto";
|
|
5
|
+
import axios from "./standards-sdk.es24.js";
|
|
6
|
+
class HederaMirrorNode {
|
|
7
|
+
constructor(network, logger) {
|
|
8
|
+
this.network = network;
|
|
9
|
+
this.baseUrl = this.getMirrorNodeUrl();
|
|
10
|
+
this.logger = logger;
|
|
11
|
+
this.isServerEnvironment = typeof window === "undefined";
|
|
12
|
+
}
|
|
13
|
+
getMirrorNodeUrl() {
|
|
14
|
+
return this.network === "mainnet" ? "https://mainnet-public.mirrornode.hedera.com" : "https://testnet.mirrornode.hedera.com";
|
|
15
|
+
}
|
|
16
|
+
getBaseUrl() {
|
|
17
|
+
return this.baseUrl;
|
|
18
|
+
}
|
|
19
|
+
async getPublicKey(accountId) {
|
|
20
|
+
this.logger.info(`Getting public key for account ${accountId}`);
|
|
21
|
+
const accountInfo = await this.requestAccount(accountId);
|
|
22
|
+
try {
|
|
23
|
+
if (!accountInfo || !accountInfo.key) {
|
|
24
|
+
throw new Error(
|
|
25
|
+
`Failed to retrieve public key for account ID: ${accountId}`
|
|
26
|
+
);
|
|
27
|
+
}
|
|
28
|
+
return PublicKey.fromString(accountInfo.key.key);
|
|
29
|
+
} catch (error) {
|
|
30
|
+
throw new Error(
|
|
31
|
+
`Error fetching public key from Mirror Node: ${error.message}`
|
|
32
|
+
);
|
|
33
|
+
}
|
|
34
|
+
}
|
|
35
|
+
async getAccountMemo(accountId) {
|
|
36
|
+
const maxRetries = 3;
|
|
37
|
+
for (let attempt = 0; attempt < maxRetries; attempt++) {
|
|
38
|
+
try {
|
|
39
|
+
const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;
|
|
40
|
+
const response = await axios.get(accountInfoUrl);
|
|
41
|
+
const accountInfo = response.data;
|
|
42
|
+
if (accountInfo && accountInfo.memo) {
|
|
43
|
+
return accountInfo.memo;
|
|
44
|
+
}
|
|
45
|
+
this.logger.error(`No memo found for account ${accountId}`);
|
|
46
|
+
if (attempt < maxRetries - 1) {
|
|
47
|
+
await new Promise((resolve) => setTimeout(resolve, 2e3));
|
|
48
|
+
}
|
|
49
|
+
} catch (error) {
|
|
50
|
+
this.logger.error(
|
|
51
|
+
`Error getting account memo (attempt ${attempt + 1}): ${error.message}`
|
|
52
|
+
);
|
|
53
|
+
if (attempt < maxRetries - 1) {
|
|
54
|
+
await new Promise((resolve) => setTimeout(resolve, 2e3));
|
|
55
|
+
}
|
|
56
|
+
}
|
|
57
|
+
}
|
|
58
|
+
return null;
|
|
59
|
+
}
|
|
60
|
+
async getTopicInfo(topicId) {
|
|
61
|
+
try {
|
|
62
|
+
const topicInfoUrl = `${this.baseUrl}/api/v1/topics/${topicId}`;
|
|
63
|
+
const response = await axios.get(topicInfoUrl);
|
|
64
|
+
return response.data;
|
|
65
|
+
} catch (error) {
|
|
66
|
+
this.logger.error(`Error retrieving topic information: ${error.message}`);
|
|
67
|
+
throw new Error(`Failed to retrieve topic information: ${error.message}`);
|
|
68
|
+
}
|
|
69
|
+
}
|
|
70
|
+
async getTopicFees(topicId) {
|
|
71
|
+
try {
|
|
72
|
+
const topicInfo = await this.getTopicInfo(topicId);
|
|
73
|
+
return topicInfo.custom_fees;
|
|
74
|
+
} catch (error) {
|
|
75
|
+
this.logger.error(`Error retrieving topic fees: ${error.message}`);
|
|
76
|
+
return null;
|
|
77
|
+
}
|
|
78
|
+
}
|
|
79
|
+
async getHBARPrice(date) {
|
|
80
|
+
try {
|
|
81
|
+
const timestamp = Timestamp.fromDate(date).toString();
|
|
82
|
+
const request = await fetch(
|
|
83
|
+
`https://mainnet-public.mirrornode.hedera.com/api/v1/network/exchangerate?timestamp=${timestamp}`
|
|
84
|
+
);
|
|
85
|
+
const response = await request.json();
|
|
86
|
+
const usdPrice = Number(response?.current_rate?.cent_equivalent) / Number(response?.current_rate?.hbar_equivalent) / 100;
|
|
87
|
+
return usdPrice;
|
|
88
|
+
} catch (e) {
|
|
89
|
+
return null;
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
async getTopicMessages(topicId) {
|
|
93
|
+
this.logger.info(`Querying messages for topic ${topicId}`);
|
|
94
|
+
let nextUrl = `${this.baseUrl}/api/v1/topics/${topicId}/messages`;
|
|
95
|
+
const messages = [];
|
|
96
|
+
while (nextUrl) {
|
|
97
|
+
try {
|
|
98
|
+
const response = await axios.get(nextUrl);
|
|
99
|
+
const data = response.data;
|
|
100
|
+
if (data.messages && data.messages.length > 0) {
|
|
101
|
+
for (const message of data.messages) {
|
|
102
|
+
try {
|
|
103
|
+
if (!message.message) {
|
|
104
|
+
continue;
|
|
105
|
+
}
|
|
106
|
+
let messageContent;
|
|
107
|
+
try {
|
|
108
|
+
if (this.isServerEnvironment) {
|
|
109
|
+
messageContent = Buffer.from(
|
|
110
|
+
message.message,
|
|
111
|
+
"base64"
|
|
112
|
+
).toString("utf-8");
|
|
113
|
+
} else {
|
|
114
|
+
messageContent = new TextDecoder().decode(
|
|
115
|
+
Uint8Array.from(
|
|
116
|
+
atob(message.message),
|
|
117
|
+
(c) => c.charCodeAt(0)
|
|
118
|
+
)
|
|
119
|
+
);
|
|
120
|
+
}
|
|
121
|
+
} catch (error) {
|
|
122
|
+
this.logger.error(`Error decoding message: ${error}`);
|
|
123
|
+
continue;
|
|
124
|
+
}
|
|
125
|
+
let messageJson;
|
|
126
|
+
try {
|
|
127
|
+
messageJson = JSON.parse(messageContent);
|
|
128
|
+
} catch (error) {
|
|
129
|
+
this.logger.error(
|
|
130
|
+
`Invalid JSON message content: ${messageContent}`
|
|
131
|
+
);
|
|
132
|
+
return;
|
|
133
|
+
}
|
|
134
|
+
messageJson.sequence_number = message.sequence_number;
|
|
135
|
+
messages.push({
|
|
136
|
+
...messageJson,
|
|
137
|
+
consensus_timestamp: message.consensus_timestamp,
|
|
138
|
+
sequence_number: message.sequence_number,
|
|
139
|
+
created: new Date(
|
|
140
|
+
Number(message.consensus_timestamp) * 1e3
|
|
141
|
+
)
|
|
142
|
+
});
|
|
143
|
+
} catch (error) {
|
|
144
|
+
this.logger.error(`Error processing message: ${error.message}`);
|
|
145
|
+
}
|
|
146
|
+
}
|
|
147
|
+
}
|
|
148
|
+
nextUrl = data.links?.next ? `${this.baseUrl}${data.links.next}` : "";
|
|
149
|
+
} catch (error) {
|
|
150
|
+
this.logger.error(`Error querying topic messages: ${error.message}`);
|
|
151
|
+
throw new Error(`Failed to query topic messages: ${error.message}`);
|
|
152
|
+
}
|
|
153
|
+
}
|
|
154
|
+
return messages;
|
|
155
|
+
}
|
|
156
|
+
async requestAccount(accountId) {
|
|
157
|
+
try {
|
|
158
|
+
const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;
|
|
159
|
+
const response = await axios.get(accountInfoUrl);
|
|
160
|
+
if (!response.data) {
|
|
161
|
+
throw new Error(
|
|
162
|
+
`Failed to make request to mirror node for account: ${accountId}`
|
|
163
|
+
);
|
|
164
|
+
}
|
|
165
|
+
return response.data;
|
|
166
|
+
} catch (error) {
|
|
167
|
+
this.logger.error(`Failed to fetch account: ${error.message}`);
|
|
168
|
+
throw new Error(`Failed to fetch account: ${error.message}`);
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
async checkKeyListAccess(keyBytes, userPublicKey) {
|
|
172
|
+
try {
|
|
173
|
+
const key = proto.Key.decode(keyBytes);
|
|
174
|
+
return this.evaluateKeyAccess(key, userPublicKey);
|
|
175
|
+
} catch (error) {
|
|
176
|
+
this.logger.error(
|
|
177
|
+
`Error decoding protobuf key: ${error instanceof Error ? error.message : String(error)}`
|
|
178
|
+
);
|
|
179
|
+
return false;
|
|
180
|
+
}
|
|
181
|
+
}
|
|
182
|
+
async evaluateKeyAccess(key, userPublicKey) {
|
|
183
|
+
if (key.ed25519) {
|
|
184
|
+
return this.compareEd25519Key(key.ed25519, userPublicKey);
|
|
185
|
+
}
|
|
186
|
+
if (key.keyList) {
|
|
187
|
+
return this.evaluateKeyList(key.keyList, userPublicKey);
|
|
188
|
+
}
|
|
189
|
+
if (key.thresholdKey && key.thresholdKey.keys) {
|
|
190
|
+
return this.evaluateKeyList(key.thresholdKey.keys, userPublicKey);
|
|
191
|
+
}
|
|
192
|
+
return false;
|
|
193
|
+
}
|
|
194
|
+
async evaluateKeyList(keyList, userPublicKey) {
|
|
195
|
+
const keys = keyList.keys || [];
|
|
196
|
+
for (const listKey of keys) {
|
|
197
|
+
if (!listKey) continue;
|
|
198
|
+
if (listKey.ed25519) {
|
|
199
|
+
if (this.compareEd25519Key(listKey.ed25519, userPublicKey)) {
|
|
200
|
+
return true;
|
|
201
|
+
}
|
|
202
|
+
} else if (listKey.keyList || listKey.thresholdKey) {
|
|
203
|
+
try {
|
|
204
|
+
const nestedKeyBytes = proto.Key.encode({
|
|
205
|
+
...listKey.keyList ? { keyList: listKey.keyList } : {},
|
|
206
|
+
...listKey.thresholdKey ? { thresholdKey: listKey.thresholdKey } : {}
|
|
207
|
+
}).finish();
|
|
208
|
+
const hasNestedAccess = await this.checkKeyListAccess(
|
|
209
|
+
Buffer.from(nestedKeyBytes),
|
|
210
|
+
userPublicKey
|
|
211
|
+
);
|
|
212
|
+
if (hasNestedAccess) {
|
|
213
|
+
return true;
|
|
214
|
+
}
|
|
215
|
+
} catch (err) {
|
|
216
|
+
this.logger.debug(
|
|
217
|
+
`Error in nested key: ${err instanceof Error ? err.message : String(err)}`
|
|
218
|
+
);
|
|
219
|
+
}
|
|
220
|
+
}
|
|
221
|
+
}
|
|
222
|
+
return false;
|
|
223
|
+
}
|
|
224
|
+
compareEd25519Key(keyData, userPublicKey) {
|
|
225
|
+
try {
|
|
226
|
+
const decodedKey = PublicKey.fromBytes(Buffer.from(keyData));
|
|
227
|
+
return decodedKey.toString() === userPublicKey.toString();
|
|
228
|
+
} catch (err) {
|
|
229
|
+
return false;
|
|
230
|
+
}
|
|
231
|
+
}
|
|
232
|
+
}
|
|
7
233
|
export {
|
|
8
|
-
|
|
234
|
+
HederaMirrorNode
|
|
9
235
|
};
|
|
10
236
|
//# sourceMappingURL=standards-sdk.es18.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"standards-sdk.es18.js","sources":["../../src/hcs-10/types.ts"],"sourcesContent":["import { PrivateKey, TransactionReceipt } from '@hashgraph/sdk';\nimport { LogLevel } from '../utils/logger';\nimport { AIAgentCapability } from '../hcs-11';\nimport {\n ProgressData,\n ProgressStage,\n ProgressCallback,\n} from '../utils/progress-reporter';\n\nexport type RegistrationResult = {\n success: boolean;\n error?: string;\n transactionId?: string;\n transaction?: string;\n};\n\nexport interface ValidationError {\n validation: string;\n code: string;\n message: string;\n path: string[];\n}\n\nexport type NetworkType = 'mainnet' | 'testnet';\n\nexport enum InboundTopicType {\n PUBLIC = 'PUBLIC',\n CONTROLLED = 'CONTROLLED',\n FEE_BASED = 'FEE_BASED',\n}\n\nexport type FeeAmount = {\n amount: number; // Amount in tinybars\n decimals?: number; // Decimal places for fixed point representation\n tokenId?: string; // Optional token ID for token fees\n};\n\n// For backward compatibility\nexport interface RegistrationProgressData {\n stage: 'preparing' | 'submitting' | 'confirming' | 'completed' | 'verifying' | 'failed';\n message: string;\n progressPercent?: number;\n details?: Record<string, any>;\n}\n\nexport type RegistrationProgressCallback = (\n data: RegistrationProgressData\n) => void;\n\nexport interface TopicFeeConfig {\n feeAmount: FeeAmount;\n feeCollectorAccountId: string;\n exemptAccounts?: string[];\n}\n\nexport interface FeeConfigBuilderInterface {\n setHbarAmount(hbarAmount: number): FeeConfigBuilderInterface;\n setFeeAmount(amount: number, decimals?: number): FeeConfigBuilderInterface;\n setFeeCollector(accountId: string): FeeConfigBuilderInterface;\n addExemptAccount(accountId: string): FeeConfigBuilderInterface;\n addExemptAccounts(accountIds: string[]): FeeConfigBuilderInterface;\n build(): TopicFeeConfig;\n}\n\nexport interface FeeConfigBuilderStatic {\n new (): FeeConfigBuilderInterface;\n forHbar(\n hbarAmount: number,\n collectorAccountId: string,\n exemptAccounts?: string[]\n ): FeeConfigBuilderInterface;\n}\n\nexport interface AgentConfig<T> {\n accountId: string;\n privateKey: string;\n operatorId: string;\n inboundTopicId: string;\n outboundTopicId: string;\n profileTopicId: string;\n pfpTopicId: string;\n client: T;\n}\n\nexport interface HCSClientConfig {\n network: NetworkType;\n operatorId: string;\n operatorPrivateKey: string;\n operatorPublicKey?: string;\n logLevel?: LogLevel;\n prettyPrint?: boolean;\n guardedRegistryBaseUrl?: string;\n feeAmount?: number; // Default fee amount for HIP-991 fee payments\n}\n\nexport interface Message {\n message: string;\n sequence_number?: number;\n}\n\nexport interface Links {\n next: string;\n}\n\nexport interface ApiResponse {\n messages?: any[];\n links?: {\n next?: string;\n };\n}\n\nexport interface RegistrationResponse {\n transaction: string;\n transaction_id: string;\n}\n\nexport interface Topic {\n topicId: string;\n memo: string;\n adminKey: boolean;\n submitKey: boolean;\n}\n\nexport interface CreateAgentResponse {\n inboundTopicId: string;\n outboundTopicId: string;\n pfpTopicId: string;\n profileTopicId: string;\n}\n\nexport interface CreateAccountResponse {\n accountId: string;\n privateKey: string;\n}\n\nexport interface InscribePfpResponse {\n pfpTopicId: string;\n transactionId: string;\n success: boolean;\n error?: string;\n}\n\nexport interface StoreHCS11ProfileResponse {\n profileTopicId: string;\n pfpTopicId?: string;\n transactionId: string;\n success: boolean;\n error?: string;\n}\n\nexport interface GetTopicsResponse {\n inboundTopic: string;\n outboundTopic: string;\n}\n\nexport interface HandleConnectionRequestResponse {\n connectionTopicId: string;\n confirmedConnectionSequenceNumber: number;\n operatorId: string;\n}\n\nexport interface WaitForConnectionConfirmationResponse {\n connectionTopicId: string;\n sequence_number: number;\n confirmedBy: string;\n memo: string;\n}\n\nexport interface GetAccountAndSignerResponse {\n accountId: string;\n signer: PrivateKey;\n}\n\nexport interface AgentRegistrationResult {\n success: boolean;\n error?: string;\n transactionId?: string;\n transaction?: string;\n confirmed?: boolean;\n state?: AgentCreationState;\n metadata?: {\n capabilities?: number[];\n [key: string]: any;\n };\n}\n\nexport interface AgentConfiguration {\n name: string;\n description: string;\n capabilities: AIAgentCapability[];\n metadata: any;\n pfpBuffer: Buffer;\n pfpFileName: string;\n network: NetworkType;\n inboundTopicType: InboundTopicType;\n feeConfig?: FeeConfigBuilderInterface;\n connectionFeeConfig?: FeeConfigBuilderInterface;\n existingAccount?: {\n accountId: string;\n privateKey: string;\n };\n existingPfpTopicId?: string;\n}\n\nexport interface AgentCreationState {\n pfpTopicId?: string;\n inboundTopicId?: string;\n outboundTopicId?: string;\n profileTopicId?: string;\n currentStage: 'init' | 'pfp' | 'topics' | 'profile' | 'registration' | 'complete';\n completedPercentage: number;\n error?: string;\n createdResources?: string[];\n agentMetadata?: Record<string, any>;\n} "],"names":["InboundTopicType"],"mappings":"AAyBY,IAAA,qCAAAA,sBAAL;AACLA,oBAAA,QAAS,IAAA;AACTA,oBAAA,YAAa,IAAA;AACbA,oBAAA,WAAY,IAAA;AAHFA,SAAAA;AAAA,GAAA,oBAAA,CAAA,CAAA;"}
|
|
1
|
+
{"version":3,"file":"standards-sdk.es18.js","sources":["../../src/services/mirror-node.ts"],"sourcesContent":["import { PublicKey, Timestamp } from '@hashgraph/sdk';\nimport axios from 'axios';\nimport { Logger } from '../utils/logger';\nimport { HCSMessage } from '../hcs-10/base-client';\nimport { proto } from '@hashgraph/proto';\nimport {\n AccountResponse,\n CustomFees,\n HBARPrice,\n NetworkType,\n TopicMessagesResponse,\n TopicResponse,\n} from './types';\n\nexport class HederaMirrorNode {\n private network: NetworkType;\n private baseUrl: string;\n private logger: Logger;\n private isServerEnvironment: boolean;\n\n constructor(network: NetworkType, logger: Logger) {\n this.network = network;\n this.baseUrl = this.getMirrorNodeUrl();\n this.logger = logger;\n this.isServerEnvironment = typeof window === 'undefined';\n }\n\n private getMirrorNodeUrl(): string {\n return this.network === 'mainnet'\n ? 'https://mainnet-public.mirrornode.hedera.com'\n : 'https://testnet.mirrornode.hedera.com';\n }\n\n getBaseUrl(): string {\n return this.baseUrl;\n }\n\n async getPublicKey(accountId: string): Promise<PublicKey> {\n this.logger.info(`Getting public key for account ${accountId}`);\n\n const accountInfo = await this.requestAccount(accountId);\n\n try {\n if (!accountInfo || !accountInfo.key) {\n throw new Error(\n `Failed to retrieve public key for account ID: ${accountId}`\n );\n }\n\n return PublicKey.fromString(accountInfo.key.key);\n } catch (error: any) {\n throw new Error(\n `Error fetching public key from Mirror Node: ${error.message}`\n );\n }\n }\n\n async getAccountMemo(accountId: string): Promise<string | null> {\n const maxRetries = 3;\n\n for (let attempt = 0; attempt < maxRetries; attempt++) {\n try {\n const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;\n\n const response = await axios.get(accountInfoUrl);\n const accountInfo = response.data;\n\n if (accountInfo && accountInfo.memo) {\n return accountInfo.memo;\n }\n\n this.logger.error(`No memo found for account ${accountId}`);\n\n if (attempt < maxRetries - 1) {\n await new Promise((resolve) => setTimeout(resolve, 2000));\n }\n } catch (error: any) {\n this.logger.error(\n `Error getting account memo (attempt ${attempt + 1}): ${\n error.message\n }`\n );\n\n if (attempt < maxRetries - 1) {\n await new Promise((resolve) => setTimeout(resolve, 2000));\n }\n }\n }\n\n return null;\n }\n\n async getTopicInfo(topicId: string): Promise<TopicResponse> {\n try {\n const topicInfoUrl = `${this.baseUrl}/api/v1/topics/${topicId}`;\n const response = await axios.get(topicInfoUrl);\n return response.data;\n } catch (error: any) {\n this.logger.error(`Error retrieving topic information: ${error.message}`);\n throw new Error(`Failed to retrieve topic information: ${error.message}`);\n }\n }\n\n async getTopicFees(topicId: string): Promise<CustomFees | null> {\n try {\n const topicInfo = await this.getTopicInfo(topicId);\n return topicInfo.custom_fees;\n } catch (error: any) {\n this.logger.error(`Error retrieving topic fees: ${error.message}`);\n return null;\n }\n }\n\n async getHBARPrice(date: Date): Promise<number | null> {\n try {\n const timestamp = Timestamp.fromDate(date).toString();\n\n const request = await fetch(\n `https://mainnet-public.mirrornode.hedera.com/api/v1/network/exchangerate?timestamp=${timestamp}`\n );\n const response = (await request.json()) as HBARPrice;\n\n const usdPrice =\n Number(response?.current_rate?.cent_equivalent) /\n Number(response?.current_rate?.hbar_equivalent) /\n 100;\n\n return usdPrice;\n } catch (e) {\n return null;\n }\n }\n\n async getTopicMessages(topicId: string): Promise<HCSMessage[]> {\n this.logger.info(`Querying messages for topic ${topicId}`);\n\n let nextUrl = `${this.baseUrl}/api/v1/topics/${topicId}/messages`;\n const messages: HCSMessage[] = [];\n\n while (nextUrl) {\n try {\n const response = await axios.get<TopicMessagesResponse>(nextUrl);\n const data = response.data;\n\n if (data.messages && data.messages.length > 0) {\n for (const message of data.messages) {\n try {\n if (!message.message) {\n continue;\n }\n\n let messageContent: string;\n try {\n if (this.isServerEnvironment) {\n messageContent = Buffer.from(\n message.message,\n 'base64'\n ).toString('utf-8');\n } else {\n messageContent = new TextDecoder().decode(\n Uint8Array.from(atob(message.message), (c) =>\n c.charCodeAt(0)\n )\n );\n }\n } catch (error) {\n this.logger.error(`Error decoding message: ${error}`);\n continue;\n }\n\n let messageJson;\n try {\n messageJson = JSON.parse(messageContent);\n } catch (error) {\n this.logger.error(\n `Invalid JSON message content: ${messageContent}`\n );\n return;\n }\n\n messageJson.sequence_number = message.sequence_number;\n messages.push({\n ...messageJson,\n consensus_timestamp: message.consensus_timestamp,\n sequence_number: message.sequence_number,\n created: new Date(\n Number(message.consensus_timestamp) * 1000\n ),\n });\n } catch (error: any) {\n this.logger.error(`Error processing message: ${error.message}`);\n }\n }\n }\n\n nextUrl = data.links?.next ? `${this.baseUrl}${data.links.next}` : '';\n } catch (error: any) {\n this.logger.error(`Error querying topic messages: ${error.message}`);\n throw new Error(`Failed to query topic messages: ${error.message}`);\n }\n }\n\n return messages;\n }\n\n async requestAccount(accountId: string): Promise<AccountResponse> {\n try {\n const accountInfoUrl = `${this.baseUrl}/api/v1/accounts/${accountId}`;\n const response = await axios.get(accountInfoUrl);\n if (!response.data) {\n throw new Error(\n `Failed to make request to mirror node for account: ${accountId}`\n );\n }\n return response.data;\n } catch (error: any) {\n this.logger.error(`Failed to fetch account: ${error.message}`);\n throw new Error(`Failed to fetch account: ${error.message}`);\n }\n }\n\n async checkKeyListAccess(\n keyBytes: Buffer,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n try {\n const key = proto.Key.decode(keyBytes);\n return this.evaluateKeyAccess(key, userPublicKey);\n } catch (error) {\n this.logger.error(\n `Error decoding protobuf key: ${\n error instanceof Error ? error.message : String(error)\n }`\n );\n return false;\n }\n }\n\n private async evaluateKeyAccess(\n key: proto.IKey,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n if (key.ed25519) {\n return this.compareEd25519Key(key.ed25519, userPublicKey);\n }\n\n if (key.keyList) {\n return this.evaluateKeyList(key.keyList, userPublicKey);\n }\n\n if (key.thresholdKey && key.thresholdKey.keys) {\n return this.evaluateKeyList(key.thresholdKey.keys, userPublicKey);\n }\n\n return false;\n }\n\n private async evaluateKeyList(\n keyList: proto.IKeyList,\n userPublicKey: PublicKey\n ): Promise<boolean> {\n const keys = keyList.keys || [];\n\n for (const listKey of keys) {\n if (!listKey) continue;\n\n if (listKey.ed25519) {\n if (this.compareEd25519Key(listKey.ed25519, userPublicKey)) {\n return true;\n }\n } else if (listKey.keyList || listKey.thresholdKey) {\n try {\n const nestedKeyBytes = proto.Key.encode({\n ...(listKey.keyList ? { keyList: listKey.keyList } : {}),\n ...(listKey.thresholdKey\n ? { thresholdKey: listKey.thresholdKey }\n : {}),\n }).finish();\n\n const hasNestedAccess = await this.checkKeyListAccess(\n Buffer.from(nestedKeyBytes),\n userPublicKey\n );\n\n if (hasNestedAccess) {\n return true;\n }\n } catch (err) {\n this.logger.debug(\n `Error in nested key: ${\n err instanceof Error ? err.message : String(err)\n }`\n );\n }\n }\n }\n\n return false;\n }\n\n private compareEd25519Key(\n keyData: Uint8Array,\n userPublicKey: PublicKey\n ): boolean {\n try {\n const decodedKey = PublicKey.fromBytes(Buffer.from(keyData));\n return decodedKey.toString() === userPublicKey.toString();\n } catch (err) {\n return false;\n }\n }\n}\n"],"names":[],"mappings":";;;;;AAcO,MAAM,iBAAiB;AAAA,EAM5B,YAAY,SAAsB,QAAgB;AAChD,SAAK,UAAU;AACV,SAAA,UAAU,KAAK,iBAAiB;AACrC,SAAK,SAAS;AACT,SAAA,sBAAsB,OAAO,WAAW;AAAA,EAAA;AAAA,EAGvC,mBAA2B;AAC1B,WAAA,KAAK,YAAY,YACpB,iDACA;AAAA,EAAA;AAAA,EAGN,aAAqB;AACnB,WAAO,KAAK;AAAA,EAAA;AAAA,EAGd,MAAM,aAAa,WAAuC;AACxD,SAAK,OAAO,KAAK,kCAAkC,SAAS,EAAE;AAE9D,UAAM,cAAc,MAAM,KAAK,eAAe,SAAS;AAEnD,QAAA;AACF,UAAI,CAAC,eAAe,CAAC,YAAY,KAAK;AACpC,cAAM,IAAI;AAAA,UACR,iDAAiD,SAAS;AAAA,QAC5D;AAAA,MAAA;AAGF,aAAO,UAAU,WAAW,YAAY,IAAI,GAAG;AAAA,aACxC,OAAY;AACnB,YAAM,IAAI;AAAA,QACR,+CAA+C,MAAM,OAAO;AAAA,MAC9D;AAAA,IAAA;AAAA,EACF;AAAA,EAGF,MAAM,eAAe,WAA2C;AAC9D,UAAM,aAAa;AAEnB,aAAS,UAAU,GAAG,UAAU,YAAY,WAAW;AACjD,UAAA;AACF,cAAM,iBAAiB,GAAG,KAAK,OAAO,oBAAoB,SAAS;AAEnE,cAAM,WAAW,MAAM,MAAM,IAAI,cAAc;AAC/C,cAAM,cAAc,SAAS;AAEzB,YAAA,eAAe,YAAY,MAAM;AACnC,iBAAO,YAAY;AAAA,QAAA;AAGrB,aAAK,OAAO,MAAM,6BAA6B,SAAS,EAAE;AAEtD,YAAA,UAAU,aAAa,GAAG;AAC5B,gBAAM,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,GAAI,CAAC;AAAA,QAAA;AAAA,eAEnD,OAAY;AACnB,aAAK,OAAO;AAAA,UACV,uCAAuC,UAAU,CAAC,MAChD,MAAM,OACR;AAAA,QACF;AAEI,YAAA,UAAU,aAAa,GAAG;AAC5B,gBAAM,IAAI,QAAQ,CAAC,YAAY,WAAW,SAAS,GAAI,CAAC;AAAA,QAAA;AAAA,MAC1D;AAAA,IACF;AAGK,WAAA;AAAA,EAAA;AAAA,EAGT,MAAM,aAAa,SAAyC;AACtD,QAAA;AACF,YAAM,eAAe,GAAG,KAAK,OAAO,kBAAkB,OAAO;AAC7D,YAAM,WAAW,MAAM,MAAM,IAAI,YAAY;AAC7C,aAAO,SAAS;AAAA,aACT,OAAY;AACnB,WAAK,OAAO,MAAM,uCAAuC,MAAM,OAAO,EAAE;AACxE,YAAM,IAAI,MAAM,yCAAyC,MAAM,OAAO,EAAE;AAAA,IAAA;AAAA,EAC1E;AAAA,EAGF,MAAM,aAAa,SAA6C;AAC1D,QAAA;AACF,YAAM,YAAY,MAAM,KAAK,aAAa,OAAO;AACjD,aAAO,UAAU;AAAA,aACV,OAAY;AACnB,WAAK,OAAO,MAAM,gCAAgC,MAAM,OAAO,EAAE;AAC1D,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAM,aAAa,MAAoC;AACjD,QAAA;AACF,YAAM,YAAY,UAAU,SAAS,IAAI,EAAE,SAAS;AAEpD,YAAM,UAAU,MAAM;AAAA,QACpB,sFAAsF,SAAS;AAAA,MACjG;AACM,YAAA,WAAY,MAAM,QAAQ,KAAK;AAE/B,YAAA,WACJ,OAAO,UAAU,cAAc,eAAe,IAC9C,OAAO,UAAU,cAAc,eAAe,IAC9C;AAEK,aAAA;AAAA,aACA,GAAG;AACH,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAM,iBAAiB,SAAwC;AAC7D,SAAK,OAAO,KAAK,+BAA+B,OAAO,EAAE;AAEzD,QAAI,UAAU,GAAG,KAAK,OAAO,kBAAkB,OAAO;AACtD,UAAM,WAAyB,CAAC;AAEhC,WAAO,SAAS;AACV,UAAA;AACF,cAAM,WAAW,MAAM,MAAM,IAA2B,OAAO;AAC/D,cAAM,OAAO,SAAS;AAEtB,YAAI,KAAK,YAAY,KAAK,SAAS,SAAS,GAAG;AAClC,qBAAA,WAAW,KAAK,UAAU;AAC/B,gBAAA;AACE,kBAAA,CAAC,QAAQ,SAAS;AACpB;AAAA,cAAA;AAGE,kBAAA;AACA,kBAAA;AACF,oBAAI,KAAK,qBAAqB;AAC5B,mCAAiB,OAAO;AAAA,oBACtB,QAAQ;AAAA,oBACR;AAAA,kBAAA,EACA,SAAS,OAAO;AAAA,gBAAA,OACb;AACY,mCAAA,IAAI,cAAc;AAAA,oBACjC,WAAW;AAAA,sBAAK,KAAK,QAAQ,OAAO;AAAA,sBAAG,CAAC,MACtC,EAAE,WAAW,CAAC;AAAA,oBAAA;AAAA,kBAElB;AAAA,gBAAA;AAAA,uBAEK,OAAO;AACd,qBAAK,OAAO,MAAM,2BAA2B,KAAK,EAAE;AACpD;AAAA,cAAA;AAGE,kBAAA;AACA,kBAAA;AACY,8BAAA,KAAK,MAAM,cAAc;AAAA,uBAChC,OAAO;AACd,qBAAK,OAAO;AAAA,kBACV,iCAAiC,cAAc;AAAA,gBACjD;AACA;AAAA,cAAA;AAGF,0BAAY,kBAAkB,QAAQ;AACtC,uBAAS,KAAK;AAAA,gBACZ,GAAG;AAAA,gBACH,qBAAqB,QAAQ;AAAA,gBAC7B,iBAAiB,QAAQ;AAAA,gBACzB,SAAS,IAAI;AAAA,kBACX,OAAO,QAAQ,mBAAmB,IAAI;AAAA,gBAAA;AAAA,cACxC,CACD;AAAA,qBACM,OAAY;AACnB,mBAAK,OAAO,MAAM,6BAA6B,MAAM,OAAO,EAAE;AAAA,YAAA;AAAA,UAChE;AAAA,QACF;AAGQ,kBAAA,KAAK,OAAO,OAAO,GAAG,KAAK,OAAO,GAAG,KAAK,MAAM,IAAI,KAAK;AAAA,eAC5D,OAAY;AACnB,aAAK,OAAO,MAAM,kCAAkC,MAAM,OAAO,EAAE;AACnE,cAAM,IAAI,MAAM,mCAAmC,MAAM,OAAO,EAAE;AAAA,MAAA;AAAA,IACpE;AAGK,WAAA;AAAA,EAAA;AAAA,EAGT,MAAM,eAAe,WAA6C;AAC5D,QAAA;AACF,YAAM,iBAAiB,GAAG,KAAK,OAAO,oBAAoB,SAAS;AACnE,YAAM,WAAW,MAAM,MAAM,IAAI,cAAc;AAC3C,UAAA,CAAC,SAAS,MAAM;AAClB,cAAM,IAAI;AAAA,UACR,sDAAsD,SAAS;AAAA,QACjE;AAAA,MAAA;AAEF,aAAO,SAAS;AAAA,aACT,OAAY;AACnB,WAAK,OAAO,MAAM,4BAA4B,MAAM,OAAO,EAAE;AAC7D,YAAM,IAAI,MAAM,4BAA4B,MAAM,OAAO,EAAE;AAAA,IAAA;AAAA,EAC7D;AAAA,EAGF,MAAM,mBACJ,UACA,eACkB;AACd,QAAA;AACF,YAAM,MAAM,MAAM,IAAI,OAAO,QAAQ;AAC9B,aAAA,KAAK,kBAAkB,KAAK,aAAa;AAAA,aACzC,OAAO;AACd,WAAK,OAAO;AAAA,QACV,gCACE,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,CACvD;AAAA,MACF;AACO,aAAA;AAAA,IAAA;AAAA,EACT;AAAA,EAGF,MAAc,kBACZ,KACA,eACkB;AAClB,QAAI,IAAI,SAAS;AACf,aAAO,KAAK,kBAAkB,IAAI,SAAS,aAAa;AAAA,IAAA;AAG1D,QAAI,IAAI,SAAS;AACf,aAAO,KAAK,gBAAgB,IAAI,SAAS,aAAa;AAAA,IAAA;AAGxD,QAAI,IAAI,gBAAgB,IAAI,aAAa,MAAM;AAC7C,aAAO,KAAK,gBAAgB,IAAI,aAAa,MAAM,aAAa;AAAA,IAAA;AAG3D,WAAA;AAAA,EAAA;AAAA,EAGT,MAAc,gBACZ,SACA,eACkB;AACZ,UAAA,OAAO,QAAQ,QAAQ,CAAC;AAE9B,eAAW,WAAW,MAAM;AAC1B,UAAI,CAAC,QAAS;AAEd,UAAI,QAAQ,SAAS;AACnB,YAAI,KAAK,kBAAkB,QAAQ,SAAS,aAAa,GAAG;AACnD,iBAAA;AAAA,QAAA;AAAA,MAEA,WAAA,QAAQ,WAAW,QAAQ,cAAc;AAC9C,YAAA;AACI,gBAAA,iBAAiB,MAAM,IAAI,OAAO;AAAA,YACtC,GAAI,QAAQ,UAAU,EAAE,SAAS,QAAQ,QAAA,IAAY,CAAC;AAAA,YACtD,GAAI,QAAQ,eACR,EAAE,cAAc,QAAQ,aAAA,IACxB,CAAA;AAAA,UACL,CAAA,EAAE,OAAO;AAEJ,gBAAA,kBAAkB,MAAM,KAAK;AAAA,YACjC,OAAO,KAAK,cAAc;AAAA,YAC1B;AAAA,UACF;AAEA,cAAI,iBAAiB;AACZ,mBAAA;AAAA,UAAA;AAAA,iBAEF,KAAK;AACZ,eAAK,OAAO;AAAA,YACV,wBACE,eAAe,QAAQ,IAAI,UAAU,OAAO,GAAG,CACjD;AAAA,UACF;AAAA,QAAA;AAAA,MACF;AAAA,IACF;AAGK,WAAA;AAAA,EAAA;AAAA,EAGD,kBACN,SACA,eACS;AACL,QAAA;AACF,YAAM,aAAa,UAAU,UAAU,OAAO,KAAK,OAAO,CAAC;AAC3D,aAAO,WAAW,eAAe,cAAc,SAAS;AAAA,aACjD,KAAK;AACL,aAAA;AAAA,IAAA;AAAA,EACT;AAEJ;"}
|
|
@@ -10,16 +10,16 @@ var __privateAdd = (obj, member, value) => member.has(obj) ? __typeError("Cannot
|
|
|
10
10
|
var __privateSet = (obj, member, value, setter) => (__accessCheck(obj, member, "write to private field"), setter ? setter.call(obj, value) : member.set(obj, value), value);
|
|
11
11
|
var __privateMethod = (obj, member, method) => (__accessCheck(obj, member, "access private method"), method);
|
|
12
12
|
var _errors, _events, _functions, _abiCoder, _Interface_instances, getFunction_fn, getEvent_fn;
|
|
13
|
-
import { keccak256 } from "./standards-sdk.
|
|
14
|
-
import { AbiCoder } from "./standards-sdk.
|
|
15
|
-
import { Result } from "./standards-sdk.
|
|
16
|
-
import { Fragment, ConstructorFragment, FunctionFragment, EventFragment, ErrorFragment, ParamType } from "./standards-sdk.
|
|
13
|
+
import { keccak256 } from "./standards-sdk.es106.js";
|
|
14
|
+
import { AbiCoder } from "./standards-sdk.es88.js";
|
|
15
|
+
import { Result } from "./standards-sdk.es89.js";
|
|
16
|
+
import { Fragment, ConstructorFragment, FunctionFragment, EventFragment, ErrorFragment, ParamType } from "./standards-sdk.es99.js";
|
|
17
17
|
import { Typed } from "./standards-sdk.es107.js";
|
|
18
|
-
import { defineProperties } from "./standards-sdk.
|
|
19
|
-
import { assertArgument, assert } from "./standards-sdk.
|
|
20
|
-
import { isHexString, dataSlice, concat, getBytesCopy, hexlify, getBytes, zeroPadBytes, zeroPadValue } from "./standards-sdk.
|
|
21
|
-
import { id } from "./standards-sdk.
|
|
22
|
-
import { getBigInt, toBeHex } from "./standards-sdk.
|
|
18
|
+
import { defineProperties } from "./standards-sdk.es103.js";
|
|
19
|
+
import { assertArgument, assert } from "./standards-sdk.es100.js";
|
|
20
|
+
import { isHexString, dataSlice, concat, getBytesCopy, hexlify, getBytes, zeroPadBytes, zeroPadValue } from "./standards-sdk.es101.js";
|
|
21
|
+
import { id } from "./standards-sdk.es104.js";
|
|
22
|
+
import { getBigInt, toBeHex } from "./standards-sdk.es105.js";
|
|
23
23
|
class LogDescription {
|
|
24
24
|
/**
|
|
25
25
|
* @_ignore:
|
|
@@ -2,12 +2,12 @@ import Buffer from "./standards-sdk.es19.js";
|
|
|
2
2
|
import { Client, PrivateKey, AccountCreateTransaction, Hbar, CustomFixedFee, AccountId, KeyList, TopicCreateTransaction, PublicKey, TopicMessageSubmitTransaction, TopicId, Transaction } from "@hashgraph/sdk";
|
|
3
3
|
import { AccountCreationError, TopicCreationError, ConnectionConfirmationError, PayloadSizeError } from "./standards-sdk.es6.js";
|
|
4
4
|
import { InscriptionSDK } from "./standards-sdk.es22.js";
|
|
5
|
-
import { Logger } from "./standards-sdk.
|
|
5
|
+
import { Logger } from "./standards-sdk.es14.js";
|
|
6
6
|
import { HCS10BaseClient, Hcs10MemoType } from "./standards-sdk.es8.js";
|
|
7
7
|
import { m as mimeTypesExports } from "./standards-sdk.es20.js";
|
|
8
|
-
import { InboundTopicType } from "./standards-sdk.
|
|
9
|
-
import { HCS11Client } from "./standards-sdk.
|
|
10
|
-
import { accountIdsToExemptKeys } from "./standards-sdk.
|
|
8
|
+
import { InboundTopicType } from "./standards-sdk.es12.js";
|
|
9
|
+
import { HCS11Client } from "./standards-sdk.es13.js";
|
|
10
|
+
import { accountIdsToExemptKeys } from "./standards-sdk.es15.js";
|
|
11
11
|
class HCS10Client extends HCS10BaseClient {
|
|
12
12
|
constructor(config) {
|
|
13
13
|
super({
|
|
@@ -381,7 +381,6 @@ class HCS10Client extends HCS10BaseClient {
|
|
|
381
381
|
connectionTopicId,
|
|
382
382
|
requestingAccountId,
|
|
383
383
|
connectionRequestId,
|
|
384
|
-
operatorId,
|
|
385
384
|
"Connection accepted. Looking forward to collaborating!"
|
|
386
385
|
);
|
|
387
386
|
return {
|
|
@@ -390,7 +389,8 @@ class HCS10Client extends HCS10BaseClient {
|
|
|
390
389
|
operatorId
|
|
391
390
|
};
|
|
392
391
|
}
|
|
393
|
-
async confirmConnection(inboundTopicId, connectionTopicId, connectedAccountId, connectionId,
|
|
392
|
+
async confirmConnection(inboundTopicId, connectionTopicId, connectedAccountId, connectionId, memo, submitKey) {
|
|
393
|
+
const operatorId = await this.getOperatorId();
|
|
394
394
|
this.logger.info(`Confirming connection with ID ${connectionId}`);
|
|
395
395
|
const payload = {
|
|
396
396
|
p: "hcs-10",
|
|
@@ -535,10 +535,16 @@ class HCS10Client extends HCS10BaseClient {
|
|
|
535
535
|
this.logger.info("Message submitted successfully");
|
|
536
536
|
return receipt;
|
|
537
537
|
}
|
|
538
|
-
async submitConnectionRequest(inboundTopicId,
|
|
538
|
+
async submitConnectionRequest(inboundTopicId, memo) {
|
|
539
|
+
const accountResponse = this.getAccountAndSigner();
|
|
540
|
+
if (!accountResponse.accountId) {
|
|
541
|
+
throw new Error("Operator account ID is not set");
|
|
542
|
+
}
|
|
543
|
+
const operatorId = await this.getOperatorId();
|
|
544
|
+
const accountId = accountResponse.accountId;
|
|
539
545
|
const submissionCheck = await this.canSubmitToTopic(
|
|
540
546
|
inboundTopicId,
|
|
541
|
-
|
|
547
|
+
accountId
|
|
542
548
|
);
|
|
543
549
|
if (!submissionCheck.canSubmit) {
|
|
544
550
|
throw new Error(`Cannot submit to topic: ${submissionCheck.reason}`);
|
|
@@ -547,7 +553,7 @@ class HCS10Client extends HCS10BaseClient {
|
|
|
547
553
|
p: "hcs-10",
|
|
548
554
|
op: "connection_request",
|
|
549
555
|
operator_id: operatorId,
|
|
550
|
-
memo
|
|
556
|
+
m: memo
|
|
551
557
|
};
|
|
552
558
|
const requiresFee = submissionCheck.requiresFee;
|
|
553
559
|
const response = await this.submitPayload(
|
|
@@ -559,9 +565,7 @@ class HCS10Client extends HCS10BaseClient {
|
|
|
559
565
|
this.logger.info(
|
|
560
566
|
`Submitted connection request to topic ID: ${inboundTopicId}`
|
|
561
567
|
);
|
|
562
|
-
const outboundTopic = await this.retrieveOutboundConnectTopic(
|
|
563
|
-
requestingAccountId
|
|
564
|
-
);
|
|
568
|
+
const outboundTopic = await this.retrieveOutboundConnectTopic(accountId);
|
|
565
569
|
const responseSequenceNumber = response.topicSequenceNumber?.toNumber();
|
|
566
570
|
if (!responseSequenceNumber) {
|
|
567
571
|
throw new Error("Failed to get response sequence number");
|