@human-protocol/sdk 3.0.8 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/dist/constants.d.ts +1 -1
  2. package/dist/constants.d.ts.map +1 -1
  3. package/dist/constants.js +2 -2
  4. package/dist/decorators.js +1 -1
  5. package/dist/encryption.d.ts +21 -29
  6. package/dist/encryption.d.ts.map +1 -1
  7. package/dist/encryption.js +17 -29
  8. package/dist/error.d.ts +31 -28
  9. package/dist/error.d.ts.map +1 -1
  10. package/dist/error.js +36 -33
  11. package/dist/escrow.d.ts +102 -59
  12. package/dist/escrow.d.ts.map +1 -1
  13. package/dist/escrow.js +186 -98
  14. package/dist/graphql/queries/operator.d.ts.map +1 -1
  15. package/dist/graphql/queries/operator.js +13 -5
  16. package/dist/interfaces.d.ts +10 -2
  17. package/dist/interfaces.d.ts.map +1 -1
  18. package/dist/kvstore.d.ts +15 -15
  19. package/dist/kvstore.d.ts.map +1 -1
  20. package/dist/kvstore.js +15 -15
  21. package/dist/operator.d.ts +11 -10
  22. package/dist/operator.d.ts.map +1 -1
  23. package/dist/operator.js +23 -11
  24. package/dist/staking.d.ts +38 -21
  25. package/dist/staking.d.ts.map +1 -1
  26. package/dist/staking.js +62 -21
  27. package/dist/statistics.d.ts +10 -29
  28. package/dist/statistics.d.ts.map +1 -1
  29. package/dist/statistics.js +10 -29
  30. package/dist/storage.d.ts +13 -18
  31. package/dist/storage.d.ts.map +1 -1
  32. package/dist/storage.js +13 -18
  33. package/dist/transaction.js +1 -1
  34. package/dist/types.d.ts +6 -2
  35. package/dist/types.d.ts.map +1 -1
  36. package/dist/types.js +1 -1
  37. package/dist/utils.d.ts +0 -1
  38. package/dist/utils.d.ts.map +1 -1
  39. package/dist/utils.js +0 -1
  40. package/package.json +1 -1
  41. package/src/constants.ts +2 -2
  42. package/src/decorators.ts +1 -1
  43. package/src/encryption.ts +21 -29
  44. package/src/error.ts +39 -37
  45. package/src/escrow.ts +245 -117
  46. package/src/graphql/queries/operator.ts +13 -5
  47. package/src/interfaces.ts +11 -2
  48. package/src/kvstore.ts +16 -16
  49. package/src/operator.ts +26 -12
  50. package/src/staking.ts +71 -22
  51. package/src/statistics.ts +10 -29
  52. package/src/storage.ts +13 -18
  53. package/src/transaction.ts +2 -2
  54. package/src/types.ts +6 -2
  55. package/src/utils.ts +0 -1
@@ -5,7 +5,6 @@ export declare const DEFAULT_ENDPOINT = "localhost";
5
5
  export declare const DEFAULT_REGION = "eu";
6
6
  export declare const DEFAULT_PORT = 9000;
7
7
  export declare const DEFAULT_USE_SSL = false;
8
- export declare const DEFAULT_TX_ID = 1;
9
8
  export declare enum HttpStatus {
10
9
  OK = 200,
11
10
  CREATED = 201,
@@ -37,4 +36,5 @@ export declare const Role: {
37
36
  RecordingOracle: string;
38
37
  };
39
38
  export declare const SUBGRAPH_API_KEY_PLACEHOLDER = "[SUBGRAPH_API_KEY]";
39
+ export declare const ESCROW_BULK_PAYOUT_MAX_ITEMS = 99;
40
40
  //# sourceMappingURL=constants.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC;AAClC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAEtC,eAAO,MAAM,qBAAqB,0BAA0B,CAAC;AAE7D,eAAO,MAAM,gBAAgB,cAAc,CAAC;AAE5C,eAAO,MAAM,cAAc,OAAO,CAAC;AAEnC,eAAO,MAAM,YAAY,OAAO,CAAC;AAEjC,eAAO,MAAM,eAAe,QAAQ,CAAC;AAErC,eAAO,MAAM,aAAa,IAAI,CAAC;AAE/B,oBAAY,UAAU;IACpB,EAAE,MAAM;IACR,OAAO,MAAM;IACb,WAAW,MAAM;IACjB,YAAY,MAAM;IAClB,gBAAgB,MAAM;IACtB,SAAS,MAAM;IACf,SAAS,MAAM;IACf,qBAAqB,MAAM;CAC5B;AAED,eAAO,MAAM,QAAQ,EAAE;KACpB,OAAO,IAAI,OAAO,CAAC,CAAC,EAAE,WAAW;CAiRnC,CAAC;AAEF,eAAO,MAAM,WAAW;;;;;;;;;;CAUvB,CAAC;AAEF,eAAO,MAAM,IAAI;;;;;CAKhB,CAAC;AAEF,eAAO,MAAM,4BAA4B,uBAAuB,CAAC"}
1
+ {"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC;AAClC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAEtC,eAAO,MAAM,qBAAqB,0BAA0B,CAAC;AAE7D,eAAO,MAAM,gBAAgB,cAAc,CAAC;AAE5C,eAAO,MAAM,cAAc,OAAO,CAAC;AAEnC,eAAO,MAAM,YAAY,OAAO,CAAC;AAEjC,eAAO,MAAM,eAAe,QAAQ,CAAC;AAErC,oBAAY,UAAU;IACpB,EAAE,MAAM;IACR,OAAO,MAAM;IACb,WAAW,MAAM;IACjB,YAAY,MAAM;IAClB,gBAAgB,MAAM;IACtB,SAAS,MAAM;IACf,SAAS,MAAM;IACf,qBAAqB,MAAM;CAC5B;AAED,eAAO,MAAM,QAAQ,EAAE;KACpB,OAAO,IAAI,OAAO,CAAC,CAAC,EAAE,WAAW;CAiRnC,CAAC;AAEF,eAAO,MAAM,WAAW;;;;;;;;;;CAUvB,CAAC;AAEF,eAAO,MAAM,IAAI;;;;;CAKhB,CAAC;AAEF,eAAO,MAAM,4BAA4B,uBAAuB,CAAC;AAEjE,eAAO,MAAM,4BAA4B,KAAK,CAAC"}
package/dist/constants.js CHANGED
@@ -1,13 +1,12 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.SUBGRAPH_API_KEY_PLACEHOLDER = exports.Role = exports.KVStoreKeys = exports.NETWORKS = exports.HttpStatus = exports.DEFAULT_TX_ID = exports.DEFAULT_USE_SSL = exports.DEFAULT_PORT = exports.DEFAULT_REGION = exports.DEFAULT_ENDPOINT = exports.DEFAULT_PUBLIC_BUCKET = void 0;
3
+ exports.ESCROW_BULK_PAYOUT_MAX_ITEMS = exports.SUBGRAPH_API_KEY_PLACEHOLDER = exports.Role = exports.KVStoreKeys = exports.NETWORKS = exports.HttpStatus = exports.DEFAULT_USE_SSL = exports.DEFAULT_PORT = exports.DEFAULT_REGION = exports.DEFAULT_ENDPOINT = exports.DEFAULT_PUBLIC_BUCKET = void 0;
4
4
  const enums_1 = require("./enums");
5
5
  exports.DEFAULT_PUBLIC_BUCKET = 'escrow-public-results';
6
6
  exports.DEFAULT_ENDPOINT = 'localhost';
7
7
  exports.DEFAULT_REGION = 'eu';
8
8
  exports.DEFAULT_PORT = 9000;
9
9
  exports.DEFAULT_USE_SSL = false;
10
- exports.DEFAULT_TX_ID = 1;
11
10
  var HttpStatus;
12
11
  (function (HttpStatus) {
13
12
  HttpStatus[HttpStatus["OK"] = 200] = "OK";
@@ -273,3 +272,4 @@ exports.Role = {
273
272
  RecordingOracle: 'Recording Oracle',
274
273
  };
275
274
  exports.SUBGRAPH_API_KEY_PLACEHOLDER = '[SUBGRAPH_API_KEY]';
275
+ exports.ESCROW_BULK_PAYOUT_MAX_ITEMS = 99;
@@ -7,7 +7,7 @@ function requiresSigner(target, propertyKey, descriptor) {
7
7
  const originalMethod = descriptor.value;
8
8
  descriptor.value = async function (...args) {
9
9
  try {
10
- !this.runner.getAddress();
10
+ this.runner.getAddress();
11
11
  }
12
12
  catch {
13
13
  throw error_1.ErrorSigner;
@@ -1,5 +1,9 @@
1
1
  import * as openpgp from 'openpgp';
2
2
  import { IKeyPair } from './interfaces';
3
+ /**
4
+ * Type representing the data type of a message.
5
+ * It can be either a string or a Uint8Array.
6
+ */
3
7
  type MessageDataType = string | Uint8Array;
4
8
  /**
5
9
  * ## Introduction
@@ -38,7 +42,7 @@ type MessageDataType = string | Uint8Array;
38
42
  *
39
43
  * const privateKey = 'Armored_priv_key';
40
44
  * const passphrase = 'example_passphrase';
41
- * const encription = await Encryption.build(privateKey, passphrase);
45
+ * const encryption = await Encryption.build(privateKey, passphrase);
42
46
  * ```
43
47
  */
44
48
  export declare class Encryption {
@@ -60,7 +64,7 @@ export declare class Encryption {
60
64
  /**
61
65
  * This function signs and encrypts a message using the private key used to initialize the client and the specified public keys.
62
66
  *
63
- * @param {string} message Message to sign and encrypt.
67
+ * @param {MessageDataType} message Message to sign and encrypt.
64
68
  * @param {string[]} publicKeys Array of public keys to use for encryption.
65
69
  * @returns {Promise<string>} Message signed and encrypted.
66
70
  *
@@ -72,7 +76,7 @@ export declare class Encryption {
72
76
  *
73
77
  * const privateKey = 'Armored_priv_key';
74
78
  * const passphrase = 'example_passphrase';
75
- * const encription = await Encryption.build(privateKey, passphrase);
79
+ * const encryption = await Encryption.build(privateKey, passphrase);
76
80
  * const publicKey1 = `-----BEGIN PGP PUBLIC KEY BLOCK-----
77
81
  * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
78
82
  * WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
@@ -98,7 +102,7 @@ export declare class Encryption {
98
102
  * -----END PGP PUBLIC KEY BLOCK-----`;
99
103
  *
100
104
  * const publicKeys = [publicKey1, publicKey2];
101
- * const resultMessage = await encription.signAndEncrypt('message', publicKeys);
105
+ * const resultMessage = await encryption.signAndEncrypt('message', publicKeys);
102
106
  * ```
103
107
  */
104
108
  signAndEncrypt(message: MessageDataType, publicKeys: string[]): Promise<string>;
@@ -107,7 +111,7 @@ export declare class Encryption {
107
111
  *
108
112
  * @param {string} message Message to decrypt.
109
113
  * @param {string} publicKey Public key used to verify signature if needed. This is optional.
110
- * @returns {Promise<string>} Message decrypted.
114
+ * @returns {Promise<Uint8Array>} Message decrypted.
111
115
  *
112
116
  * **Code example**
113
117
  *
@@ -116,7 +120,7 @@ export declare class Encryption {
116
120
  *
117
121
  * const privateKey = 'Armored_priv_key';
118
122
  * const passphrase = 'example_passphrase';
119
- * const encription = await Encryption.build(privateKey, passphrase);
123
+ * const encryption = await Encryption.build(privateKey, passphrase);
120
124
  *
121
125
  * const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
122
126
  * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
@@ -130,7 +134,7 @@ export declare class Encryption {
130
134
  * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
131
135
  * -----END PGP PUBLIC KEY BLOCK-----`;
132
136
  *
133
- * const resultMessage = await encription.decrypt('message');
137
+ * const resultMessage = await encryption.decrypt('message');
134
138
  * ```
135
139
  */
136
140
  decrypt(message: string, publicKey?: string): Promise<Uint8Array>;
@@ -147,9 +151,9 @@ export declare class Encryption {
147
151
  *
148
152
  * const privateKey = 'Armored_priv_key';
149
153
  * const passphrase = 'example_passphrase';
150
- * const encription = await Encryption.build(privateKey, passphrase);
154
+ * const encryption = await Encryption.build(privateKey, passphrase);
151
155
  *
152
- * const resultMessage = await encription.sign('message');
156
+ * const resultMessage = await encryption.sign('message');
153
157
  * ```
154
158
  */
155
159
  sign(message: string): Promise<string>;
@@ -184,7 +188,7 @@ export declare class EncryptionUtils {
184
188
  * This function verifies the signature of a signed message using the public key.
185
189
  *
186
190
  * @param {string} message Message to verify.
187
- * @param {string} publicKey Public key to verify that the message was sign by a specific source.
191
+ * @param {string} publicKey Public key to verify that the message was signed by a specific source.
188
192
  * @returns {Promise<boolean>} True if verified. False if not verified.
189
193
  *
190
194
  * **Code example**
@@ -204,7 +208,7 @@ export declare class EncryptionUtils {
204
208
  * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
205
209
  * -----END PGP PUBLIC KEY BLOCK-----`;
206
210
  *
207
- * const result = await EncriptionUtils.verify('message', publicKey);
211
+ * const result = await EncryptionUtils.verify('message', publicKey);
208
212
  * ```
209
213
  */
210
214
  static verify(message: string, publicKey: string): Promise<boolean>;
@@ -219,7 +223,7 @@ export declare class EncryptionUtils {
219
223
  * ```ts
220
224
  * import { EncryptionUtils } from '@human-protocol/sdk';
221
225
  *
222
- * const signedData = await EncriptionUtils.getSignedData('message');
226
+ * const signedData = await EncryptionUtils.getSignedData('message');
223
227
  * ```
224
228
  */
225
229
  static getSignedData(message: string): Promise<string>;
@@ -236,30 +240,18 @@ export declare class EncryptionUtils {
236
240
  * ```ts
237
241
  * import { EncryptionUtils } from '@human-protocol/sdk';
238
242
  *
239
- * const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
240
- * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
241
- * WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
242
- * CwkHCAkQJBFPuuhtQo4DFQgKBBYAAgECGQECGwMCHgEWIQTQ5fbVPB9CWIdf
243
- * XdYkEU+66G1CjgAAKYYA/jMyDCtJtqu6hj22kq9SW6fuV1FCT2ySJ9vBhumF
244
- * X8wWAP433zVFl4VECOkgGk8qFr8BgkYxaz16GOFAqYbfO6oMBc44BGSkBDMS
245
- * CisGAQQBl1UBBQEBB0AKR+A48zVVYZWQvgu7Opn2IGvzI9jePB/J8pzqRhg2
246
- * YAMBCAfCeAQYFggAKgUCZKQEMwkQJBFPuuhtQo4CGwwWIQTQ5fbVPB9CWIdf
247
- * XdYkEU+66G1CjgAA0xgBAK4AIahFFnmWR2Mp6A3q021cZXpGklc0Xw1Hfswc
248
- * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
249
- * -----END PGP PUBLIC KEY BLOCK-----`;
250
- *
251
243
  * const name = 'YOUR_NAME';
252
244
  * const email = 'YOUR_EMAIL';
253
245
  * const passphrase = 'YOUR_PASSPHRASE';
254
- * const result = await EncriptionUtils.generateKeyPair(name, email, passphrase);
246
+ * const result = await EncryptionUtils.generateKeyPair(name, email, passphrase);
255
247
  * ```
256
248
  */
257
249
  static generateKeyPair(name: string, email: string, passphrase?: string): Promise<IKeyPair>;
258
250
  /**
259
251
  * This function encrypts a message using the specified public keys.
260
252
  *
261
- * @param {string} message Message to encrypt.
262
- * @param {string} publicKeys Array of public keys to use for encryption.
253
+ * @param {MessageDataType} message Message to encrypt.
254
+ * @param {string[]} publicKeys Array of public keys to use for encryption.
263
255
  * @returns {Promise<string>} Message encrypted.
264
256
  *
265
257
  * **Code example**
@@ -292,7 +284,7 @@ export declare class EncryptionUtils {
292
284
  * -----END PGP PUBLIC KEY BLOCK-----`;
293
285
  *
294
286
  * const publicKeys = [publicKey1, publicKey2]
295
- * const result = await EncriptionUtils.encrypt('message', publicKeys);
287
+ * const result = await EncryptionUtils.encrypt('message', publicKeys);
296
288
  * ```
297
289
  */
298
290
  static encrypt(message: MessageDataType, publicKeys: string[]): Promise<string>;
@@ -317,7 +309,7 @@ export declare class EncryptionUtils {
317
309
  * =tsmI
318
310
  * -----END PGP MESSAGE-----`;
319
311
  *
320
- * const isEncrypted = await EncriptionUtils.isEncrypted(message);
312
+ * const isEncrypted = await EncryptionUtils.isEncrypted(message);
321
313
  *
322
314
  * if (isEncrypted) {
323
315
  * console.log('The message is encrypted with OpenPGP.');
@@ -1 +1 @@
1
- {"version":3,"file":"encryption.d.ts","sourceRoot":"","sources":["../src/encryption.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,SAAS,CAAC;AACnC,OAAO,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAExC,KAAK,eAAe,GAAG,MAAM,GAAG,UAAU,CAAC;AAU3C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,UAAU,CAAqB;IAEvC;;;;OAIG;gBACS,UAAU,EAAE,OAAO,CAAC,UAAU;IAI1C;;;;;;OAMG;WACiB,KAAK,CACvB,iBAAiB,EAAE,MAAM,EACzB,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,UAAU,CAAC;IAkBtB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA2CG;IACU,cAAc,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAkBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACU,OAAO,CAClB,OAAO,EAAE,MAAM,EACf,SAAS,CAAC,EAAE,MAAM,GACjB,OAAO,CAAC,UAAU,CAAC;IAoCtB;;;;;;;;;;;;;;;;;OAiBG;IACU,IAAI,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;CAYpD;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;WACiB,MAAM,CACxB,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,OAAO,CAAC;IAgBnB;;;;;;;;;;;;;OAaG;WACiB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAYnE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;WACiB,eAAe,CACjC,IAAI,EAAE,MAAM,EACZ,KAAK,EAAE,MAAM,EACb,UAAU,SAAK,GACd,OAAO,CAAC,QAAQ,CAAC;IAkBpB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAuCG;WACiB,OAAO,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAiBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA6BG;WACW,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO;CASpD"}
1
+ {"version":3,"file":"encryption.d.ts","sourceRoot":"","sources":["../src/encryption.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,SAAS,CAAC;AACnC,OAAO,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAExC;;;GAGG;AACH,KAAK,eAAe,GAAG,MAAM,GAAG,UAAU,CAAC;AAU3C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,UAAU,CAAqB;IAEvC;;;;OAIG;gBACS,UAAU,EAAE,OAAO,CAAC,UAAU;IAI1C;;;;;;OAMG;WACiB,KAAK,CACvB,iBAAiB,EAAE,MAAM,EACzB,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,UAAU,CAAC;IAkBtB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA2CG;IACU,cAAc,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAkBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACU,OAAO,CAClB,OAAO,EAAE,MAAM,EACf,SAAS,CAAC,EAAE,MAAM,GACjB,OAAO,CAAC,UAAU,CAAC;IAoCtB;;;;;;;;;;;;;;;;;OAiBG;IACU,IAAI,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;CAYpD;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;WACiB,MAAM,CACxB,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,OAAO,CAAC;IAgBnB;;;;;;;;;;;;;OAaG;WACiB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAYnE;;;;;;;;;;;;;;;;;;OAkBG;WACiB,eAAe,CACjC,IAAI,EAAE,MAAM,EACZ,KAAK,EAAE,MAAM,EACb,UAAU,SAAK,GACd,OAAO,CAAC,QAAQ,CAAC;IAkBpB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAuCG;WACiB,OAAO,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAiBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA6BG;WACW,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO;CASpD"}
@@ -78,7 +78,7 @@ function makeMessageDataBinary(message) {
78
78
  *
79
79
  * const privateKey = 'Armored_priv_key';
80
80
  * const passphrase = 'example_passphrase';
81
- * const encription = await Encryption.build(privateKey, passphrase);
81
+ * const encryption = await Encryption.build(privateKey, passphrase);
82
82
  * ```
83
83
  */
84
84
  class Encryption {
@@ -113,7 +113,7 @@ class Encryption {
113
113
  /**
114
114
  * This function signs and encrypts a message using the private key used to initialize the client and the specified public keys.
115
115
  *
116
- * @param {string} message Message to sign and encrypt.
116
+ * @param {MessageDataType} message Message to sign and encrypt.
117
117
  * @param {string[]} publicKeys Array of public keys to use for encryption.
118
118
  * @returns {Promise<string>} Message signed and encrypted.
119
119
  *
@@ -125,7 +125,7 @@ class Encryption {
125
125
  *
126
126
  * const privateKey = 'Armored_priv_key';
127
127
  * const passphrase = 'example_passphrase';
128
- * const encription = await Encryption.build(privateKey, passphrase);
128
+ * const encryption = await Encryption.build(privateKey, passphrase);
129
129
  * const publicKey1 = `-----BEGIN PGP PUBLIC KEY BLOCK-----
130
130
  * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
131
131
  * WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
@@ -151,7 +151,7 @@ class Encryption {
151
151
  * -----END PGP PUBLIC KEY BLOCK-----`;
152
152
  *
153
153
  * const publicKeys = [publicKey1, publicKey2];
154
- * const resultMessage = await encription.signAndEncrypt('message', publicKeys);
154
+ * const resultMessage = await encryption.signAndEncrypt('message', publicKeys);
155
155
  * ```
156
156
  */
157
157
  async signAndEncrypt(message, publicKeys) {
@@ -172,7 +172,7 @@ class Encryption {
172
172
  *
173
173
  * @param {string} message Message to decrypt.
174
174
  * @param {string} publicKey Public key used to verify signature if needed. This is optional.
175
- * @returns {Promise<string>} Message decrypted.
175
+ * @returns {Promise<Uint8Array>} Message decrypted.
176
176
  *
177
177
  * **Code example**
178
178
  *
@@ -181,7 +181,7 @@ class Encryption {
181
181
  *
182
182
  * const privateKey = 'Armored_priv_key';
183
183
  * const passphrase = 'example_passphrase';
184
- * const encription = await Encryption.build(privateKey, passphrase);
184
+ * const encryption = await Encryption.build(privateKey, passphrase);
185
185
  *
186
186
  * const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
187
187
  * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
@@ -195,7 +195,7 @@ class Encryption {
195
195
  * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
196
196
  * -----END PGP PUBLIC KEY BLOCK-----`;
197
197
  *
198
- * const resultMessage = await encription.decrypt('message');
198
+ * const resultMessage = await encryption.decrypt('message');
199
199
  * ```
200
200
  */
201
201
  async decrypt(message, publicKey) {
@@ -241,9 +241,9 @@ class Encryption {
241
241
  *
242
242
  * const privateKey = 'Armored_priv_key';
243
243
  * const passphrase = 'example_passphrase';
244
- * const encription = await Encryption.build(privateKey, passphrase);
244
+ * const encryption = await Encryption.build(privateKey, passphrase);
245
245
  *
246
- * const resultMessage = await encription.sign('message');
246
+ * const resultMessage = await encryption.sign('message');
247
247
  * ```
248
248
  */
249
249
  async sign(message) {
@@ -289,7 +289,7 @@ class EncryptionUtils {
289
289
  * This function verifies the signature of a signed message using the public key.
290
290
  *
291
291
  * @param {string} message Message to verify.
292
- * @param {string} publicKey Public key to verify that the message was sign by a specific source.
292
+ * @param {string} publicKey Public key to verify that the message was signed by a specific source.
293
293
  * @returns {Promise<boolean>} True if verified. False if not verified.
294
294
  *
295
295
  * **Code example**
@@ -309,7 +309,7 @@ class EncryptionUtils {
309
309
  * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
310
310
  * -----END PGP PUBLIC KEY BLOCK-----`;
311
311
  *
312
- * const result = await EncriptionUtils.verify('message', publicKey);
312
+ * const result = await EncryptionUtils.verify('message', publicKey);
313
313
  * ```
314
314
  */
315
315
  static async verify(message, publicKey) {
@@ -337,7 +337,7 @@ class EncryptionUtils {
337
337
  * ```ts
338
338
  * import { EncryptionUtils } from '@human-protocol/sdk';
339
339
  *
340
- * const signedData = await EncriptionUtils.getSignedData('message');
340
+ * const signedData = await EncryptionUtils.getSignedData('message');
341
341
  * ```
342
342
  */
343
343
  static async getSignedData(message) {
@@ -364,22 +364,10 @@ class EncryptionUtils {
364
364
  * ```ts
365
365
  * import { EncryptionUtils } from '@human-protocol/sdk';
366
366
  *
367
- * const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
368
- * xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
369
- * WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
370
- * CwkHCAkQJBFPuuhtQo4DFQgKBBYAAgECGQECGwMCHgEWIQTQ5fbVPB9CWIdf
371
- * XdYkEU+66G1CjgAAKYYA/jMyDCtJtqu6hj22kq9SW6fuV1FCT2ySJ9vBhumF
372
- * X8wWAP433zVFl4VECOkgGk8qFr8BgkYxaz16GOFAqYbfO6oMBc44BGSkBDMS
373
- * CisGAQQBl1UBBQEBB0AKR+A48zVVYZWQvgu7Opn2IGvzI9jePB/J8pzqRhg2
374
- * YAMBCAfCeAQYFggAKgUCZKQEMwkQJBFPuuhtQo4CGwwWIQTQ5fbVPB9CWIdf
375
- * XdYkEU+66G1CjgAA0xgBAK4AIahFFnmWR2Mp6A3q021cZXpGklc0Xw1Hfswc
376
- * UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
377
- * -----END PGP PUBLIC KEY BLOCK-----`;
378
- *
379
367
  * const name = 'YOUR_NAME';
380
368
  * const email = 'YOUR_EMAIL';
381
369
  * const passphrase = 'YOUR_PASSPHRASE';
382
- * const result = await EncriptionUtils.generateKeyPair(name, email, passphrase);
370
+ * const result = await EncryptionUtils.generateKeyPair(name, email, passphrase);
383
371
  * ```
384
372
  */
385
373
  static async generateKeyPair(name, email, passphrase = '') {
@@ -400,8 +388,8 @@ class EncryptionUtils {
400
388
  /**
401
389
  * This function encrypts a message using the specified public keys.
402
390
  *
403
- * @param {string} message Message to encrypt.
404
- * @param {string} publicKeys Array of public keys to use for encryption.
391
+ * @param {MessageDataType} message Message to encrypt.
392
+ * @param {string[]} publicKeys Array of public keys to use for encryption.
405
393
  * @returns {Promise<string>} Message encrypted.
406
394
  *
407
395
  * **Code example**
@@ -434,7 +422,7 @@ class EncryptionUtils {
434
422
  * -----END PGP PUBLIC KEY BLOCK-----`;
435
423
  *
436
424
  * const publicKeys = [publicKey1, publicKey2]
437
- * const result = await EncriptionUtils.encrypt('message', publicKeys);
425
+ * const result = await EncryptionUtils.encrypt('message', publicKeys);
438
426
  * ```
439
427
  */
440
428
  static async encrypt(message, publicKeys) {
@@ -470,7 +458,7 @@ class EncryptionUtils {
470
458
  * =tsmI
471
459
  * -----END PGP MESSAGE-----`;
472
460
  *
473
- * const isEncrypted = await EncriptionUtils.isEncrypted(message);
461
+ * const isEncrypted = await EncryptionUtils.isEncrypted(message);
474
462
  *
475
463
  * if (isEncrypted) {
476
464
  * console.log('The message is encrypted with OpenPGP.');
package/dist/error.d.ts CHANGED
@@ -3,15 +3,15 @@
3
3
  */
4
4
  export declare const ErrorStakingMissing: Error;
5
5
  /**
6
- * @constant {Error} - The Storage client not initialised.
6
+ * @constant {Error} - The Storage client not initialized.
7
7
  */
8
8
  export declare const ErrorStorageClientNotInitialized: Error;
9
9
  /**
10
- * @constant {Error} - The Storage does not exists.
10
+ * @constant {Error} - The Storage client does not exist.
11
11
  */
12
12
  export declare const ErrorStorageClientNotExists: Error;
13
13
  /**
14
- * @constant {Error} - The Storage credentials is missing.
14
+ * @constant {Error} - The Storage credentials are missing.
15
15
  */
16
16
  export declare const ErrorStorageCredentialsMissing: Error;
17
17
  /**
@@ -27,7 +27,7 @@ export declare const ErrorStorageFileNotFound: Error;
27
27
  */
28
28
  export declare const ErrorStorageFileNotUploaded: Error;
29
29
  /**
30
- * @constant {Error} - The KVStore key can not be empty.
30
+ * @constant {Error} - The KVStore key cannot be empty.
31
31
  */
32
32
  export declare const ErrorKVStoreEmptyKey: Error;
33
33
  /**
@@ -35,11 +35,11 @@ export declare const ErrorKVStoreEmptyKey: Error;
35
35
  */
36
36
  export declare const ErrorKVStoreArrayLength: Error;
37
37
  /**
38
- * @constant {Error} - The Address sent is invalid.
38
+ * @constant {Error} - The address provided is invalid.
39
39
  */
40
40
  export declare const ErrorInvalidAddress: Error;
41
41
  /**
42
- * @constant {Error} - The token address sent is invalid.
42
+ * @constant {Error} - The token address provided is invalid.
43
43
  */
44
44
  export declare const ErrorInvalidTokenAddress: Error;
45
45
  /**
@@ -51,11 +51,11 @@ export declare const ErrorInvalidRecordingOracleAddressProvided: Error;
51
51
  */
52
52
  export declare const ErrorInvalidReputationOracleAddressProvided: Error;
53
53
  /**
54
- * @constant {Error} - Invalid reputation oracle address provided.
54
+ * @constant {Error} - Invalid exchange oracle address provided.
55
55
  */
56
56
  export declare const ErrorInvalidExchangeOracleAddressProvided: Error;
57
57
  /**
58
- * @constant {Error} - The Staking value must be positive.
58
+ * @constant {Error} - The staking value must be positive.
59
59
  */
60
60
  export declare const ErrorStakingValueMustBePositive: Error;
61
61
  /**
@@ -77,7 +77,7 @@ export declare const ErrorInvalidStakerAddressProvided: Error;
77
77
  /**
78
78
  * @constant {Error} - Invalid hash provided.
79
79
  */
80
- export declare const ErrorInvalidHahsProvided: Error;
80
+ export declare const ErrorInvalidHashProvided: Error;
81
81
  /**
82
82
  * @constant {Error} - Cannot use both date and block filters simultaneously.
83
83
  */
@@ -94,17 +94,20 @@ export declare const ErrorStakingGetStakers: Error;
94
94
  * @constant {Error} - Failed to approve staking amount: signerOrProvider is not a Signer instance.
95
95
  */
96
96
  export declare const ErrorFailedToApproveStakingAmountSignerDoesNotExist: Error;
97
+ /**
98
+ * @constant {Error} - Failed to check allowance.
99
+ */
97
100
  export declare const ErrorFailedToCheckAllowance: Error;
98
101
  /**
99
102
  * @constant {Error} - The HMToken amount not approved.
100
103
  */
101
104
  export declare const ErrorHMTokenAmountNotApproved: Error;
102
105
  /**
103
- * @constant {Error} - Init provider does not exists.
106
+ * @constant {Error} - Provider does not exist.
104
107
  */
105
108
  export declare const ErrorProviderDoesNotExist: Error;
106
109
  /**
107
- * @constant {Error} - Init with unsupported chain ID.
110
+ * @constant {Error} - Unsupported chain ID.
108
111
  */
109
112
  export declare const ErrorUnsupportedChainID: Error;
110
113
  /**
@@ -123,10 +126,6 @@ export declare const ErrorTransferEventNotFoundInTransactionLogs: Error;
123
126
  * @constant {Error} - Manifest file does not exist.
124
127
  */
125
128
  export declare const ErrorManifestFileDoesNotExist: Error;
126
- /**
127
- * @constant {Error} - Storage client does not exist.
128
- */
129
- export declare const ErrorStorageClientDoesNotExist: Error;
130
129
  /**
131
130
  * @constant {Error} - Invalid URL string.
132
131
  */
@@ -156,7 +155,11 @@ export declare const ErrorTotalFeeMustBeLessThanHundred: Error;
156
155
  */
157
156
  export declare const ErrorRecipientCannotBeEmptyArray: Error;
158
157
  /**
159
- * @constant {Error} - Amount must be greater than zero..
158
+ * @constant {Error} - Too many recipients.
159
+ */
160
+ export declare const ErrorTooManyRecipients: Error;
161
+ /**
162
+ * @constant {Error} - Amount must be greater than zero.
160
163
  */
161
164
  export declare const ErrorAmountMustBeGreaterThanZero: Error;
162
165
  /**
@@ -179,6 +182,18 @@ export declare const ErrorLaunchedEventIsNotEmitted: Error;
179
182
  * @constant {Error} - Hash is an empty string.
180
183
  */
181
184
  export declare const ErrorHashIsEmptyString: Error;
185
+ /**
186
+ * @constant {Error} - The hash does not match.
187
+ */
188
+ export declare const ErrorInvalidHash: Error;
189
+ /**
190
+ * @constant {Error} - The status is not supported.
191
+ */
192
+ export declare const ErrorUnsupportedStatus: Error;
193
+ /**
194
+ * @constant {Warning} - The SUBGRAPH_API_KEY is not being provided.
195
+ */
196
+ export declare const WarnSubgraphApiKeyNotProvided = "\"SUBGRAPH_API_KEY\" is not being provided. It might cause issues with the subgraph.";
182
197
  export declare class EthereumError extends Error {
183
198
  constructor(message: string);
184
199
  }
@@ -203,18 +218,6 @@ export declare class ContractExecutionError extends EthereumError {
203
218
  export declare class InvalidEthereumAddressError extends Error {
204
219
  constructor(address: string);
205
220
  }
206
- /**
207
- * @constant {Error} - The Hash does not match
208
- */
209
- export declare const ErrorInvalidHash: Error;
210
- /**
211
- * @constant {Error} - The Status is not supported
212
- */
213
- export declare const ErrorUnsupportedStatus: Error;
214
- /**
215
- * @constant {Error} - The SUBGRAPH_API_KEY is not being provided
216
- */
217
- export declare const WarnSubgraphApiKeyNotProvided = "\"SUBGRAPH_API_KEY\" is not being provided. It might cause issues with the subgraph.";
218
221
  export declare class InvalidKeyError extends Error {
219
222
  constructor(key: string, address: string);
220
223
  }
@@ -1 +1 @@
1
- {"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../src/error.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA2C,CAAC;AAE5E;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,0BAA0B,OAAgC,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAA8B,CAAC;AAEpE;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAAiC,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,oBAAoB,OAAoC,CAAC;AAEtE;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAEnC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA+B,CAAC;AAEhE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,0CAA0C,OAEtD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,yCAAyC,OAErD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,+BAA+B,OAE3C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA0C,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,mDAAmD,OAE/D,CAAC;AAEF,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAAmC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,yBAAyB,OAAuC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAAoC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,WAAW,OAA+B,CAAC;AAExD;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAEzC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,eAAe,OAAkC,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,qBAAqB,OAAsC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kBAAkB,OAA+B,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAAuC,CAAC;AAE3E,qBAAa,aAAc,SAAQ,KAAK;gBAC1B,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,oBAAqB,SAAQ,aAAa;gBACzC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,mBAAoB,SAAQ,aAAa;gBACxC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,MAAM,EAAE,MAAM;CAG3B;AAED,qBAAa,2BAA4B,SAAQ,KAAK;gBACxC,OAAO,EAAE,MAAM;CAG5B;AACD;;GAEG;AACH,eAAO,MAAM,gBAAgB,OAA4B,CAAC;AAE1D;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA4C,CAAC;AAEhF;;GAEG;AACH,eAAO,MAAM,6BAA6B,yFAC4C,CAAC;AAEvF,qBAAa,eAAgB,SAAQ,KAAK;gBAC5B,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM;CAGzC"}
1
+ {"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../src/error.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA2C,CAAC;AAE5E;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,0BAA0B,OAAgC,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAA8B,CAAC;AAEpE;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAAiC,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,oBAAoB,OAAmC,CAAC;AAErE;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAEnC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA+B,CAAC;AAEhE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,0CAA0C,OAEtD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,yCAAyC,OAErD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,+BAA+B,OAE3C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA0C,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,mDAAmD,OAE/D,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAAmC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,yBAAyB,OAAuC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAAoC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,WAAW,OAA+B,CAAC;AAExD;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAEzC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,eAAe,OAAkC,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,qBAAqB,OAAsC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kBAAkB,OAA+B,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAAmC,CAAC;AAEvE;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAAuC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,gBAAgB,OAA4B,CAAC;AAE1D;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA4C,CAAC;AAEhF;;GAEG;AACH,eAAO,MAAM,6BAA6B,yFAC4C,CAAC;AAEvF,qBAAa,aAAc,SAAQ,KAAK;gBAC1B,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,oBAAqB,SAAQ,aAAa;gBACzC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,mBAAoB,SAAQ,aAAa;gBACxC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,MAAM,EAAE,MAAM;CAG3B;AAED,qBAAa,2BAA4B,SAAQ,KAAK;gBACxC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,eAAgB,SAAQ,KAAK;gBAC5B,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM;CAGzC"}