@hashgraphonline/standards-sdk 0.1.143-feat-solana-register.canary.1870c8f.71 → 0.1.143-feat-solana-register.canary.74520ad.73

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (174) hide show
  1. package/dist/cjs/hcs-10/sdk.d.ts.map +1 -1
  2. package/dist/cjs/hcs-11/client.d.ts +2 -2
  3. package/dist/cjs/hcs-11/client.d.ts.map +1 -1
  4. package/dist/cjs/hcs-11/person-builder.d.ts +1 -0
  5. package/dist/cjs/hcs-11/person-builder.d.ts.map +1 -1
  6. package/dist/cjs/hcs-11/types.d.ts +1 -0
  7. package/dist/cjs/hcs-11/types.d.ts.map +1 -1
  8. package/dist/cjs/hcs-15/sdk.d.ts +4 -1
  9. package/dist/cjs/hcs-15/sdk.d.ts.map +1 -1
  10. package/dist/cjs/hcs-15/types.d.ts +16 -1
  11. package/dist/cjs/hcs-15/types.d.ts.map +1 -1
  12. package/dist/cjs/hcs-16/sdk.d.ts +22 -1
  13. package/dist/cjs/hcs-16/sdk.d.ts.map +1 -1
  14. package/dist/cjs/hcs-16/tx.d.ts +1 -1
  15. package/dist/cjs/hcs-16/tx.d.ts.map +1 -1
  16. package/dist/cjs/services/registry-broker/client/feedback.d.ts +9 -0
  17. package/dist/cjs/services/registry-broker/client/feedback.d.ts.map +1 -0
  18. package/dist/cjs/services/registry-broker/client.d.ts.map +1 -1
  19. package/dist/cjs/services/registry-broker/private-key-signer.d.ts +1 -0
  20. package/dist/cjs/services/registry-broker/private-key-signer.d.ts.map +1 -1
  21. package/dist/cjs/services/registry-broker/schemas.d.ts +201 -28
  22. package/dist/cjs/services/registry-broker/schemas.d.ts.map +1 -1
  23. package/dist/cjs/services/registry-broker/types.d.ts +19 -1
  24. package/dist/cjs/services/registry-broker/types.d.ts.map +1 -1
  25. package/dist/cjs/standards-sdk.cjs +2 -2
  26. package/dist/cjs/standards-sdk.cjs.map +1 -1
  27. package/dist/es/hcs-10/sdk.d.ts.map +1 -1
  28. package/dist/es/hcs-11/client.d.ts +2 -2
  29. package/dist/es/hcs-11/client.d.ts.map +1 -1
  30. package/dist/es/hcs-11/person-builder.d.ts +1 -0
  31. package/dist/es/hcs-11/person-builder.d.ts.map +1 -1
  32. package/dist/es/hcs-11/types.d.ts +1 -0
  33. package/dist/es/hcs-11/types.d.ts.map +1 -1
  34. package/dist/es/hcs-15/sdk.d.ts +4 -1
  35. package/dist/es/hcs-15/sdk.d.ts.map +1 -1
  36. package/dist/es/hcs-15/types.d.ts +16 -1
  37. package/dist/es/hcs-15/types.d.ts.map +1 -1
  38. package/dist/es/hcs-16/sdk.d.ts +22 -1
  39. package/dist/es/hcs-16/sdk.d.ts.map +1 -1
  40. package/dist/es/hcs-16/tx.d.ts +1 -1
  41. package/dist/es/hcs-16/tx.d.ts.map +1 -1
  42. package/dist/es/services/registry-broker/client/feedback.d.ts +9 -0
  43. package/dist/es/services/registry-broker/client/feedback.d.ts.map +1 -0
  44. package/dist/es/services/registry-broker/client.d.ts.map +1 -1
  45. package/dist/es/services/registry-broker/private-key-signer.d.ts +1 -0
  46. package/dist/es/services/registry-broker/private-key-signer.d.ts.map +1 -1
  47. package/dist/es/services/registry-broker/schemas.d.ts +201 -28
  48. package/dist/es/services/registry-broker/schemas.d.ts.map +1 -1
  49. package/dist/es/services/registry-broker/types.d.ts +19 -1
  50. package/dist/es/services/registry-broker/types.d.ts.map +1 -1
  51. package/dist/es/standards-sdk.es.js +10 -8
  52. package/dist/es/standards-sdk.es.js.map +1 -1
  53. package/dist/es/standards-sdk.es100.js +1 -1
  54. package/dist/es/standards-sdk.es102.js +1 -1
  55. package/dist/es/standards-sdk.es104.js +1 -1
  56. package/dist/es/standards-sdk.es110.js +2 -1
  57. package/dist/es/standards-sdk.es110.js.map +1 -1
  58. package/dist/es/standards-sdk.es111.js +5 -5
  59. package/dist/es/standards-sdk.es12.js +1 -1
  60. package/dist/es/standards-sdk.es121.js +1 -1
  61. package/dist/es/standards-sdk.es122.js +1 -1
  62. package/dist/es/standards-sdk.es123.js +5 -5
  63. package/dist/es/standards-sdk.es125.js +1 -1
  64. package/dist/es/standards-sdk.es126.js +1 -1
  65. package/dist/es/standards-sdk.es128.js +3 -3
  66. package/dist/es/standards-sdk.es129.js +4 -4
  67. package/dist/es/standards-sdk.es13.js +1 -1
  68. package/dist/es/standards-sdk.es130.js +3 -3
  69. package/dist/es/standards-sdk.es131.js +4 -4
  70. package/dist/es/standards-sdk.es132.js +4 -4
  71. package/dist/es/standards-sdk.es133.js +5 -5
  72. package/dist/es/standards-sdk.es133.js.map +1 -1
  73. package/dist/es/standards-sdk.es134.js +2 -2
  74. package/dist/es/standards-sdk.es135.js +4 -4
  75. package/dist/es/standards-sdk.es136.js +55 -367
  76. package/dist/es/standards-sdk.es136.js.map +1 -1
  77. package/dist/es/standards-sdk.es137.js +363 -14
  78. package/dist/es/standards-sdk.es137.js.map +1 -1
  79. package/dist/es/standards-sdk.es138.js +15 -65
  80. package/dist/es/standards-sdk.es138.js.map +1 -1
  81. package/dist/es/standards-sdk.es139.js +71 -77
  82. package/dist/es/standards-sdk.es139.js.map +1 -1
  83. package/dist/es/standards-sdk.es140.js +80 -152
  84. package/dist/es/standards-sdk.es140.js.map +1 -1
  85. package/dist/es/standards-sdk.es141.js +159 -7
  86. package/dist/es/standards-sdk.es141.js.map +1 -1
  87. package/dist/es/standards-sdk.es142.js +7 -86
  88. package/dist/es/standards-sdk.es142.js.map +1 -1
  89. package/dist/es/standards-sdk.es143.js +64 -43
  90. package/dist/es/standards-sdk.es143.js.map +1 -1
  91. package/dist/es/standards-sdk.es144.js +65 -28
  92. package/dist/es/standards-sdk.es144.js.map +1 -1
  93. package/dist/es/standards-sdk.es145.js +30 -138
  94. package/dist/es/standards-sdk.es145.js.map +1 -1
  95. package/dist/es/standards-sdk.es146.js +34 -42
  96. package/dist/es/standards-sdk.es146.js.map +1 -1
  97. package/dist/es/standards-sdk.es147.js +28 -12289
  98. package/dist/es/standards-sdk.es147.js.map +1 -1
  99. package/dist/es/standards-sdk.es148.js +132 -50
  100. package/dist/es/standards-sdk.es148.js.map +1 -1
  101. package/dist/es/standards-sdk.es149.js +34 -74
  102. package/dist/es/standards-sdk.es149.js.map +1 -1
  103. package/dist/es/standards-sdk.es150.js +12284 -12
  104. package/dist/es/standards-sdk.es150.js.map +1 -1
  105. package/dist/es/standards-sdk.es151.js +51 -167
  106. package/dist/es/standards-sdk.es151.js.map +1 -1
  107. package/dist/es/standards-sdk.es152.js +69 -309
  108. package/dist/es/standards-sdk.es152.js.map +1 -1
  109. package/dist/es/standards-sdk.es153.js +120 -294
  110. package/dist/es/standards-sdk.es153.js.map +1 -1
  111. package/dist/es/standards-sdk.es154.js +191 -322
  112. package/dist/es/standards-sdk.es154.js.map +1 -1
  113. package/dist/es/standards-sdk.es155.js +294 -279
  114. package/dist/es/standards-sdk.es155.js.map +1 -1
  115. package/dist/es/standards-sdk.es156.js +440 -63
  116. package/dist/es/standards-sdk.es156.js.map +1 -1
  117. package/dist/es/standards-sdk.es157.js +331 -871
  118. package/dist/es/standards-sdk.es157.js.map +1 -1
  119. package/dist/es/standards-sdk.es158.js +68 -231
  120. package/dist/es/standards-sdk.es158.js.map +1 -1
  121. package/dist/es/standards-sdk.es159.js +15 -242
  122. package/dist/es/standards-sdk.es159.js.map +1 -1
  123. package/dist/es/standards-sdk.es160.js +926 -0
  124. package/dist/es/standards-sdk.es160.js.map +1 -0
  125. package/dist/es/standards-sdk.es161.js +242 -0
  126. package/dist/es/standards-sdk.es161.js.map +1 -0
  127. package/dist/es/standards-sdk.es162.js +247 -0
  128. package/dist/es/standards-sdk.es162.js.map +1 -0
  129. package/dist/es/standards-sdk.es17.js +9 -5
  130. package/dist/es/standards-sdk.es17.js.map +1 -1
  131. package/dist/es/standards-sdk.es19.js +9 -6
  132. package/dist/es/standards-sdk.es19.js.map +1 -1
  133. package/dist/es/standards-sdk.es20.js +3 -2
  134. package/dist/es/standards-sdk.es20.js.map +1 -1
  135. package/dist/es/standards-sdk.es23.js +1 -1
  136. package/dist/es/standards-sdk.es25.js +5 -0
  137. package/dist/es/standards-sdk.es25.js.map +1 -1
  138. package/dist/es/standards-sdk.es28.js +25 -5
  139. package/dist/es/standards-sdk.es28.js.map +1 -1
  140. package/dist/es/standards-sdk.es29.js.map +1 -1
  141. package/dist/es/standards-sdk.es31.js +1 -1
  142. package/dist/es/standards-sdk.es32.js +1 -1
  143. package/dist/es/standards-sdk.es36.js +3 -2
  144. package/dist/es/standards-sdk.es36.js.map +1 -1
  145. package/dist/es/standards-sdk.es37.js +3 -3
  146. package/dist/es/standards-sdk.es38.js +1 -1
  147. package/dist/es/standards-sdk.es5.js +1 -1
  148. package/dist/es/standards-sdk.es54.js +1 -1
  149. package/dist/es/standards-sdk.es57.js +1 -1
  150. package/dist/es/standards-sdk.es59.js +1 -1
  151. package/dist/es/standards-sdk.es60.js +1 -1
  152. package/dist/es/standards-sdk.es61.js +3 -2
  153. package/dist/es/standards-sdk.es61.js.map +1 -1
  154. package/dist/es/standards-sdk.es63.js +1 -1
  155. package/dist/es/standards-sdk.es65.js +1 -1
  156. package/dist/es/standards-sdk.es66.js +2 -2
  157. package/dist/es/standards-sdk.es69.js +2 -2
  158. package/dist/es/standards-sdk.es70.js +1 -1
  159. package/dist/es/standards-sdk.es72.js +1 -1
  160. package/dist/es/standards-sdk.es77.js +1 -1
  161. package/dist/es/standards-sdk.es78.js +2 -1
  162. package/dist/es/standards-sdk.es78.js.map +1 -1
  163. package/dist/es/standards-sdk.es79.js +1 -1
  164. package/dist/es/standards-sdk.es8.js +1 -1
  165. package/dist/es/standards-sdk.es82.js +1 -1
  166. package/dist/es/standards-sdk.es84.js +1 -1
  167. package/dist/es/standards-sdk.es88.js +65 -2
  168. package/dist/es/standards-sdk.es88.js.map +1 -1
  169. package/dist/es/standards-sdk.es92.js +2 -2
  170. package/dist/es/standards-sdk.es92.js.map +1 -1
  171. package/dist/es/standards-sdk.es93.js +58 -1
  172. package/dist/es/standards-sdk.es93.js.map +1 -1
  173. package/dist/es/standards-sdk.es98.js +1 -1
  174. package/package.json +1 -1
@@ -1,247 +1,20 @@
1
- class EncryptionUnavailableError extends Error {
2
- constructor(sessionId, summary) {
3
- super("Encryption is not enabled for this session");
4
- this.sessionId = sessionId;
5
- this.summary = summary;
6
- }
7
- }
8
- class EncryptedChatManager {
9
- constructor(client) {
10
- this.client = client;
11
- }
12
- registerConversationContext(context) {
13
- this.client.registerConversationContextForEncryption(context);
14
- }
15
- async startSession(options) {
16
- await this.client.encryptionReady();
17
- const session = await this.client.chat.createSession({
18
- uaid: options.uaid,
19
- senderUaid: options.senderUaid,
20
- encryptionRequested: true,
21
- historyTtlSeconds: options.historyTtlSeconds,
22
- auth: options.auth
23
- });
24
- options.onSessionCreated?.(session.sessionId);
25
- const summary = session.encryption;
26
- if (!summary?.enabled) {
27
- throw new EncryptionUnavailableError(
28
- session.sessionId,
29
- session.encryption ?? null
30
- );
31
- }
32
- const handle = await this.establishRequesterContext({
33
- sessionId: session.sessionId,
34
- summary,
35
- senderUaid: options.senderUaid,
36
- handshakeTimeoutMs: options.handshakeTimeoutMs,
37
- pollIntervalMs: options.pollIntervalMs
38
- });
39
- return handle;
40
- }
41
- async acceptSession(options) {
42
- await this.client.encryptionReady();
43
- const summary = await this.waitForEncryptionSummary(
44
- options.sessionId,
45
- options.handshakeTimeoutMs,
46
- options.pollIntervalMs
47
- );
48
- const handle = await this.establishResponderContext({
49
- sessionId: options.sessionId,
50
- summary,
51
- responderUaid: options.responderUaid,
52
- handshakeTimeoutMs: options.handshakeTimeoutMs,
53
- pollIntervalMs: options.pollIntervalMs
54
- });
55
- return handle;
56
- }
57
- async establishRequesterContext(params) {
58
- const keyPair = this.client.encryption.generateEphemeralKeyPair();
59
- await this.client.chat.submitEncryptionHandshake(params.sessionId, {
60
- role: "requester",
61
- keyType: "secp256k1",
62
- ephemeralPublicKey: keyPair.publicKey,
63
- uaid: params.senderUaid ?? params.summary.requester?.uaid ?? void 0
64
- });
65
- const { summary, record } = await this.waitForHandshakeCompletion(
66
- params.sessionId,
67
- params.handshakeTimeoutMs,
68
- params.pollIntervalMs
69
- );
70
- const responderKey = record.responder?.ephemeralPublicKey;
71
- if (!responderKey) {
72
- throw new Error("Responder handshake was not completed in time");
73
- }
74
- const sharedSecret = this.client.encryption.deriveSharedSecret({
75
- privateKey: keyPair.privateKey,
76
- peerPublicKey: responderKey
77
- }).subarray();
78
- const recipients = this.buildRecipients(summary);
79
- return this.createHandle({
80
- sessionId: params.sessionId,
81
- sharedSecret,
82
- summary,
83
- recipients,
84
- identity: summary.requester ?? void 0
85
- });
86
- }
87
- async establishResponderContext(params) {
88
- const keyPair = this.client.encryption.generateEphemeralKeyPair();
89
- await this.client.chat.submitEncryptionHandshake(params.sessionId, {
90
- role: "responder",
91
- keyType: "secp256k1",
92
- ephemeralPublicKey: keyPair.publicKey,
93
- uaid: params.responderUaid ?? params.summary.responder?.uaid ?? void 0
94
- });
95
- const { summary, record } = await this.waitForHandshakeCompletion(
96
- params.sessionId,
97
- params.handshakeTimeoutMs,
98
- params.pollIntervalMs
99
- );
100
- const requesterKey = record.requester?.ephemeralPublicKey;
101
- if (!requesterKey) {
102
- throw new Error("Requester handshake was not detected in time");
103
- }
104
- const sharedSecret = this.client.encryption.deriveSharedSecret({
105
- privateKey: keyPair.privateKey,
106
- peerPublicKey: requesterKey
107
- }).subarray();
108
- const recipients = this.buildRecipients(summary);
109
- return this.createHandle({
110
- sessionId: params.sessionId,
111
- sharedSecret,
112
- summary,
113
- recipients,
114
- identity: summary.responder ?? void 0
115
- });
116
- }
117
- async waitForHandshakeCompletion(sessionId, timeoutMs = 3e4, pollIntervalMs = 1e3) {
118
- const deadline = Date.now() + timeoutMs;
119
- while (true) {
120
- const status = await this.client.chat.getEncryptionStatus(sessionId);
121
- const summary = status.encryption;
122
- const record = summary?.handshake;
123
- if (summary && record && record.status === "complete") {
124
- return { summary, record };
125
- }
126
- if (Date.now() >= deadline) {
127
- throw new Error("Timed out waiting for encrypted handshake completion");
128
- }
129
- await this.delay(pollIntervalMs);
130
- }
131
- }
132
- async waitForEncryptionSummary(sessionId, _timeoutMs = 3e4, _pollIntervalMs = 1e3) {
133
- const status = await this.client.chat.getEncryptionStatus(sessionId);
134
- if (!status.encryption?.enabled) {
135
- throw new EncryptionUnavailableError(
136
- sessionId,
137
- status.encryption ?? null
138
- );
139
- }
140
- return status.encryption;
141
- }
142
- buildRecipients(summary) {
143
- const candidates = [summary.requester, summary.responder].filter(Boolean);
144
- const normalized = candidates.map((candidate) => {
145
- if (!candidate) {
146
- return null;
147
- }
148
- const recipient = {};
149
- if (candidate.uaid) {
150
- recipient.uaid = candidate.uaid;
151
- }
152
- if (candidate.ledgerAccountId) {
153
- recipient.ledgerAccountId = candidate.ledgerAccountId;
154
- }
155
- if (candidate.userId) {
156
- recipient.userId = candidate.userId;
157
- }
158
- if (candidate.email) {
159
- recipient.email = candidate.email;
160
- }
161
- return recipient;
162
- }).filter(
163
- (entry) => Boolean(
164
- entry?.uaid || entry?.ledgerAccountId || entry?.userId || entry?.email
165
- )
166
- );
167
- if (normalized.length > 0) {
168
- return normalized;
169
- }
170
- if (summary.responder?.uaid) {
171
- return [{ uaid: summary.responder.uaid }];
172
- }
173
- return [];
174
- }
175
- createHandle(context) {
176
- const sharedSecret = context.sharedSecret;
177
- const uaid = context.summary.requester?.uaid ?? context.summary.responder?.uaid ?? context.identity?.uaid;
178
- const handle = {
179
- sessionId: context.sessionId,
180
- mode: "encrypted",
181
- summary: context.summary,
182
- send: async (options) => {
183
- const recipients = options.recipients ?? context.recipients;
184
- return this.client.chat.sendMessage({
185
- sessionId: context.sessionId,
186
- message: options.message ?? "[ciphertext omitted]",
187
- streaming: options.streaming,
188
- auth: options.auth,
189
- uaid,
190
- encryption: {
191
- plaintext: options.plaintext,
192
- sharedSecret: Buffer.from(sharedSecret),
193
- recipients
194
- }
195
- });
196
- },
197
- decryptHistoryEntry: (entry) => this.decryptEntry(entry, context.identity, sharedSecret)
198
- };
199
- this.registerConversationContext({
200
- sessionId: context.sessionId,
201
- sharedSecret,
202
- identity: context.identity
203
- });
204
- return handle;
205
- }
206
- decryptEntry(entry, identity, fallbackSecret) {
207
- const envelope = entry.cipherEnvelope;
208
- if (!envelope) {
209
- return null;
210
- }
211
- const secret = Buffer.from(fallbackSecret);
212
- try {
213
- return this.client.encryption.decryptCipherEnvelope({
214
- envelope,
215
- sharedSecret: secret
216
- });
217
- } catch (_error) {
218
- return null;
219
- }
220
- }
221
- recipientMatches(candidate, target) {
222
- if (target.uaid && candidate.uaid?.toLowerCase() === target.uaid.toLowerCase()) {
223
- return true;
224
- }
225
- if (target.ledgerAccountId && candidate.ledgerAccountId?.toLowerCase() === target.ledgerAccountId.toLowerCase()) {
226
- return true;
227
- }
228
- if (target.userId && candidate.userId === target.userId) {
229
- return true;
230
- }
231
- if (target.email && candidate.email?.toLowerCase() === target.email.toLowerCase()) {
232
- return true;
233
- }
234
- return false;
235
- }
236
- async delay(ms) {
237
- if (ms <= 0) {
238
- return;
239
- }
240
- await new Promise((resolve) => setTimeout(resolve, ms));
1
+ import { Logger } from "./standards-sdk.es106.js";
2
+ import { HederaMirrorNode } from "./standards-sdk.es127.js";
3
+ class HCS5BaseClient {
4
+ /**
5
+ * Create a new HCS-5 base client
6
+ */
7
+ constructor(config) {
8
+ this.network = config.network;
9
+ this.logger = config.logger || Logger.getInstance({
10
+ level: config.logLevel || "info",
11
+ module: "HCS5Client",
12
+ silent: config.silent
13
+ });
14
+ this.mirrorNode = new HederaMirrorNode(this.network, this.logger);
241
15
  }
242
16
  }
243
17
  export {
244
- EncryptedChatManager,
245
- EncryptionUnavailableError
18
+ HCS5BaseClient
246
19
  };
247
20
  //# sourceMappingURL=standards-sdk.es159.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"standards-sdk.es159.js","sources":["../../src/services/registry-broker/client/encrypted-chat-manager.ts"],"sourcesContent":["import type {\n AcceptEncryptedChatSessionOptions,\n ChatHistoryEntry,\n CipherEnvelopeRecipient,\n EncryptedChatSessionHandle,\n EncryptionHandshakeRecord,\n RecipientIdentity,\n SessionEncryptionSummary,\n SharedSecretInput,\n StartEncryptedChatSessionOptions,\n} from '../types';\nimport { RegistryBrokerClient } from './base-client';\n\ninterface EncryptedSessionContext {\n sessionId: string;\n sharedSecret: Uint8Array;\n summary: SessionEncryptionSummary;\n recipients: RecipientIdentity[];\n identity?: RecipientIdentity;\n}\n\ninterface ConversationContextInput {\n sessionId: string;\n sharedSecret: Uint8Array | Buffer;\n identity?: RecipientIdentity;\n}\n\ndeclare module './base-client' {\n interface RegistryBrokerClient {\n registerConversationContextForEncryption(\n context: ConversationContextInput,\n ): void;\n }\n}\n\nexport class EncryptionUnavailableError extends Error {\n constructor(\n readonly sessionId: string,\n readonly summary?: SessionEncryptionSummary | null,\n ) {\n super('Encryption is not enabled for this session');\n }\n}\n\nexport class EncryptedChatManager {\n constructor(private readonly client: RegistryBrokerClient) {}\n\n registerConversationContext(context: ConversationContextInput): void {\n this.client.registerConversationContextForEncryption(context);\n }\n\n async startSession(\n options: StartEncryptedChatSessionOptions,\n ): Promise<EncryptedChatSessionHandle> {\n await this.client.encryptionReady();\n const session = await this.client.chat.createSession({\n uaid: options.uaid,\n senderUaid: options.senderUaid,\n encryptionRequested: true,\n historyTtlSeconds: options.historyTtlSeconds,\n auth: options.auth,\n });\n options.onSessionCreated?.(session.sessionId);\n const summary = session.encryption;\n if (!summary?.enabled) {\n throw new EncryptionUnavailableError(\n session.sessionId,\n session.encryption ?? null,\n );\n }\n const handle = await this.establishRequesterContext({\n sessionId: session.sessionId,\n summary,\n senderUaid: options.senderUaid,\n handshakeTimeoutMs: options.handshakeTimeoutMs,\n pollIntervalMs: options.pollIntervalMs,\n });\n return handle;\n }\n\n async acceptSession(\n options: AcceptEncryptedChatSessionOptions,\n ): Promise<EncryptedChatSessionHandle> {\n await this.client.encryptionReady();\n const summary = await this.waitForEncryptionSummary(\n options.sessionId,\n options.handshakeTimeoutMs,\n options.pollIntervalMs,\n );\n const handle = await this.establishResponderContext({\n sessionId: options.sessionId,\n summary,\n responderUaid: options.responderUaid,\n handshakeTimeoutMs: options.handshakeTimeoutMs,\n pollIntervalMs: options.pollIntervalMs,\n });\n return handle;\n }\n\n private async establishRequesterContext(params: {\n sessionId: string;\n summary: SessionEncryptionSummary;\n senderUaid?: string;\n handshakeTimeoutMs?: number;\n pollIntervalMs?: number;\n }): Promise<EncryptedChatSessionHandle> {\n const keyPair = this.client.encryption.generateEphemeralKeyPair();\n await this.client.chat.submitEncryptionHandshake(params.sessionId, {\n role: 'requester',\n keyType: 'secp256k1',\n ephemeralPublicKey: keyPair.publicKey,\n uaid: params.senderUaid ?? params.summary.requester?.uaid ?? undefined,\n });\n const { summary, record } = await this.waitForHandshakeCompletion(\n params.sessionId,\n params.handshakeTimeoutMs,\n params.pollIntervalMs,\n );\n const responderKey = record.responder?.ephemeralPublicKey;\n if (!responderKey) {\n throw new Error('Responder handshake was not completed in time');\n }\n const sharedSecret = this.client.encryption\n .deriveSharedSecret({\n privateKey: keyPair.privateKey,\n peerPublicKey: responderKey,\n })\n .subarray();\n const recipients = this.buildRecipients(summary);\n return this.createHandle({\n sessionId: params.sessionId,\n sharedSecret,\n summary,\n recipients,\n identity: summary.requester ?? undefined,\n });\n }\n\n private async establishResponderContext(params: {\n sessionId: string;\n summary: SessionEncryptionSummary;\n responderUaid?: string;\n handshakeTimeoutMs?: number;\n pollIntervalMs?: number;\n }): Promise<EncryptedChatSessionHandle> {\n const keyPair = this.client.encryption.generateEphemeralKeyPair();\n await this.client.chat.submitEncryptionHandshake(params.sessionId, {\n role: 'responder',\n keyType: 'secp256k1',\n ephemeralPublicKey: keyPair.publicKey,\n uaid: params.responderUaid ?? params.summary.responder?.uaid ?? undefined,\n });\n const { summary, record } = await this.waitForHandshakeCompletion(\n params.sessionId,\n params.handshakeTimeoutMs,\n params.pollIntervalMs,\n );\n const requesterKey = record.requester?.ephemeralPublicKey;\n if (!requesterKey) {\n throw new Error('Requester handshake was not detected in time');\n }\n const sharedSecret = this.client.encryption\n .deriveSharedSecret({\n privateKey: keyPair.privateKey,\n peerPublicKey: requesterKey,\n })\n .subarray();\n const recipients = this.buildRecipients(summary);\n return this.createHandle({\n sessionId: params.sessionId,\n sharedSecret,\n summary,\n recipients,\n identity: summary.responder ?? undefined,\n });\n }\n\n private async waitForHandshakeCompletion(\n sessionId: string,\n timeoutMs = 30_000,\n pollIntervalMs = 1_000,\n ): Promise<{\n summary: SessionEncryptionSummary;\n record: EncryptionHandshakeRecord;\n }> {\n const deadline = Date.now() + timeoutMs;\n while (true) {\n const status = await this.client.chat.getEncryptionStatus(sessionId);\n const summary = status.encryption;\n const record = summary?.handshake;\n if (summary && record && record.status === 'complete') {\n return { summary, record };\n }\n if (Date.now() >= deadline) {\n throw new Error('Timed out waiting for encrypted handshake completion');\n }\n await this.delay(pollIntervalMs);\n }\n }\n\n private async waitForEncryptionSummary(\n sessionId: string,\n _timeoutMs = 30_000,\n _pollIntervalMs = 1_000,\n ): Promise<SessionEncryptionSummary> {\n const status = await this.client.chat.getEncryptionStatus(sessionId);\n if (!status.encryption?.enabled) {\n throw new EncryptionUnavailableError(\n sessionId,\n status.encryption ?? null,\n );\n }\n return status.encryption;\n }\n\n private buildRecipients(\n summary: SessionEncryptionSummary,\n ): RecipientIdentity[] {\n const candidates = [summary.requester, summary.responder].filter(Boolean);\n const normalized = candidates\n .map(candidate => {\n if (!candidate) {\n return null;\n }\n const recipient: RecipientIdentity = {};\n if (candidate.uaid) {\n recipient.uaid = candidate.uaid;\n }\n if (candidate.ledgerAccountId) {\n recipient.ledgerAccountId = candidate.ledgerAccountId;\n }\n if (candidate.userId) {\n recipient.userId = candidate.userId;\n }\n if (candidate.email) {\n recipient.email = candidate.email;\n }\n return recipient;\n })\n .filter((entry): entry is RecipientIdentity =>\n Boolean(\n entry?.uaid ||\n entry?.ledgerAccountId ||\n entry?.userId ||\n entry?.email,\n ),\n );\n if (normalized.length > 0) {\n return normalized;\n }\n if (summary.responder?.uaid) {\n return [{ uaid: summary.responder.uaid }];\n }\n return [];\n }\n\n private createHandle(\n context: EncryptedSessionContext,\n ): EncryptedChatSessionHandle {\n const sharedSecret = context.sharedSecret;\n const uaid =\n context.summary.requester?.uaid ??\n context.summary.responder?.uaid ??\n context.identity?.uaid;\n const handle: EncryptedChatSessionHandle = {\n sessionId: context.sessionId,\n mode: 'encrypted',\n summary: context.summary,\n send: async options => {\n const recipients = options.recipients ?? context.recipients;\n return this.client.chat.sendMessage({\n sessionId: context.sessionId,\n message: options.message ?? '[ciphertext omitted]',\n streaming: options.streaming,\n auth: options.auth,\n uaid,\n encryption: {\n plaintext: options.plaintext,\n sharedSecret: Buffer.from(sharedSecret),\n recipients,\n },\n });\n },\n decryptHistoryEntry: entry =>\n this.decryptEntry(entry, context.identity, sharedSecret),\n };\n this.registerConversationContext({\n sessionId: context.sessionId,\n sharedSecret,\n identity: context.identity,\n });\n return handle;\n }\n\n private decryptEntry(\n entry: ChatHistoryEntry,\n identity: RecipientIdentity | undefined,\n fallbackSecret: Uint8Array,\n ): string | null {\n const envelope = entry.cipherEnvelope;\n if (!envelope) {\n return null;\n }\n const secret: SharedSecretInput = Buffer.from(fallbackSecret);\n try {\n return this.client.encryption.decryptCipherEnvelope({\n envelope,\n sharedSecret: secret,\n });\n } catch (_error) {\n return null;\n }\n }\n\n private recipientMatches(\n candidate: CipherEnvelopeRecipient,\n target: RecipientIdentity,\n ): boolean {\n if (\n target.uaid &&\n candidate.uaid?.toLowerCase() === target.uaid.toLowerCase()\n ) {\n return true;\n }\n if (\n target.ledgerAccountId &&\n candidate.ledgerAccountId?.toLowerCase() ===\n target.ledgerAccountId.toLowerCase()\n ) {\n return true;\n }\n if (target.userId && candidate.userId === target.userId) {\n return true;\n }\n if (\n target.email &&\n candidate.email?.toLowerCase() === target.email.toLowerCase()\n ) {\n return true;\n }\n return false;\n }\n\n private async delay(ms: number): Promise<void> {\n if (ms <= 0) {\n return;\n }\n await new Promise(resolve => setTimeout(resolve, ms));\n }\n}\n"],"names":[],"mappings":"AAmCO,MAAM,mCAAmC,MAAM;AAAA,EACpD,YACW,WACA,SACT;AACA,UAAM,4CAA4C;AAHzC,SAAA,YAAA;AACA,SAAA,UAAA;AAAA,EAGX;AACF;AAEO,MAAM,qBAAqB;AAAA,EAChC,YAA6B,QAA8B;AAA9B,SAAA,SAAA;AAAA,EAA+B;AAAA,EAE5D,4BAA4B,SAAyC;AACnE,SAAK,OAAO,yCAAyC,OAAO;AAAA,EAC9D;AAAA,EAEA,MAAM,aACJ,SACqC;AACrC,UAAM,KAAK,OAAO,gBAAA;AAClB,UAAM,UAAU,MAAM,KAAK,OAAO,KAAK,cAAc;AAAA,MACnD,MAAM,QAAQ;AAAA,MACd,YAAY,QAAQ;AAAA,MACpB,qBAAqB;AAAA,MACrB,mBAAmB,QAAQ;AAAA,MAC3B,MAAM,QAAQ;AAAA,IAAA,CACf;AACD,YAAQ,mBAAmB,QAAQ,SAAS;AAC5C,UAAM,UAAU,QAAQ;AACxB,QAAI,CAAC,SAAS,SAAS;AACrB,YAAM,IAAI;AAAA,QACR,QAAQ;AAAA,QACR,QAAQ,cAAc;AAAA,MAAA;AAAA,IAE1B;AACA,UAAM,SAAS,MAAM,KAAK,0BAA0B;AAAA,MAClD,WAAW,QAAQ;AAAA,MACnB;AAAA,MACA,YAAY,QAAQ;AAAA,MACpB,oBAAoB,QAAQ;AAAA,MAC5B,gBAAgB,QAAQ;AAAA,IAAA,CACzB;AACD,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,cACJ,SACqC;AACrC,UAAM,KAAK,OAAO,gBAAA;AAClB,UAAM,UAAU,MAAM,KAAK;AAAA,MACzB,QAAQ;AAAA,MACR,QAAQ;AAAA,MACR,QAAQ;AAAA,IAAA;AAEV,UAAM,SAAS,MAAM,KAAK,0BAA0B;AAAA,MAClD,WAAW,QAAQ;AAAA,MACnB;AAAA,MACA,eAAe,QAAQ;AAAA,MACvB,oBAAoB,QAAQ;AAAA,MAC5B,gBAAgB,QAAQ;AAAA,IAAA,CACzB;AACD,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,0BAA0B,QAMA;AACtC,UAAM,UAAU,KAAK,OAAO,WAAW,yBAAA;AACvC,UAAM,KAAK,OAAO,KAAK,0BAA0B,OAAO,WAAW;AAAA,MACjE,MAAM;AAAA,MACN,SAAS;AAAA,MACT,oBAAoB,QAAQ;AAAA,MAC5B,MAAM,OAAO,cAAc,OAAO,QAAQ,WAAW,QAAQ;AAAA,IAAA,CAC9D;AACD,UAAM,EAAE,SAAS,WAAW,MAAM,KAAK;AAAA,MACrC,OAAO;AAAA,MACP,OAAO;AAAA,MACP,OAAO;AAAA,IAAA;AAET,UAAM,eAAe,OAAO,WAAW;AACvC,QAAI,CAAC,cAAc;AACjB,YAAM,IAAI,MAAM,+CAA+C;AAAA,IACjE;AACA,UAAM,eAAe,KAAK,OAAO,WAC9B,mBAAmB;AAAA,MAClB,YAAY,QAAQ;AAAA,MACpB,eAAe;AAAA,IAAA,CAChB,EACA,SAAA;AACH,UAAM,aAAa,KAAK,gBAAgB,OAAO;AAC/C,WAAO,KAAK,aAAa;AAAA,MACvB,WAAW,OAAO;AAAA,MAClB;AAAA,MACA;AAAA,MACA;AAAA,MACA,UAAU,QAAQ,aAAa;AAAA,IAAA,CAChC;AAAA,EACH;AAAA,EAEA,MAAc,0BAA0B,QAMA;AACtC,UAAM,UAAU,KAAK,OAAO,WAAW,yBAAA;AACvC,UAAM,KAAK,OAAO,KAAK,0BAA0B,OAAO,WAAW;AAAA,MACjE,MAAM;AAAA,MACN,SAAS;AAAA,MACT,oBAAoB,QAAQ;AAAA,MAC5B,MAAM,OAAO,iBAAiB,OAAO,QAAQ,WAAW,QAAQ;AAAA,IAAA,CACjE;AACD,UAAM,EAAE,SAAS,WAAW,MAAM,KAAK;AAAA,MACrC,OAAO;AAAA,MACP,OAAO;AAAA,MACP,OAAO;AAAA,IAAA;AAET,UAAM,eAAe,OAAO,WAAW;AACvC,QAAI,CAAC,cAAc;AACjB,YAAM,IAAI,MAAM,8CAA8C;AAAA,IAChE;AACA,UAAM,eAAe,KAAK,OAAO,WAC9B,mBAAmB;AAAA,MAClB,YAAY,QAAQ;AAAA,MACpB,eAAe;AAAA,IAAA,CAChB,EACA,SAAA;AACH,UAAM,aAAa,KAAK,gBAAgB,OAAO;AAC/C,WAAO,KAAK,aAAa;AAAA,MACvB,WAAW,OAAO;AAAA,MAClB;AAAA,MACA;AAAA,MACA;AAAA,MACA,UAAU,QAAQ,aAAa;AAAA,IAAA,CAChC;AAAA,EACH;AAAA,EAEA,MAAc,2BACZ,WACA,YAAY,KACZ,iBAAiB,KAIhB;AACD,UAAM,WAAW,KAAK,IAAA,IAAQ;AAC9B,WAAO,MAAM;AACX,YAAM,SAAS,MAAM,KAAK,OAAO,KAAK,oBAAoB,SAAS;AACnE,YAAM,UAAU,OAAO;AACvB,YAAM,SAAS,SAAS;AACxB,UAAI,WAAW,UAAU,OAAO,WAAW,YAAY;AACrD,eAAO,EAAE,SAAS,OAAA;AAAA,MACpB;AACA,UAAI,KAAK,IAAA,KAAS,UAAU;AAC1B,cAAM,IAAI,MAAM,sDAAsD;AAAA,MACxE;AACA,YAAM,KAAK,MAAM,cAAc;AAAA,IACjC;AAAA,EACF;AAAA,EAEA,MAAc,yBACZ,WACA,aAAa,KACb,kBAAkB,KACiB;AACnC,UAAM,SAAS,MAAM,KAAK,OAAO,KAAK,oBAAoB,SAAS;AACnE,QAAI,CAAC,OAAO,YAAY,SAAS;AAC/B,YAAM,IAAI;AAAA,QACR;AAAA,QACA,OAAO,cAAc;AAAA,MAAA;AAAA,IAEzB;AACA,WAAO,OAAO;AAAA,EAChB;AAAA,EAEQ,gBACN,SACqB;AACrB,UAAM,aAAa,CAAC,QAAQ,WAAW,QAAQ,SAAS,EAAE,OAAO,OAAO;AACxE,UAAM,aAAa,WAChB,IAAI,CAAA,cAAa;AAChB,UAAI,CAAC,WAAW;AACd,eAAO;AAAA,MACT;AACA,YAAM,YAA+B,CAAA;AACrC,UAAI,UAAU,MAAM;AAClB,kBAAU,OAAO,UAAU;AAAA,MAC7B;AACA,UAAI,UAAU,iBAAiB;AAC7B,kBAAU,kBAAkB,UAAU;AAAA,MACxC;AACA,UAAI,UAAU,QAAQ;AACpB,kBAAU,SAAS,UAAU;AAAA,MAC/B;AACA,UAAI,UAAU,OAAO;AACnB,kBAAU,QAAQ,UAAU;AAAA,MAC9B;AACA,aAAO;AAAA,IACT,CAAC,EACA;AAAA,MAAO,CAAC,UACP;AAAA,QACE,OAAO,QACL,OAAO,mBACP,OAAO,UACP,OAAO;AAAA,MAAA;AAAA,IACX;AAEJ,QAAI,WAAW,SAAS,GAAG;AACzB,aAAO;AAAA,IACT;AACA,QAAI,QAAQ,WAAW,MAAM;AAC3B,aAAO,CAAC,EAAE,MAAM,QAAQ,UAAU,MAAM;AAAA,IAC1C;AACA,WAAO,CAAA;AAAA,EACT;AAAA,EAEQ,aACN,SAC4B;AAC5B,UAAM,eAAe,QAAQ;AAC7B,UAAM,OACJ,QAAQ,QAAQ,WAAW,QAC3B,QAAQ,QAAQ,WAAW,QAC3B,QAAQ,UAAU;AACpB,UAAM,SAAqC;AAAA,MACzC,WAAW,QAAQ;AAAA,MACnB,MAAM;AAAA,MACN,SAAS,QAAQ;AAAA,MACjB,MAAM,OAAM,YAAW;AACrB,cAAM,aAAa,QAAQ,cAAc,QAAQ;AACjD,eAAO,KAAK,OAAO,KAAK,YAAY;AAAA,UAClC,WAAW,QAAQ;AAAA,UACnB,SAAS,QAAQ,WAAW;AAAA,UAC5B,WAAW,QAAQ;AAAA,UACnB,MAAM,QAAQ;AAAA,UACd;AAAA,UACA,YAAY;AAAA,YACV,WAAW,QAAQ;AAAA,YACnB,cAAc,OAAO,KAAK,YAAY;AAAA,YACtC;AAAA,UAAA;AAAA,QACF,CACD;AAAA,MACH;AAAA,MACA,qBAAqB,CAAA,UACnB,KAAK,aAAa,OAAO,QAAQ,UAAU,YAAY;AAAA,IAAA;AAE3D,SAAK,4BAA4B;AAAA,MAC/B,WAAW,QAAQ;AAAA,MACnB;AAAA,MACA,UAAU,QAAQ;AAAA,IAAA,CACnB;AACD,WAAO;AAAA,EACT;AAAA,EAEQ,aACN,OACA,UACA,gBACe;AACf,UAAM,WAAW,MAAM;AACvB,QAAI,CAAC,UAAU;AACb,aAAO;AAAA,IACT;AACA,UAAM,SAA4B,OAAO,KAAK,cAAc;AAC5D,QAAI;AACF,aAAO,KAAK,OAAO,WAAW,sBAAsB;AAAA,QAClD;AAAA,QACA,cAAc;AAAA,MAAA,CACf;AAAA,IACH,SAAS,QAAQ;AACf,aAAO;AAAA,IACT;AAAA,EACF;AAAA,EAEQ,iBACN,WACA,QACS;AACT,QACE,OAAO,QACP,UAAU,MAAM,kBAAkB,OAAO,KAAK,eAC9C;AACA,aAAO;AAAA,IACT;AACA,QACE,OAAO,mBACP,UAAU,iBAAiB,kBACzB,OAAO,gBAAgB,eACzB;AACA,aAAO;AAAA,IACT;AACA,QAAI,OAAO,UAAU,UAAU,WAAW,OAAO,QAAQ;AACvD,aAAO;AAAA,IACT;AACA,QACE,OAAO,SACP,UAAU,OAAO,kBAAkB,OAAO,MAAM,eAChD;AACA,aAAO;AAAA,IACT;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,MAAM,IAA2B;AAC7C,QAAI,MAAM,GAAG;AACX;AAAA,IACF;AACA,UAAM,IAAI,QAAQ,CAAA,YAAW,WAAW,SAAS,EAAE,CAAC;AAAA,EACtD;AACF;"}
1
+ {"version":3,"file":"standards-sdk.es159.js","sources":["../../src/hcs-5/base-client.ts"],"sourcesContent":["import { Logger, ILogger } from '../utils/logger';\nimport { HederaMirrorNode } from '../services/mirror-node';\nimport { HCS5ClientConfig } from './types';\nimport { NetworkType } from '../utils/types';\n\n/**\n * Base client for HCS-5 operations\n */\nexport abstract class HCS5BaseClient {\n protected logger: ILogger;\n protected mirrorNode: HederaMirrorNode;\n protected network: NetworkType;\n\n /**\n * Create a new HCS-5 base client\n */\n constructor(config: HCS5ClientConfig) {\n this.network = config.network;\n this.logger =\n config.logger ||\n Logger.getInstance({\n level: config.logLevel || 'info',\n module: 'HCS5Client',\n silent: config.silent,\n });\n\n this.mirrorNode = new HederaMirrorNode(this.network, this.logger);\n }\n}\n"],"names":[],"mappings":";;AAQO,MAAe,eAAe;AAAA;AAAA;AAAA;AAAA,EAQnC,YAAY,QAA0B;AACpC,SAAK,UAAU,OAAO;AACtB,SAAK,SACH,OAAO,UACP,OAAO,YAAY;AAAA,MACjB,OAAO,OAAO,YAAY;AAAA,MAC1B,QAAQ;AAAA,MACR,QAAQ,OAAO;AAAA,IAAA,CAChB;AAEH,SAAK,aAAa,IAAI,iBAAiB,KAAK,SAAS,KAAK,MAAM;AAAA,EAClE;AACF;"}