@human-protocol/sdk 3.0.8 → 4.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/constants.d.ts +1 -1
- package/dist/constants.d.ts.map +1 -1
- package/dist/constants.js +2 -2
- package/dist/decorators.js +1 -1
- package/dist/encryption.d.ts +21 -29
- package/dist/encryption.d.ts.map +1 -1
- package/dist/encryption.js +17 -29
- package/dist/error.d.ts +31 -28
- package/dist/error.d.ts.map +1 -1
- package/dist/error.js +36 -33
- package/dist/escrow.d.ts +102 -59
- package/dist/escrow.d.ts.map +1 -1
- package/dist/escrow.js +186 -98
- package/dist/graphql/queries/operator.d.ts.map +1 -1
- package/dist/graphql/queries/operator.js +13 -5
- package/dist/interfaces.d.ts +10 -2
- package/dist/interfaces.d.ts.map +1 -1
- package/dist/kvstore.d.ts +15 -15
- package/dist/kvstore.d.ts.map +1 -1
- package/dist/kvstore.js +15 -15
- package/dist/operator.d.ts +11 -10
- package/dist/operator.d.ts.map +1 -1
- package/dist/operator.js +23 -11
- package/dist/staking.d.ts +38 -21
- package/dist/staking.d.ts.map +1 -1
- package/dist/staking.js +62 -21
- package/dist/statistics.d.ts +10 -29
- package/dist/statistics.d.ts.map +1 -1
- package/dist/statistics.js +10 -29
- package/dist/storage.d.ts +13 -18
- package/dist/storage.d.ts.map +1 -1
- package/dist/storage.js +13 -18
- package/dist/transaction.js +1 -1
- package/dist/types.d.ts +6 -2
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js +1 -1
- package/dist/utils.d.ts +0 -1
- package/dist/utils.d.ts.map +1 -1
- package/dist/utils.js +0 -1
- package/package.json +1 -1
- package/src/constants.ts +2 -2
- package/src/decorators.ts +1 -1
- package/src/encryption.ts +21 -29
- package/src/error.ts +39 -37
- package/src/escrow.ts +245 -117
- package/src/graphql/queries/operator.ts +13 -5
- package/src/interfaces.ts +11 -2
- package/src/kvstore.ts +16 -16
- package/src/operator.ts +26 -12
- package/src/staking.ts +71 -22
- package/src/statistics.ts +10 -29
- package/src/storage.ts +13 -18
- package/src/transaction.ts +2 -2
- package/src/types.ts +6 -2
- package/src/utils.ts +0 -1
package/dist/constants.d.ts
CHANGED
|
@@ -5,7 +5,6 @@ export declare const DEFAULT_ENDPOINT = "localhost";
|
|
|
5
5
|
export declare const DEFAULT_REGION = "eu";
|
|
6
6
|
export declare const DEFAULT_PORT = 9000;
|
|
7
7
|
export declare const DEFAULT_USE_SSL = false;
|
|
8
|
-
export declare const DEFAULT_TX_ID = 1;
|
|
9
8
|
export declare enum HttpStatus {
|
|
10
9
|
OK = 200,
|
|
11
10
|
CREATED = 201,
|
|
@@ -37,4 +36,5 @@ export declare const Role: {
|
|
|
37
36
|
RecordingOracle: string;
|
|
38
37
|
};
|
|
39
38
|
export declare const SUBGRAPH_API_KEY_PLACEHOLDER = "[SUBGRAPH_API_KEY]";
|
|
39
|
+
export declare const ESCROW_BULK_PAYOUT_MAX_ITEMS = 99;
|
|
40
40
|
//# sourceMappingURL=constants.d.ts.map
|
package/dist/constants.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC;AAClC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAEtC,eAAO,MAAM,qBAAqB,0BAA0B,CAAC;AAE7D,eAAO,MAAM,gBAAgB,cAAc,CAAC;AAE5C,eAAO,MAAM,cAAc,OAAO,CAAC;AAEnC,eAAO,MAAM,YAAY,OAAO,CAAC;AAEjC,eAAO,MAAM,eAAe,QAAQ,CAAC;AAErC,
|
|
1
|
+
{"version":3,"file":"constants.d.ts","sourceRoot":"","sources":["../src/constants.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,OAAO,EAAE,MAAM,SAAS,CAAC;AAClC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAEtC,eAAO,MAAM,qBAAqB,0BAA0B,CAAC;AAE7D,eAAO,MAAM,gBAAgB,cAAc,CAAC;AAE5C,eAAO,MAAM,cAAc,OAAO,CAAC;AAEnC,eAAO,MAAM,YAAY,OAAO,CAAC;AAEjC,eAAO,MAAM,eAAe,QAAQ,CAAC;AAErC,oBAAY,UAAU;IACpB,EAAE,MAAM;IACR,OAAO,MAAM;IACb,WAAW,MAAM;IACjB,YAAY,MAAM;IAClB,gBAAgB,MAAM;IACtB,SAAS,MAAM;IACf,SAAS,MAAM;IACf,qBAAqB,MAAM;CAC5B;AAED,eAAO,MAAM,QAAQ,EAAE;KACpB,OAAO,IAAI,OAAO,CAAC,CAAC,EAAE,WAAW;CAiRnC,CAAC;AAEF,eAAO,MAAM,WAAW;;;;;;;;;;CAUvB,CAAC;AAEF,eAAO,MAAM,IAAI;;;;;CAKhB,CAAC;AAEF,eAAO,MAAM,4BAA4B,uBAAuB,CAAC;AAEjE,eAAO,MAAM,4BAA4B,KAAK,CAAC"}
|
package/dist/constants.js
CHANGED
|
@@ -1,13 +1,12 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.SUBGRAPH_API_KEY_PLACEHOLDER = exports.Role = exports.KVStoreKeys = exports.NETWORKS = exports.HttpStatus = exports.
|
|
3
|
+
exports.ESCROW_BULK_PAYOUT_MAX_ITEMS = exports.SUBGRAPH_API_KEY_PLACEHOLDER = exports.Role = exports.KVStoreKeys = exports.NETWORKS = exports.HttpStatus = exports.DEFAULT_USE_SSL = exports.DEFAULT_PORT = exports.DEFAULT_REGION = exports.DEFAULT_ENDPOINT = exports.DEFAULT_PUBLIC_BUCKET = void 0;
|
|
4
4
|
const enums_1 = require("./enums");
|
|
5
5
|
exports.DEFAULT_PUBLIC_BUCKET = 'escrow-public-results';
|
|
6
6
|
exports.DEFAULT_ENDPOINT = 'localhost';
|
|
7
7
|
exports.DEFAULT_REGION = 'eu';
|
|
8
8
|
exports.DEFAULT_PORT = 9000;
|
|
9
9
|
exports.DEFAULT_USE_SSL = false;
|
|
10
|
-
exports.DEFAULT_TX_ID = 1;
|
|
11
10
|
var HttpStatus;
|
|
12
11
|
(function (HttpStatus) {
|
|
13
12
|
HttpStatus[HttpStatus["OK"] = 200] = "OK";
|
|
@@ -273,3 +272,4 @@ exports.Role = {
|
|
|
273
272
|
RecordingOracle: 'Recording Oracle',
|
|
274
273
|
};
|
|
275
274
|
exports.SUBGRAPH_API_KEY_PLACEHOLDER = '[SUBGRAPH_API_KEY]';
|
|
275
|
+
exports.ESCROW_BULK_PAYOUT_MAX_ITEMS = 99;
|
package/dist/decorators.js
CHANGED
package/dist/encryption.d.ts
CHANGED
|
@@ -1,5 +1,9 @@
|
|
|
1
1
|
import * as openpgp from 'openpgp';
|
|
2
2
|
import { IKeyPair } from './interfaces';
|
|
3
|
+
/**
|
|
4
|
+
* Type representing the data type of a message.
|
|
5
|
+
* It can be either a string or a Uint8Array.
|
|
6
|
+
*/
|
|
3
7
|
type MessageDataType = string | Uint8Array;
|
|
4
8
|
/**
|
|
5
9
|
* ## Introduction
|
|
@@ -38,7 +42,7 @@ type MessageDataType = string | Uint8Array;
|
|
|
38
42
|
*
|
|
39
43
|
* const privateKey = 'Armored_priv_key';
|
|
40
44
|
* const passphrase = 'example_passphrase';
|
|
41
|
-
* const
|
|
45
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
42
46
|
* ```
|
|
43
47
|
*/
|
|
44
48
|
export declare class Encryption {
|
|
@@ -60,7 +64,7 @@ export declare class Encryption {
|
|
|
60
64
|
/**
|
|
61
65
|
* This function signs and encrypts a message using the private key used to initialize the client and the specified public keys.
|
|
62
66
|
*
|
|
63
|
-
* @param {
|
|
67
|
+
* @param {MessageDataType} message Message to sign and encrypt.
|
|
64
68
|
* @param {string[]} publicKeys Array of public keys to use for encryption.
|
|
65
69
|
* @returns {Promise<string>} Message signed and encrypted.
|
|
66
70
|
*
|
|
@@ -72,7 +76,7 @@ export declare class Encryption {
|
|
|
72
76
|
*
|
|
73
77
|
* const privateKey = 'Armored_priv_key';
|
|
74
78
|
* const passphrase = 'example_passphrase';
|
|
75
|
-
* const
|
|
79
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
76
80
|
* const publicKey1 = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
77
81
|
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
78
82
|
* WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
|
|
@@ -98,7 +102,7 @@ export declare class Encryption {
|
|
|
98
102
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
99
103
|
*
|
|
100
104
|
* const publicKeys = [publicKey1, publicKey2];
|
|
101
|
-
* const resultMessage = await
|
|
105
|
+
* const resultMessage = await encryption.signAndEncrypt('message', publicKeys);
|
|
102
106
|
* ```
|
|
103
107
|
*/
|
|
104
108
|
signAndEncrypt(message: MessageDataType, publicKeys: string[]): Promise<string>;
|
|
@@ -107,7 +111,7 @@ export declare class Encryption {
|
|
|
107
111
|
*
|
|
108
112
|
* @param {string} message Message to decrypt.
|
|
109
113
|
* @param {string} publicKey Public key used to verify signature if needed. This is optional.
|
|
110
|
-
* @returns {Promise<
|
|
114
|
+
* @returns {Promise<Uint8Array>} Message decrypted.
|
|
111
115
|
*
|
|
112
116
|
* **Code example**
|
|
113
117
|
*
|
|
@@ -116,7 +120,7 @@ export declare class Encryption {
|
|
|
116
120
|
*
|
|
117
121
|
* const privateKey = 'Armored_priv_key';
|
|
118
122
|
* const passphrase = 'example_passphrase';
|
|
119
|
-
* const
|
|
123
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
120
124
|
*
|
|
121
125
|
* const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
122
126
|
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
@@ -130,7 +134,7 @@ export declare class Encryption {
|
|
|
130
134
|
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
131
135
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
132
136
|
*
|
|
133
|
-
* const resultMessage = await
|
|
137
|
+
* const resultMessage = await encryption.decrypt('message');
|
|
134
138
|
* ```
|
|
135
139
|
*/
|
|
136
140
|
decrypt(message: string, publicKey?: string): Promise<Uint8Array>;
|
|
@@ -147,9 +151,9 @@ export declare class Encryption {
|
|
|
147
151
|
*
|
|
148
152
|
* const privateKey = 'Armored_priv_key';
|
|
149
153
|
* const passphrase = 'example_passphrase';
|
|
150
|
-
* const
|
|
154
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
151
155
|
*
|
|
152
|
-
* const resultMessage = await
|
|
156
|
+
* const resultMessage = await encryption.sign('message');
|
|
153
157
|
* ```
|
|
154
158
|
*/
|
|
155
159
|
sign(message: string): Promise<string>;
|
|
@@ -184,7 +188,7 @@ export declare class EncryptionUtils {
|
|
|
184
188
|
* This function verifies the signature of a signed message using the public key.
|
|
185
189
|
*
|
|
186
190
|
* @param {string} message Message to verify.
|
|
187
|
-
* @param {string} publicKey Public key to verify that the message was
|
|
191
|
+
* @param {string} publicKey Public key to verify that the message was signed by a specific source.
|
|
188
192
|
* @returns {Promise<boolean>} True if verified. False if not verified.
|
|
189
193
|
*
|
|
190
194
|
* **Code example**
|
|
@@ -204,7 +208,7 @@ export declare class EncryptionUtils {
|
|
|
204
208
|
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
205
209
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
206
210
|
*
|
|
207
|
-
* const result = await
|
|
211
|
+
* const result = await EncryptionUtils.verify('message', publicKey);
|
|
208
212
|
* ```
|
|
209
213
|
*/
|
|
210
214
|
static verify(message: string, publicKey: string): Promise<boolean>;
|
|
@@ -219,7 +223,7 @@ export declare class EncryptionUtils {
|
|
|
219
223
|
* ```ts
|
|
220
224
|
* import { EncryptionUtils } from '@human-protocol/sdk';
|
|
221
225
|
*
|
|
222
|
-
* const signedData = await
|
|
226
|
+
* const signedData = await EncryptionUtils.getSignedData('message');
|
|
223
227
|
* ```
|
|
224
228
|
*/
|
|
225
229
|
static getSignedData(message: string): Promise<string>;
|
|
@@ -236,30 +240,18 @@ export declare class EncryptionUtils {
|
|
|
236
240
|
* ```ts
|
|
237
241
|
* import { EncryptionUtils } from '@human-protocol/sdk';
|
|
238
242
|
*
|
|
239
|
-
* const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
240
|
-
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
241
|
-
* WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
|
|
242
|
-
* CwkHCAkQJBFPuuhtQo4DFQgKBBYAAgECGQECGwMCHgEWIQTQ5fbVPB9CWIdf
|
|
243
|
-
* XdYkEU+66G1CjgAAKYYA/jMyDCtJtqu6hj22kq9SW6fuV1FCT2ySJ9vBhumF
|
|
244
|
-
* X8wWAP433zVFl4VECOkgGk8qFr8BgkYxaz16GOFAqYbfO6oMBc44BGSkBDMS
|
|
245
|
-
* CisGAQQBl1UBBQEBB0AKR+A48zVVYZWQvgu7Opn2IGvzI9jePB/J8pzqRhg2
|
|
246
|
-
* YAMBCAfCeAQYFggAKgUCZKQEMwkQJBFPuuhtQo4CGwwWIQTQ5fbVPB9CWIdf
|
|
247
|
-
* XdYkEU+66G1CjgAA0xgBAK4AIahFFnmWR2Mp6A3q021cZXpGklc0Xw1Hfswc
|
|
248
|
-
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
249
|
-
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
250
|
-
*
|
|
251
243
|
* const name = 'YOUR_NAME';
|
|
252
244
|
* const email = 'YOUR_EMAIL';
|
|
253
245
|
* const passphrase = 'YOUR_PASSPHRASE';
|
|
254
|
-
* const result = await
|
|
246
|
+
* const result = await EncryptionUtils.generateKeyPair(name, email, passphrase);
|
|
255
247
|
* ```
|
|
256
248
|
*/
|
|
257
249
|
static generateKeyPair(name: string, email: string, passphrase?: string): Promise<IKeyPair>;
|
|
258
250
|
/**
|
|
259
251
|
* This function encrypts a message using the specified public keys.
|
|
260
252
|
*
|
|
261
|
-
* @param {
|
|
262
|
-
* @param {string} publicKeys Array of public keys to use for encryption.
|
|
253
|
+
* @param {MessageDataType} message Message to encrypt.
|
|
254
|
+
* @param {string[]} publicKeys Array of public keys to use for encryption.
|
|
263
255
|
* @returns {Promise<string>} Message encrypted.
|
|
264
256
|
*
|
|
265
257
|
* **Code example**
|
|
@@ -292,7 +284,7 @@ export declare class EncryptionUtils {
|
|
|
292
284
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
293
285
|
*
|
|
294
286
|
* const publicKeys = [publicKey1, publicKey2]
|
|
295
|
-
* const result = await
|
|
287
|
+
* const result = await EncryptionUtils.encrypt('message', publicKeys);
|
|
296
288
|
* ```
|
|
297
289
|
*/
|
|
298
290
|
static encrypt(message: MessageDataType, publicKeys: string[]): Promise<string>;
|
|
@@ -317,7 +309,7 @@ export declare class EncryptionUtils {
|
|
|
317
309
|
* =tsmI
|
|
318
310
|
* -----END PGP MESSAGE-----`;
|
|
319
311
|
*
|
|
320
|
-
* const isEncrypted = await
|
|
312
|
+
* const isEncrypted = await EncryptionUtils.isEncrypted(message);
|
|
321
313
|
*
|
|
322
314
|
* if (isEncrypted) {
|
|
323
315
|
* console.log('The message is encrypted with OpenPGP.');
|
package/dist/encryption.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"encryption.d.ts","sourceRoot":"","sources":["../src/encryption.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,SAAS,CAAC;AACnC,OAAO,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAExC,KAAK,eAAe,GAAG,MAAM,GAAG,UAAU,CAAC;AAU3C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,UAAU,CAAqB;IAEvC;;;;OAIG;gBACS,UAAU,EAAE,OAAO,CAAC,UAAU;IAI1C;;;;;;OAMG;WACiB,KAAK,CACvB,iBAAiB,EAAE,MAAM,EACzB,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,UAAU,CAAC;IAkBtB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA2CG;IACU,cAAc,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAkBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACU,OAAO,CAClB,OAAO,EAAE,MAAM,EACf,SAAS,CAAC,EAAE,MAAM,GACjB,OAAO,CAAC,UAAU,CAAC;IAoCtB;;;;;;;;;;;;;;;;;OAiBG;IACU,IAAI,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;CAYpD;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;WACiB,MAAM,CACxB,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,OAAO,CAAC;IAgBnB;;;;;;;;;;;;;OAaG;WACiB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAYnE
|
|
1
|
+
{"version":3,"file":"encryption.d.ts","sourceRoot":"","sources":["../src/encryption.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,SAAS,CAAC;AACnC,OAAO,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAExC;;;GAGG;AACH,KAAK,eAAe,GAAG,MAAM,GAAG,UAAU,CAAC;AAU3C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,qBAAa,UAAU;IACrB,OAAO,CAAC,UAAU,CAAqB;IAEvC;;;;OAIG;gBACS,UAAU,EAAE,OAAO,CAAC,UAAU;IAI1C;;;;;;OAMG;WACiB,KAAK,CACvB,iBAAiB,EAAE,MAAM,EACzB,UAAU,CAAC,EAAE,MAAM,GAClB,OAAO,CAAC,UAAU,CAAC;IAkBtB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA2CG;IACU,cAAc,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAkBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA8BG;IACU,OAAO,CAClB,OAAO,EAAE,MAAM,EACf,SAAS,CAAC,EAAE,MAAM,GACjB,OAAO,CAAC,UAAU,CAAC;IAoCtB;;;;;;;;;;;;;;;;;OAiBG;IACU,IAAI,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;CAYpD;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,qBAAa,eAAe;IAC1B;;;;;;;;;;;;;;;;;;;;;;;;;;OA0BG;WACiB,MAAM,CACxB,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,MAAM,GAChB,OAAO,CAAC,OAAO,CAAC;IAgBnB;;;;;;;;;;;;;OAaG;WACiB,aAAa,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,CAAC;IAYnE;;;;;;;;;;;;;;;;;;OAkBG;WACiB,eAAe,CACjC,IAAI,EAAE,MAAM,EACZ,KAAK,EAAE,MAAM,EACb,UAAU,SAAK,GACd,OAAO,CAAC,QAAQ,CAAC;IAkBpB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OAuCG;WACiB,OAAO,CACzB,OAAO,EAAE,eAAe,EACxB,UAAU,EAAE,MAAM,EAAE,GACnB,OAAO,CAAC,MAAM,CAAC;IAiBlB;;;;;;;;;;;;;;;;;;;;;;;;;;;;;OA6BG;WACW,WAAW,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO;CASpD"}
|
package/dist/encryption.js
CHANGED
|
@@ -78,7 +78,7 @@ function makeMessageDataBinary(message) {
|
|
|
78
78
|
*
|
|
79
79
|
* const privateKey = 'Armored_priv_key';
|
|
80
80
|
* const passphrase = 'example_passphrase';
|
|
81
|
-
* const
|
|
81
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
82
82
|
* ```
|
|
83
83
|
*/
|
|
84
84
|
class Encryption {
|
|
@@ -113,7 +113,7 @@ class Encryption {
|
|
|
113
113
|
/**
|
|
114
114
|
* This function signs and encrypts a message using the private key used to initialize the client and the specified public keys.
|
|
115
115
|
*
|
|
116
|
-
* @param {
|
|
116
|
+
* @param {MessageDataType} message Message to sign and encrypt.
|
|
117
117
|
* @param {string[]} publicKeys Array of public keys to use for encryption.
|
|
118
118
|
* @returns {Promise<string>} Message signed and encrypted.
|
|
119
119
|
*
|
|
@@ -125,7 +125,7 @@ class Encryption {
|
|
|
125
125
|
*
|
|
126
126
|
* const privateKey = 'Armored_priv_key';
|
|
127
127
|
* const passphrase = 'example_passphrase';
|
|
128
|
-
* const
|
|
128
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
129
129
|
* const publicKey1 = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
130
130
|
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
131
131
|
* WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
|
|
@@ -151,7 +151,7 @@ class Encryption {
|
|
|
151
151
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
152
152
|
*
|
|
153
153
|
* const publicKeys = [publicKey1, publicKey2];
|
|
154
|
-
* const resultMessage = await
|
|
154
|
+
* const resultMessage = await encryption.signAndEncrypt('message', publicKeys);
|
|
155
155
|
* ```
|
|
156
156
|
*/
|
|
157
157
|
async signAndEncrypt(message, publicKeys) {
|
|
@@ -172,7 +172,7 @@ class Encryption {
|
|
|
172
172
|
*
|
|
173
173
|
* @param {string} message Message to decrypt.
|
|
174
174
|
* @param {string} publicKey Public key used to verify signature if needed. This is optional.
|
|
175
|
-
* @returns {Promise<
|
|
175
|
+
* @returns {Promise<Uint8Array>} Message decrypted.
|
|
176
176
|
*
|
|
177
177
|
* **Code example**
|
|
178
178
|
*
|
|
@@ -181,7 +181,7 @@ class Encryption {
|
|
|
181
181
|
*
|
|
182
182
|
* const privateKey = 'Armored_priv_key';
|
|
183
183
|
* const passphrase = 'example_passphrase';
|
|
184
|
-
* const
|
|
184
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
185
185
|
*
|
|
186
186
|
* const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
187
187
|
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
@@ -195,7 +195,7 @@ class Encryption {
|
|
|
195
195
|
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
196
196
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
197
197
|
*
|
|
198
|
-
* const resultMessage = await
|
|
198
|
+
* const resultMessage = await encryption.decrypt('message');
|
|
199
199
|
* ```
|
|
200
200
|
*/
|
|
201
201
|
async decrypt(message, publicKey) {
|
|
@@ -241,9 +241,9 @@ class Encryption {
|
|
|
241
241
|
*
|
|
242
242
|
* const privateKey = 'Armored_priv_key';
|
|
243
243
|
* const passphrase = 'example_passphrase';
|
|
244
|
-
* const
|
|
244
|
+
* const encryption = await Encryption.build(privateKey, passphrase);
|
|
245
245
|
*
|
|
246
|
-
* const resultMessage = await
|
|
246
|
+
* const resultMessage = await encryption.sign('message');
|
|
247
247
|
* ```
|
|
248
248
|
*/
|
|
249
249
|
async sign(message) {
|
|
@@ -289,7 +289,7 @@ class EncryptionUtils {
|
|
|
289
289
|
* This function verifies the signature of a signed message using the public key.
|
|
290
290
|
*
|
|
291
291
|
* @param {string} message Message to verify.
|
|
292
|
-
* @param {string} publicKey Public key to verify that the message was
|
|
292
|
+
* @param {string} publicKey Public key to verify that the message was signed by a specific source.
|
|
293
293
|
* @returns {Promise<boolean>} True if verified. False if not verified.
|
|
294
294
|
*
|
|
295
295
|
* **Code example**
|
|
@@ -309,7 +309,7 @@ class EncryptionUtils {
|
|
|
309
309
|
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
310
310
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
311
311
|
*
|
|
312
|
-
* const result = await
|
|
312
|
+
* const result = await EncryptionUtils.verify('message', publicKey);
|
|
313
313
|
* ```
|
|
314
314
|
*/
|
|
315
315
|
static async verify(message, publicKey) {
|
|
@@ -337,7 +337,7 @@ class EncryptionUtils {
|
|
|
337
337
|
* ```ts
|
|
338
338
|
* import { EncryptionUtils } from '@human-protocol/sdk';
|
|
339
339
|
*
|
|
340
|
-
* const signedData = await
|
|
340
|
+
* const signedData = await EncryptionUtils.getSignedData('message');
|
|
341
341
|
* ```
|
|
342
342
|
*/
|
|
343
343
|
static async getSignedData(message) {
|
|
@@ -364,22 +364,10 @@ class EncryptionUtils {
|
|
|
364
364
|
* ```ts
|
|
365
365
|
* import { EncryptionUtils } from '@human-protocol/sdk';
|
|
366
366
|
*
|
|
367
|
-
* const publicKey = `-----BEGIN PGP PUBLIC KEY BLOCK-----
|
|
368
|
-
* xjMEZKQEMxYJKwYBBAHaRw8BAQdA5oZTq4UPlS0IXn4kEaSqQdAa9+Cq522v
|
|
369
|
-
* WYxJQn3vo1/NFEh1bWFuIDxodW1hbkBobXQuYWk+wowEEBYKAD4FAmSkBDME
|
|
370
|
-
* CwkHCAkQJBFPuuhtQo4DFQgKBBYAAgECGQECGwMCHgEWIQTQ5fbVPB9CWIdf
|
|
371
|
-
* XdYkEU+66G1CjgAAKYYA/jMyDCtJtqu6hj22kq9SW6fuV1FCT2ySJ9vBhumF
|
|
372
|
-
* X8wWAP433zVFl4VECOkgGk8qFr8BgkYxaz16GOFAqYbfO6oMBc44BGSkBDMS
|
|
373
|
-
* CisGAQQBl1UBBQEBB0AKR+A48zVVYZWQvgu7Opn2IGvzI9jePB/J8pzqRhg2
|
|
374
|
-
* YAMBCAfCeAQYFggAKgUCZKQEMwkQJBFPuuhtQo4CGwwWIQTQ5fbVPB9CWIdf
|
|
375
|
-
* XdYkEU+66G1CjgAA0xgBAK4AIahFFnmWR2Mp6A3q021cZXpGklc0Xw1Hfswc
|
|
376
|
-
* UYLqAQDfdym4kiUvKO1+REKASt0Gwykndl7hra9txqlUL5DXBQ===Vwgv
|
|
377
|
-
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
378
|
-
*
|
|
379
367
|
* const name = 'YOUR_NAME';
|
|
380
368
|
* const email = 'YOUR_EMAIL';
|
|
381
369
|
* const passphrase = 'YOUR_PASSPHRASE';
|
|
382
|
-
* const result = await
|
|
370
|
+
* const result = await EncryptionUtils.generateKeyPair(name, email, passphrase);
|
|
383
371
|
* ```
|
|
384
372
|
*/
|
|
385
373
|
static async generateKeyPair(name, email, passphrase = '') {
|
|
@@ -400,8 +388,8 @@ class EncryptionUtils {
|
|
|
400
388
|
/**
|
|
401
389
|
* This function encrypts a message using the specified public keys.
|
|
402
390
|
*
|
|
403
|
-
* @param {
|
|
404
|
-
* @param {string} publicKeys Array of public keys to use for encryption.
|
|
391
|
+
* @param {MessageDataType} message Message to encrypt.
|
|
392
|
+
* @param {string[]} publicKeys Array of public keys to use for encryption.
|
|
405
393
|
* @returns {Promise<string>} Message encrypted.
|
|
406
394
|
*
|
|
407
395
|
* **Code example**
|
|
@@ -434,7 +422,7 @@ class EncryptionUtils {
|
|
|
434
422
|
* -----END PGP PUBLIC KEY BLOCK-----`;
|
|
435
423
|
*
|
|
436
424
|
* const publicKeys = [publicKey1, publicKey2]
|
|
437
|
-
* const result = await
|
|
425
|
+
* const result = await EncryptionUtils.encrypt('message', publicKeys);
|
|
438
426
|
* ```
|
|
439
427
|
*/
|
|
440
428
|
static async encrypt(message, publicKeys) {
|
|
@@ -470,7 +458,7 @@ class EncryptionUtils {
|
|
|
470
458
|
* =tsmI
|
|
471
459
|
* -----END PGP MESSAGE-----`;
|
|
472
460
|
*
|
|
473
|
-
* const isEncrypted = await
|
|
461
|
+
* const isEncrypted = await EncryptionUtils.isEncrypted(message);
|
|
474
462
|
*
|
|
475
463
|
* if (isEncrypted) {
|
|
476
464
|
* console.log('The message is encrypted with OpenPGP.');
|
package/dist/error.d.ts
CHANGED
|
@@ -3,15 +3,15 @@
|
|
|
3
3
|
*/
|
|
4
4
|
export declare const ErrorStakingMissing: Error;
|
|
5
5
|
/**
|
|
6
|
-
* @constant {Error} - The Storage client not
|
|
6
|
+
* @constant {Error} - The Storage client not initialized.
|
|
7
7
|
*/
|
|
8
8
|
export declare const ErrorStorageClientNotInitialized: Error;
|
|
9
9
|
/**
|
|
10
|
-
* @constant {Error} - The Storage does not
|
|
10
|
+
* @constant {Error} - The Storage client does not exist.
|
|
11
11
|
*/
|
|
12
12
|
export declare const ErrorStorageClientNotExists: Error;
|
|
13
13
|
/**
|
|
14
|
-
* @constant {Error} - The Storage credentials
|
|
14
|
+
* @constant {Error} - The Storage credentials are missing.
|
|
15
15
|
*/
|
|
16
16
|
export declare const ErrorStorageCredentialsMissing: Error;
|
|
17
17
|
/**
|
|
@@ -27,7 +27,7 @@ export declare const ErrorStorageFileNotFound: Error;
|
|
|
27
27
|
*/
|
|
28
28
|
export declare const ErrorStorageFileNotUploaded: Error;
|
|
29
29
|
/**
|
|
30
|
-
* @constant {Error} - The KVStore key
|
|
30
|
+
* @constant {Error} - The KVStore key cannot be empty.
|
|
31
31
|
*/
|
|
32
32
|
export declare const ErrorKVStoreEmptyKey: Error;
|
|
33
33
|
/**
|
|
@@ -35,11 +35,11 @@ export declare const ErrorKVStoreEmptyKey: Error;
|
|
|
35
35
|
*/
|
|
36
36
|
export declare const ErrorKVStoreArrayLength: Error;
|
|
37
37
|
/**
|
|
38
|
-
* @constant {Error} - The
|
|
38
|
+
* @constant {Error} - The address provided is invalid.
|
|
39
39
|
*/
|
|
40
40
|
export declare const ErrorInvalidAddress: Error;
|
|
41
41
|
/**
|
|
42
|
-
* @constant {Error} - The token address
|
|
42
|
+
* @constant {Error} - The token address provided is invalid.
|
|
43
43
|
*/
|
|
44
44
|
export declare const ErrorInvalidTokenAddress: Error;
|
|
45
45
|
/**
|
|
@@ -51,11 +51,11 @@ export declare const ErrorInvalidRecordingOracleAddressProvided: Error;
|
|
|
51
51
|
*/
|
|
52
52
|
export declare const ErrorInvalidReputationOracleAddressProvided: Error;
|
|
53
53
|
/**
|
|
54
|
-
* @constant {Error} - Invalid
|
|
54
|
+
* @constant {Error} - Invalid exchange oracle address provided.
|
|
55
55
|
*/
|
|
56
56
|
export declare const ErrorInvalidExchangeOracleAddressProvided: Error;
|
|
57
57
|
/**
|
|
58
|
-
* @constant {Error} - The
|
|
58
|
+
* @constant {Error} - The staking value must be positive.
|
|
59
59
|
*/
|
|
60
60
|
export declare const ErrorStakingValueMustBePositive: Error;
|
|
61
61
|
/**
|
|
@@ -77,7 +77,7 @@ export declare const ErrorInvalidStakerAddressProvided: Error;
|
|
|
77
77
|
/**
|
|
78
78
|
* @constant {Error} - Invalid hash provided.
|
|
79
79
|
*/
|
|
80
|
-
export declare const
|
|
80
|
+
export declare const ErrorInvalidHashProvided: Error;
|
|
81
81
|
/**
|
|
82
82
|
* @constant {Error} - Cannot use both date and block filters simultaneously.
|
|
83
83
|
*/
|
|
@@ -94,17 +94,20 @@ export declare const ErrorStakingGetStakers: Error;
|
|
|
94
94
|
* @constant {Error} - Failed to approve staking amount: signerOrProvider is not a Signer instance.
|
|
95
95
|
*/
|
|
96
96
|
export declare const ErrorFailedToApproveStakingAmountSignerDoesNotExist: Error;
|
|
97
|
+
/**
|
|
98
|
+
* @constant {Error} - Failed to check allowance.
|
|
99
|
+
*/
|
|
97
100
|
export declare const ErrorFailedToCheckAllowance: Error;
|
|
98
101
|
/**
|
|
99
102
|
* @constant {Error} - The HMToken amount not approved.
|
|
100
103
|
*/
|
|
101
104
|
export declare const ErrorHMTokenAmountNotApproved: Error;
|
|
102
105
|
/**
|
|
103
|
-
* @constant {Error} -
|
|
106
|
+
* @constant {Error} - Provider does not exist.
|
|
104
107
|
*/
|
|
105
108
|
export declare const ErrorProviderDoesNotExist: Error;
|
|
106
109
|
/**
|
|
107
|
-
* @constant {Error} -
|
|
110
|
+
* @constant {Error} - Unsupported chain ID.
|
|
108
111
|
*/
|
|
109
112
|
export declare const ErrorUnsupportedChainID: Error;
|
|
110
113
|
/**
|
|
@@ -123,10 +126,6 @@ export declare const ErrorTransferEventNotFoundInTransactionLogs: Error;
|
|
|
123
126
|
* @constant {Error} - Manifest file does not exist.
|
|
124
127
|
*/
|
|
125
128
|
export declare const ErrorManifestFileDoesNotExist: Error;
|
|
126
|
-
/**
|
|
127
|
-
* @constant {Error} - Storage client does not exist.
|
|
128
|
-
*/
|
|
129
|
-
export declare const ErrorStorageClientDoesNotExist: Error;
|
|
130
129
|
/**
|
|
131
130
|
* @constant {Error} - Invalid URL string.
|
|
132
131
|
*/
|
|
@@ -156,7 +155,11 @@ export declare const ErrorTotalFeeMustBeLessThanHundred: Error;
|
|
|
156
155
|
*/
|
|
157
156
|
export declare const ErrorRecipientCannotBeEmptyArray: Error;
|
|
158
157
|
/**
|
|
159
|
-
* @constant {Error} -
|
|
158
|
+
* @constant {Error} - Too many recipients.
|
|
159
|
+
*/
|
|
160
|
+
export declare const ErrorTooManyRecipients: Error;
|
|
161
|
+
/**
|
|
162
|
+
* @constant {Error} - Amount must be greater than zero.
|
|
160
163
|
*/
|
|
161
164
|
export declare const ErrorAmountMustBeGreaterThanZero: Error;
|
|
162
165
|
/**
|
|
@@ -179,6 +182,18 @@ export declare const ErrorLaunchedEventIsNotEmitted: Error;
|
|
|
179
182
|
* @constant {Error} - Hash is an empty string.
|
|
180
183
|
*/
|
|
181
184
|
export declare const ErrorHashIsEmptyString: Error;
|
|
185
|
+
/**
|
|
186
|
+
* @constant {Error} - The hash does not match.
|
|
187
|
+
*/
|
|
188
|
+
export declare const ErrorInvalidHash: Error;
|
|
189
|
+
/**
|
|
190
|
+
* @constant {Error} - The status is not supported.
|
|
191
|
+
*/
|
|
192
|
+
export declare const ErrorUnsupportedStatus: Error;
|
|
193
|
+
/**
|
|
194
|
+
* @constant {Warning} - The SUBGRAPH_API_KEY is not being provided.
|
|
195
|
+
*/
|
|
196
|
+
export declare const WarnSubgraphApiKeyNotProvided = "\"SUBGRAPH_API_KEY\" is not being provided. It might cause issues with the subgraph.";
|
|
182
197
|
export declare class EthereumError extends Error {
|
|
183
198
|
constructor(message: string);
|
|
184
199
|
}
|
|
@@ -203,18 +218,6 @@ export declare class ContractExecutionError extends EthereumError {
|
|
|
203
218
|
export declare class InvalidEthereumAddressError extends Error {
|
|
204
219
|
constructor(address: string);
|
|
205
220
|
}
|
|
206
|
-
/**
|
|
207
|
-
* @constant {Error} - The Hash does not match
|
|
208
|
-
*/
|
|
209
|
-
export declare const ErrorInvalidHash: Error;
|
|
210
|
-
/**
|
|
211
|
-
* @constant {Error} - The Status is not supported
|
|
212
|
-
*/
|
|
213
|
-
export declare const ErrorUnsupportedStatus: Error;
|
|
214
|
-
/**
|
|
215
|
-
* @constant {Error} - The SUBGRAPH_API_KEY is not being provided
|
|
216
|
-
*/
|
|
217
|
-
export declare const WarnSubgraphApiKeyNotProvided = "\"SUBGRAPH_API_KEY\" is not being provided. It might cause issues with the subgraph.";
|
|
218
221
|
export declare class InvalidKeyError extends Error {
|
|
219
222
|
constructor(key: string, address: string);
|
|
220
223
|
}
|
package/dist/error.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../src/error.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA2C,CAAC;AAE5E;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,0BAA0B,OAAgC,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAA8B,CAAC;AAEpE;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAAiC,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,oBAAoB,
|
|
1
|
+
{"version":3,"file":"error.d.ts","sourceRoot":"","sources":["../src/error.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA2C,CAAC;AAE5E;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,0BAA0B,OAAgC,CAAC;AAExE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAA8B,CAAC;AAEpE;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAAiC,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,oBAAoB,OAAmC,CAAC;AAErE;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAEnC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mBAAmB,OAA+B,CAAC;AAEhE;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,0CAA0C,OAEtD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,yCAAyC,OAErD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,+BAA+B,OAE3C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,4BAA4B,OAExC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wBAAwB,OAAqC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,iCAAiC,OAE7C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA0C,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,mDAAmD,OAE/D,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2BAA2B,OAEvC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAAmC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,yBAAyB,OAAuC,CAAC;AAE9E;;GAEG;AACH,eAAO,MAAM,uBAAuB,OAAoC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,WAAW,OAA+B,CAAC;AAExD;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,2CAA2C,OAEvD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,6BAA6B,OAEzC,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,eAAe,OAAkC,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,qBAAqB,OAAsC,CAAC;AAEzE;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kBAAkB,OAA+B,CAAC;AAE/D;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,kCAAkC,OAE9C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAAmC,CAAC;AAEvE;;GAEG;AACH,eAAO,MAAM,gCAAgC,OAE5C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,mCAAmC,OAE/C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,wCAAwC,OAEpD,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,8BAA8B,OAE1C,CAAC;AAEF;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAAuC,CAAC;AAE3E;;GAEG;AACH,eAAO,MAAM,gBAAgB,OAA4B,CAAC;AAE1D;;GAEG;AACH,eAAO,MAAM,sBAAsB,OAA4C,CAAC;AAEhF;;GAEG;AACH,eAAO,MAAM,6BAA6B,yFAC4C,CAAC;AAEvF,qBAAa,aAAc,SAAQ,KAAK;gBAC1B,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,oBAAqB,SAAQ,aAAa;gBACzC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,YAAa,SAAQ,aAAa;gBACjC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,mBAAoB,SAAQ,aAAa;gBACxC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,sBAAuB,SAAQ,aAAa;gBAC3C,MAAM,EAAE,MAAM;CAG3B;AAED,qBAAa,2BAA4B,SAAQ,KAAK;gBACxC,OAAO,EAAE,MAAM;CAG5B;AAED,qBAAa,eAAgB,SAAQ,KAAK;gBAC5B,GAAG,EAAE,MAAM,EAAE,OAAO,EAAE,MAAM;CAGzC"}
|