@phantom/embedded-provider-core 1.0.0-beta.8 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"sources":["../src/index.ts","../src/embedded-provider.ts","../src/constants.ts","../src/auth/jwt-auth.ts","../src/utils/session.ts","../src/utils/retry.ts","../src/chains/SolanaChain.ts","../src/chains/EthereumChain.ts"],"sourcesContent":["export * from \"./interfaces\";\nexport * from \"./types\";\nexport * from \"./embedded-provider\";\nexport * from \"./auth/jwt-auth\";\nexport * from \"./utils/session\";\nexport * from \"./utils/retry\";\nexport * from \"./chains\";\nexport * from \"./constants\";\n","import { AddressType, PhantomClient } from \"@phantom/client\";\nimport type { NetworkId } from \"@phantom/constants\";\nimport { randomUUID } from \"@phantom/utils\";\nimport { base64urlEncode } from \"@phantom/base64url\";\nimport bs58 from \"bs58\";\nimport {\n parseMessage,\n parseTransactionToBase64Url,\n parseSignMessageResponse,\n parseTransactionResponse,\n type ParsedTransactionResult,\n type ParsedSignatureResult,\n} from \"@phantom/parsers\";\nimport { AUTHENTICATOR_EXPIRATION_TIME_MS, AUTHENTICATOR_RENEWAL_WINDOW_MS } from \"./constants\";\n\nimport type {\n PlatformAdapter,\n Session,\n AuthResult,\n DebugLogger,\n EmbeddedStorage,\n AuthProvider,\n URLParamsAccessor,\n StamperInfo,\n} from \"./interfaces\";\nimport type {\n EmbeddedProviderConfig,\n ConnectResult,\n SignMessageParams,\n SignTransactionParams,\n SignAndSendTransactionParams,\n WalletAddress,\n AuthOptions,\n} from \"./types\";\nimport { JWTAuth } from \"./auth/jwt-auth\";\nimport { generateSessionId } from \"./utils/session\";\nimport { retryWithBackoff } from \"./utils/retry\";\nimport type { StamperWithKeyManagement } from \"@phantom/sdk-types\";\nimport { EmbeddedSolanaChain, EmbeddedEthereumChain } from \"./chains\";\nimport type { ISolanaChain, IEthereumChain } from \"@phantom/chain-interfaces\";\n\nexport type EmbeddedProviderEvent = \"connect\" | \"connect_start\" | \"connect_error\" | \"disconnect\" | \"error\";\nexport type EventCallback = (data?: any) => void;\n\ninterface StamperResponse {\n organizationId: string;\n stamperInfo: StamperInfo;\n expiresInMs: number;\n username: string;\n}\n\nexport class EmbeddedProvider {\n private config: EmbeddedProviderConfig;\n private platform: PlatformAdapter;\n private storage: EmbeddedStorage;\n private authProvider: AuthProvider;\n private urlParamsAccessor: URLParamsAccessor;\n private stamper: StamperWithKeyManagement;\n private logger: DebugLogger;\n private client: PhantomClient | null = null;\n private walletId: string | null = null;\n private addresses: WalletAddress[] = [];\n private jwtAuth: JWTAuth;\n\n // Built-in chain instances\n public readonly solana: ISolanaChain;\n public readonly ethereum: IEthereumChain;\n private eventListeners: Map<EmbeddedProviderEvent, Set<EventCallback>> = new Map();\n\n constructor(config: EmbeddedProviderConfig, platform: PlatformAdapter, logger: DebugLogger) {\n this.logger = logger;\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing EmbeddedProvider\", { config });\n\n // TODO: Re-enable app-wallet support once it's fully implemented\n if (config.embeddedWalletType === \"app-wallet\") {\n throw new Error(\"app-wallet type is not currently supported. Please use 'user-wallet' instead.\");\n }\n\n this.config = config;\n this.platform = platform;\n this.storage = platform.storage;\n this.authProvider = platform.authProvider;\n this.urlParamsAccessor = platform.urlParamsAccessor;\n this.stamper = platform.stamper;\n this.jwtAuth = new JWTAuth();\n\n // Initialize chain instances\n this.solana = new EmbeddedSolanaChain(this);\n this.ethereum = new EmbeddedEthereumChain(this);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"EmbeddedProvider initialized\");\n\n // Auto-connect is now handled manually via autoConnect() method to avoid race conditions\n }\n\n /*\n * Event system methods for listening to provider state changes\n */\n on(event: EmbeddedProviderEvent, callback: EventCallback): void {\n if (!this.eventListeners.has(event)) {\n this.eventListeners.set(event, new Set());\n }\n this.eventListeners.get(event)!.add(callback);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Event listener added\", { event });\n }\n\n off(event: EmbeddedProviderEvent, callback: EventCallback): void {\n const listeners = this.eventListeners.get(event);\n if (listeners) {\n listeners.delete(callback);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Event listener removed\", { event });\n }\n }\n\n private emit(event: EmbeddedProviderEvent, data?: any): void {\n const listeners = this.eventListeners.get(event);\n if (listeners && listeners.size > 0) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Emitting event\", { event, listenerCount: listeners.size, data });\n listeners.forEach(callback => {\n try {\n callback(data);\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Event callback error\", { event, error });\n }\n });\n }\n }\n\n /**\n * Get the appropriate address for a given network ID from available addresses\n */\n private getAddressForNetwork(networkId: NetworkId): string | undefined {\n // Extract the chain name from network ID format (e.g., \"solana:mainnet\" -> \"solana\")\n const network = networkId.split(\":\")[0].toLowerCase();\n \n // Map network to address type\n let targetAddressType: string;\n switch (network) {\n case \"solana\":\n targetAddressType = AddressType.solana;\n break;\n case \"eip155\": // EVM chains use eip155 prefix\n targetAddressType = AddressType.ethereum;\n break;\n case \"bitcoin\":\n case \"btc\":\n targetAddressType = AddressType.bitcoinSegwit;\n break;\n case \"sui\":\n targetAddressType = AddressType.sui;\n break;\n default:\n // Default to ethereum for unknown networks\n targetAddressType = AddressType.ethereum;\n break;\n }\n \n // Find the matching address from available addresses\n const matchingAddress = this.addresses.find(addr => \n addr.addressType.toLowerCase() === targetAddressType.toLowerCase()\n );\n \n return matchingAddress?.address;\n }\n\n private async getAndFilterWalletAddresses(walletId: string): Promise<WalletAddress[]> {\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Get wallet addresses with retry and auto-disconnect on failure\n const addresses = await retryWithBackoff(\n () => this.client!.getWalletAddresses(walletId, undefined, derivationIndex),\n \"getWalletAddresses\",\n this.logger,\n ).catch(async error => {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"getWalletAddresses failed after retries, disconnecting\", {\n walletId,\n error: error.message,\n derivationIndex: derivationIndex,\n });\n // Clear the session if getWalletAddresses fails after retries\n await this.storage.clearSession();\n this.client = null;\n this.walletId = null;\n this.addresses = [];\n throw error;\n });\n\n // Filter by enabled address types and return formatted addresses\n return addresses.filter(addr => this.config.addressTypes.some(type => type === addr.addressType));\n }\n\n /*\n * We use this method to make sure the session is not invalid, or there's a different session id in the url.\n * If there's a different one, we delete the current session and start from scratch.\n * This prevents issues where users have stale sessions or URL mismatches after redirects.\n */\n private async validateAndCleanSession(session: Session | null): Promise<Session | null> {\n if (!session) return null;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Found existing session, validating\", {\n sessionId: session.sessionId,\n status: session.status,\n walletId: session.walletId,\n });\n\n // If session is not completed, check if we're in the right context\n if (session.status !== \"completed\") {\n const urlSessionId = this.urlParamsAccessor.getParam(\"session_id\");\n\n // If we have a pending session but no sessionId in URL, this is a mismatch\n if (session.status === \"pending\" && !urlSessionId) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session mismatch detected - pending session without redirect context\", {\n sessionId: session.sessionId,\n status: session.status,\n });\n // Clear the invalid session and start fresh\n await this.storage.clearSession();\n return null;\n }\n // If sessionId in URL doesn't match stored session, clear invalid session\n else if (urlSessionId && urlSessionId !== session.sessionId) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session ID mismatch detected\", {\n storedSessionId: session.sessionId,\n urlSessionId: urlSessionId,\n });\n await this.storage.clearSession();\n return null;\n }\n }\n\n // For completed sessions, check if session is valid (only checks authenticator expiration)\n if (session.status === \"completed\" && !this.isSessionValid(session)) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session invalid due to authenticator expiration\", {\n sessionId: session.sessionId,\n authenticatorExpiresAt: session.authenticatorExpiresAt,\n });\n // Clear the invalid session\n await this.storage.clearSession();\n return null;\n }\n\n return session;\n }\n\n /*\n * Shared connection logic for both connect() and autoConnect().\n * Handles existing session validation, redirect resume, and session initialization.\n * Returns ConnectResult if connection succeeds, null if should continue with new auth flow.\n */\n private async tryExistingConnection(isAutoConnect: boolean): Promise<ConnectResult | null> {\n // Get and validate existing session\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Getting existing session\");\n let session = await this.storage.getSession();\n session = await this.validateAndCleanSession(session);\n\n // First priority: If we have a completed session, use it\n // This prevents unnecessary redirect resume when the session is already valid\n if (session && session.status === \"completed\") {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Using existing completed session\", {\n sessionId: session.sessionId,\n walletId: session.walletId,\n });\n\n await this.initializeClientFromSession(session);\n\n // Update session timestamp\n session.lastUsed = Date.now();\n await this.storage.saveSession(session);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Connection from existing session successful\", {\n walletId: this.walletId,\n addressCount: this.addresses.length,\n });\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n const result: ConnectResult = {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n };\n\n // Emit connect event for existing session success\n this.emit(\"connect\", {\n walletId: this.walletId,\n addresses: this.addresses,\n source: \"existing-session\",\n });\n\n return result;\n }\n\n // Second priority: Check if we're resuming from a redirect\n // Only attempt redirect resume if there's no valid completed session\n this.logger.log(\"EMBEDDED_PROVIDER\", \"No completed session found, checking for redirect resume\");\n if (this.authProvider.resumeAuthFromRedirect) {\n const authResult = this.authProvider.resumeAuthFromRedirect();\n if (authResult) {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Resuming from redirect\", {\n walletId: authResult.walletId,\n provider: authResult.provider,\n });\n\n try {\n return await this.completeAuthConnection(authResult);\n } catch (error) {\n // Handle the edge case where session was wiped from DB but URL has session params\n // Only fall back gracefully when authOptions are provided (indicating intent to start fresh auth)\n if (error instanceof Error && error.message.includes(\"No session found after redirect\") && !isAutoConnect) {\n this.logger.warn(\n \"EMBEDDED_PROVIDER\",\n \"Session missing during redirect resume - will start fresh auth flow\",\n {\n error: error.message,\n walletId: authResult.walletId,\n },\n );\n\n // Clear any potentially stale session data and continue to fresh auth flow\n await this.storage.clearSession();\n return null; // Let connect() method start a fresh auth flow\n }\n\n // Re-throw error if no authOptions (should fail) or if different error type\n throw error;\n }\n }\n }\n\n // No existing connection available\n return null;\n }\n\n /*\n * We use this method to validate authentication options before processing them.\n * This ensures only supported auth providers are used and required tokens are present.\n */\n private validateAuthOptions(authOptions?: AuthOptions): void {\n if (!authOptions) return;\n\n if (authOptions.provider && ![\"google\", \"apple\", \"jwt\"].includes(authOptions.provider)) {\n throw new Error(`Invalid auth provider: ${authOptions.provider}. Must be \"google\", \"apple\", or \"jwt\"`);\n }\n\n if (authOptions.provider === \"jwt\" && !authOptions.jwtToken) {\n throw new Error(\"JWT token is required when using JWT authentication\");\n }\n }\n\n /*\n * We use this method to validate if a session is still valid.\n * This checks session status, required fields, and authenticator expiration.\n * Sessions never expire by age - only authenticators expire.\n */\n private isSessionValid(session: Session | null): boolean {\n if (!session) {\n return false;\n }\n\n // Check required fields\n if (!session.walletId || !session.organizationId || !session.stamperInfo) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session missing required fields\", {\n hasWalletId: !!session.walletId,\n hasOrganizationId: !!session.organizationId,\n hasStamperInfo: !!session.stamperInfo,\n });\n return false;\n }\n\n // Check session status\n if (session.status !== \"completed\") {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session not completed\", { status: session.status });\n return false;\n }\n\n // Sessions without authenticator timing are invalid\n if (!session.authenticatorExpiresAt) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session invalid - missing authenticator timing\", {\n sessionId: session.sessionId,\n });\n return false;\n }\n\n // Check authenticator expiration - if expired, session is invalid\n if (Date.now() >= session.authenticatorExpiresAt) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Authenticator expired, session invalid\", {\n authenticatorExpiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n now: new Date().toISOString(),\n });\n return false;\n }\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session is valid\", {\n sessionId: session.sessionId,\n walletId: session.walletId,\n authenticatorExpires: new Date(session.authenticatorExpiresAt).toISOString(),\n });\n return true;\n }\n\n /*\n * Public method to attempt auto-connection using an existing valid session.\n * This should be called after setting up event listeners to avoid race conditions.\n * Silently fails if no valid session exists, enabling seamless reconnection.\n */\n async autoConnect(): Promise<void> {\n try {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Starting auto-connect attempt\");\n\n // Emit connect_start event for auto-connect\n this.emit(\"connect_start\", { source: \"auto-connect\" });\n\n // Try to use existing connection (redirect resume or completed session)\n const result = await this.tryExistingConnection(true);\n\n if (result) {\n // Successfully connected using existing session or redirect\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Auto-connect successful\", {\n walletId: result.walletId,\n addressCount: result.addresses.length,\n });\n\n this.emit(\"connect\", {\n walletId: result.walletId,\n addresses: result.addresses,\n source: \"auto-connect\",\n });\n return;\n }\n\n // No existing connection available - auto-connect should fail silently\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Auto-connect failed: no valid session found\");\n\n // Emit connect_error to reset isConnecting state\n this.emit(\"connect_error\", {\n error: \"No valid session found\",\n source: \"auto-connect\",\n });\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Auto-connect failed\", {\n error: error instanceof Error ? error.message : String(error),\n });\n\n // Emit connect_error to reset isConnecting state\n this.emit(\"connect_error\", {\n error: error instanceof Error ? error.message : \"Auto-connect failed\",\n source: \"auto-connect\",\n });\n }\n }\n\n /*\n * We use this method to initialize the stamper and create an organization for new sessions.\n * This is the first step when no existing session is found and we need to set up a new wallet.\n */\n\n private async createOrganizationAndStamper(): Promise<StamperResponse> {\n // Initialize stamper (generates keypair in IndexedDB)\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing stamper\");\n const stamperInfo = await this.stamper.init();\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Stamper initialized\", {\n publicKey: stamperInfo.publicKey,\n keyId: stamperInfo.keyId,\n algorithm: this.stamper.algorithm,\n });\n\n // Create a temporary client with the stamper\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Creating temporary PhantomClient\");\n const tempClient = new PhantomClient(\n {\n apiBaseUrl: this.config.apiBaseUrl,\n headers: {\n ...(this.platform.analyticsHeaders || {})\n }\n },\n this.stamper,\n );\n\n // Create an organization\n // organization name is a combination of this organizationId and this userId, which will be a unique identifier\n const platformName = this.platform.name || \"unknown\";\n const shortPubKey = stamperInfo.publicKey.slice(0, 8);\n \n const organizationName = `${this.config.appId.substring(0, 8)}-${platformName}-${shortPubKey}`;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Creating organization\", {\n organizationName,\n publicKey: stamperInfo.publicKey,\n platform: platformName,\n });\n\n // Convert base58 public key to base64url format as required by the API\n const base64urlPublicKey = base64urlEncode(bs58.decode(stamperInfo.publicKey));\n const expiresInMs = AUTHENTICATOR_EXPIRATION_TIME_MS;\n\n const username = `user-${randomUUID()}`;\n const { organizationId } = await tempClient.createOrganization(organizationName, [\n {\n username,\n role: \"ADMIN\",\n authenticators: [\n {\n authenticatorName: `auth-${shortPubKey}`,\n authenticatorKind: \"keypair\",\n publicKey: base64urlPublicKey,\n algorithm: \"Ed25519\",\n // Commented for now until KMS supports fully expirable organizations\n // expiresInMs: expiresInMs,\n } as any,\n ],\n },\n ]);\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Organization created\", { organizationId });\n\n return { organizationId, stamperInfo, expiresInMs, username };\n }\n\n async connect(authOptions?: AuthOptions): Promise<ConnectResult> {\n try {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting embedded provider connect\", {\n authOptions: authOptions\n ? {\n provider: authOptions.provider,\n hasJwtToken: !!authOptions.jwtToken,\n }\n : undefined,\n });\n\n // Emit connect_start event for manual connect\n this.emit(\"connect_start\", {\n source: \"manual-connect\",\n authOptions: authOptions ? { provider: authOptions.provider } : undefined,\n });\n\n // Try to use existing connection (redirect resume or completed session)\n const existingResult = await this.tryExistingConnection(false);\n if (existingResult) {\n // Successfully connected using existing session or redirect\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Manual connect using existing connection\", {\n walletId: existingResult.walletId,\n addressCount: existingResult.addresses.length,\n });\n\n // Emit connect event for manual connect success with existing connection\n this.emit(\"connect\", {\n walletId: existingResult.walletId,\n addresses: existingResult.addresses,\n source: \"manual-existing\",\n });\n\n return existingResult;\n }\n\n // Validate auth options before proceeding with new auth flow\n this.validateAuthOptions(authOptions);\n\n // No existing connection available, create new one\n this.logger.info(\"EMBEDDED_PROVIDER\", \"No existing connection, creating new auth flow\");\n const { organizationId, stamperInfo, expiresInMs, username } = await this.createOrganizationAndStamper();\n const session = await this.handleAuthFlow(organizationId, stamperInfo, authOptions, expiresInMs, username);\n\n // If session is null here, it means we're doing a redirect\n if (!session) {\n // This should not return anything as redirect is happening\n return {\n addresses: [],\n status: \"pending\",\n } as ConnectResult;\n }\n\n // Update session last used timestamp (only for non-redirect flows)\n // For redirect flows, timestamp is updated before redirect to prevent race condition\n if (!authOptions || authOptions.provider === \"jwt\" || this.config.embeddedWalletType === \"app-wallet\") {\n session.lastUsed = Date.now();\n await this.storage.saveSession(session);\n }\n\n // Initialize client and get addresses\n await this.initializeClientFromSession(session);\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n const result: ConnectResult = {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n };\n\n // Emit connect event for manual connect success\n this.emit(\"connect\", {\n walletId: this.walletId,\n addresses: this.addresses,\n source: \"manual\",\n });\n\n return result;\n } catch (error) {\n // Log the full error details for debugging\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Connect failed with error\", {\n error:\n error instanceof Error\n ? {\n name: error.name,\n message: error.message,\n stack: error.stack,\n }\n : error,\n });\n\n // Emit connect_error event for manual connect failure\n this.emit(\"connect_error\", {\n error: error instanceof Error ? error.message : String(error),\n source: \"manual-connect\",\n });\n\n // Enhanced error handling with specific error types\n if (error instanceof Error) {\n // Check for specific error types and provide better error messages\n if (error.message.includes(\"IndexedDB\") || error.message.includes(\"storage\")) {\n throw new Error(\n \"Storage error: Unable to access browser storage. Please ensure storage is available and try again.\",\n );\n }\n\n if (error.message.includes(\"network\") || error.message.includes(\"fetch\")) {\n throw new Error(\n \"Network error: Unable to connect to authentication server. Please check your internet connection and try again.\",\n );\n }\n\n if (error.message.includes(\"JWT\") || error.message.includes(\"jwt\")) {\n throw new Error(`JWT Authentication error: ${error.message}`);\n }\n\n if (error.message.includes(\"Authentication\") || error.message.includes(\"auth\")) {\n throw new Error(`Authentication error: ${error.message}`);\n }\n\n if (error.message.includes(\"organization\") || error.message.includes(\"wallet\")) {\n throw new Error(`Wallet creation error: ${error.message}`);\n }\n\n // Re-throw the original error if it's already well-formatted\n throw error;\n }\n\n // Handle unknown error types\n throw new Error(`Embedded wallet connection failed: ${String(error)}`);\n }\n }\n\n async disconnect(): Promise<void> {\n const wasConnected = this.client !== null;\n\n await this.storage.clearSession();\n\n this.client = null;\n this.walletId = null;\n this.addresses = [];\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Disconnected from embedded wallet\");\n\n // Emit disconnect event if we were previously connected\n if (wasConnected) {\n this.emit(\"disconnect\", {\n source: \"manual\",\n });\n }\n }\n\n async signMessage(params: SignMessageParams): Promise<ParsedSignatureResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing message\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n // Parse message to base64url format for client\n const parsedMessage = parseMessage(params.message);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Get raw response from client\n const rawResponse = await this.client.signMessage({\n walletId: this.walletId,\n message: parsedMessage.base64url,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Message signed successfully\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n // Parse the response to get human-readable signature and explorer URL\n return parseSignMessageResponse(rawResponse, params.networkId);\n }\n\n async signTransaction(params: SignTransactionParams): Promise<ParsedTransactionResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing transaction\", {\n walletId: this.walletId,\n networkId: params.networkId,\n });\n\n // Parse transaction to base64url format for client based on network\n const parsedTransaction = await parseTransactionToBase64Url(params.transaction, params.networkId);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Parsed transaction for signing\", {\n walletId: this.walletId,\n transaction: parsedTransaction,\n derivationIndex: derivationIndex,\n });\n\n // Get raw response from client\n const rawResponse = await this.client.signTransaction({\n walletId: this.walletId,\n transaction: parsedTransaction.base64url,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n account: this.getAddressForNetwork(params.networkId),\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Transaction signed successfully\", {\n walletId: this.walletId,\n networkId: params.networkId,\n rawTransaction: rawResponse.rawTransaction,\n });\n\n // Parse the response to get transaction result (without hash since it wasn't sent)\n return await parseTransactionResponse(rawResponse.rawTransaction, params.networkId);\n }\n\n async signAndSendTransaction(params: SignAndSendTransactionParams): Promise<ParsedTransactionResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing and sending transaction\", {\n walletId: this.walletId,\n networkId: params.networkId,\n });\n\n // Parse transaction to base64url format for client based on network\n const parsedTransaction = await parseTransactionToBase64Url(params.transaction, params.networkId);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Parsed transaction for signing\", {\n walletId: this.walletId,\n transaction: parsedTransaction,\n derivationIndex: derivationIndex,\n });\n\n // Get raw response from client\n const rawResponse = await this.client.signAndSendTransaction({\n walletId: this.walletId,\n transaction: parsedTransaction.base64url,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n account: this.getAddressForNetwork(params.networkId),\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Transaction signed and sent successfully\", {\n walletId: this.walletId,\n networkId: params.networkId,\n hash: rawResponse.hash,\n rawTransaction: rawResponse.rawTransaction,\n });\n\n // Parse the response to get transaction hash and explorer URL\n return await parseTransactionResponse(rawResponse.rawTransaction, params.networkId, rawResponse.hash);\n }\n\n getAddresses(): WalletAddress[] {\n return this.addresses;\n }\n\n isConnected(): boolean {\n return this.client !== null && this.walletId !== null;\n }\n\n /*\n * We use this method to route between different authentication flows based on wallet type and auth options.\n * It handles app-wallet creation directly or routes to JWT/redirect authentication for user-wallets.\n * Returns null for redirect flows since they don't complete synchronously.\n */\n private async handleAuthFlow(\n organizationId: string,\n stamperInfo: StamperInfo,\n authOptions: AuthOptions | undefined,\n expiresInMs: number,\n username: string,\n ): Promise<Session | null> {\n if (this.config.embeddedWalletType === \"user-wallet\") {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Creating user-wallet, routing authentication\", {\n authProvider: authOptions?.provider || \"phantom-connect\",\n });\n\n // Route to appropriate authentication flow based on authOptions\n if (authOptions?.provider === \"jwt\") {\n return await this.handleJWTAuth(organizationId, stamperInfo, authOptions, expiresInMs, username);\n } else {\n // This will redirect in browser, so we don't return a session\n // In react-native this will return an auth result\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting redirect-based authentication flow\", {\n organizationId,\n provider: authOptions?.provider,\n });\n return await this.handleRedirectAuth(organizationId, stamperInfo, authOptions, username);\n }\n } else {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Creating app-wallet\", {\n organizationId,\n });\n // Create app-wallet directly\n const tempClient = new PhantomClient(\n {\n apiBaseUrl: this.config.apiBaseUrl,\n organizationId: organizationId,\n headers: {\n ...(this.platform.analyticsHeaders || {})\n }\n },\n this.stamper,\n );\n\n const wallet = await tempClient.createWallet(`Wallet ${Date.now()}`);\n const walletId = wallet.walletId;\n\n // Save session with app-wallet info\n const now = Date.now();\n const session = {\n sessionId: generateSessionId(),\n walletId: walletId,\n organizationId: organizationId,\n appId: this.config.appId,\n stamperInfo,\n authProvider: \"app-wallet\",\n userInfo: { embeddedWalletType: this.config.embeddedWalletType },\n accountDerivationIndex: 0, // App wallets default to index 0\n status: \"completed\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: Date.now() + expiresInMs,\n lastRenewalAttempt: undefined,\n username,\n };\n\n await this.storage.saveSession(session);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"App-wallet created successfully\", { walletId, organizationId });\n return session;\n }\n }\n\n /*\n * We use this method to handle JWT-based authentication for user-wallets.\n * It authenticates using the provided JWT token and creates a completed session.\n */\n private async handleJWTAuth(\n organizationId: string,\n stamperInfo: StamperInfo,\n authOptions: AuthOptions,\n expiresInMs: number,\n username: string,\n ): Promise<Session> {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Using JWT authentication flow\");\n\n // Use JWT authentication flow\n if (!authOptions.jwtToken) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"JWT token missing for JWT authentication\");\n throw new Error(\"JWT token is required for JWT authentication\");\n }\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Starting JWT authentication\");\n const authResult = await this.jwtAuth.authenticate({\n organizationId,\n appId: this.config.appId,\n jwtToken: authOptions.jwtToken,\n customAuthData: authOptions.customAuthData,\n });\n const walletId = authResult.walletId;\n this.logger.info(\"EMBEDDED_PROVIDER\", \"JWT authentication completed\", { walletId });\n\n // Save session with auth info\n const now = Date.now();\n const session = {\n sessionId: generateSessionId(),\n walletId: walletId,\n organizationId: organizationId,\n appId: this.config.appId,\n stamperInfo,\n authProvider: authResult.provider,\n userInfo: authResult.userInfo,\n accountDerivationIndex: authResult.accountDerivationIndex,\n status: \"completed\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: Date.now() + expiresInMs,\n lastRenewalAttempt: undefined,\n username,\n };\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Saving JWT session\");\n await this.storage.saveSession(session);\n return session;\n }\n\n /*\n * We use this method to handle redirect-based authentication (Google/Apple OAuth).\n * It saves a temporary session before redirecting to prevent losing state during the redirect flow.\n * Session timestamp is updated before redirect to prevent race conditions.\n */\n private async handleRedirectAuth(\n organizationId: string,\n stamperInfo: StamperInfo,\n authOptions?: AuthOptions,\n username?: string,\n ): Promise<Session | null> {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Using Phantom Connect authentication flow (redirect-based)\", {\n provider: authOptions?.provider,\n hasRedirectUrl: !!this.config.authOptions.redirectUrl,\n authUrl: this.config.authOptions.authUrl,\n });\n\n // Use Phantom Connect authentication flow (redirect-based)\n // Store session before redirect so we can restore it after redirect\n const now = Date.now();\n const sessionId = generateSessionId();\n const tempSession: Session = {\n sessionId: sessionId,\n walletId: `temp-${now}`, // Temporary ID, will be updated after redirect\n organizationId: organizationId,\n appId: this.config.appId,\n stamperInfo,\n authProvider: \"phantom-connect\",\n userInfo: { provider: authOptions?.provider },\n accountDerivationIndex: undefined, // Will be set when redirect completes\n status: \"pending\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: now + AUTHENTICATOR_EXPIRATION_TIME_MS,\n lastRenewalAttempt: undefined,\n username: username || `user-${randomUUID()}`,\n };\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Saving temporary session before redirect\", {\n sessionId: tempSession.sessionId,\n tempWalletId: tempSession.walletId,\n });\n\n // Update session timestamp before redirect (prevents race condition)\n tempSession.lastUsed = Date.now();\n await this.storage.saveSession(tempSession);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting Phantom Connect redirect\", {\n organizationId,\n appId: this.config.appId,\n provider: authOptions?.provider,\n authUrl: this.config.authOptions.authUrl,\n });\n\n // Start the authentication flow (this will redirect the user in the browser, or handle it in React Native)\n const authResult = await this.authProvider.authenticate({\n organizationId: organizationId,\n appId: this.config.appId,\n provider: authOptions?.provider as \"google\" | \"apple\" | undefined,\n redirectUrl: this.config.authOptions.redirectUrl,\n customAuthData: authOptions?.customAuthData,\n authUrl: this.config.authOptions.authUrl,\n sessionId: sessionId,\n });\n\n if (authResult && \"walletId\" in authResult) {\n // If we got an auth result, we need to update the session with actual wallet ID\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Authentication completed after redirect\", {\n walletId: authResult.walletId,\n provider: authResult.provider,\n });\n\n // Update the temporary session with actual wallet ID and auth info\n tempSession.walletId = authResult.walletId;\n tempSession.authProvider = authResult.provider || tempSession.authProvider;\n tempSession.accountDerivationIndex = authResult.accountDerivationIndex;\n tempSession.status = \"completed\";\n tempSession.lastUsed = Date.now();\n await this.storage.saveSession(tempSession);\n\n return tempSession; // Return the auth result for further processing\n }\n // If we don't have an auth result, it means we're in a redirect flow\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Redirect authentication initiated, waiting for redirect completion\");\n // In this case, we don't return anything as the redirect will handle the rest\n return null;\n }\n\n private async completeAuthConnection(authResult: AuthResult): Promise<ConnectResult> {\n // Check if we have an existing session\n const session = await this.storage.getSession();\n\n if (!session) {\n throw new Error(\"No session found after redirect - session may have expired\");\n }\n\n // Update session with actual wallet ID and auth info from redirect\n session.walletId = authResult.walletId;\n session.authProvider = authResult.provider || session.authProvider;\n session.accountDerivationIndex = authResult.accountDerivationIndex;\n session.status = \"completed\";\n session.lastUsed = Date.now();\n await this.storage.saveSession(session);\n\n await this.initializeClientFromSession(session);\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n return {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n };\n }\n\n /*\n * Ensures the authenticator is valid and performs renewal if needed.\n * The renewal of the authenticator can only happen meanwhile the previous authenticator is still valid.\n */\n private async ensureValidAuthenticator(): Promise<void> {\n // Get current session to check authenticator timing\n const session = await this.storage.getSession();\n if (!session) {\n throw new Error(\"No active session found\");\n }\n\n const now = Date.now();\n\n // Sessions without authenticator timing fields are invalid - clear them\n if (!session.authenticatorExpiresAt) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session missing authenticator timing - treating as invalid session\");\n await this.disconnect();\n throw new Error(\"Invalid session - missing authenticator timing\");\n }\n\n const timeUntilExpiry = session.authenticatorExpiresAt - now;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Checking authenticator expiration\", {\n expiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n timeUntilExpiry,\n });\n\n // Check if authenticator has expired\n if (timeUntilExpiry <= 0) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Authenticator has expired, disconnecting\");\n await this.disconnect();\n throw new Error(\"Authenticator expired\");\n }\n\n // Check if authenticator needs renewal (within renewal window)\n const renewalWindow = AUTHENTICATOR_RENEWAL_WINDOW_MS;\n if (timeUntilExpiry <= renewalWindow) {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Authenticator needs renewal\", {\n expiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n timeUntilExpiry,\n renewalWindow,\n });\n\n try {\n await this.renewAuthenticator(session);\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Authenticator renewed successfully\");\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Failed to renew authenticator\", {\n error: error instanceof Error ? error.message : String(error),\n });\n // Don't throw - renewal failure shouldn't break existing functionality\n }\n }\n }\n\n /*\n * We use this method to perform silent authenticator renewal.\n * It generates a new keypair, creates a new authenticator, and switches to it.\n */\n private async renewAuthenticator(session: Session): Promise<void> {\n if (!this.client) {\n throw new Error(\"Client not initialized\");\n }\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting authenticator renewal\");\n\n try {\n // Step 1: Generate new keypair (but don't make it active yet)\n const newKeyInfo = await this.stamper.rotateKeyPair();\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Generated new keypair for renewal\", {\n newKeyId: newKeyInfo.keyId,\n newPublicKey: newKeyInfo.publicKey,\n });\n\n // Step 2: Convert public key and set expiration\n const base64urlPublicKey = base64urlEncode(bs58.decode(newKeyInfo.publicKey));\n const expiresInMs = AUTHENTICATOR_EXPIRATION_TIME_MS;\n\n // Step 3: Create new authenticator with replaceExpirable=true\n let authenticatorResult;\n try {\n authenticatorResult = await this.client.createAuthenticator({\n organizationId: session.organizationId,\n username: session.username,\n authenticatorName: `auth-${newKeyInfo.keyId.substring(0, 8)}`,\n authenticator: {\n authenticatorName: `auth-${newKeyInfo.keyId.substring(0, 8)}`,\n authenticatorKind: \"keypair\",\n publicKey: base64urlPublicKey,\n algorithm: \"Ed25519\",\n // Commented for now until KMS supports fully expiring organizations\n // expiresInMs: expiresInMs,\n } as any,\n replaceExpirable: true,\n } as any);\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Failed to create new authenticator\", {\n error: error instanceof Error ? error.message : String(error),\n });\n // Rollback the rotation on server error\n await this.stamper.rollbackRotation();\n throw new Error(\n `Failed to create new authenticator: ${error instanceof Error ? error.message : String(error)}`,\n );\n }\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Created new authenticator\", {\n authenticatorId: (authenticatorResult as any).id,\n });\n\n // Step 4: Commit the rotation (switch stamper to use new keypair)\n await this.stamper.commitRotation((authenticatorResult as any).id || \"unknown\");\n\n // Step 5: Update session with new authenticator timing\n const now = Date.now();\n session.stamperInfo = newKeyInfo;\n session.authenticatorCreatedAt = now;\n session.authenticatorExpiresAt = Date.now() + expiresInMs;\n session.lastRenewalAttempt = now;\n await this.storage.saveSession(session);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Authenticator renewal completed successfully\", {\n newKeyId: newKeyInfo.keyId,\n expiresAt: new Date(Date.now() + expiresInMs).toISOString(),\n });\n } catch (error) {\n // Rollback rotation on any failure\n await this.stamper.rollbackRotation();\n throw error;\n }\n }\n\n /*\n * We use this method to initialize the PhantomClient and fetch wallet addresses from a completed session.\n * This is the final step that sets up the provider's client state and retrieves available addresses.\n */\n private async initializeClientFromSession(session: Session): Promise<void> {\n // Create client from session\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing PhantomClient from session\", {\n organizationId: session.organizationId,\n walletId: session.walletId,\n appId: session.appId,\n });\n\n // Ensure stamper is initialized with existing keys\n if (!this.stamper.getKeyInfo()) {\n await this.stamper.init();\n }\n\n this.client = new PhantomClient(\n {\n apiBaseUrl: this.config.apiBaseUrl,\n organizationId: session.organizationId,\n headers: {\n ...(this.platform.analyticsHeaders || {})\n }\n },\n this.stamper,\n );\n\n this.walletId = session.walletId;\n\n // Get wallet addresses and filter by enabled address types with retry\n this.addresses = await this.getAndFilterWalletAddresses(session.walletId);\n }\n}\n","/**\n * Constants for authenticator lifecycle management\n */\n\n/**\n * How long an authenticator is valid before it expires (in milliseconds)\n * Default: 7 days\n * For testing: Use smaller values like 5 * 60 * 1000 (5 minutes)\n */\nexport const AUTHENTICATOR_EXPIRATION_TIME_MS = 7 * 24 * 60 * 60 * 1000; // 7 days\n/**\n * How long before expiration should we attempt to renew the authenticator (in milliseconds)\n * Default: 2 days before expiration\n * For testing: Use smaller values like 2 * 60 * 1000 (2 minutes)\n */\nexport const AUTHENTICATOR_RENEWAL_WINDOW_MS = 2 * 24 * 60 * 60 * 1000; // 2 days\n\n/**\n * Example configurations for testing:\n *\n * Quick testing (5 minute expiration, 2 minute renewal window):\n * export const AUTHENTICATOR_EXPIRATION_TIME_MS = 5 * 60 * 1000;\n * export const AUTHENTICATOR_RENEWAL_WINDOW_MS = 2 * 60 * 1000;\n *\n * Medium testing (1 hour expiration, 15 minute renewal window):\n * export const AUTHENTICATOR_EXPIRATION_TIME_MS = 60 * 60 * 1000;\n * export const AUTHENTICATOR_RENEWAL_WINDOW_MS = 15 * 60 * 1000;\n *\n * Aggressive testing (30 seconds expiration, 10 second renewal window):\n * export const AUTHENTICATOR_EXPIRATION_TIME_MS = 30 * 1000;\n * export const AUTHENTICATOR_RENEWAL_WINDOW_MS = 10 * 1000;\n */\n","import type { AuthResult, JWTAuthOptions } from \"../interfaces\";\n\nexport class JWTAuth {\n async authenticate(options: JWTAuthOptions): Promise<AuthResult> {\n // Validate JWT token format\n if (!options.jwtToken || typeof options.jwtToken !== \"string\") {\n throw new Error(\"Invalid JWT token: token must be a non-empty string\");\n }\n\n // Basic JWT format validation (3 parts separated by dots)\n const jwtParts = options.jwtToken.split(\".\");\n if (jwtParts.length !== 3) {\n throw new Error(\"Invalid JWT token format: token must have 3 parts separated by dots\");\n }\n\n // JWT authentication flow - direct API call to create wallet with JWT\n try {\n // This would typically make an API call to your backend\n // which would validate the JWT and create/retrieve the wallet\n const response = await fetch(\"/api/auth/jwt\", {\n method: \"POST\",\n headers: {\n \"Content-Type\": \"application/json\",\n Authorization: `Bearer ${options.jwtToken}`,\n \"X-PHANTOM-APPID\": options.appId,\n },\n body: JSON.stringify({\n appId: options.appId,\n customAuthData: options.customAuthData,\n }),\n });\n\n if (!response.ok) {\n let errorMessage = `HTTP ${response.status}`;\n try {\n const errorData = await response.json();\n errorMessage = errorData.message || errorData.error || errorMessage;\n } catch {\n errorMessage = response.statusText || errorMessage;\n }\n\n switch (response.status) {\n case 400:\n throw new Error(`Invalid JWT authentication request: ${errorMessage}`);\n case 401:\n throw new Error(`JWT token is invalid or expired: ${errorMessage}`);\n case 403:\n throw new Error(`JWT authentication forbidden: ${errorMessage}`);\n case 404:\n throw new Error(`JWT authentication endpoint not found: ${errorMessage}`);\n case 429:\n throw new Error(`Too many JWT authentication requests: ${errorMessage}`);\n case 500:\n case 502:\n case 503:\n case 504:\n throw new Error(`JWT authentication server error: ${errorMessage}`);\n default:\n throw new Error(`JWT authentication failed: ${errorMessage}`);\n }\n }\n\n let result;\n try {\n result = await response.json();\n } catch (parseError) {\n throw new Error(\"Invalid response from JWT authentication server: response is not valid JSON\");\n }\n\n if (!result.walletId) {\n throw new Error(\"Invalid JWT authentication response: missing walletId\");\n }\n\n return {\n walletId: result.walletId,\n provider: \"jwt\",\n userInfo: result.userInfo || {},\n };\n } catch (error) {\n if (error instanceof TypeError && error.message.includes(\"fetch\")) {\n throw new Error(\"JWT authentication failed: network error or invalid endpoint\");\n }\n\n if (error instanceof Error) {\n throw error; // Re-throw known errors\n }\n\n throw new Error(`JWT authentication error: ${String(error)}`);\n }\n }\n}\n","export function generateSessionId(): string {\n return (\n \"session_\" +\n Math.random().toString(36).substring(2, 15) +\n Math.random().toString(36).substring(2, 15) +\n \"_\" +\n Date.now()\n );\n}\n","import type { DebugLogger } from \"../interfaces\";\n\nexport async function retryWithBackoff<T>(\n operation: () => Promise<T>,\n operationName: string,\n logger: DebugLogger,\n maxRetries: number = 3,\n baseDelay: number = 1000,\n): Promise<T> {\n let lastError: Error;\n\n for (let attempt = 1; attempt <= maxRetries; attempt++) {\n try {\n logger.log(\"EMBEDDED_PROVIDER\", `Attempting ${operationName}`, {\n attempt,\n maxRetries,\n });\n return await operation();\n } catch (error) {\n lastError = error as Error;\n logger.warn(\"EMBEDDED_PROVIDER\", `${operationName} failed`, {\n attempt,\n maxRetries,\n error: error instanceof Error ? error.message : String(error),\n });\n\n if (attempt === maxRetries) {\n logger.error(\"EMBEDDED_PROVIDER\", `${operationName} failed after ${maxRetries} attempts`, {\n finalError: error instanceof Error ? error.message : String(error),\n });\n break;\n }\n\n // Exponential backoff: 1s, 2s, 4s\n const delay = baseDelay * Math.pow(2, attempt - 1);\n logger.log(\"EMBEDDED_PROVIDER\", `Retrying ${operationName} in ${delay}ms`, {\n attempt: attempt + 1,\n delay,\n });\n await new Promise(resolve => setTimeout(resolve, delay));\n }\n }\n\n throw lastError!;\n}\n","import { EventEmitter } from \"eventemitter3\";\nimport type { ISolanaChain } from \"@phantom/chain-interfaces\";\nimport type { EmbeddedProvider } from \"../embedded-provider\";\nimport { NetworkId } from \"@phantom/constants\";\nimport bs58 from \"bs58\";\nimport type { Transaction, VersionedTransaction } from \"@phantom/sdk-types\";\n\n/**\n * Embedded Solana chain implementation that is wallet adapter compliant\n */\nexport class EmbeddedSolanaChain implements ISolanaChain {\n private currentNetworkId: NetworkId = NetworkId.SOLANA_MAINNET;\n private _connected: boolean = false;\n private _publicKey: string | null = null;\n private eventEmitter: EventEmitter = new EventEmitter();\n\n constructor(private provider: EmbeddedProvider) {\n this.setupEventListeners();\n this.syncInitialState();\n }\n\n // Wallet adapter compliant properties\n get connected(): boolean {\n return this._connected;\n }\n\n get publicKey(): string | null {\n return this._publicKey;\n }\n\n private ensureConnected(): void {\n if (!this.provider.isConnected()) {\n throw new Error(\"Solana chain not available. Ensure SDK is connected.\");\n }\n }\n\n // Standard wallet adapter methods\n async signMessage(message: string | Uint8Array): Promise<{ signature: Uint8Array; publicKey: string }> {\n this.ensureConnected();\n const messageStr = typeof message === \"string\" ? message : new TextDecoder().decode(message);\n const result = await this.provider.signMessage({\n message: messageStr,\n networkId: this.currentNetworkId,\n });\n\n // Convert signature to Uint8Array - result.signature is base58 encoded from parseSignMessageResponse\n const signature =\n typeof result.signature === \"string\" ? new Uint8Array(bs58.decode(result.signature)) : result.signature;\n\n return {\n signature,\n publicKey: this._publicKey || \"\",\n };\n }\n\n signTransaction(_transaction: Transaction | VersionedTransaction): Promise<Transaction | VersionedTransaction> {\n return Promise.reject(new Error(\"signTransaction is not supported in embedded provider. Use signAndSendTransaction instead.\"));\n }\n\n async signAndSendTransaction(transaction: Transaction | VersionedTransaction): Promise<{ signature: string }> {\n this.ensureConnected();\n const result = await this.provider.signAndSendTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n if (!result.hash) {\n throw new Error(\"Transaction not submitted\");\n }\n return { signature: result.hash };\n }\n\n signAllTransactions(_transactions: (Transaction | VersionedTransaction)[]): Promise<(Transaction | VersionedTransaction)[]> {\n return Promise.reject(new Error(\"signAllTransactions is not supported in embedded provider. Use signAndSendAllTransactions instead.\"));\n }\n\n async signAndSendAllTransactions(transactions: (Transaction | VersionedTransaction)[]): Promise<{ signatures: string[] }> {\n const results = await Promise.all(transactions.map(tx => this.signAndSendTransaction(tx)));\n return { signatures: results.map(result => result.signature) };\n }\n\n connect(_options?: { onlyIfTrusted?: boolean }): Promise<{ publicKey: string }> {\n if (!this.provider.isConnected()) {\n throw new Error(\"Provider not connected. Call provider connect first.\");\n }\n const addresses = this.provider.getAddresses();\n const solanaAddr = addresses.find((a: any) => a.addressType === \"Solana\");\n if (!solanaAddr) throw new Error(\"No Solana address found\");\n\n this.updateConnectionState(true, solanaAddr.address);\n return Promise.resolve({ publicKey: solanaAddr.address });\n }\n\n async disconnect(): Promise<void> {\n // For embedded, disconnection is handled at SDK level\n return this.provider.disconnect();\n }\n\n switchNetwork(network: \"mainnet\" | \"devnet\"): Promise<void> {\n this.currentNetworkId = network === \"mainnet\" ? NetworkId.SOLANA_MAINNET : NetworkId.SOLANA_DEVNET;\n return Promise.resolve();\n }\n\n getPublicKey(): Promise<string | null> {\n if (!this.provider.isConnected()) return Promise.resolve(null);\n\n const addresses = this.provider.getAddresses();\n const solanaAddr = addresses.find((a: any) => a.addressType === \"Solana\");\n return Promise.resolve(solanaAddr?.address || null);\n }\n\n isConnected(): boolean {\n return this._connected && this.provider.isConnected();\n }\n\n private setupEventListeners(): void {\n // Listen to provider events and bridge to wallet adapter events\n this.provider.on(\"connect\", (data: any) => {\n const solanaAddress = data.addresses?.find((addr: any) => addr.addressType === \"Solana\");\n\n if (solanaAddress) {\n this.updateConnectionState(true, solanaAddress.address);\n this.eventEmitter.emit(\"connect\", solanaAddress.address);\n }\n });\n\n this.provider.on(\"disconnect\", () => {\n this.updateConnectionState(false, null);\n this.eventEmitter.emit(\"disconnect\");\n });\n }\n\n private syncInitialState(): void {\n if (this.provider.isConnected()) {\n const addresses = this.provider.getAddresses();\n const solanaAddress = addresses.find((a: any) => a.addressType === \"Solana\");\n\n if (solanaAddress) {\n this.updateConnectionState(true, solanaAddress.address);\n }\n }\n }\n\n private updateConnectionState(connected: boolean, publicKey: string | null): void {\n this._connected = connected;\n this._publicKey = publicKey;\n }\n\n // Event methods for interface compliance\n on(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.on(event, listener);\n }\n\n off(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.off(event, listener);\n }\n}\n","import { EventEmitter } from \"eventemitter3\";\nimport type { IEthereumChain, EthTransactionRequest } from \"@phantom/chain-interfaces\";\nimport type { EmbeddedProvider } from \"../embedded-provider\";\nimport { NetworkId, chainIdToNetworkId, networkIdToChainId } from \"@phantom/constants\";\nimport { base64urlDecode } from \"@phantom/base64url\";\nimport { Buffer } from \"buffer\";\n\n/**\n * Embedded Ethereum chain implementation that is EIP-1193 compliant\n */\nexport class EmbeddedEthereumChain implements IEthereumChain {\n private currentNetworkId: NetworkId = NetworkId.ETHEREUM_MAINNET;\n private _connected: boolean = false;\n private _accounts: string[] = [];\n private eventEmitter: EventEmitter = new EventEmitter();\n\n constructor(private provider: EmbeddedProvider) {\n this.setupEventListeners();\n this.syncInitialState();\n }\n\n // EIP-1193 compliant properties\n get connected(): boolean {\n return this._connected;\n }\n\n get chainId(): string {\n const chainId = networkIdToChainId(this.currentNetworkId) || 1;\n return `0x${chainId.toString(16)}`;\n }\n\n get accounts(): string[] {\n return this._accounts;\n }\n\n private ensureConnected(): void {\n if (!this.provider.isConnected()) {\n throw new Error(\"Ethereum chain not available. Ensure SDK is connected.\");\n }\n }\n\n async request<T = any>(args: { method: string; params?: unknown[] }): Promise<T> {\n this.ensureConnected();\n return this.handleEmbeddedRequest(args);\n }\n\n // Connection methods\n connect(): Promise<string[]> {\n if (!this.provider.isConnected()) {\n throw new Error(\"Provider not connected. Call provider connect first.\");\n }\n const addresses = this.provider.getAddresses();\n const ethAddresses = addresses.filter((a: any) => a.addressType === \"Ethereum\").map((a: any) => a.address);\n\n this.updateConnectionState(true, ethAddresses);\n return Promise.resolve(ethAddresses);\n }\n\n async disconnect(): Promise<void> {\n await this.provider.disconnect();\n }\n\n // Standard compliant methods (return raw values)\n async signPersonalMessage(message: string, address: string): Promise<string> {\n return await this.request<string>({\n method: \"personal_sign\",\n params: [message, address],\n });\n }\n\n async signTypedData(typedData: any, address: string): Promise<string> {\n return await this.request<string>({\n method: \"eth_signTypedData_v4\",\n params: [address, JSON.stringify(typedData)],\n });\n }\n\n async signTransaction(transaction: EthTransactionRequest): Promise<string> {\n const result = await this.provider.signTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n // Convert base64url encoded signature to hex format for Ethereum (same logic as parseEVMSignatureResponse)\n try {\n const signatureBytes = base64urlDecode(result.rawTransaction);\n return \"0x\" + Buffer.from(signatureBytes).toString(\"hex\");\n } catch (error) {\n // Fallback: assume it's already hex format\n return result.rawTransaction.startsWith(\"0x\") ? result.rawTransaction : \"0x\" + result.rawTransaction;\n }\n }\n\n async sendTransaction(transaction: EthTransactionRequest): Promise<string> {\n const result = await this.provider.signAndSendTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n if (!result.hash) {\n // Throw error as we didn't submit the transaction\n throw new Error(\"Transaction not submitted\");\n }\n return result.hash;\n }\n\n switchChain(chainId: number): Promise<void> {\n const networkId = chainIdToNetworkId(chainId);\n if (!networkId) {\n throw new Error(`Unsupported chainId: ${chainId}`);\n }\n this.currentNetworkId = networkId;\n this.eventEmitter.emit(\"chainChanged\", `0x${chainId.toString(16)}`);\n return Promise.resolve();\n }\n\n getChainId(): Promise<number> {\n const chainId = networkIdToChainId(this.currentNetworkId);\n return Promise.resolve(chainId || 1); // Default to mainnet\n }\n\n async getAccounts(): Promise<string[]> {\n return this.request({ method: \"eth_accounts\" });\n }\n\n isConnected(): boolean {\n return this._connected && this.provider.isConnected();\n }\n\n private setupEventListeners(): void {\n // Listen to provider events and bridge to EIP-1193 events\n this.provider.on(\"connect\", (data: any) => {\n const ethAddresses =\n data.addresses?.filter((addr: any) => addr.addressType === \"Ethereum\")?.map((addr: any) => addr.address) || [];\n\n if (ethAddresses.length > 0) {\n this.updateConnectionState(true, ethAddresses);\n this.eventEmitter.emit(\"connect\", { chainId: this.chainId });\n this.eventEmitter.emit(\"accountsChanged\", ethAddresses);\n }\n });\n\n this.provider.on(\"disconnect\", () => {\n this.updateConnectionState(false, []);\n this.eventEmitter.emit(\"disconnect\", { code: 4900, message: \"Provider disconnected\" });\n this.eventEmitter.emit(\"accountsChanged\", []);\n });\n }\n\n private syncInitialState(): void {\n if (this.provider.isConnected()) {\n const addresses = this.provider.getAddresses();\n const ethAddresses = addresses.filter((a: any) => a.addressType === \"Ethereum\").map((a: any) => a.address);\n\n if (ethAddresses.length > 0) {\n this.updateConnectionState(true, ethAddresses);\n }\n }\n }\n\n private updateConnectionState(connected: boolean, accounts: string[]): void {\n this._connected = connected;\n this._accounts = accounts;\n }\n\n private async handleEmbeddedRequest<T>(args: { method: string; params?: unknown[] }): Promise<T> {\n // Convert Ethereum RPC calls to embedded provider API\n switch (args.method) {\n case \"personal_sign\": {\n const [message, _address] = args.params as [string, string];\n const result = await this.provider.signMessage({\n message,\n networkId: this.currentNetworkId,\n });\n return result.signature as T;\n }\n\n case \"eth_signTypedData_v4\": {\n const [_typedDataAddress, typedDataStr] = args.params as [string, string];\n const _typedData = JSON.parse(typedDataStr);\n const typedDataResult = await this.provider.signMessage({\n message: typedDataStr, // Pass the stringified typed data as message\n networkId: this.currentNetworkId,\n });\n return typedDataResult.signature as T;\n }\n\n case \"eth_signTransaction\": {\n const [transaction] = args.params as [EthTransactionRequest];\n // If the transaction has a chainId, use that NetworkId\n const networkIdFromTx = transaction.chainId\n ? chainIdToNetworkId(\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16),\n )\n : null;\n\n const signResult = await this.provider.signTransaction({\n transaction,\n networkId: networkIdFromTx || this.currentNetworkId,\n });\n return signResult.rawTransaction as T;\n }\n\n case \"eth_sendTransaction\": {\n const [transaction] = args.params as [EthTransactionRequest];\n // If the transaction has a chainId, submit it to that NetworkId\n const networkIdFromTx = transaction.chainId\n ? chainIdToNetworkId(\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16),\n )\n : null;\n\n const sendResult = await this.provider.signAndSendTransaction({\n transaction,\n networkId: networkIdFromTx || this.currentNetworkId,\n });\n return sendResult.hash as T;\n }\n\n case \"eth_accounts\": {\n const addresses = this.provider.getAddresses();\n const ethAddr = addresses.find((a: any) => a.addressType === \"Ethereum\");\n return (ethAddr ? [ethAddr.address] : []) as T;\n }\n\n case \"eth_chainId\": {\n return `0x${(networkIdToChainId(this.currentNetworkId) || 1).toString(16)}` as T;\n }\n\n case \"wallet_switchEthereumChain\": {\n const [{ chainId }] = args.params as [{ chainId: string }];\n const numericChainId = parseInt(chainId, 16);\n await this.switchChain(numericChainId);\n return undefined as T;\n }\n\n default:\n throw new Error(`Embedded provider doesn't support method: ${args.method}`);\n }\n }\n\n // Event methods for interface compliance\n on(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.on(event, listener);\n }\n\n off(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.off(event, listener);\n }\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,oBAA2C;AAE3C,mBAA2B;AAC3B,IAAAA,oBAAgC;AAChC,IAAAC,eAAiB;AACjB,qBAOO;;;ACHA,IAAM,mCAAmC,IAAI,KAAK,KAAK,KAAK;AAM5D,IAAM,kCAAkC,IAAI,KAAK,KAAK,KAAK;;;ACb3D,IAAM,UAAN,MAAc;AAAA,EACnB,MAAM,aAAa,SAA8C;AAE/D,QAAI,CAAC,QAAQ,YAAY,OAAO,QAAQ,aAAa,UAAU;AAC7D,YAAM,IAAI,MAAM,qDAAqD;AAAA,IACvE;AAGA,UAAM,WAAW,QAAQ,SAAS,MAAM,GAAG;AAC3C,QAAI,SAAS,WAAW,GAAG;AACzB,YAAM,IAAI,MAAM,qEAAqE;AAAA,IACvF;AAGA,QAAI;AAGF,YAAM,WAAW,MAAM,MAAM,iBAAiB;AAAA,QAC5C,QAAQ;AAAA,QACR,SAAS;AAAA,UACP,gBAAgB;AAAA,UAChB,eAAe,UAAU,QAAQ,QAAQ;AAAA,UACzC,mBAAmB,QAAQ;AAAA,QAC7B;AAAA,QACA,MAAM,KAAK,UAAU;AAAA,UACnB,OAAO,QAAQ;AAAA,UACf,gBAAgB,QAAQ;AAAA,QAC1B,CAAC;AAAA,MACH,CAAC;AAED,UAAI,CAAC,SAAS,IAAI;AAChB,YAAI,eAAe,QAAQ,SAAS,MAAM;AAC1C,YAAI;AACF,gBAAM,YAAY,MAAM,SAAS,KAAK;AACtC,yBAAe,UAAU,WAAW,UAAU,SAAS;AAAA,QACzD,QAAQ;AACN,yBAAe,SAAS,cAAc;AAAA,QACxC;AAEA,gBAAQ,SAAS,QAAQ;AAAA,UACvB,KAAK;AACH,kBAAM,IAAI,MAAM,uCAAuC,YAAY,EAAE;AAAA,UACvE,KAAK;AACH,kBAAM,IAAI,MAAM,oCAAoC,YAAY,EAAE;AAAA,UACpE,KAAK;AACH,kBAAM,IAAI,MAAM,iCAAiC,YAAY,EAAE;AAAA,UACjE,KAAK;AACH,kBAAM,IAAI,MAAM,0CAA0C,YAAY,EAAE;AAAA,UAC1E,KAAK;AACH,kBAAM,IAAI,MAAM,yCAAyC,YAAY,EAAE;AAAA,UACzE,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AAAA,UACL,KAAK;AACH,kBAAM,IAAI,MAAM,oCAAoC,YAAY,EAAE;AAAA,UACpE;AACE,kBAAM,IAAI,MAAM,8BAA8B,YAAY,EAAE;AAAA,QAChE;AAAA,MACF;AAEA,UAAI;AACJ,UAAI;AACF,iBAAS,MAAM,SAAS,KAAK;AAAA,MAC/B,SAAS,YAAY;AACnB,cAAM,IAAI,MAAM,6EAA6E;AAAA,MAC/F;AAEA,UAAI,CAAC,OAAO,UAAU;AACpB,cAAM,IAAI,MAAM,uDAAuD;AAAA,MACzE;AAEA,aAAO;AAAA,QACL,UAAU,OAAO;AAAA,QACjB,UAAU;AAAA,QACV,UAAU,OAAO,YAAY,CAAC;AAAA,MAChC;AAAA,IACF,SAAS,OAAO;AACd,UAAI,iBAAiB,aAAa,MAAM,QAAQ,SAAS,OAAO,GAAG;AACjE,cAAM,IAAI,MAAM,8DAA8D;AAAA,MAChF;AAEA,UAAI,iBAAiB,OAAO;AAC1B,cAAM;AAAA,MACR;AAEA,YAAM,IAAI,MAAM,6BAA6B,OAAO,KAAK,CAAC,EAAE;AAAA,IAC9D;AAAA,EACF;AACF;;;AC1FO,SAAS,oBAA4B;AAC1C,SACE,aACA,KAAK,OAAO,EAAE,SAAS,EAAE,EAAE,UAAU,GAAG,EAAE,IAC1C,KAAK,OAAO,EAAE,SAAS,EAAE,EAAE,UAAU,GAAG,EAAE,IAC1C,MACA,KAAK,IAAI;AAEb;;;ACNA,eAAsB,iBACpB,WACA,eACA,QACA,aAAqB,GACrB,YAAoB,KACR;AACZ,MAAI;AAEJ,WAAS,UAAU,GAAG,WAAW,YAAY,WAAW;AACtD,QAAI;AACF,aAAO,IAAI,qBAAqB,cAAc,aAAa,IAAI;AAAA,QAC7D;AAAA,QACA;AAAA,MACF,CAAC;AACD,aAAO,MAAM,UAAU;AAAA,IACzB,SAAS,OAAO;AACd,kBAAY;AACZ,aAAO,KAAK,qBAAqB,GAAG,aAAa,WAAW;AAAA,QAC1D;AAAA,QACA;AAAA,QACA,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,MAC9D,CAAC;AAED,UAAI,YAAY,YAAY;AAC1B,eAAO,MAAM,qBAAqB,GAAG,aAAa,iBAAiB,UAAU,aAAa;AAAA,UACxF,YAAY,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QACnE,CAAC;AACD;AAAA,MACF;AAGA,YAAM,QAAQ,YAAY,KAAK,IAAI,GAAG,UAAU,CAAC;AACjD,aAAO,IAAI,qBAAqB,YAAY,aAAa,OAAO,KAAK,MAAM;AAAA,QACzE,SAAS,UAAU;AAAA,QACnB;AAAA,MACF,CAAC;AACD,YAAM,IAAI,QAAQ,aAAW,WAAW,SAAS,KAAK,CAAC;AAAA,IACzD;AAAA,EACF;AAEA,QAAM;AACR;;;AC5CA,2BAA6B;AAG7B,uBAA0B;AAC1B,kBAAiB;AAMV,IAAM,sBAAN,MAAkD;AAAA,EAMvD,YAAoB,UAA4B;AAA5B;AALpB,SAAQ,mBAA8B,2BAAU;AAChD,SAAQ,aAAsB;AAC9B,SAAQ,aAA4B;AACpC,SAAQ,eAA6B,IAAI,kCAAa;AAGpD,SAAK,oBAAoB;AACzB,SAAK,iBAAiB;AAAA,EACxB;AAAA;AAAA,EAGA,IAAI,YAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,YAA2B;AAC7B,WAAO,KAAK;AAAA,EACd;AAAA,EAEQ,kBAAwB;AAC9B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AAAA,EACF;AAAA;AAAA,EAGA,MAAM,YAAY,SAAqF;AACrG,SAAK,gBAAgB;AACrB,UAAM,aAAa,OAAO,YAAY,WAAW,UAAU,IAAI,YAAY,EAAE,OAAO,OAAO;AAC3F,UAAM,SAAS,MAAM,KAAK,SAAS,YAAY;AAAA,MAC7C,SAAS;AAAA,MACT,WAAW,KAAK;AAAA,IAClB,CAAC;AAGD,UAAM,YACJ,OAAO,OAAO,cAAc,WAAW,IAAI,WAAW,YAAAC,QAAK,OAAO,OAAO,SAAS,CAAC,IAAI,OAAO;AAEhG,WAAO;AAAA,MACL;AAAA,MACA,WAAW,KAAK,cAAc;AAAA,IAChC;AAAA,EACF;AAAA,EAEA,gBAAgB,cAA+F;AAC7G,WAAO,QAAQ,OAAO,IAAI,MAAM,4FAA4F,CAAC;AAAA,EAC/H;AAAA,EAEA,MAAM,uBAAuB,aAAiF;AAC5G,SAAK,gBAAgB;AACrB,UAAM,SAAS,MAAM,KAAK,SAAS,uBAAuB;AAAA,MACxD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AACD,QAAI,CAAC,OAAO,MAAM;AAChB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AACA,WAAO,EAAE,WAAW,OAAO,KAAK;AAAA,EAClC;AAAA,EAEA,oBAAoB,eAAwG;AAC1H,WAAO,QAAQ,OAAO,IAAI,MAAM,oGAAoG,CAAC;AAAA,EACvI;AAAA,EAEA,MAAM,2BAA2B,cAAyF;AACxH,UAAM,UAAU,MAAM,QAAQ,IAAI,aAAa,IAAI,QAAM,KAAK,uBAAuB,EAAE,CAAC,CAAC;AACzF,WAAO,EAAE,YAAY,QAAQ,IAAI,YAAU,OAAO,SAAS,EAAE;AAAA,EAC/D;AAAA,EAEA,QAAQ,UAAwE;AAC9E,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AACA,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,aAAa,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AACxE,QAAI,CAAC;AAAY,YAAM,IAAI,MAAM,yBAAyB;AAE1D,SAAK,sBAAsB,MAAM,WAAW,OAAO;AACnD,WAAO,QAAQ,QAAQ,EAAE,WAAW,WAAW,QAAQ,CAAC;AAAA,EAC1D;AAAA,EAEA,MAAM,aAA4B;AAEhC,WAAO,KAAK,SAAS,WAAW;AAAA,EAClC;AAAA,EAEA,cAAc,SAA8C;AAC1D,SAAK,mBAAmB,YAAY,YAAY,2BAAU,iBAAiB,2BAAU;AACrF,WAAO,QAAQ,QAAQ;AAAA,EACzB;AAAA,EAEA,eAAuC;AACrC,QAAI,CAAC,KAAK,SAAS,YAAY;AAAG,aAAO,QAAQ,QAAQ,IAAI;AAE7D,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,aAAa,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AACxE,WAAO,QAAQ,QAAQ,YAAY,WAAW,IAAI;AAAA,EACpD;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,cAAc,KAAK,SAAS,YAAY;AAAA,EACtD;AAAA,EAEQ,sBAA4B;AAElC,SAAK,SAAS,GAAG,WAAW,CAAC,SAAc;AACzC,YAAM,gBAAgB,KAAK,WAAW,KAAK,CAAC,SAAc,KAAK,gBAAgB,QAAQ;AAEvF,UAAI,eAAe;AACjB,aAAK,sBAAsB,MAAM,cAAc,OAAO;AACtD,aAAK,aAAa,KAAK,WAAW,cAAc,OAAO;AAAA,MACzD;AAAA,IACF,CAAC;AAED,SAAK,SAAS,GAAG,cAAc,MAAM;AACnC,WAAK,sBAAsB,OAAO,IAAI;AACtC,WAAK,aAAa,KAAK,YAAY;AAAA,IACrC,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAyB;AAC/B,QAAI,KAAK,SAAS,YAAY,GAAG;AAC/B,YAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,YAAM,gBAAgB,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AAE3E,UAAI,eAAe;AACjB,aAAK,sBAAsB,MAAM,cAAc,OAAO;AAAA,MACxD;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,sBAAsB,WAAoB,WAAgC;AAChF,SAAK,aAAa;AAClB,SAAK,aAAa;AAAA,EACpB;AAAA;AAAA,EAGA,GAAG,OAAe,UAA0C;AAC1D,SAAK,aAAa,GAAG,OAAO,QAAQ;AAAA,EACtC;AAAA,EAEA,IAAI,OAAe,UAA0C;AAC3D,SAAK,aAAa,IAAI,OAAO,QAAQ;AAAA,EACvC;AACF;;;AC3JA,IAAAC,wBAA6B;AAG7B,IAAAC,oBAAkE;AAClE,uBAAgC;AAChC,oBAAuB;AAKhB,IAAM,wBAAN,MAAsD;AAAA,EAM3D,YAAoB,UAA4B;AAA5B;AALpB,SAAQ,mBAA8B,4BAAU;AAChD,SAAQ,aAAsB;AAC9B,SAAQ,YAAsB,CAAC;AAC/B,SAAQ,eAA6B,IAAI,mCAAa;AAGpD,SAAK,oBAAoB;AACzB,SAAK,iBAAiB;AAAA,EACxB;AAAA;AAAA,EAGA,IAAI,YAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,UAAkB;AACpB,UAAM,cAAU,sCAAmB,KAAK,gBAAgB,KAAK;AAC7D,WAAO,KAAK,QAAQ,SAAS,EAAE,CAAC;AAAA,EAClC;AAAA,EAEA,IAAI,WAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEQ,kBAAwB;AAC9B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,wDAAwD;AAAA,IAC1E;AAAA,EACF;AAAA,EAEA,MAAM,QAAiB,MAA0D;AAC/E,SAAK,gBAAgB;AACrB,WAAO,KAAK,sBAAsB,IAAI;AAAA,EACxC;AAAA;AAAA,EAGA,UAA6B;AAC3B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AACA,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,eAAe,UAAU,OAAO,CAAC,MAAW,EAAE,gBAAgB,UAAU,EAAE,IAAI,CAAC,MAAW,EAAE,OAAO;AAEzG,SAAK,sBAAsB,MAAM,YAAY;AAC7C,WAAO,QAAQ,QAAQ,YAAY;AAAA,EACrC;AAAA,EAEA,MAAM,aAA4B;AAChC,UAAM,KAAK,SAAS,WAAW;AAAA,EACjC;AAAA;AAAA,EAGA,MAAM,oBAAoB,SAAiB,SAAkC;AAC3E,WAAO,MAAM,KAAK,QAAgB;AAAA,MAChC,QAAQ;AAAA,MACR,QAAQ,CAAC,SAAS,OAAO;AAAA,IAC3B,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,cAAc,WAAgB,SAAkC;AACpE,WAAO,MAAM,KAAK,QAAgB;AAAA,MAChC,QAAQ;AAAA,MACR,QAAQ,CAAC,SAAS,KAAK,UAAU,SAAS,CAAC;AAAA,IAC7C,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,gBAAgB,aAAqD;AACzE,UAAM,SAAS,MAAM,KAAK,SAAS,gBAAgB;AAAA,MACjD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AAED,QAAI;AACF,YAAM,qBAAiB,kCAAgB,OAAO,cAAc;AAC5D,aAAO,OAAO,qBAAO,KAAK,cAAc,EAAE,SAAS,KAAK;AAAA,IAC1D,SAAS,OAAO;AAEd,aAAO,OAAO,eAAe,WAAW,IAAI,IAAI,OAAO,iBAAiB,OAAO,OAAO;AAAA,IACxF;AAAA,EACF;AAAA,EAEA,MAAM,gBAAgB,aAAqD;AACzE,UAAM,SAAS,MAAM,KAAK,SAAS,uBAAuB;AAAA,MACxD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AACD,QAAI,CAAC,OAAO,MAAM;AAEhB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AACA,WAAO,OAAO;AAAA,EAChB;AAAA,EAEA,YAAY,SAAgC;AAC1C,UAAM,gBAAY,sCAAmB,OAAO;AAC5C,QAAI,CAAC,WAAW;AACd,YAAM,IAAI,MAAM,wBAAwB,OAAO,EAAE;AAAA,IACnD;AACA,SAAK,mBAAmB;AACxB,SAAK,aAAa,KAAK,gBAAgB,KAAK,QAAQ,SAAS,EAAE,CAAC,EAAE;AAClE,WAAO,QAAQ,QAAQ;AAAA,EACzB;AAAA,EAEA,aAA8B;AAC5B,UAAM,cAAU,sCAAmB,KAAK,gBAAgB;AACxD,WAAO,QAAQ,QAAQ,WAAW,CAAC;AAAA,EACrC;AAAA,EAEA,MAAM,cAAiC;AACrC,WAAO,KAAK,QAAQ,EAAE,QAAQ,eAAe,CAAC;AAAA,EAChD;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,cAAc,KAAK,SAAS,YAAY;AAAA,EACtD;AAAA,EAEQ,sBAA4B;AAElC,SAAK,SAAS,GAAG,WAAW,CAAC,SAAc;AACzC,YAAM,eACJ,KAAK,WAAW,OAAO,CAAC,SAAc,KAAK,gBAAgB,UAAU,GAAG,IAAI,CAAC,SAAc,KAAK,OAAO,KAAK,CAAC;AAE/G,UAAI,aAAa,SAAS,GAAG;AAC3B,aAAK,sBAAsB,MAAM,YAAY;AAC7C,aAAK,aAAa,KAAK,WAAW,EAAE,SAAS,KAAK,QAAQ,CAAC;AAC3D,aAAK,aAAa,KAAK,mBAAmB,YAAY;AAAA,MACxD;AAAA,IACF,CAAC;AAED,SAAK,SAAS,GAAG,cAAc,MAAM;AACnC,WAAK,sBAAsB,OAAO,CAAC,CAAC;AACpC,WAAK,aAAa,KAAK,cAAc,EAAE,MAAM,MAAM,SAAS,wBAAwB,CAAC;AACrF,WAAK,aAAa,KAAK,mBAAmB,CAAC,CAAC;AAAA,IAC9C,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAyB;AAC/B,QAAI,KAAK,SAAS,YAAY,GAAG;AAC/B,YAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,YAAM,eAAe,UAAU,OAAO,CAAC,MAAW,EAAE,gBAAgB,UAAU,EAAE,IAAI,CAAC,MAAW,EAAE,OAAO;AAEzG,UAAI,aAAa,SAAS,GAAG;AAC3B,aAAK,sBAAsB,MAAM,YAAY;AAAA,MAC/C;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,sBAAsB,WAAoB,UAA0B;AAC1E,SAAK,aAAa;AAClB,SAAK,YAAY;AAAA,EACnB;AAAA,EAEA,MAAc,sBAAyB,MAA0D;AAE/F,YAAQ,KAAK,QAAQ;AAAA,MACnB,KAAK,iBAAiB;AACpB,cAAM,CAAC,SAAS,QAAQ,IAAI,KAAK;AACjC,cAAM,SAAS,MAAM,KAAK,SAAS,YAAY;AAAA,UAC7C;AAAA,UACA,WAAW,KAAK;AAAA,QAClB,CAAC;AACD,eAAO,OAAO;AAAA,MAChB;AAAA,MAEA,KAAK,wBAAwB;AAC3B,cAAM,CAAC,mBAAmB,YAAY,IAAI,KAAK;AAC/C,cAAM,aAAa,KAAK,MAAM,YAAY;AAC1C,cAAM,kBAAkB,MAAM,KAAK,SAAS,YAAY;AAAA,UACtD,SAAS;AAAA;AAAA,UACT,WAAW,KAAK;AAAA,QAClB,CAAC;AACD,eAAO,gBAAgB;AAAA,MACzB;AAAA,MAEA,KAAK,uBAAuB;AAC1B,cAAM,CAAC,WAAW,IAAI,KAAK;AAE3B,cAAM,kBAAkB,YAAY,cAChC;AAAA,UACE,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAAA,QAClG,IACA;AAEJ,cAAM,aAAa,MAAM,KAAK,SAAS,gBAAgB;AAAA,UACrD;AAAA,UACA,WAAW,mBAAmB,KAAK;AAAA,QACrC,CAAC;AACD,eAAO,WAAW;AAAA,MACpB;AAAA,MAEA,KAAK,uBAAuB;AAC1B,cAAM,CAAC,WAAW,IAAI,KAAK;AAE3B,cAAM,kBAAkB,YAAY,cAChC;AAAA,UACE,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAAA,QAClG,IACA;AAEJ,cAAM,aAAa,MAAM,KAAK,SAAS,uBAAuB;AAAA,UAC5D;AAAA,UACA,WAAW,mBAAmB,KAAK;AAAA,QACrC,CAAC;AACD,eAAO,WAAW;AAAA,MACpB;AAAA,MAEA,KAAK,gBAAgB;AACnB,cAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,cAAM,UAAU,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,UAAU;AACvE,eAAQ,UAAU,CAAC,QAAQ,OAAO,IAAI,CAAC;AAAA,MACzC;AAAA,MAEA,KAAK,eAAe;AAClB,eAAO,UAAM,sCAAmB,KAAK,gBAAgB,KAAK,GAAG,SAAS,EAAE,CAAC;AAAA,MAC3E;AAAA,MAEA,KAAK,8BAA8B;AACjC,cAAM,CAAC,EAAE,QAAQ,CAAC,IAAI,KAAK;AAC3B,cAAM,iBAAiB,SAAS,SAAS,EAAE;AAC3C,cAAM,KAAK,YAAY,cAAc;AACrC,eAAO;AAAA,MACT;AAAA,MAEA;AACE,cAAM,IAAI,MAAM,6CAA6C,KAAK,MAAM,EAAE;AAAA,IAC9E;AAAA,EACF;AAAA;AAAA,EAGA,GAAG,OAAe,UAA0C;AAC1D,SAAK,aAAa,GAAG,OAAO,QAAQ;AAAA,EACtC;AAAA,EAEA,IAAI,OAAe,UAA0C;AAC3D,SAAK,aAAa,IAAI,OAAO,QAAQ;AAAA,EACvC;AACF;;;ANpMO,IAAM,mBAAN,MAAuB;AAAA,EAkB5B,YAAY,QAAgC,UAA2B,QAAqB;AAV5F,SAAQ,SAA+B;AACvC,SAAQ,WAA0B;AAClC,SAAQ,YAA6B,CAAC;AAMtC,SAAQ,iBAAiE,oBAAI,IAAI;AAG/E,SAAK,SAAS;AACd,SAAK,OAAO,IAAI,qBAAqB,iCAAiC,EAAE,OAAO,CAAC;AAGhF,QAAI,OAAO,uBAAuB,cAAc;AAC9C,YAAM,IAAI,MAAM,+EAA+E;AAAA,IACjG;AAEA,SAAK,SAAS;AACd,SAAK,WAAW;AAChB,SAAK,UAAU,SAAS;AACxB,SAAK,eAAe,SAAS;AAC7B,SAAK,oBAAoB,SAAS;AAClC,SAAK,UAAU,SAAS;AACxB,SAAK,UAAU,IAAI,QAAQ;AAG3B,SAAK,SAAS,IAAI,oBAAoB,IAAI;AAC1C,SAAK,WAAW,IAAI,sBAAsB,IAAI;AAE9C,SAAK,OAAO,KAAK,qBAAqB,8BAA8B;AAAA,EAGtE;AAAA;AAAA;AAAA;AAAA,EAKA,GAAG,OAA8B,UAA+B;AAC9D,QAAI,CAAC,KAAK,eAAe,IAAI,KAAK,GAAG;AACnC,WAAK,eAAe,IAAI,OAAO,oBAAI,IAAI,CAAC;AAAA,IAC1C;AACA,SAAK,eAAe,IAAI,KAAK,EAAG,IAAI,QAAQ;AAC5C,SAAK,OAAO,IAAI,qBAAqB,wBAAwB,EAAE,MAAM,CAAC;AAAA,EACxE;AAAA,EAEA,IAAI,OAA8B,UAA+B;AAC/D,UAAM,YAAY,KAAK,eAAe,IAAI,KAAK;AAC/C,QAAI,WAAW;AACb,gBAAU,OAAO,QAAQ;AACzB,WAAK,OAAO,IAAI,qBAAqB,0BAA0B,EAAE,MAAM,CAAC;AAAA,IAC1E;AAAA,EACF;AAAA,EAEQ,KAAK,OAA8B,MAAkB;AAC3D,UAAM,YAAY,KAAK,eAAe,IAAI,KAAK;AAC/C,QAAI,aAAa,UAAU,OAAO,GAAG;AACnC,WAAK,OAAO,IAAI,qBAAqB,kBAAkB,EAAE,OAAO,eAAe,UAAU,MAAM,KAAK,CAAC;AACrG,gBAAU,QAAQ,cAAY;AAC5B,YAAI;AACF,mBAAS,IAAI;AAAA,QACf,SAAS,OAAO;AACd,eAAK,OAAO,MAAM,qBAAqB,wBAAwB,EAAE,OAAO,MAAM,CAAC;AAAA,QACjF;AAAA,MACF,CAAC;AAAA,IACH;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKQ,qBAAqB,WAA0C;AAErE,UAAM,UAAU,UAAU,MAAM,GAAG,EAAE,CAAC,EAAE,YAAY;AAGpD,QAAI;AACJ,YAAQ,SAAS;AAAA,MACf,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AAAA,MACL,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF;AAEE,4BAAoB,0BAAY;AAChC;AAAA,IACJ;AAGA,UAAM,kBAAkB,KAAK,UAAU;AAAA,MAAK,UAC1C,KAAK,YAAY,YAAY,MAAM,kBAAkB,YAAY;AAAA,IACnE;AAEA,WAAO,iBAAiB;AAAA,EAC1B;AAAA,EAEA,MAAc,4BAA4B,UAA4C;AAEpF,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,YAAY,MAAM;AAAA,MACtB,MAAM,KAAK,OAAQ,mBAAmB,UAAU,QAAW,eAAe;AAAA,MAC1E;AAAA,MACA,KAAK;AAAA,IACP,EAAE,MAAM,OAAM,UAAS;AACrB,WAAK,OAAO,MAAM,qBAAqB,0DAA0D;AAAA,QAC/F;AAAA,QACA,OAAO,MAAM;AAAA,QACb;AAAA,MACF,CAAC;AAED,YAAM,KAAK,QAAQ,aAAa;AAChC,WAAK,SAAS;AACd,WAAK,WAAW;AAChB,WAAK,YAAY,CAAC;AAClB,YAAM;AAAA,IACR,CAAC;AAGD,WAAO,UAAU,OAAO,UAAQ,KAAK,OAAO,aAAa,KAAK,UAAQ,SAAS,KAAK,WAAW,CAAC;AAAA,EAClG;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,wBAAwB,SAAkD;AACtF,QAAI,CAAC;AAAS,aAAO;AAErB,SAAK,OAAO,IAAI,qBAAqB,sCAAsC;AAAA,MACzE,WAAW,QAAQ;AAAA,MACnB,QAAQ,QAAQ;AAAA,MAChB,UAAU,QAAQ;AAAA,IACpB,CAAC;AAGD,QAAI,QAAQ,WAAW,aAAa;AAClC,YAAM,eAAe,KAAK,kBAAkB,SAAS,YAAY;AAGjE,UAAI,QAAQ,WAAW,aAAa,CAAC,cAAc;AACjD,aAAK,OAAO,KAAK,qBAAqB,wEAAwE;AAAA,UAC5G,WAAW,QAAQ;AAAA,UACnB,QAAQ,QAAQ;AAAA,QAClB,CAAC;AAED,cAAM,KAAK,QAAQ,aAAa;AAChC,eAAO;AAAA,MACT,WAES,gBAAgB,iBAAiB,QAAQ,WAAW;AAC3D,aAAK,OAAO,KAAK,qBAAqB,gCAAgC;AAAA,UACpE,iBAAiB,QAAQ;AAAA,UACzB;AAAA,QACF,CAAC;AACD,cAAM,KAAK,QAAQ,aAAa;AAChC,eAAO;AAAA,MACT;AAAA,IACF;AAGA,QAAI,QAAQ,WAAW,eAAe,CAAC,KAAK,eAAe,OAAO,GAAG;AACnE,WAAK,OAAO,KAAK,qBAAqB,mDAAmD;AAAA,QACvF,WAAW,QAAQ;AAAA,QACnB,wBAAwB,QAAQ;AAAA,MAClC,CAAC;AAED,YAAM,KAAK,QAAQ,aAAa;AAChC,aAAO;AAAA,IACT;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,sBAAsB,eAAuD;AAEzF,SAAK,OAAO,IAAI,qBAAqB,0BAA0B;AAC/D,QAAI,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC5C,cAAU,MAAM,KAAK,wBAAwB,OAAO;AAIpD,QAAI,WAAW,QAAQ,WAAW,aAAa;AAC7C,WAAK,OAAO,KAAK,qBAAqB,oCAAoC;AAAA,QACxE,WAAW,QAAQ;AAAA,QACnB,UAAU,QAAQ;AAAA,MACpB,CAAC;AAED,YAAM,KAAK,4BAA4B,OAAO;AAG9C,cAAQ,WAAW,KAAK,IAAI;AAC5B,YAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAK,OAAO,KAAK,qBAAqB,+CAA+C;AAAA,QACnF,UAAU,KAAK;AAAA,QACf,cAAc,KAAK,UAAU;AAAA,MAC/B,CAAC;AAGD,YAAM,KAAK,yBAAyB;AAEpC,YAAM,SAAwB;AAAA,QAC5B,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,MACV;AAGA,WAAK,KAAK,WAAW;AAAA,QACnB,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,MACV,CAAC;AAED,aAAO;AAAA,IACT;AAIA,SAAK,OAAO,IAAI,qBAAqB,0DAA0D;AAC/F,QAAI,KAAK,aAAa,wBAAwB;AAC5C,YAAM,aAAa,KAAK,aAAa,uBAAuB;AAC5D,UAAI,YAAY;AACd,aAAK,OAAO,KAAK,qBAAqB,0BAA0B;AAAA,UAC9D,UAAU,WAAW;AAAA,UACrB,UAAU,WAAW;AAAA,QACvB,CAAC;AAED,YAAI;AACF,iBAAO,MAAM,KAAK,uBAAuB,UAAU;AAAA,QACrD,SAAS,OAAO;AAGd,cAAI,iBAAiB,SAAS,MAAM,QAAQ,SAAS,iCAAiC,KAAK,CAAC,eAAe;AACzG,iBAAK,OAAO;AAAA,cACV;AAAA,cACA;AAAA,cACA;AAAA,gBACE,OAAO,MAAM;AAAA,gBACb,UAAU,WAAW;AAAA,cACvB;AAAA,YACF;AAGA,kBAAM,KAAK,QAAQ,aAAa;AAChC,mBAAO;AAAA,UACT;AAGA,gBAAM;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAGA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA,EAMQ,oBAAoB,aAAiC;AAC3D,QAAI,CAAC;AAAa;AAElB,QAAI,YAAY,YAAY,CAAC,CAAC,UAAU,SAAS,KAAK,EAAE,SAAS,YAAY,QAAQ,GAAG;AACtF,YAAM,IAAI,MAAM,0BAA0B,YAAY,QAAQ,uCAAuC;AAAA,IACvG;AAEA,QAAI,YAAY,aAAa,SAAS,CAAC,YAAY,UAAU;AAC3D,YAAM,IAAI,MAAM,qDAAqD;AAAA,IACvE;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOQ,eAAe,SAAkC;AACvD,QAAI,CAAC,SAAS;AACZ,aAAO;AAAA,IACT;AAGA,QAAI,CAAC,QAAQ,YAAY,CAAC,QAAQ,kBAAkB,CAAC,QAAQ,aAAa;AACxE,WAAK,OAAO,IAAI,qBAAqB,mCAAmC;AAAA,QACtE,aAAa,CAAC,CAAC,QAAQ;AAAA,QACvB,mBAAmB,CAAC,CAAC,QAAQ;AAAA,QAC7B,gBAAgB,CAAC,CAAC,QAAQ;AAAA,MAC5B,CAAC;AACD,aAAO;AAAA,IACT;AAGA,QAAI,QAAQ,WAAW,aAAa;AAClC,WAAK,OAAO,IAAI,qBAAqB,yBAAyB,EAAE,QAAQ,QAAQ,OAAO,CAAC;AACxF,aAAO;AAAA,IACT;AAGA,QAAI,CAAC,QAAQ,wBAAwB;AACnC,WAAK,OAAO,IAAI,qBAAqB,kDAAkD;AAAA,QACrF,WAAW,QAAQ;AAAA,MACrB,CAAC;AACD,aAAO;AAAA,IACT;AAGA,QAAI,KAAK,IAAI,KAAK,QAAQ,wBAAwB;AAChD,WAAK,OAAO,IAAI,qBAAqB,0CAA0C;AAAA,QAC7E,wBAAwB,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,QAC7E,MAAK,oBAAI,KAAK,GAAE,YAAY;AAAA,MAC9B,CAAC;AACD,aAAO;AAAA,IACT;AAEA,SAAK,OAAO,IAAI,qBAAqB,oBAAoB;AAAA,MACvD,WAAW,QAAQ;AAAA,MACnB,UAAU,QAAQ;AAAA,MAClB,sBAAsB,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,IAC7E,CAAC;AACD,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAM,cAA6B;AACjC,QAAI;AACF,WAAK,OAAO,IAAI,qBAAqB,+BAA+B;AAGpE,WAAK,KAAK,iBAAiB,EAAE,QAAQ,eAAe,CAAC;AAGrD,YAAM,SAAS,MAAM,KAAK,sBAAsB,IAAI;AAEpD,UAAI,QAAQ;AAEV,aAAK,OAAO,KAAK,qBAAqB,2BAA2B;AAAA,UAC/D,UAAU,OAAO;AAAA,UACjB,cAAc,OAAO,UAAU;AAAA,QACjC,CAAC;AAED,aAAK,KAAK,WAAW;AAAA,UACnB,UAAU,OAAO;AAAA,UACjB,WAAW,OAAO;AAAA,UAClB,QAAQ;AAAA,QACV,CAAC;AACD;AAAA,MACF;AAGA,WAAK,OAAO,IAAI,qBAAqB,6CAA6C;AAGlF,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO;AAAA,QACP,QAAQ;AAAA,MACV,CAAC;AAAA,IACH,SAAS,OAAO;AACd,WAAK,OAAO,MAAM,qBAAqB,uBAAuB;AAAA,QAC5D,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,MAC9D,CAAC;AAGD,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO,iBAAiB,QAAQ,MAAM,UAAU;AAAA,QAChD,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,+BAAyD;AAErE,SAAK,OAAO,IAAI,qBAAqB,sBAAsB;AAC3D,UAAM,cAAc,MAAM,KAAK,QAAQ,KAAK;AAC5C,SAAK,OAAO,IAAI,qBAAqB,uBAAuB;AAAA,MAC1D,WAAW,YAAY;AAAA,MACvB,OAAO,YAAY;AAAA,MACnB,WAAW,KAAK,QAAQ;AAAA,IAC1B,CAAC;AAGD,SAAK,OAAO,IAAI,qBAAqB,kCAAkC;AACvE,UAAM,aAAa,IAAI;AAAA,MACrB;AAAA,QACE,YAAY,KAAK,OAAO;AAAA,QACxB,SAAS;AAAA,UACP,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,QACzC;AAAA,MACF;AAAA,MACA,KAAK;AAAA,IACP;AAIA,UAAM,eAAe,KAAK,SAAS,QAAQ;AAC3C,UAAM,cAAc,YAAY,UAAU,MAAM,GAAG,CAAC;AAEpD,UAAM,mBAAmB,GAAG,KAAK,OAAO,MAAM,UAAU,GAAG,CAAC,CAAC,IAAI,YAAY,IAAI,WAAW;AAE5F,SAAK,OAAO,IAAI,qBAAqB,yBAAyB;AAAA,MAC5D;AAAA,MACA,WAAW,YAAY;AAAA,MACvB,UAAU;AAAA,IACZ,CAAC;AAGD,UAAM,yBAAqB,mCAAgB,aAAAC,QAAK,OAAO,YAAY,SAAS,CAAC;AAC7E,UAAM,cAAc;AAEpB,UAAM,WAAW,YAAQ,yBAAW,CAAC;AACrC,UAAM,EAAE,eAAe,IAAI,MAAM,WAAW,mBAAmB,kBAAkB;AAAA,MAC/E;AAAA,QACE;AAAA,QACA,MAAM;AAAA,QACN,gBAAgB;AAAA,UACd;AAAA,YACE,mBAAmB,QAAQ,WAAW;AAAA,YACtC,mBAAmB;AAAA,YACnB,WAAW;AAAA,YACX,WAAW;AAAA;AAAA;AAAA,UAGb;AAAA,QACF;AAAA,MACF;AAAA,IACF,CAAC;AACD,SAAK,OAAO,KAAK,qBAAqB,wBAAwB,EAAE,eAAe,CAAC;AAEhF,WAAO,EAAE,gBAAgB,aAAa,aAAa,SAAS;AAAA,EAC9D;AAAA,EAEA,MAAM,QAAQ,aAAmD;AAC/D,QAAI;AACF,WAAK,OAAO,KAAK,qBAAqB,sCAAsC;AAAA,QAC1E,aAAa,cACT;AAAA,UACE,UAAU,YAAY;AAAA,UACtB,aAAa,CAAC,CAAC,YAAY;AAAA,QAC7B,IACA;AAAA,MACN,CAAC;AAGD,WAAK,KAAK,iBAAiB;AAAA,QACzB,QAAQ;AAAA,QACR,aAAa,cAAc,EAAE,UAAU,YAAY,SAAS,IAAI;AAAA,MAClE,CAAC;AAGD,YAAM,iBAAiB,MAAM,KAAK,sBAAsB,KAAK;AAC7D,UAAI,gBAAgB;AAElB,aAAK,OAAO,KAAK,qBAAqB,4CAA4C;AAAA,UAChF,UAAU,eAAe;AAAA,UACzB,cAAc,eAAe,UAAU;AAAA,QACzC,CAAC;AAGD,aAAK,KAAK,WAAW;AAAA,UACnB,UAAU,eAAe;AAAA,UACzB,WAAW,eAAe;AAAA,UAC1B,QAAQ;AAAA,QACV,CAAC;AAED,eAAO;AAAA,MACT;AAGA,WAAK,oBAAoB,WAAW;AAGpC,WAAK,OAAO,KAAK,qBAAqB,gDAAgD;AACtF,YAAM,EAAE,gBAAgB,aAAa,aAAa,SAAS,IAAI,MAAM,KAAK,6BAA6B;AACvG,YAAM,UAAU,MAAM,KAAK,eAAe,gBAAgB,aAAa,aAAa,aAAa,QAAQ;AAGzG,UAAI,CAAC,SAAS;AAEZ,eAAO;AAAA,UACL,WAAW,CAAC;AAAA,UACZ,QAAQ;AAAA,QACV;AAAA,MACF;AAIA,UAAI,CAAC,eAAe,YAAY,aAAa,SAAS,KAAK,OAAO,uBAAuB,cAAc;AACrG,gBAAQ,WAAW,KAAK,IAAI;AAC5B,cAAM,KAAK,QAAQ,YAAY,OAAO;AAAA,MACxC;AAGA,YAAM,KAAK,4BAA4B,OAAO;AAG9C,YAAM,KAAK,yBAAyB;AAEpC,YAAM,SAAwB;AAAA,QAC5B,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,MACV;AAGA,WAAK,KAAK,WAAW;AAAA,QACnB,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,MACV,CAAC;AAED,aAAO;AAAA,IACT,SAAS,OAAO;AAEd,WAAK,OAAO,MAAM,qBAAqB,6BAA6B;AAAA,QAClE,OACE,iBAAiB,QACb;AAAA,UACE,MAAM,MAAM;AAAA,UACZ,SAAS,MAAM;AAAA,UACf,OAAO,MAAM;AAAA,QACf,IACA;AAAA,MACR,CAAC;AAGD,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QAC5D,QAAQ;AAAA,MACV,CAAC;AAGD,UAAI,iBAAiB,OAAO;AAE1B,YAAI,MAAM,QAAQ,SAAS,WAAW,KAAK,MAAM,QAAQ,SAAS,SAAS,GAAG;AAC5E,gBAAM,IAAI;AAAA,YACR;AAAA,UACF;AAAA,QACF;AAEA,YAAI,MAAM,QAAQ,SAAS,SAAS,KAAK,MAAM,QAAQ,SAAS,OAAO,GAAG;AACxE,gBAAM,IAAI;AAAA,YACR;AAAA,UACF;AAAA,QACF;AAEA,YAAI,MAAM,QAAQ,SAAS,KAAK,KAAK,MAAM,QAAQ,SAAS,KAAK,GAAG;AAClE,gBAAM,IAAI,MAAM,6BAA6B,MAAM,OAAO,EAAE;AAAA,QAC9D;AAEA,YAAI,MAAM,QAAQ,SAAS,gBAAgB,KAAK,MAAM,QAAQ,SAAS,MAAM,GAAG;AAC9E,gBAAM,IAAI,MAAM,yBAAyB,MAAM,OAAO,EAAE;AAAA,QAC1D;AAEA,YAAI,MAAM,QAAQ,SAAS,cAAc,KAAK,MAAM,QAAQ,SAAS,QAAQ,GAAG;AAC9E,gBAAM,IAAI,MAAM,0BAA0B,MAAM,OAAO,EAAE;AAAA,QAC3D;AAGA,cAAM;AAAA,MACR;AAGA,YAAM,IAAI,MAAM,sCAAsC,OAAO,KAAK,CAAC,EAAE;AAAA,IACvE;AAAA,EACF;AAAA,EAEA,MAAM,aAA4B;AAChC,UAAM,eAAe,KAAK,WAAW;AAErC,UAAM,KAAK,QAAQ,aAAa;AAEhC,SAAK,SAAS;AACd,SAAK,WAAW;AAChB,SAAK,YAAY,CAAC;AAClB,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAGzE,QAAI,cAAc;AAChB,WAAK,KAAK,cAAc;AAAA,QACtB,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,QAA2D;AAC3E,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,mBAAmB;AAAA,MACvD,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAGD,UAAM,oBAAgB,6BAAa,OAAO,OAAO;AAGjD,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,cAAc,MAAM,KAAK,OAAO,YAAY;AAAA,MAChD,UAAU,KAAK;AAAA,MACf,SAAS,cAAc;AAAA,MACvB,WAAW,OAAO;AAAA,MAClB;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,+BAA+B;AAAA,MACnE,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAGD,eAAO,yCAAyB,aAAa,OAAO,SAAS;AAAA,EAC/D;AAAA,EAEA,MAAM,gBAAgB,QAAiE;AACrF,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,uBAAuB;AAAA,MAC3D,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,IACpB,CAAC;AAGD,UAAM,oBAAoB,UAAM,4CAA4B,OAAO,aAAa,OAAO,SAAS;AAGhG,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAE3D,SAAK,OAAO,IAAI,qBAAqB,kCAAkC;AAAA,MACrE,UAAU,KAAK;AAAA,MACf,aAAa;AAAA,MACb;AAAA,IACF,CAAC;AAGD,UAAM,cAAc,MAAM,KAAK,OAAO,gBAAgB;AAAA,MACpD,UAAU,KAAK;AAAA,MACf,aAAa,kBAAkB;AAAA,MAC/B,WAAW,OAAO;AAAA,MAClB;AAAA,MACA,SAAS,KAAK,qBAAqB,OAAO,SAAS;AAAA,IACrD,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAAA,MACvE,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,MAClB,gBAAgB,YAAY;AAAA,IAC9B,CAAC;AAGD,WAAO,UAAM,yCAAyB,YAAY,gBAAgB,OAAO,SAAS;AAAA,EACpF;AAAA,EAEA,MAAM,uBAAuB,QAAwE;AACnG,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAAA,MACvE,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,IACpB,CAAC;AAGD,UAAM,oBAAoB,UAAM,4CAA4B,OAAO,aAAa,OAAO,SAAS;AAGhG,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAE3D,SAAK,OAAO,IAAI,qBAAqB,kCAAkC;AAAA,MACrE,UAAU,KAAK;AAAA,MACf,aAAa;AAAA,MACb;AAAA,IACF,CAAC;AAGD,UAAM,cAAc,MAAM,KAAK,OAAO,uBAAuB;AAAA,MAC3D,UAAU,KAAK;AAAA,MACf,aAAa,kBAAkB;AAAA,MAC/B,WAAW,OAAO;AAAA,MAClB;AAAA,MACA,SAAS,KAAK,qBAAqB,OAAO,SAAS;AAAA,IACrD,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,4CAA4C;AAAA,MAChF,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,MAClB,MAAM,YAAY;AAAA,MAClB,gBAAgB,YAAY;AAAA,IAC9B,CAAC;AAGD,WAAO,UAAM,yCAAyB,YAAY,gBAAgB,OAAO,WAAW,YAAY,IAAI;AAAA,EACtG;AAAA,EAEA,eAAgC;AAC9B,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,WAAW,QAAQ,KAAK,aAAa;AAAA,EACnD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,eACZ,gBACA,aACA,aACA,aACA,UACyB;AACzB,QAAI,KAAK,OAAO,uBAAuB,eAAe;AACpD,WAAK,OAAO,KAAK,qBAAqB,gDAAgD;AAAA,QACpF,cAAc,aAAa,YAAY;AAAA,MACzC,CAAC;AAGD,UAAI,aAAa,aAAa,OAAO;AACnC,eAAO,MAAM,KAAK,cAAc,gBAAgB,aAAa,aAAa,aAAa,QAAQ;AAAA,MACjG,OAAO;AAGL,aAAK,OAAO,KAAK,qBAAqB,+CAA+C;AAAA,UACnF;AAAA,UACA,UAAU,aAAa;AAAA,QACzB,CAAC;AACD,eAAO,MAAM,KAAK,mBAAmB,gBAAgB,aAAa,aAAa,QAAQ;AAAA,MACzF;AAAA,IACF,OAAO;AACL,WAAK,OAAO,KAAK,qBAAqB,uBAAuB;AAAA,QAC3D;AAAA,MACF,CAAC;AAED,YAAM,aAAa,IAAI;AAAA,QACrB;AAAA,UACE,YAAY,KAAK,OAAO;AAAA,UACxB;AAAA,UACA,SAAS;AAAA,YACT,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,UACzC;AAAA,QACA;AAAA,QACA,KAAK;AAAA,MACP;AAEA,YAAM,SAAS,MAAM,WAAW,aAAa,UAAU,KAAK,IAAI,CAAC,EAAE;AACnE,YAAM,WAAW,OAAO;AAGxB,YAAM,MAAM,KAAK,IAAI;AACrB,YAAM,UAAU;AAAA,QACd,WAAW,kBAAkB;AAAA,QAC7B;AAAA,QACA;AAAA,QACA,OAAO,KAAK,OAAO;AAAA,QACnB;AAAA,QACA,cAAc;AAAA,QACd,UAAU,EAAE,oBAAoB,KAAK,OAAO,mBAAmB;AAAA,QAC/D,wBAAwB;AAAA;AAAA,QACxB,QAAQ;AAAA,QACR,WAAW;AAAA,QACX,UAAU;AAAA,QACV,wBAAwB;AAAA,QACxB,wBAAwB,KAAK,IAAI,IAAI;AAAA,QACrC,oBAAoB;AAAA,QACpB;AAAA,MACF;AAEA,YAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAK,OAAO,KAAK,qBAAqB,mCAAmC,EAAE,UAAU,eAAe,CAAC;AACrG,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,cACZ,gBACA,aACA,aACA,aACA,UACkB;AAClB,SAAK,OAAO,KAAK,qBAAqB,+BAA+B;AAGrE,QAAI,CAAC,YAAY,UAAU;AACzB,WAAK,OAAO,MAAM,qBAAqB,0CAA0C;AACjF,YAAM,IAAI,MAAM,8CAA8C;AAAA,IAChE;AAEA,SAAK,OAAO,IAAI,qBAAqB,6BAA6B;AAClE,UAAM,aAAa,MAAM,KAAK,QAAQ,aAAa;AAAA,MACjD;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB,UAAU,YAAY;AAAA,MACtB,gBAAgB,YAAY;AAAA,IAC9B,CAAC;AACD,UAAM,WAAW,WAAW;AAC5B,SAAK,OAAO,KAAK,qBAAqB,gCAAgC,EAAE,SAAS,CAAC;AAGlF,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,UAAU;AAAA,MACd,WAAW,kBAAkB;AAAA,MAC7B;AAAA,MACA;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB;AAAA,MACA,cAAc,WAAW;AAAA,MACzB,UAAU,WAAW;AAAA,MACrB,wBAAwB,WAAW;AAAA,MACnC,QAAQ;AAAA,MACR,WAAW;AAAA,MACX,UAAU;AAAA,MACV,wBAAwB;AAAA,MACxB,wBAAwB,KAAK,IAAI,IAAI;AAAA,MACrC,oBAAoB;AAAA,MACpB;AAAA,IACF;AACA,SAAK,OAAO,IAAI,qBAAqB,oBAAoB;AACzD,UAAM,KAAK,QAAQ,YAAY,OAAO;AACtC,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,mBACZ,gBACA,aACA,aACA,UACyB;AACzB,SAAK,OAAO,KAAK,qBAAqB,8DAA8D;AAAA,MAClG,UAAU,aAAa;AAAA,MACvB,gBAAgB,CAAC,CAAC,KAAK,OAAO,YAAY;AAAA,MAC1C,SAAS,KAAK,OAAO,YAAY;AAAA,IACnC,CAAC;AAID,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,YAAY,kBAAkB;AACpC,UAAM,cAAuB;AAAA,MAC3B;AAAA,MACA,UAAU,QAAQ,GAAG;AAAA;AAAA,MACrB;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB;AAAA,MACA,cAAc;AAAA,MACd,UAAU,EAAE,UAAU,aAAa,SAAS;AAAA,MAC5C,wBAAwB;AAAA;AAAA,MACxB,QAAQ;AAAA,MACR,WAAW;AAAA,MACX,UAAU;AAAA,MACV,wBAAwB;AAAA,MACxB,wBAAwB,MAAM;AAAA,MAC9B,oBAAoB;AAAA,MACpB,UAAU,YAAY,YAAQ,yBAAW,CAAC;AAAA,IAC5C;AACA,SAAK,OAAO,IAAI,qBAAqB,4CAA4C;AAAA,MAC/E,WAAW,YAAY;AAAA,MACvB,cAAc,YAAY;AAAA,IAC5B,CAAC;AAGD,gBAAY,WAAW,KAAK,IAAI;AAChC,UAAM,KAAK,QAAQ,YAAY,WAAW;AAE1C,SAAK,OAAO,KAAK,qBAAqB,qCAAqC;AAAA,MACzE;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB,UAAU,aAAa;AAAA,MACvB,SAAS,KAAK,OAAO,YAAY;AAAA,IACnC,CAAC;AAGD,UAAM,aAAa,MAAM,KAAK,aAAa,aAAa;AAAA,MACtD;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB,UAAU,aAAa;AAAA,MACvB,aAAa,KAAK,OAAO,YAAY;AAAA,MACrC,gBAAgB,aAAa;AAAA,MAC7B,SAAS,KAAK,OAAO,YAAY;AAAA,MACjC;AAAA,IACF,CAAC;AAED,QAAI,cAAc,cAAc,YAAY;AAE1C,WAAK,OAAO,KAAK,qBAAqB,2CAA2C;AAAA,QAC/E,UAAU,WAAW;AAAA,QACrB,UAAU,WAAW;AAAA,MACvB,CAAC;AAGD,kBAAY,WAAW,WAAW;AAClC,kBAAY,eAAe,WAAW,YAAY,YAAY;AAC9D,kBAAY,yBAAyB,WAAW;AAChD,kBAAY,SAAS;AACrB,kBAAY,WAAW,KAAK,IAAI;AAChC,YAAM,KAAK,QAAQ,YAAY,WAAW;AAE1C,aAAO;AAAA,IACT;AAEA,SAAK,OAAO,KAAK,qBAAqB,oEAAoE;AAE1G,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,uBAAuB,YAAgD;AAEnF,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAE9C,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,4DAA4D;AAAA,IAC9E;AAGA,YAAQ,WAAW,WAAW;AAC9B,YAAQ,eAAe,WAAW,YAAY,QAAQ;AACtD,YAAQ,yBAAyB,WAAW;AAC5C,YAAQ,SAAS;AACjB,YAAQ,WAAW,KAAK,IAAI;AAC5B,UAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,UAAM,KAAK,4BAA4B,OAAO;AAG9C,UAAM,KAAK,yBAAyB;AAEpC,WAAO;AAAA,MACL,UAAU,KAAK;AAAA,MACf,WAAW,KAAK;AAAA,MAChB,QAAQ;AAAA,IACV;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,2BAA0C;AAEtD,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,yBAAyB;AAAA,IAC3C;AAEA,UAAM,MAAM,KAAK,IAAI;AAGrB,QAAI,CAAC,QAAQ,wBAAwB;AACnC,WAAK,OAAO,KAAK,qBAAqB,oEAAoE;AAC1G,YAAM,KAAK,WAAW;AACtB,YAAM,IAAI,MAAM,gDAAgD;AAAA,IAClE;AAEA,UAAM,kBAAkB,QAAQ,yBAAyB;AAEzD,SAAK,OAAO,IAAI,qBAAqB,qCAAqC;AAAA,MACxE,WAAW,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,MAChE;AAAA,IACF,CAAC;AAGD,QAAI,mBAAmB,GAAG;AACxB,WAAK,OAAO,MAAM,qBAAqB,0CAA0C;AACjF,YAAM,KAAK,WAAW;AACtB,YAAM,IAAI,MAAM,uBAAuB;AAAA,IACzC;AAGA,UAAM,gBAAgB;AACtB,QAAI,mBAAmB,eAAe;AACpC,WAAK,OAAO,KAAK,qBAAqB,+BAA+B;AAAA,QACnE,WAAW,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,QAChE;AAAA,QACA;AAAA,MACF,CAAC;AAED,UAAI;AACF,cAAM,KAAK,mBAAmB,OAAO;AACrC,aAAK,OAAO,KAAK,qBAAqB,oCAAoC;AAAA,MAC5E,SAAS,OAAO;AACd,aAAK,OAAO,MAAM,qBAAqB,iCAAiC;AAAA,UACtE,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QAC9D,CAAC;AAAA,MAEH;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,mBAAmB,SAAiC;AAChE,QAAI,CAAC,KAAK,QAAQ;AAChB,YAAM,IAAI,MAAM,wBAAwB;AAAA,IAC1C;AAEA,SAAK,OAAO,KAAK,qBAAqB,gCAAgC;AAEtE,QAAI;AAEF,YAAM,aAAa,MAAM,KAAK,QAAQ,cAAc;AACpD,WAAK,OAAO,IAAI,qBAAqB,qCAAqC;AAAA,QACxE,UAAU,WAAW;AAAA,QACrB,cAAc,WAAW;AAAA,MAC3B,CAAC;AAGD,YAAM,yBAAqB,mCAAgB,aAAAA,QAAK,OAAO,WAAW,SAAS,CAAC;AAC5E,YAAM,cAAc;AAGpB,UAAI;AACJ,UAAI;AACF,8BAAsB,MAAM,KAAK,OAAO,oBAAoB;AAAA,UAC1D,gBAAgB,QAAQ;AAAA,UACxB,UAAU,QAAQ;AAAA,UAClB,mBAAmB,QAAQ,WAAW,MAAM,UAAU,GAAG,CAAC,CAAC;AAAA,UAC3D,eAAe;AAAA,YACb,mBAAmB,QAAQ,WAAW,MAAM,UAAU,GAAG,CAAC,CAAC;AAAA,YAC3D,mBAAmB;AAAA,YACnB,WAAW;AAAA,YACX,WAAW;AAAA;AAAA;AAAA,UAGb;AAAA,UACA,kBAAkB;AAAA,QACpB,CAAQ;AAAA,MACV,SAAS,OAAO;AACd,aAAK,OAAO,MAAM,qBAAqB,sCAAsC;AAAA,UAC3E,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QAC9D,CAAC;AAED,cAAM,KAAK,QAAQ,iBAAiB;AACpC,cAAM,IAAI;AAAA,UACR,uCAAuC,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK,CAAC;AAAA,QAC/F;AAAA,MACF;AAEA,WAAK,OAAO,KAAK,qBAAqB,6BAA6B;AAAA,QACjE,iBAAkB,oBAA4B;AAAA,MAChD,CAAC;AAGD,YAAM,KAAK,QAAQ,eAAgB,oBAA4B,MAAM,SAAS;AAG9E,YAAM,MAAM,KAAK,IAAI;AACrB,cAAQ,cAAc;AACtB,cAAQ,yBAAyB;AACjC,cAAQ,yBAAyB,KAAK,IAAI,IAAI;AAC9C,cAAQ,qBAAqB;AAC7B,YAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAK,OAAO,KAAK,qBAAqB,gDAAgD;AAAA,QACpF,UAAU,WAAW;AAAA,QACrB,WAAW,IAAI,KAAK,KAAK,IAAI,IAAI,WAAW,EAAE,YAAY;AAAA,MAC5D,CAAC;AAAA,IACH,SAAS,OAAO;AAEd,YAAM,KAAK,QAAQ,iBAAiB;AACpC,YAAM;AAAA,IACR;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,4BAA4B,SAAiC;AAEzE,SAAK,OAAO,IAAI,qBAAqB,2CAA2C;AAAA,MAC9E,gBAAgB,QAAQ;AAAA,MACxB,UAAU,QAAQ;AAAA,MAClB,OAAO,QAAQ;AAAA,IACjB,CAAC;AAGD,QAAI,CAAC,KAAK,QAAQ,WAAW,GAAG;AAC9B,YAAM,KAAK,QAAQ,KAAK;AAAA,IAC1B;AAEA,SAAK,SAAS,IAAI;AAAA,MAChB;AAAA,QACE,YAAY,KAAK,OAAO;AAAA,QACxB,gBAAgB,QAAQ;AAAA,QACxB,SAAS;AAAA,UACP,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,QACzC;AAAA,MACF;AAAA,MACA,KAAK;AAAA,IACP;AAEA,SAAK,WAAW,QAAQ;AAGxB,SAAK,YAAY,MAAM,KAAK,4BAA4B,QAAQ,QAAQ;AAAA,EAC1E;AACF;","names":["import_base64url","import_bs58","bs58","import_eventemitter3","import_constants","bs58"]}
1
+ {"version":3,"sources":["../src/index.ts","../src/embedded-provider.ts","../src/constants.ts","../src/chains/SolanaChain.ts","../src/chains/EthereumChain.ts","../src/utils/retry.ts","../src/utils/session.ts"],"sourcesContent":["export * from \"./interfaces\";\nexport * from \"./types\";\nexport * from \"./embedded-provider\";\nexport * from \"./utils/session\";\nexport * from \"./utils/retry\";\nexport * from \"./chains\";\nexport * from \"./constants\";\n","import { base64urlEncode, stringToBase64url } from \"@phantom/base64url\";\nimport { AddressType, PhantomClient, SpendingLimitError } from \"@phantom/client\";\nimport type { NetworkId } from \"@phantom/constants\";\nimport {\n parseSignMessageResponse,\n parseTransactionResponse,\n parseToKmsTransaction,\n type ParsedSignatureResult,\n type ParsedTransactionResult,\n} from \"@phantom/parsers\";\nimport { randomUUID } from \"@phantom/utils\";\nimport { Buffer } from \"buffer\";\nimport bs58 from \"bs58\";\nimport { AUTHENTICATOR_EXPIRATION_TIME_MS, EMBEDDED_PROVIDER_AUTH_TYPES } from \"./constants\";\n\nimport type { IEthereumChain, ISolanaChain } from \"@phantom/chain-interfaces\";\nimport type { StamperWithKeyManagement } from \"@phantom/sdk-types\";\nimport { EmbeddedEthereumChain, EmbeddedSolanaChain } from \"./chains\";\nimport type {\n AuthProvider,\n AuthResult,\n DebugLogger,\n EmbeddedStorage,\n PlatformAdapter,\n PhantomAppProvider,\n Session,\n StamperInfo,\n URLParamsAccessor,\n} from \"./interfaces\";\nimport type {\n AuthOptions,\n ConnectResult,\n EmbeddedProviderConfig,\n SignAndSendTransactionParams,\n SignMessageParams,\n SignTransactionParams,\n SignTypedDataV4Params,\n WalletAddress,\n} from \"./types\";\nimport { retryWithBackoff } from \"./utils/retry\";\nimport { generateSessionId } from \"./utils/session\";\n\nexport type EmbeddedProviderEvent =\n | \"connect\"\n | \"connect_start\"\n | \"connect_error\"\n | \"disconnect\"\n | \"error\"\n | \"spending_limit_reached\";\n\n// Event payload types for type-safe event handling\nexport interface ConnectEventData extends ConnectResult {\n source: \"auto-connect\" | \"manual-connect\" | \"manual-existing\" | \"existing-session\" | \"manual\";\n}\n\nexport interface ConnectStartEventData {\n source: \"auto-connect\" | \"manual-connect\";\n authOptions?: { provider?: string };\n}\n\nexport interface ConnectErrorEventData {\n error: string;\n source: \"auto-connect\" | \"manual-connect\";\n}\n\nexport interface DisconnectEventData {\n source: \"manual\";\n}\n\n// Mapped type for event data based on event name\nexport interface EmbeddedProviderEventMap {\n connect: ConnectEventData;\n connect_start: ConnectStartEventData;\n connect_error: ConnectErrorEventData;\n disconnect: DisconnectEventData;\n error: any;\n spending_limit_reached: { error: SpendingLimitError };\n}\n\nexport type EventCallback<T = any> = (data: T) => void;\n\ninterface StamperResponse {\n stamperInfo: StamperInfo;\n expiresInMs: number;\n}\n\nexport class EmbeddedProvider {\n private config: EmbeddedProviderConfig;\n private platform: PlatformAdapter;\n private storage: EmbeddedStorage;\n // Phantom Connect Provider (handles redirects, auth flows, etc.)\n private authProvider: AuthProvider;\n // Phantom App (mobile and extension provider) deeplinks to our wallet for phantom connect\n private phantomAppProvider: PhantomAppProvider;\n private urlParamsAccessor: URLParamsAccessor;\n private stamper: StamperWithKeyManagement;\n private logger: DebugLogger;\n private client: PhantomClient | null = null;\n private walletId: string | null = null;\n private addresses: WalletAddress[] = [];\n\n // Built-in chain instances\n public readonly solana: ISolanaChain;\n public readonly ethereum: IEthereumChain;\n private eventListeners: Map<EmbeddedProviderEvent, Set<EventCallback>> = new Map();\n\n constructor(config: EmbeddedProviderConfig, platform: PlatformAdapter, logger: DebugLogger) {\n this.logger = logger;\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing EmbeddedProvider\", { config });\n\n // TODO: Re-enable app-wallet support once it's fully implemented\n if (config.embeddedWalletType === \"app-wallet\") {\n throw new Error(\"app-wallet type is not currently supported. Please use 'user-wallet' instead.\");\n }\n\n this.config = config;\n this.platform = platform;\n this.storage = platform.storage;\n this.authProvider = platform.authProvider;\n this.phantomAppProvider = platform.phantomAppProvider;\n this.urlParamsAccessor = platform.urlParamsAccessor;\n this.stamper = platform.stamper;\n\n // Initialize chain instances\n this.solana = new EmbeddedSolanaChain(this);\n this.ethereum = new EmbeddedEthereumChain(this);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"EmbeddedProvider initialized\");\n\n // Auto-connect is now handled manually via autoConnect() method to avoid race conditions\n }\n\n /*\n * Event system methods for listening to provider state changes\n */\n on<K extends EmbeddedProviderEvent>(event: K, callback: EventCallback<EmbeddedProviderEventMap[K]>): void {\n if (!this.eventListeners.has(event)) {\n this.eventListeners.set(event, new Set());\n }\n this.eventListeners.get(event)!.add(callback as EventCallback);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Event listener added\", { event });\n }\n\n off<K extends EmbeddedProviderEvent>(event: K, callback: EventCallback<EmbeddedProviderEventMap[K]>): void {\n const listeners = this.eventListeners.get(event);\n if (listeners) {\n listeners.delete(callback);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Event listener removed\", { event });\n }\n }\n\n private emit(event: EmbeddedProviderEvent, data?: any): void {\n const listeners = this.eventListeners.get(event);\n if (listeners && listeners.size > 0) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Emitting event\", { event, listenerCount: listeners.size, data });\n listeners.forEach(callback => {\n try {\n callback(data);\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Event callback error\", { event, error });\n }\n });\n }\n }\n\n /**\n * Get the appropriate address for a given network ID from available addresses\n */\n private getAddressForNetwork(networkId: NetworkId): string | undefined {\n // Extract the chain name from network ID format (e.g., \"solana:mainnet\" -> \"solana\")\n const network = networkId.split(\":\")[0].toLowerCase();\n\n // Map network to address type\n let targetAddressType: string;\n switch (network) {\n case \"solana\":\n targetAddressType = AddressType.solana;\n break;\n case \"eip155\": // EVM chains use eip155 prefix\n targetAddressType = AddressType.ethereum;\n break;\n case \"bitcoin\":\n case \"btc\":\n targetAddressType = AddressType.bitcoinSegwit;\n break;\n case \"sui\":\n targetAddressType = AddressType.sui;\n break;\n default:\n // Default to ethereum for unknown networks\n targetAddressType = AddressType.ethereum;\n break;\n }\n\n // Find the matching address from available addresses\n const matchingAddress = this.addresses.find(\n addr => addr.addressType.toLowerCase() === targetAddressType.toLowerCase(),\n );\n\n return matchingAddress?.address;\n }\n\n private async getAndFilterWalletAddresses(walletId: string): Promise<WalletAddress[]> {\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Get wallet addresses with retry and auto-disconnect on failure\n const addresses = await retryWithBackoff(\n () => this.client!.getWalletAddresses(walletId, undefined, derivationIndex),\n \"getWalletAddresses\",\n this.logger,\n ).catch(async error => {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"getWalletAddresses failed after retries, disconnecting\", {\n walletId,\n error: error.message,\n derivationIndex: derivationIndex,\n });\n // Clear the session if getWalletAddresses fails after retries\n await this.storage.clearSession();\n this.client = null;\n this.walletId = null;\n this.addresses = [];\n throw error;\n });\n\n // Filter by enabled address types and return formatted addresses\n return addresses.filter(addr => this.config.addressTypes.some(type => type === addr.addressType));\n }\n\n /*\n * We use this method to make sure the session is not invalid, or there's a different session id in the url.\n * If there's a different one, we delete the current session and start from scratch.\n * This prevents issues where users have stale sessions or URL mismatches after redirects.\n */\n private async validateAndCleanSession(session: Session | null): Promise<Session | null> {\n if (!session) return null;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Found existing session, validating\", {\n sessionId: session.sessionId,\n status: session.status,\n walletId: session.walletId,\n });\n\n // If session is not completed, check if we're in the right context\n if (session.status !== \"completed\") {\n const urlSessionId = this.urlParamsAccessor.getParam(\"session_id\");\n\n // If we have a pending session but no sessionId in URL, this is a mismatch\n if (session.status === \"pending\" && !urlSessionId) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session mismatch detected - pending session without redirect context\", {\n sessionId: session.sessionId,\n status: session.status,\n });\n // Clear the invalid session and start fresh\n await this.storage.clearSession();\n return null;\n }\n // If sessionId in URL doesn't match stored session, clear invalid session\n else if (urlSessionId && urlSessionId !== session.sessionId) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session ID mismatch detected\", {\n storedSessionId: session.sessionId,\n urlSessionId: urlSessionId,\n });\n await this.storage.clearSession();\n return null;\n }\n }\n\n // For completed sessions, check if session is valid (only checks authenticator expiration)\n if (session.status === \"completed\" && !this.isSessionValid(session)) {\n this.logger.warn(\n \"EMBEDDED_PROVIDER\",\n \"Session invalid due to authenticator expiration, will regenerate keypair\",\n {\n sessionId: session.sessionId,\n authenticatorExpiresAt: session.authenticatorExpiresAt,\n currentTime: Date.now(),\n expired: session.authenticatorExpiresAt < Date.now(),\n },\n );\n // Clear the invalid session - this will trigger keypair regeneration in connect flow\n await this.storage.clearSession();\n return null;\n }\n\n return session;\n }\n\n /*\n * Shared connection logic for both connect() and autoConnect().\n * Handles existing session validation, redirect resume, and session initialization.\n * Returns ConnectResult if connection succeeds, null if should continue with new auth flow.\n */\n private async tryExistingConnection(isAutoConnect: boolean): Promise<ConnectResult | null> {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Getting existing session\");\n let session = await this.storage.getSession();\n session = await this.validateAndCleanSession(session);\n\n if (!session) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"No existing session found\");\n return null;\n }\n\n // First priority: If we have a completed session, use it\n // This prevents unnecessary redirect resume when the session is already valid\n if (session.status === \"completed\") {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Using existing completed session\", {\n sessionId: session.sessionId,\n walletId: session.walletId,\n });\n\n await this.initializeClientFromSession(session);\n\n session.lastUsed = Date.now();\n await this.storage.saveSession(session);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Connection from existing session successful\", {\n walletId: this.walletId,\n addressCount: this.addresses.length,\n });\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n const result: ConnectResult = {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n authUserId: session.authUserId,\n authProvider: session.authProvider,\n };\n\n this.emit(\"connect\", {\n ...result,\n source: \"existing-session\",\n });\n\n return result;\n }\n\n // Second priority: Check if we're resuming from a redirect\n // Only attempt redirect resume if there's no valid completed session\n this.logger.log(\"EMBEDDED_PROVIDER\", \"No completed session found, checking for redirect resume\");\n if (this.authProvider.resumeAuthFromRedirect) {\n const authResult = this.authProvider.resumeAuthFromRedirect(session.authProvider);\n if (authResult) {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Resuming from redirect\", {\n walletId: authResult.walletId,\n provider: authResult.provider,\n });\n\n try {\n return await this.completeAuthConnection(authResult);\n } catch (error) {\n // Handle the edge case where session was wiped from DB but URL has session params\n // Only fall back gracefully when authOptions are provided (indicating intent to start fresh auth)\n if (error instanceof Error && error.message.includes(\"No session found after redirect\") && !isAutoConnect) {\n this.logger.warn(\n \"EMBEDDED_PROVIDER\",\n \"Session missing during redirect resume - will start fresh auth flow\",\n {\n error: error.message,\n walletId: authResult.walletId,\n },\n );\n\n // Clear any potentially stale session data and continue to fresh auth flow\n await this.storage.clearSession();\n return null;\n }\n\n // Re-throw error if no authOptions (should fail) or if different error type\n throw error;\n }\n }\n }\n\n return null;\n }\n\n /*\n * We use this method to validate authentication options before processing them.\n * This ensures only supported auth providers are used and required tokens are present.\n */\n private validateAuthOptions(authOptions: AuthOptions): void {\n if (!EMBEDDED_PROVIDER_AUTH_TYPES.includes(authOptions.provider)) {\n throw new Error(\n `Invalid auth provider: ${authOptions.provider}. Must be ${EMBEDDED_PROVIDER_AUTH_TYPES.join(\", \")}`,\n );\n }\n }\n\n /*\n * We use this method to validate if a session is still valid.\n * This checks session status, required fields, and authenticator expiration.\n * Sessions never expire by age - only authenticators expire.\n */\n private isSessionValid(session: Session | null): boolean {\n if (!session) {\n return false;\n }\n\n if (!session.walletId || !session.organizationId || !session.stamperInfo) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session missing required fields\", {\n hasWalletId: !!session.walletId,\n hasOrganizationId: !!session.organizationId,\n hasStamperInfo: !!session.stamperInfo,\n });\n return false;\n }\n\n if (session.status !== \"completed\") {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session not completed\", { status: session.status });\n return false;\n }\n\n if (!session.authenticatorExpiresAt) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session invalid - missing authenticator timing\", {\n sessionId: session.sessionId,\n });\n return false;\n }\n\n if (Date.now() >= session.authenticatorExpiresAt) {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Authenticator expired, session invalid\", {\n authenticatorExpiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n now: new Date().toISOString(),\n });\n return false;\n }\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Session is valid\", {\n sessionId: session.sessionId,\n walletId: session.walletId,\n authenticatorExpires: new Date(session.authenticatorExpiresAt).toISOString(),\n });\n return true;\n }\n\n /*\n * Public method to attempt auto-connection using an existing valid session.\n * This should be called after setting up event listeners to avoid race conditions.\n * Silently fails if no valid session exists, enabling seamless reconnection.\n */\n async autoConnect(): Promise<void> {\n try {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Starting auto-connect attempt\");\n\n this.emit(\"connect_start\", { source: \"auto-connect\" });\n\n const result = await this.tryExistingConnection(true);\n\n if (result) {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Auto-connect successful\", {\n walletId: result.walletId,\n addressCount: result.addresses.length,\n });\n\n this.emit(\"connect\", {\n ...result,\n source: \"auto-connect\",\n });\n return;\n }\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Auto-connect failed: no valid session found\");\n\n this.emit(\"connect_error\", {\n error: \"No valid session found\",\n source: \"auto-connect\",\n });\n } catch (error) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Auto-connect failed\", {\n error: error instanceof Error ? error.message : String(error),\n });\n\n this.emit(\"connect_error\", {\n error: error instanceof Error ? error.message : \"Auto-connect failed\",\n source: \"auto-connect\",\n });\n // If auto-connect fails, set the flag to clear previous session on next login\n await this.storage.setShouldClearPreviousSession(true);\n }\n }\n\n /*\n * We use this method to initialize the stamper and create an organization for new sessions.\n * This is the first step when no existing session is found and we need to set up a new wallet.\n */\n\n private async initializeStamper(): Promise<StamperResponse> {\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing stamper\");\n await this.stamper.init();\n\n // Reset keypair to ensure we get a fresh unique keypair that doesn't conflict with existing ones\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Resetting keypair to avoid conflicts with existing keypairs\");\n const stamperInfo = await this.stamper.resetKeyPair();\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Stamper initialized with fresh keypair\", {\n publicKey: stamperInfo.publicKey,\n keyId: stamperInfo.keyId,\n algorithm: this.stamper.algorithm,\n });\n\n const expiresInMs = AUTHENTICATOR_EXPIRATION_TIME_MS;\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Stamper ready for auth flow with fresh keypair\", {\n publicKey: stamperInfo.publicKey,\n keyId: stamperInfo.keyId,\n });\n\n return { stamperInfo, expiresInMs };\n }\n\n private async createOrganizationForAppWallet(stamperInfo: StamperInfo, expiresInMs: number): Promise<string> {\n // Create temporary client to make API call\n // This client is used only for organization creation (doesn't need stamper since it's creating the org)\n const tempClient = new PhantomClient({\n apiBaseUrl: this.config.apiBaseUrl,\n headers: {\n ...(this.platform.analyticsHeaders || {}),\n },\n });\n\n // Create an organization for app-wallet\n const platformName = this.platform.name || \"unknown\";\n const shortPubKey = stamperInfo.publicKey.slice(0, 8);\n\n const organizationName = `${this.config.appId.substring(0, 8)}-${platformName}-${shortPubKey}`;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Creating organization for app-wallet\", {\n organizationName,\n publicKey: stamperInfo.publicKey,\n platform: platformName,\n });\n\n // Convert base58 public key to base64url format as required by the API\n const base64urlPublicKey = base64urlEncode(bs58.decode(stamperInfo.publicKey));\n\n const username = `user-${randomUUID()}`;\n const { organizationId } = await tempClient.createOrganization(organizationName, [\n {\n username,\n role: \"ADMIN\",\n authenticators: [\n {\n authenticatorName: `auth-${shortPubKey}`,\n authenticatorKind: \"keypair\",\n publicKey: base64urlPublicKey,\n algorithm: \"Ed25519\",\n expiresInMs: expiresInMs,\n } as any,\n ],\n },\n ]);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Organization created for app-wallet\", { organizationId });\n\n return organizationId;\n }\n\n async connect(authOptions: AuthOptions): Promise<ConnectResult> {\n try {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting embedded provider connect\", {\n authOptions: {\n provider: authOptions.provider,\n },\n });\n\n // Emit connect_start event for manual connect\n this.emit(\"connect_start\", {\n source: \"manual-connect\",\n authOptions: { provider: authOptions.provider },\n });\n\n // Try to use existing connection (redirect resume or completed session)\n const existingResult = await this.tryExistingConnection(false);\n if (existingResult) {\n // Successfully connected using existing session or redirect\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Manual connect using existing connection\", {\n walletId: existingResult.walletId,\n addressCount: existingResult.addresses.length,\n });\n\n // Emit connect event for manual connect success with existing connection\n this.emit(\"connect\", {\n ...existingResult,\n source: \"manual-existing\",\n });\n\n return existingResult;\n }\n\n // Validate auth options before proceeding with new auth flow\n this.validateAuthOptions(authOptions);\n\n // No existing connection available, create new one\n // This could be due to: 1) First time connection, 2) Expired authenticator, 3) Invalid session\n this.logger.info(\n \"EMBEDDED_PROVIDER\",\n \"No existing connection available, creating new auth flow with fresh keypair\",\n );\n const { stamperInfo, expiresInMs } = await this.initializeStamper();\n const session = await this.handleAuthFlow(stamperInfo.publicKey, stamperInfo, authOptions, expiresInMs);\n\n // If session is null here, it means we're doing a redirect\n if (!session) {\n // This should not return anything as redirect is happening\n return {\n addresses: [],\n status: \"pending\",\n authProvider: authOptions.provider,\n } as ConnectResult;\n }\n\n // Update session last used timestamp (only for non-redirect flows)\n // For redirect flows, timestamp is updated before redirect to prevent race condition\n if (this.config.embeddedWalletType === \"app-wallet\") {\n session.lastUsed = Date.now();\n await this.storage.saveSession(session);\n }\n\n // Initialize client and get addresses\n await this.initializeClientFromSession(session);\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n const result: ConnectResult = {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n authUserId: session?.authUserId,\n authProvider: session?.authProvider,\n };\n\n // Emit connect event for manual connect success\n this.emit(\"connect\", {\n ...result,\n source: \"manual\",\n });\n\n return result;\n } catch (error) {\n // Log the full error details for debugging\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Connect failed with error\", {\n error:\n error instanceof Error\n ? {\n name: error.name,\n message: error.message,\n stack: error.stack,\n }\n : error,\n });\n\n // Emit connect_error event for manual connect failure\n this.emit(\"connect_error\", {\n error: error instanceof Error ? error.message : String(error),\n source: \"manual-connect\",\n });\n\n // Enhanced error handling with specific error types\n if (error instanceof Error) {\n // Check for specific error types and provide better error messages\n if (error.message.includes(\"IndexedDB\") || error.message.includes(\"storage\")) {\n throw new Error(\n \"Storage error: Unable to access browser storage. Please ensure storage is available and try again.\",\n );\n }\n\n if (error.message.includes(\"network\") || error.message.includes(\"fetch\")) {\n throw new Error(\n \"Network error: Unable to connect to authentication server. Please check your internet connection and try again.\",\n );\n }\n\n if (error.message.includes(\"JWT\") || error.message.includes(\"jwt\")) {\n throw new Error(`JWT Authentication error: ${error.message}`);\n }\n\n if (error.message.includes(\"Authentication\") || error.message.includes(\"auth\")) {\n throw new Error(`Authentication error: ${error.message}`);\n }\n\n if (error.message.includes(\"organization\") || error.message.includes(\"wallet\")) {\n throw new Error(`Wallet creation error: ${error.message}`);\n }\n\n // Re-throw the original error if it's already well-formatted\n throw error;\n }\n\n // Handle unknown error types\n throw new Error(`Embedded wallet connection failed: ${String(error)}`);\n }\n }\n\n async disconnect(shouldClearPreviousSession = true): Promise<void> {\n const wasConnected = this.client !== null;\n\n // Set flag to clear previous OAuth session on next login attempt\n // This ensures user will be prompted for fresh authentication\n await this.storage.setShouldClearPreviousSession(shouldClearPreviousSession);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Set flag to clear previous session on next login\");\n\n await this.storage.clearSession();\n\n this.client = null;\n this.walletId = null;\n this.addresses = [];\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Disconnected from embedded wallet\");\n\n // Emit disconnect event if we were previously connected\n if (wasConnected) {\n this.emit(\"disconnect\", {\n source: \"manual\",\n });\n }\n }\n\n async signMessage(params: SignMessageParams): Promise<ParsedSignatureResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing message\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Get raw response from client - use the appropriate method based on chain\n const rawResponse = await this.client.signUtf8Message({\n walletId: this.walletId,\n message: params.message,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Message signed successfully\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n // Parse the response to get human-readable signature and explorer URL\n return parseSignMessageResponse(rawResponse, params.networkId);\n }\n\n async signEthereumMessage(params: SignMessageParams): Promise<ParsedSignatureResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing message\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n const looksLikeHex = (str: string) => /^0x[0-9a-fA-F]+$/.test(str);\n\n const normalizedMessage = (() => {\n if (looksLikeHex(params.message)) {\n const hexPayload = params.message.slice(2);\n const normalizedHex = hexPayload.length % 2 === 0 ? hexPayload : `0${hexPayload}`;\n return Buffer.from(normalizedHex, \"hex\").toString(\"utf8\");\n }\n return params.message;\n })();\n\n // Parse message to base64url format for client\n const base64UrlMessage = stringToBase64url(normalizedMessage);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Get raw response from client - use the appropriate method based on chain\n const rawResponse = await this.client.ethereumSignMessage({\n walletId: this.walletId,\n message: base64UrlMessage,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Message signed successfully\", {\n walletId: this.walletId,\n message: params.message,\n });\n\n // Parse the response to get human-readable signature and explorer URL\n return parseSignMessageResponse(rawResponse, params.networkId);\n }\n\n async signTypedDataV4(params: SignTypedDataV4Params): Promise<ParsedSignatureResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing typed data\", {\n walletId: this.walletId,\n typedData: params.typedData,\n });\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n // Call the client's ethereumSignTypedData method\n const rawResponse = await this.client.ethereumSignTypedData({\n walletId: this.walletId,\n typedData: params.typedData,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Typed data signed successfully\", {\n walletId: this.walletId,\n });\n\n // Parse the response\n return parseSignMessageResponse(rawResponse, params.networkId);\n }\n\n async signTransaction(params: SignTransactionParams): Promise<ParsedTransactionResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing transaction\", {\n walletId: this.walletId,\n networkId: params.networkId,\n });\n\n // Parse transaction to KMS format (base64url for Solana, hex for EVM) based on network\n const parsedTransaction = await parseToKmsTransaction(params.transaction, params.networkId);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Parsed transaction for signing\", {\n walletId: this.walletId,\n transaction: parsedTransaction,\n derivationIndex: derivationIndex,\n });\n\n const transactionPayload = parsedTransaction.parsed;\n if (!transactionPayload) {\n throw new Error(\"Failed to parse transaction: no valid encoding found\");\n }\n\n const account = this.getAddressForNetwork(params.networkId);\n if (!account) {\n throw new Error(`No address found for network ${params.networkId}`);\n }\n\n // Get raw response from client\n // PhantomClient will handle EVM transaction formatting internally\n const rawResponse = await this.client.signTransaction({\n walletId: this.walletId,\n transaction: transactionPayload,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n account,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Transaction signed successfully\", {\n walletId: this.walletId,\n networkId: params.networkId,\n rawTransaction: rawResponse.rawTransaction,\n });\n\n // Parse the response to get transaction result (without hash since it wasn't sent)\n return await parseTransactionResponse(rawResponse.rawTransaction, params.networkId);\n }\n\n async signAndSendTransaction(params: SignAndSendTransactionParams): Promise<ParsedTransactionResult> {\n if (!this.client || !this.walletId) {\n throw new Error(\"Not connected\");\n }\n\n // Check if authenticator needs renewal before performing the operation\n await this.ensureValidAuthenticator();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Signing and sending transaction\", {\n walletId: this.walletId,\n networkId: params.networkId,\n });\n\n // Parse transaction to KMS format (base64url for Solana, hex for EVM) based on network\n const parsedTransaction = await parseToKmsTransaction(params.transaction, params.networkId);\n\n // Get session to access derivation index\n const session = await this.storage.getSession();\n const derivationIndex = session?.accountDerivationIndex ?? 0;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Parsed transaction for signing\", {\n walletId: this.walletId,\n transaction: parsedTransaction,\n derivationIndex: derivationIndex,\n });\n\n const transactionPayload = parsedTransaction.parsed;\n if (!transactionPayload) {\n throw new Error(\"Failed to parse transaction: no valid encoding found\");\n }\n\n const account = this.getAddressForNetwork(params.networkId);\n if (!account) {\n throw new Error(`No address found for network ${params.networkId}`);\n }\n\n // Get raw response from client\n // PhantomClient will handle EVM transaction formatting internally\n let rawResponse;\n try {\n rawResponse = await this.client.signAndSendTransaction({\n walletId: this.walletId,\n transaction: transactionPayload,\n networkId: params.networkId,\n derivationIndex: derivationIndex,\n account,\n });\n } catch (error: any) {\n // Normalize spending limit errors into a dedicated event while preserving the rejection\n if (error instanceof SpendingLimitError) {\n this.emit(\"spending_limit_reached\", { error });\n }\n throw error;\n }\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Transaction signed and sent successfully\", {\n walletId: this.walletId,\n networkId: params.networkId,\n hash: rawResponse.hash,\n rawTransaction: rawResponse.rawTransaction,\n });\n\n // Parse the response to get transaction hash and explorer URL\n return await parseTransactionResponse(rawResponse.rawTransaction, params.networkId, rawResponse.hash);\n }\n\n getAddresses(): WalletAddress[] {\n return this.addresses;\n }\n\n isConnected(): boolean {\n return this.client !== null && this.walletId !== null;\n }\n\n /*\n * We use this method to route between different authentication flows based on wallet type and auth options.\n * It handles app-wallet creation directly or routes to JWT/redirect authentication for user-wallets.\n * Returns null for redirect flows since they don't complete synchronously.\n */\n private async handleAuthFlow(\n publicKey: string,\n stamperInfo: StamperInfo,\n authOptions: AuthOptions,\n expiresInMs: number,\n ): Promise<Session | null> {\n if (this.config.embeddedWalletType === \"user-wallet\") {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Creating user-wallet, routing authentication\", {\n authProvider: authOptions.provider,\n });\n\n if (authOptions.provider === \"phantom\") {\n return await this.handlePhantomAuth(publicKey, stamperInfo, expiresInMs);\n } else {\n // This will redirect in browser, so we don't return a session\n // In react-native this will return an auth result\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting redirect-based authentication flow\", {\n publicKey,\n provider: authOptions?.provider,\n });\n return await this.handleRedirectAuth(publicKey, stamperInfo, authOptions);\n }\n } else {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Creating app-wallet\", {\n publicKey,\n });\n\n // App-wallet creates organization locally on device\n const organizationId = await this.createOrganizationForAppWallet(stamperInfo, expiresInMs);\n\n // Create app-wallet directly\n const tempClient = new PhantomClient(\n {\n apiBaseUrl: this.config.apiBaseUrl,\n organizationId: organizationId,\n headers: {\n ...(this.platform.analyticsHeaders || {}),\n },\n },\n this.stamper,\n );\n\n const wallet = await tempClient.createWallet(`Wallet ${Date.now()}`);\n const walletId = wallet.walletId;\n\n // Save session with app-wallet info\n const now = Date.now();\n const session: Session = {\n sessionId: generateSessionId(),\n walletId: walletId,\n organizationId: organizationId,\n appId: this.config.appId,\n stamperInfo,\n authProvider: \"device\", // For now app wallets have no auth provider.\n accountDerivationIndex: 0, // App wallets default to index 0\n status: \"completed\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: Date.now() + expiresInMs,\n lastRenewalAttempt: undefined,\n };\n\n await this.storage.saveSession(session);\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"App-wallet created successfully\", { walletId, organizationId });\n return session;\n }\n }\n\n /*\n * We use this method to handle Phantom app-based authentication for user-wallets.\n * This method uses the PhantomAppProvider to authenticate via the browser extension or mobile app.\n *\n * NOTE: Mobile deeplink support is not yet implemented. If we wanted to support mobile deeplinks,\n * we would:\n * 1. Check if the app provider is available using phantomAppProvider.isAvailable()\n * 2. If not available, generate a deeplink (phantom://auth?...)\n * 3. Save a pending session before opening the deeplink\n * 4. Start a polling mechanism to check for auth completion\n * 5. Update the session when the mobile app completes the auth\n */\n private async handlePhantomAuth(publicKey: string, stamperInfo: StamperInfo, expiresInMs: number): Promise<Session> {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting Phantom authentication flow\");\n\n // Check if Phantom app is available (extension or mobile)\n const isAvailable = this.phantomAppProvider.isAvailable();\n\n if (!isAvailable) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Phantom app not available\");\n // NOTE: If we wanted to support mobile deeplinks, we would generate a deeplink here\n // and start a polling mechanism. For now, we just throw an error.\n throw new Error(\n \"Phantom app is not available. Please install the Phantom browser extension or mobile app to use this authentication method.\",\n );\n }\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Phantom app detected, proceeding with authentication\");\n\n const sessionId = generateSessionId();\n\n const authResult = await this.phantomAppProvider.authenticate({\n publicKey,\n appId: this.config.appId,\n sessionId,\n });\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Phantom authentication completed\", {\n walletId: authResult.walletId,\n organizationId: authResult.organizationId,\n });\n\n // Use expiresInMs from auth response if provided (and > 0), otherwise use local default\n const effectiveExpiresInMs = authResult.expiresInMs > 0 ? authResult.expiresInMs : expiresInMs;\n\n // Save session with auth info\n const now = Date.now();\n const session: Session = {\n sessionId,\n walletId: authResult.walletId,\n organizationId: authResult.organizationId,\n appId: this.config.appId,\n stamperInfo,\n authProvider: \"phantom\",\n accountDerivationIndex: authResult.accountDerivationIndex,\n status: \"completed\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: now + effectiveExpiresInMs,\n lastRenewalAttempt: undefined,\n authUserId: authResult.authUserId,\n };\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Saving Phantom session\");\n await this.storage.saveSession(session);\n\n return session;\n }\n\n /*\n * We use this method to handle redirect-based authentication (Google/Apple OAuth).\n * It saves a temporary session before redirecting to prevent losing state during the redirect flow.\n * Session timestamp is updated before redirect to prevent race conditions.\n */\n private async handleRedirectAuth(\n publicKey: string,\n stamperInfo: StamperInfo,\n authOptions: AuthOptions,\n ): Promise<Session | null> {\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Using Phantom Connect authentication flow (redirect-based)\", {\n provider: authOptions.provider,\n hasRedirectUrl: !!this.config.authOptions.redirectUrl,\n authUrl: this.config.authOptions.authUrl,\n });\n\n // Use Phantom Connect authentication flow (redirect-based)\n // Store session before redirect so we can restore it after redirect\n const now = Date.now();\n const sessionId = generateSessionId();\n const tempSession: Session = {\n sessionId: sessionId,\n walletId: `temp-wallet-${now}`, // Temporary ID, will be updated after redirect\n organizationId: `temp-org-${now}`, // Temporary ID, will be updated after redirect\n appId: this.config.appId,\n stamperInfo,\n authProvider: authOptions.provider,\n accountDerivationIndex: undefined, // Will be set when redirect completes\n status: \"pending\" as const,\n createdAt: now,\n lastUsed: now,\n authenticatorCreatedAt: now,\n authenticatorExpiresAt: now + AUTHENTICATOR_EXPIRATION_TIME_MS,\n lastRenewalAttempt: undefined,\n };\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Saving temporary session before redirect\", {\n sessionId: tempSession.sessionId,\n tempWalletId: tempSession.walletId,\n });\n\n // Update session timestamp before redirect (prevents race condition)\n tempSession.lastUsed = Date.now();\n await this.storage.saveSession(tempSession);\n\n // Check if user explicitly logged out (requires clearing previous OAuth session)\n const shouldClearPreviousSession = await this.storage.getShouldClearPreviousSession();\n\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Starting Phantom Connect redirect\", {\n publicKey,\n appId: this.config.appId,\n provider: authOptions?.provider,\n authUrl: this.config.authOptions.authUrl,\n clearPreviousSession: shouldClearPreviousSession,\n allowRefresh: !shouldClearPreviousSession,\n });\n\n // Start the authentication flow (this will redirect the user in the browser, or handle it in React Native)\n const authResult = await this.authProvider.authenticate({\n publicKey: publicKey,\n appId: this.config.appId,\n provider: authOptions?.provider,\n redirectUrl: this.config.authOptions.redirectUrl,\n authUrl: this.config.authOptions.authUrl,\n sessionId: sessionId,\n // OAuth session management - defaults to allowing refresh unless user explicitly logged out\n clearPreviousSession: shouldClearPreviousSession, // true only after logout\n allowRefresh: !shouldClearPreviousSession, // false only after logout\n });\n\n if (authResult && \"walletId\" in authResult) {\n // If we got an auth result, we need to update the session with actual wallet ID and organizationId\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Authentication completed after redirect\", {\n walletId: authResult.walletId,\n organizationId: authResult.organizationId,\n provider: authResult.provider,\n });\n\n // Update the temporary session with actual wallet ID, organizationId, and auth info\n tempSession.walletId = authResult.walletId;\n tempSession.organizationId = authResult.organizationId;\n tempSession.authProvider = authResult.provider || tempSession.authProvider;\n tempSession.accountDerivationIndex = authResult.accountDerivationIndex;\n tempSession.authUserId = authResult.authUserId;\n tempSession.status = \"completed\";\n tempSession.lastUsed = Date.now();\n\n // Update authenticator expiration if provided by auth response (and > 0)\n if (authResult.expiresInMs > 0) {\n const now = Date.now();\n tempSession.authenticatorCreatedAt = now;\n tempSession.authenticatorExpiresAt = now + authResult.expiresInMs;\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Updated authenticator expiration from immediate auth response\", {\n expiresInMs: authResult.expiresInMs,\n expiresAt: new Date(tempSession.authenticatorExpiresAt).toISOString(),\n });\n }\n\n await this.storage.saveSession(tempSession);\n\n // Clear the logout flag after successful authentication (React Native case)\n await this.storage.setShouldClearPreviousSession(false);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Cleared logout flag after successful authentication\");\n\n return tempSession; // Return the auth result for further processing\n }\n // If we don't have an auth result, it means we're in a redirect flow\n this.logger.info(\"EMBEDDED_PROVIDER\", \"Redirect authentication initiated, waiting for redirect completion\");\n // In this case, we don't return anything as the redirect will handle the rest\n return null;\n }\n\n private async completeAuthConnection(authResult: AuthResult): Promise<ConnectResult> {\n // Check if we have an existing session\n const session = await this.storage.getSession();\n\n if (!session) {\n throw new Error(\"No session found after redirect - session may have expired\");\n }\n\n // Update session with actual wallet ID and auth info from redirect\n session.walletId = authResult.walletId;\n session.authProvider = authResult.provider || session.authProvider;\n session.organizationId = authResult.organizationId;\n session.accountDerivationIndex = authResult.accountDerivationIndex;\n session.authUserId = authResult.authUserId;\n session.status = \"completed\";\n session.lastUsed = Date.now();\n\n // Update authenticator expiration if provided by auth response (and > 0)\n if (authResult.expiresInMs > 0) {\n const now = Date.now();\n session.authenticatorCreatedAt = now;\n session.authenticatorExpiresAt = now + authResult.expiresInMs;\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Updated authenticator expiration from auth response\", {\n expiresInMs: authResult.expiresInMs,\n expiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n });\n }\n\n await this.storage.saveSession(session);\n\n // Clear the logout flag after successful authentication\n // This allows future logins to use OAuth session refresh\n await this.storage.setShouldClearPreviousSession(false);\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Cleared logout flag after successful authentication\");\n\n await this.initializeClientFromSession(session);\n\n // Ensure authenticator is valid after successful connection\n await this.ensureValidAuthenticator();\n\n return {\n walletId: this.walletId!,\n addresses: this.addresses,\n status: \"completed\",\n authUserId: session.authUserId,\n authProvider: session.authProvider,\n };\n }\n\n /*\n * Ensures the authenticator is valid and performs renewal if needed.\n * The renewal of the authenticator can only happen meanwhile the previous authenticator is still valid.\n */\n private async ensureValidAuthenticator(): Promise<void> {\n // Get current session to check authenticator timing\n const session = await this.storage.getSession();\n if (!session) {\n throw new Error(\"No active session found\");\n }\n\n const now = Date.now();\n\n // Sessions without authenticator timing fields are invalid - clear them\n if (!session.authenticatorExpiresAt) {\n this.logger.warn(\"EMBEDDED_PROVIDER\", \"Session missing authenticator timing - treating as invalid session\");\n await this.disconnect(false);\n throw new Error(\"Invalid session - missing authenticator timing\");\n }\n\n const timeUntilExpiry = session.authenticatorExpiresAt - now;\n\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Checking authenticator expiration\", {\n expiresAt: new Date(session.authenticatorExpiresAt).toISOString(),\n timeUntilExpiry,\n });\n\n // Check if authenticator has expired\n if (timeUntilExpiry <= 0) {\n this.logger.error(\"EMBEDDED_PROVIDER\", \"Authenticator has expired, disconnecting\");\n await this.disconnect(false);\n throw new Error(\"Authenticator expired\");\n }\n\n // TODO: Here we would renew the authenticator if needed. It was disabled at PR https://github.com/phantom/wallet-sdk/pull/283\n }\n\n /*\n * We use this method to initialize the PhantomClient and fetch wallet addresses from a completed session.\n * This is the final step that sets up the provider's client state and retrieves available addresses.\n */\n private async initializeClientFromSession(session: Session): Promise<void> {\n // Create client from session\n this.logger.log(\"EMBEDDED_PROVIDER\", \"Initializing PhantomClient from session\", {\n organizationId: session.organizationId,\n walletId: session.walletId,\n appId: session.appId,\n });\n\n // Ensure stamper is initialized with existing keys\n if (!this.stamper.getKeyInfo()) {\n await this.stamper.init();\n }\n\n // Create PhantomClient with organizationId from auth flow\n this.client = new PhantomClient(\n {\n apiBaseUrl: this.config.apiBaseUrl,\n organizationId: session.organizationId,\n headers: {\n ...(this.platform.analyticsHeaders || {}),\n },\n },\n this.stamper,\n );\n\n this.walletId = session.walletId;\n\n // Get wallet addresses and filter by enabled address types with retry\n this.addresses = await this.getAndFilterWalletAddresses(session.walletId);\n }\n}\n","import type { EmbeddedProviderAuthType } from \"./types\";\n/**\n * How long an authenticator is valid before it expires (in milliseconds)\n * Default: 7 days\n * For testing: Use smaller values like 5 * 60 * 1000 (5 minutes)\n */\nexport const AUTHENTICATOR_EXPIRATION_TIME_MS = 7 * 24 * 60 * 60 * 1000; // 7 days\n/**\n * How long before expiration should we attempt to renew the authenticator (in milliseconds)\n * Default: 2 days before expiration\n * For testing: Use smaller values like 2 * 60 * 1000 (2 minutes)\n */\nexport const AUTHENTICATOR_RENEWAL_WINDOW_MS = 2 * 24 * 60 * 60 * 1000; // 2 days\n\nexport const EMBEDDED_PROVIDER_AUTH_TYPES: EmbeddedProviderAuthType[] = [\"google\", \"apple\", \"phantom\"];\n","import { EventEmitter } from \"eventemitter3\";\nimport type { ISolanaChain } from \"@phantom/chain-interfaces\";\nimport type { EmbeddedProvider } from \"../embedded-provider\";\nimport { NetworkId } from \"@phantom/constants\";\nimport bs58 from \"bs58\";\nimport type { Transaction, VersionedTransaction } from \"@phantom/sdk-types\";\nimport { parseSolanaSignedTransaction } from \"@phantom/parsers\";\n\n/**\n * Embedded Solana chain implementation that is wallet adapter compliant\n */\nexport class EmbeddedSolanaChain implements ISolanaChain {\n private currentNetworkId: NetworkId = NetworkId.SOLANA_MAINNET;\n private _connected: boolean = false;\n private _publicKey: string | null = null;\n private eventEmitter: EventEmitter = new EventEmitter();\n\n constructor(private provider: EmbeddedProvider) {\n this.setupEventListeners();\n this.syncInitialState();\n }\n\n // Wallet adapter compliant properties\n get connected(): boolean {\n return this._connected;\n }\n\n get publicKey(): string | null {\n return this._publicKey;\n }\n\n private ensureConnected(): void {\n if (!this.provider.isConnected()) {\n throw new Error(\"Solana chain not available. Ensure SDK is connected.\");\n }\n }\n\n // Standard wallet adapter methods\n async signMessage(message: string | Uint8Array): Promise<{ signature: Uint8Array; publicKey: string }> {\n this.ensureConnected();\n const messageStr = typeof message === \"string\" ? message : new TextDecoder().decode(message);\n const result = await this.provider.signMessage({\n message: messageStr,\n networkId: this.currentNetworkId,\n });\n\n // Convert signature to Uint8Array - result.signature is base58 encoded from parseSignMessageResponse\n const signature =\n typeof result.signature === \"string\" ? new Uint8Array(bs58.decode(result.signature)) : result.signature;\n\n return {\n signature,\n publicKey: this._publicKey || \"\",\n };\n }\n\n async signTransaction(transaction: Transaction | VersionedTransaction): Promise<Transaction | VersionedTransaction> {\n this.ensureConnected();\n const result = await this.provider.signTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n\n // Parse the signed transaction from base64url back to Transaction/VersionedTransaction\n const signedTransaction = parseSolanaSignedTransaction(result.rawTransaction);\n if (!signedTransaction) {\n throw new Error(\"Failed to parse signed transaction\");\n }\n return signedTransaction;\n }\n\n async signAndSendTransaction(transaction: Transaction | VersionedTransaction): Promise<{ signature: string }> {\n this.ensureConnected();\n const result = await this.provider.signAndSendTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n if (!result.hash) {\n throw new Error(\"Transaction not submitted\");\n }\n return { signature: result.hash };\n }\n\n async signAllTransactions(\n transactions: (Transaction | VersionedTransaction)[],\n ): Promise<(Transaction | VersionedTransaction)[]> {\n this.ensureConnected();\n const results = await Promise.all(transactions.map(tx => this.signTransaction(tx)));\n return results;\n }\n\n async signAndSendAllTransactions(\n transactions: (Transaction | VersionedTransaction)[],\n ): Promise<{ signatures: string[] }> {\n const results = await Promise.all(transactions.map(tx => this.signAndSendTransaction(tx)));\n return { signatures: results.map(result => result.signature) };\n }\n\n connect(_options?: { onlyIfTrusted?: boolean }): Promise<{ publicKey: string }> {\n if (!this.provider.isConnected()) {\n throw new Error(\"Provider not connected. Call provider connect first.\");\n }\n const addresses = this.provider.getAddresses();\n const solanaAddr = addresses.find((a: any) => a.addressType === \"Solana\");\n if (!solanaAddr) throw new Error(\"No Solana address found\");\n\n this.updateConnectionState(true, solanaAddr.address);\n return Promise.resolve({ publicKey: solanaAddr.address });\n }\n\n async disconnect(): Promise<void> {\n // For embedded, disconnection is handled at SDK level\n return this.provider.disconnect();\n }\n\n switchNetwork(network: \"mainnet\" | \"devnet\"): Promise<void> {\n this.currentNetworkId = network === \"mainnet\" ? NetworkId.SOLANA_MAINNET : NetworkId.SOLANA_DEVNET;\n return Promise.resolve();\n }\n\n getPublicKey(): Promise<string | null> {\n if (!this.provider.isConnected()) return Promise.resolve(null);\n\n const addresses = this.provider.getAddresses();\n const solanaAddr = addresses.find((a: any) => a.addressType === \"Solana\");\n return Promise.resolve(solanaAddr?.address || null);\n }\n\n isConnected(): boolean {\n return this._connected && this.provider.isConnected();\n }\n\n private setupEventListeners(): void {\n // Listen to provider events and bridge to wallet adapter events\n this.provider.on(\"connect\", (data: any) => {\n const solanaAddress = data.addresses?.find((addr: any) => addr.addressType === \"Solana\");\n\n if (solanaAddress) {\n this.updateConnectionState(true, solanaAddress.address);\n this.eventEmitter.emit(\"connect\", solanaAddress.address);\n }\n });\n\n this.provider.on(\"disconnect\", () => {\n this.updateConnectionState(false, null);\n this.eventEmitter.emit(\"disconnect\");\n });\n }\n\n private syncInitialState(): void {\n if (this.provider.isConnected()) {\n const addresses = this.provider.getAddresses();\n const solanaAddress = addresses.find((a: any) => a.addressType === \"Solana\");\n\n if (solanaAddress) {\n this.updateConnectionState(true, solanaAddress.address);\n }\n }\n }\n\n private updateConnectionState(connected: boolean, publicKey: string | null): void {\n this._connected = connected;\n this._publicKey = publicKey;\n }\n\n // Event methods for interface compliance\n on(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.on(event, listener);\n }\n\n off(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.off(event, listener);\n }\n}\n","import type { EthTransactionRequest, IEthereumChain } from \"@phantom/chain-interfaces\";\nimport { NetworkId, chainIdToNetworkId, networkIdToChainId } from \"@phantom/constants\";\nimport { EventEmitter } from \"eventemitter3\";\nimport type { EmbeddedProvider } from \"../embedded-provider\";\n\n/**\n * Embedded Ethereum chain implementation that is EIP-1193 compliant\n */\nexport class EmbeddedEthereumChain implements IEthereumChain {\n private currentNetworkId: NetworkId = NetworkId.ETHEREUM_MAINNET;\n private _connected: boolean = false;\n private _accounts: string[] = [];\n private eventEmitter: EventEmitter = new EventEmitter();\n\n constructor(private provider: EmbeddedProvider) {\n this.setupEventListeners();\n this.syncInitialState();\n }\n\n // EIP-1193 compliant properties\n get connected(): boolean {\n return this._connected;\n }\n\n get chainId(): string {\n const chainId = networkIdToChainId(this.currentNetworkId) || 1;\n return `0x${chainId.toString(16)}`;\n }\n\n get accounts(): string[] {\n return this._accounts;\n }\n\n private ensureConnected(): void {\n if (!this.provider.isConnected()) {\n throw new Error(\"Ethereum chain not available. Ensure SDK is connected.\");\n }\n }\n\n async request<T = any>(args: { method: string; params?: unknown[] }): Promise<T> {\n this.ensureConnected();\n return this.handleEmbeddedRequest(args);\n }\n\n // Connection methods\n connect(): Promise<string[]> {\n if (!this.provider.isConnected()) {\n throw new Error(\"Provider not connected. Call provider connect first.\");\n }\n const addresses = this.provider.getAddresses();\n const ethAddresses = addresses.filter((a: any) => a.addressType === \"Ethereum\").map((a: any) => a.address);\n\n this.updateConnectionState(true, ethAddresses);\n return Promise.resolve(ethAddresses);\n }\n\n async disconnect(): Promise<void> {\n await this.provider.disconnect();\n }\n\n // Standard compliant methods (return raw values)\n async signPersonalMessage(message: string, address: string): Promise<string> {\n return await this.request<string>({\n method: \"personal_sign\",\n params: [message, address],\n });\n }\n\n async signTypedData(typedData: any, address: string): Promise<string> {\n return await this.request<string>({\n method: \"eth_signTypedData_v4\",\n params: [address, JSON.stringify(typedData)],\n });\n }\n\n async signTransaction(transaction: EthTransactionRequest): Promise<string> {\n // If the transaction has a chainId, use that network for signing\n let networkId = this.currentNetworkId;\n if (transaction.chainId) {\n const numericChainId =\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16);\n const txNetworkId = chainIdToNetworkId(numericChainId);\n if (txNetworkId) {\n networkId = txNetworkId;\n }\n }\n\n const result = await this.provider.signTransaction({\n transaction,\n networkId,\n });\n // parseTransactionResponse already converts base64url to hex for Ethereum\n return result.rawTransaction;\n }\n\n async sendTransaction(transaction: EthTransactionRequest): Promise<string> {\n // If the transaction has a chainId, switch to that chain first\n if (transaction.chainId) {\n const numericChainId =\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16);\n await this.switchChain(numericChainId);\n }\n\n const result = await this.provider.signAndSendTransaction({\n transaction,\n networkId: this.currentNetworkId,\n });\n if (!result.hash) {\n // Throw error as we didn't submit the transaction\n throw new Error(\"Transaction not submitted\");\n }\n return result.hash;\n }\n\n switchChain(chainId: number | string): Promise<void> {\n // Convert string to number if needed, detecting hex vs decimal\n const numericChainId =\n typeof chainId === \"string\"\n ? chainId.toLowerCase().startsWith(\"0x\")\n ? parseInt(chainId, 16)\n : parseInt(chainId, 10)\n : chainId;\n\n const networkId = chainIdToNetworkId(numericChainId);\n if (!networkId) {\n throw new Error(`Unsupported chainId: ${chainId}`);\n }\n this.currentNetworkId = networkId;\n this.eventEmitter.emit(\"chainChanged\", `0x${numericChainId.toString(16)}`);\n return Promise.resolve();\n }\n\n getChainId(): Promise<number> {\n const chainId = networkIdToChainId(this.currentNetworkId);\n return Promise.resolve(chainId || 1); // Default to mainnet\n }\n\n async getAccounts(): Promise<string[]> {\n return this.request({ method: \"eth_accounts\" });\n }\n\n isConnected(): boolean {\n return this._connected && this.provider.isConnected();\n }\n\n private setupEventListeners(): void {\n // Listen to provider events and bridge to EIP-1193 events\n this.provider.on(\"connect\", (data: any) => {\n const ethAddresses =\n data.addresses?.filter((addr: any) => addr.addressType === \"Ethereum\")?.map((addr: any) => addr.address) || [];\n\n if (ethAddresses.length > 0) {\n this.updateConnectionState(true, ethAddresses);\n this.eventEmitter.emit(\"connect\", { chainId: this.chainId });\n this.eventEmitter.emit(\"accountsChanged\", ethAddresses);\n }\n });\n\n this.provider.on(\"disconnect\", () => {\n this.updateConnectionState(false, []);\n this.eventEmitter.emit(\"disconnect\", { code: 4900, message: \"Provider disconnected\" });\n this.eventEmitter.emit(\"accountsChanged\", []);\n });\n }\n\n private syncInitialState(): void {\n if (this.provider.isConnected()) {\n const addresses = this.provider.getAddresses();\n const ethAddresses = addresses.filter((a: any) => a.addressType === \"Ethereum\").map((a: any) => a.address);\n\n if (ethAddresses.length > 0) {\n this.updateConnectionState(true, ethAddresses);\n }\n }\n }\n\n private updateConnectionState(connected: boolean, accounts: string[]): void {\n this._connected = connected;\n this._accounts = accounts;\n }\n\n private async handleEmbeddedRequest<T>(args: { method: string; params?: unknown[] }): Promise<T> {\n // Convert Ethereum RPC calls to embedded provider API\n switch (args.method) {\n case \"personal_sign\": {\n const [message, _address] = args.params as [string, string];\n const result = await this.provider.signEthereumMessage({\n message,\n networkId: this.currentNetworkId,\n });\n return result.signature as T;\n }\n\n case \"eth_signTypedData_v4\": {\n const [_typedDataAddress, typedDataStr] = args.params as [string, string];\n const typedData = JSON.parse(typedDataStr);\n\n // Compute EIP-712 hash using ethers or viem\n // We'll use a simple approach: call the backend with proper typed data signing\n // For now, pass the typed data object through signMessage with a special marker\n const typedDataResult = await this.provider.signTypedDataV4({\n typedData,\n networkId: this.currentNetworkId,\n });\n return typedDataResult.signature as T;\n }\n\n case \"eth_signTransaction\": {\n const [transaction] = args.params as [EthTransactionRequest];\n // If the transaction has a chainId, use that NetworkId\n const networkIdFromTx = transaction.chainId\n ? chainIdToNetworkId(\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16),\n )\n : null;\n\n const signResult = await this.provider.signTransaction({\n transaction,\n networkId: networkIdFromTx || this.currentNetworkId,\n });\n return signResult.rawTransaction as T;\n }\n\n case \"eth_sendTransaction\": {\n const [transaction] = args.params as [EthTransactionRequest];\n // If the transaction has a chainId, submit it to that NetworkId\n const networkIdFromTx = transaction.chainId\n ? chainIdToNetworkId(\n typeof transaction.chainId === \"number\" ? transaction.chainId : parseInt(transaction.chainId, 16),\n )\n : null;\n\n const sendResult = await this.provider.signAndSendTransaction({\n transaction,\n networkId: networkIdFromTx || this.currentNetworkId,\n });\n return sendResult.hash as T;\n }\n\n case \"eth_accounts\": {\n const addresses = this.provider.getAddresses();\n const ethAddr = addresses.find((a: any) => a.addressType === \"Ethereum\");\n return (ethAddr ? [ethAddr.address] : []) as T;\n }\n\n case \"eth_chainId\": {\n return `0x${(networkIdToChainId(this.currentNetworkId) || 1).toString(16)}` as T;\n }\n\n case \"wallet_switchEthereumChain\": {\n const [{ chainId }] = args.params as [{ chainId: string }];\n const numericChainId = parseInt(chainId, 16);\n await this.switchChain(numericChainId);\n return undefined as T;\n }\n\n default:\n throw new Error(`Embedded provider doesn't support method: ${args.method}`);\n }\n }\n\n // Event methods for interface compliance\n on(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.on(event, listener);\n }\n\n off(event: string, listener: (...args: any[]) => void): void {\n this.eventEmitter.off(event, listener);\n }\n}\n","import type { DebugLogger } from \"../interfaces\";\n\nexport async function retryWithBackoff<T>(\n operation: () => Promise<T>,\n operationName: string,\n logger: DebugLogger,\n maxRetries: number = 3,\n baseDelay: number = 1000,\n): Promise<T> {\n let lastError: Error;\n\n for (let attempt = 1; attempt <= maxRetries; attempt++) {\n try {\n logger.log(\"EMBEDDED_PROVIDER\", `Attempting ${operationName}`, {\n attempt,\n maxRetries,\n });\n return await operation();\n } catch (error) {\n lastError = error as Error;\n logger.warn(\"EMBEDDED_PROVIDER\", `${operationName} failed`, {\n attempt,\n maxRetries,\n error: error instanceof Error ? error.message : String(error),\n });\n\n if (attempt === maxRetries) {\n logger.error(\"EMBEDDED_PROVIDER\", `${operationName} failed after ${maxRetries} attempts`, {\n finalError: error instanceof Error ? error.message : String(error),\n });\n break;\n }\n\n // Exponential backoff: 1s, 2s, 4s\n const delay = baseDelay * Math.pow(2, attempt - 1);\n logger.log(\"EMBEDDED_PROVIDER\", `Retrying ${operationName} in ${delay}ms`, {\n attempt: attempt + 1,\n delay,\n });\n await new Promise(resolve => setTimeout(resolve, delay));\n }\n }\n\n throw lastError!;\n}\n","export function generateSessionId(): string {\n return (\n \"session_\" +\n Math.random().toString(36).substring(2, 15) +\n Math.random().toString(36).substring(2, 15) +\n \"_\" +\n Date.now()\n );\n}\n"],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;;;ACAA,uBAAmD;AACnD,oBAA+D;AAE/D,IAAAA,kBAMO;AACP,mBAA2B;AAC3B,oBAAuB;AACvB,IAAAC,eAAiB;;;ACNV,IAAM,mCAAmC,IAAI,KAAK,KAAK,KAAK;AAM5D,IAAM,kCAAkC,IAAI,KAAK,KAAK,KAAK;AAE3D,IAAM,+BAA2D,CAAC,UAAU,SAAS,SAAS;;;ACdrG,2BAA6B;AAG7B,uBAA0B;AAC1B,kBAAiB;AAEjB,qBAA6C;AAKtC,IAAM,sBAAN,MAAkD;AAAA,EAMvD,YAAoB,UAA4B;AAA5B;AALpB,SAAQ,mBAA8B,2BAAU;AAChD,SAAQ,aAAsB;AAC9B,SAAQ,aAA4B;AACpC,SAAQ,eAA6B,IAAI,kCAAa;AAGpD,SAAK,oBAAoB;AACzB,SAAK,iBAAiB;AAAA,EACxB;AAAA;AAAA,EAGA,IAAI,YAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,YAA2B;AAC7B,WAAO,KAAK;AAAA,EACd;AAAA,EAEQ,kBAAwB;AAC9B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AAAA,EACF;AAAA;AAAA,EAGA,MAAM,YAAY,SAAqF;AACrG,SAAK,gBAAgB;AACrB,UAAM,aAAa,OAAO,YAAY,WAAW,UAAU,IAAI,YAAY,EAAE,OAAO,OAAO;AAC3F,UAAM,SAAS,MAAM,KAAK,SAAS,YAAY;AAAA,MAC7C,SAAS;AAAA,MACT,WAAW,KAAK;AAAA,IAClB,CAAC;AAGD,UAAM,YACJ,OAAO,OAAO,cAAc,WAAW,IAAI,WAAW,YAAAC,QAAK,OAAO,OAAO,SAAS,CAAC,IAAI,OAAO;AAEhG,WAAO;AAAA,MACL;AAAA,MACA,WAAW,KAAK,cAAc;AAAA,IAChC;AAAA,EACF;AAAA,EAEA,MAAM,gBAAgB,aAA8F;AAClH,SAAK,gBAAgB;AACrB,UAAM,SAAS,MAAM,KAAK,SAAS,gBAAgB;AAAA,MACjD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AAGD,UAAM,wBAAoB,6CAA6B,OAAO,cAAc;AAC5E,QAAI,CAAC,mBAAmB;AACtB,YAAM,IAAI,MAAM,oCAAoC;AAAA,IACtD;AACA,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,uBAAuB,aAAiF;AAC5G,SAAK,gBAAgB;AACrB,UAAM,SAAS,MAAM,KAAK,SAAS,uBAAuB;AAAA,MACxD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AACD,QAAI,CAAC,OAAO,MAAM;AAChB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AACA,WAAO,EAAE,WAAW,OAAO,KAAK;AAAA,EAClC;AAAA,EAEA,MAAM,oBACJ,cACiD;AACjD,SAAK,gBAAgB;AACrB,UAAM,UAAU,MAAM,QAAQ,IAAI,aAAa,IAAI,QAAM,KAAK,gBAAgB,EAAE,CAAC,CAAC;AAClF,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,2BACJ,cACmC;AACnC,UAAM,UAAU,MAAM,QAAQ,IAAI,aAAa,IAAI,QAAM,KAAK,uBAAuB,EAAE,CAAC,CAAC;AACzF,WAAO,EAAE,YAAY,QAAQ,IAAI,YAAU,OAAO,SAAS,EAAE;AAAA,EAC/D;AAAA,EAEA,QAAQ,UAAwE;AAC9E,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AACA,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,aAAa,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AACxE,QAAI,CAAC;AAAY,YAAM,IAAI,MAAM,yBAAyB;AAE1D,SAAK,sBAAsB,MAAM,WAAW,OAAO;AACnD,WAAO,QAAQ,QAAQ,EAAE,WAAW,WAAW,QAAQ,CAAC;AAAA,EAC1D;AAAA,EAEA,MAAM,aAA4B;AAEhC,WAAO,KAAK,SAAS,WAAW;AAAA,EAClC;AAAA,EAEA,cAAc,SAA8C;AAC1D,SAAK,mBAAmB,YAAY,YAAY,2BAAU,iBAAiB,2BAAU;AACrF,WAAO,QAAQ,QAAQ;AAAA,EACzB;AAAA,EAEA,eAAuC;AACrC,QAAI,CAAC,KAAK,SAAS,YAAY;AAAG,aAAO,QAAQ,QAAQ,IAAI;AAE7D,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,aAAa,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AACxE,WAAO,QAAQ,QAAQ,YAAY,WAAW,IAAI;AAAA,EACpD;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,cAAc,KAAK,SAAS,YAAY;AAAA,EACtD;AAAA,EAEQ,sBAA4B;AAElC,SAAK,SAAS,GAAG,WAAW,CAAC,SAAc;AACzC,YAAM,gBAAgB,KAAK,WAAW,KAAK,CAAC,SAAc,KAAK,gBAAgB,QAAQ;AAEvF,UAAI,eAAe;AACjB,aAAK,sBAAsB,MAAM,cAAc,OAAO;AACtD,aAAK,aAAa,KAAK,WAAW,cAAc,OAAO;AAAA,MACzD;AAAA,IACF,CAAC;AAED,SAAK,SAAS,GAAG,cAAc,MAAM;AACnC,WAAK,sBAAsB,OAAO,IAAI;AACtC,WAAK,aAAa,KAAK,YAAY;AAAA,IACrC,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAyB;AAC/B,QAAI,KAAK,SAAS,YAAY,GAAG;AAC/B,YAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,YAAM,gBAAgB,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,QAAQ;AAE3E,UAAI,eAAe;AACjB,aAAK,sBAAsB,MAAM,cAAc,OAAO;AAAA,MACxD;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,sBAAsB,WAAoB,WAAgC;AAChF,SAAK,aAAa;AAClB,SAAK,aAAa;AAAA,EACpB;AAAA;AAAA,EAGA,GAAG,OAAe,UAA0C;AAC1D,SAAK,aAAa,GAAG,OAAO,QAAQ;AAAA,EACtC;AAAA,EAEA,IAAI,OAAe,UAA0C;AAC3D,SAAK,aAAa,IAAI,OAAO,QAAQ;AAAA,EACvC;AACF;;;AC5KA,IAAAC,oBAAkE;AAClE,IAAAC,wBAA6B;AAMtB,IAAM,wBAAN,MAAsD;AAAA,EAM3D,YAAoB,UAA4B;AAA5B;AALpB,SAAQ,mBAA8B,4BAAU;AAChD,SAAQ,aAAsB;AAC9B,SAAQ,YAAsB,CAAC;AAC/B,SAAQ,eAA6B,IAAI,mCAAa;AAGpD,SAAK,oBAAoB;AACzB,SAAK,iBAAiB;AAAA,EACxB;AAAA;AAAA,EAGA,IAAI,YAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,IAAI,UAAkB;AACpB,UAAM,cAAU,sCAAmB,KAAK,gBAAgB,KAAK;AAC7D,WAAO,KAAK,QAAQ,SAAS,EAAE,CAAC;AAAA,EAClC;AAAA,EAEA,IAAI,WAAqB;AACvB,WAAO,KAAK;AAAA,EACd;AAAA,EAEQ,kBAAwB;AAC9B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,wDAAwD;AAAA,IAC1E;AAAA,EACF;AAAA,EAEA,MAAM,QAAiB,MAA0D;AAC/E,SAAK,gBAAgB;AACrB,WAAO,KAAK,sBAAsB,IAAI;AAAA,EACxC;AAAA;AAAA,EAGA,UAA6B;AAC3B,QAAI,CAAC,KAAK,SAAS,YAAY,GAAG;AAChC,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AACA,UAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,UAAM,eAAe,UAAU,OAAO,CAAC,MAAW,EAAE,gBAAgB,UAAU,EAAE,IAAI,CAAC,MAAW,EAAE,OAAO;AAEzG,SAAK,sBAAsB,MAAM,YAAY;AAC7C,WAAO,QAAQ,QAAQ,YAAY;AAAA,EACrC;AAAA,EAEA,MAAM,aAA4B;AAChC,UAAM,KAAK,SAAS,WAAW;AAAA,EACjC;AAAA;AAAA,EAGA,MAAM,oBAAoB,SAAiB,SAAkC;AAC3E,WAAO,MAAM,KAAK,QAAgB;AAAA,MAChC,QAAQ;AAAA,MACR,QAAQ,CAAC,SAAS,OAAO;AAAA,IAC3B,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,cAAc,WAAgB,SAAkC;AACpE,WAAO,MAAM,KAAK,QAAgB;AAAA,MAChC,QAAQ;AAAA,MACR,QAAQ,CAAC,SAAS,KAAK,UAAU,SAAS,CAAC;AAAA,IAC7C,CAAC;AAAA,EACH;AAAA,EAEA,MAAM,gBAAgB,aAAqD;AAEzE,QAAI,YAAY,KAAK;AACrB,QAAI,YAAY,SAAS;AACvB,YAAM,iBACJ,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAClG,YAAM,kBAAc,sCAAmB,cAAc;AACrD,UAAI,aAAa;AACf,oBAAY;AAAA,MACd;AAAA,IACF;AAEA,UAAM,SAAS,MAAM,KAAK,SAAS,gBAAgB;AAAA,MACjD;AAAA,MACA;AAAA,IACF,CAAC;AAED,WAAO,OAAO;AAAA,EAChB;AAAA,EAEA,MAAM,gBAAgB,aAAqD;AAEzE,QAAI,YAAY,SAAS;AACvB,YAAM,iBACJ,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAClG,YAAM,KAAK,YAAY,cAAc;AAAA,IACvC;AAEA,UAAM,SAAS,MAAM,KAAK,SAAS,uBAAuB;AAAA,MACxD;AAAA,MACA,WAAW,KAAK;AAAA,IAClB,CAAC;AACD,QAAI,CAAC,OAAO,MAAM;AAEhB,YAAM,IAAI,MAAM,2BAA2B;AAAA,IAC7C;AACA,WAAO,OAAO;AAAA,EAChB;AAAA,EAEA,YAAY,SAAyC;AAEnD,UAAM,iBACJ,OAAO,YAAY,WACf,QAAQ,YAAY,EAAE,WAAW,IAAI,IACnC,SAAS,SAAS,EAAE,IACpB,SAAS,SAAS,EAAE,IACtB;AAEN,UAAM,gBAAY,sCAAmB,cAAc;AACnD,QAAI,CAAC,WAAW;AACd,YAAM,IAAI,MAAM,wBAAwB,OAAO,EAAE;AAAA,IACnD;AACA,SAAK,mBAAmB;AACxB,SAAK,aAAa,KAAK,gBAAgB,KAAK,eAAe,SAAS,EAAE,CAAC,EAAE;AACzE,WAAO,QAAQ,QAAQ;AAAA,EACzB;AAAA,EAEA,aAA8B;AAC5B,UAAM,cAAU,sCAAmB,KAAK,gBAAgB;AACxD,WAAO,QAAQ,QAAQ,WAAW,CAAC;AAAA,EACrC;AAAA,EAEA,MAAM,cAAiC;AACrC,WAAO,KAAK,QAAQ,EAAE,QAAQ,eAAe,CAAC;AAAA,EAChD;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,cAAc,KAAK,SAAS,YAAY;AAAA,EACtD;AAAA,EAEQ,sBAA4B;AAElC,SAAK,SAAS,GAAG,WAAW,CAAC,SAAc;AACzC,YAAM,eACJ,KAAK,WAAW,OAAO,CAAC,SAAc,KAAK,gBAAgB,UAAU,GAAG,IAAI,CAAC,SAAc,KAAK,OAAO,KAAK,CAAC;AAE/G,UAAI,aAAa,SAAS,GAAG;AAC3B,aAAK,sBAAsB,MAAM,YAAY;AAC7C,aAAK,aAAa,KAAK,WAAW,EAAE,SAAS,KAAK,QAAQ,CAAC;AAC3D,aAAK,aAAa,KAAK,mBAAmB,YAAY;AAAA,MACxD;AAAA,IACF,CAAC;AAED,SAAK,SAAS,GAAG,cAAc,MAAM;AACnC,WAAK,sBAAsB,OAAO,CAAC,CAAC;AACpC,WAAK,aAAa,KAAK,cAAc,EAAE,MAAM,MAAM,SAAS,wBAAwB,CAAC;AACrF,WAAK,aAAa,KAAK,mBAAmB,CAAC,CAAC;AAAA,IAC9C,CAAC;AAAA,EACH;AAAA,EAEQ,mBAAyB;AAC/B,QAAI,KAAK,SAAS,YAAY,GAAG;AAC/B,YAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,YAAM,eAAe,UAAU,OAAO,CAAC,MAAW,EAAE,gBAAgB,UAAU,EAAE,IAAI,CAAC,MAAW,EAAE,OAAO;AAEzG,UAAI,aAAa,SAAS,GAAG;AAC3B,aAAK,sBAAsB,MAAM,YAAY;AAAA,MAC/C;AAAA,IACF;AAAA,EACF;AAAA,EAEQ,sBAAsB,WAAoB,UAA0B;AAC1E,SAAK,aAAa;AAClB,SAAK,YAAY;AAAA,EACnB;AAAA,EAEA,MAAc,sBAAyB,MAA0D;AAE/F,YAAQ,KAAK,QAAQ;AAAA,MACnB,KAAK,iBAAiB;AACpB,cAAM,CAAC,SAAS,QAAQ,IAAI,KAAK;AACjC,cAAM,SAAS,MAAM,KAAK,SAAS,oBAAoB;AAAA,UACrD;AAAA,UACA,WAAW,KAAK;AAAA,QAClB,CAAC;AACD,eAAO,OAAO;AAAA,MAChB;AAAA,MAEA,KAAK,wBAAwB;AAC3B,cAAM,CAAC,mBAAmB,YAAY,IAAI,KAAK;AAC/C,cAAM,YAAY,KAAK,MAAM,YAAY;AAKzC,cAAM,kBAAkB,MAAM,KAAK,SAAS,gBAAgB;AAAA,UAC1D;AAAA,UACA,WAAW,KAAK;AAAA,QAClB,CAAC;AACD,eAAO,gBAAgB;AAAA,MACzB;AAAA,MAEA,KAAK,uBAAuB;AAC1B,cAAM,CAAC,WAAW,IAAI,KAAK;AAE3B,cAAM,kBAAkB,YAAY,cAChC;AAAA,UACE,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAAA,QAClG,IACA;AAEJ,cAAM,aAAa,MAAM,KAAK,SAAS,gBAAgB;AAAA,UACrD;AAAA,UACA,WAAW,mBAAmB,KAAK;AAAA,QACrC,CAAC;AACD,eAAO,WAAW;AAAA,MACpB;AAAA,MAEA,KAAK,uBAAuB;AAC1B,cAAM,CAAC,WAAW,IAAI,KAAK;AAE3B,cAAM,kBAAkB,YAAY,cAChC;AAAA,UACE,OAAO,YAAY,YAAY,WAAW,YAAY,UAAU,SAAS,YAAY,SAAS,EAAE;AAAA,QAClG,IACA;AAEJ,cAAM,aAAa,MAAM,KAAK,SAAS,uBAAuB;AAAA,UAC5D;AAAA,UACA,WAAW,mBAAmB,KAAK;AAAA,QACrC,CAAC;AACD,eAAO,WAAW;AAAA,MACpB;AAAA,MAEA,KAAK,gBAAgB;AACnB,cAAM,YAAY,KAAK,SAAS,aAAa;AAC7C,cAAM,UAAU,UAAU,KAAK,CAAC,MAAW,EAAE,gBAAgB,UAAU;AACvE,eAAQ,UAAU,CAAC,QAAQ,OAAO,IAAI,CAAC;AAAA,MACzC;AAAA,MAEA,KAAK,eAAe;AAClB,eAAO,UAAM,sCAAmB,KAAK,gBAAgB,KAAK,GAAG,SAAS,EAAE,CAAC;AAAA,MAC3E;AAAA,MAEA,KAAK,8BAA8B;AACjC,cAAM,CAAC,EAAE,QAAQ,CAAC,IAAI,KAAK;AAC3B,cAAM,iBAAiB,SAAS,SAAS,EAAE;AAC3C,cAAM,KAAK,YAAY,cAAc;AACrC,eAAO;AAAA,MACT;AAAA,MAEA;AACE,cAAM,IAAI,MAAM,6CAA6C,KAAK,MAAM,EAAE;AAAA,IAC9E;AAAA,EACF;AAAA;AAAA,EAGA,GAAG,OAAe,UAA0C;AAC1D,SAAK,aAAa,GAAG,OAAO,QAAQ;AAAA,EACtC;AAAA,EAEA,IAAI,OAAe,UAA0C;AAC3D,SAAK,aAAa,IAAI,OAAO,QAAQ;AAAA,EACvC;AACF;;;AC3QA,eAAsB,iBACpB,WACA,eACA,QACA,aAAqB,GACrB,YAAoB,KACR;AACZ,MAAI;AAEJ,WAAS,UAAU,GAAG,WAAW,YAAY,WAAW;AACtD,QAAI;AACF,aAAO,IAAI,qBAAqB,cAAc,aAAa,IAAI;AAAA,QAC7D;AAAA,QACA;AAAA,MACF,CAAC;AACD,aAAO,MAAM,UAAU;AAAA,IACzB,SAAS,OAAO;AACd,kBAAY;AACZ,aAAO,KAAK,qBAAqB,GAAG,aAAa,WAAW;AAAA,QAC1D;AAAA,QACA;AAAA,QACA,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,MAC9D,CAAC;AAED,UAAI,YAAY,YAAY;AAC1B,eAAO,MAAM,qBAAqB,GAAG,aAAa,iBAAiB,UAAU,aAAa;AAAA,UACxF,YAAY,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QACnE,CAAC;AACD;AAAA,MACF;AAGA,YAAM,QAAQ,YAAY,KAAK,IAAI,GAAG,UAAU,CAAC;AACjD,aAAO,IAAI,qBAAqB,YAAY,aAAa,OAAO,KAAK,MAAM;AAAA,QACzE,SAAS,UAAU;AAAA,QACnB;AAAA,MACF,CAAC;AACD,YAAM,IAAI,QAAQ,aAAW,WAAW,SAAS,KAAK,CAAC;AAAA,IACzD;AAAA,EACF;AAEA,QAAM;AACR;;;AC5CO,SAAS,oBAA4B;AAC1C,SACE,aACA,KAAK,OAAO,EAAE,SAAS,EAAE,EAAE,UAAU,GAAG,EAAE,IAC1C,KAAK,OAAO,EAAE,SAAS,EAAE,EAAE,UAAU,GAAG,EAAE,IAC1C,MACA,KAAK,IAAI;AAEb;;;AL8EO,IAAM,mBAAN,MAAuB;AAAA,EAoB5B,YAAY,QAAgC,UAA2B,QAAqB;AAT5F,SAAQ,SAA+B;AACvC,SAAQ,WAA0B;AAClC,SAAQ,YAA6B,CAAC;AAKtC,SAAQ,iBAAiE,oBAAI,IAAI;AAG/E,SAAK,SAAS;AACd,SAAK,OAAO,IAAI,qBAAqB,iCAAiC,EAAE,OAAO,CAAC;AAGhF,QAAI,OAAO,uBAAuB,cAAc;AAC9C,YAAM,IAAI,MAAM,+EAA+E;AAAA,IACjG;AAEA,SAAK,SAAS;AACd,SAAK,WAAW;AAChB,SAAK,UAAU,SAAS;AACxB,SAAK,eAAe,SAAS;AAC7B,SAAK,qBAAqB,SAAS;AACnC,SAAK,oBAAoB,SAAS;AAClC,SAAK,UAAU,SAAS;AAGxB,SAAK,SAAS,IAAI,oBAAoB,IAAI;AAC1C,SAAK,WAAW,IAAI,sBAAsB,IAAI;AAE9C,SAAK,OAAO,KAAK,qBAAqB,8BAA8B;AAAA,EAGtE;AAAA;AAAA;AAAA;AAAA,EAKA,GAAoC,OAAU,UAA4D;AACxG,QAAI,CAAC,KAAK,eAAe,IAAI,KAAK,GAAG;AACnC,WAAK,eAAe,IAAI,OAAO,oBAAI,IAAI,CAAC;AAAA,IAC1C;AACA,SAAK,eAAe,IAAI,KAAK,EAAG,IAAI,QAAyB;AAC7D,SAAK,OAAO,IAAI,qBAAqB,wBAAwB,EAAE,MAAM,CAAC;AAAA,EACxE;AAAA,EAEA,IAAqC,OAAU,UAA4D;AACzG,UAAM,YAAY,KAAK,eAAe,IAAI,KAAK;AAC/C,QAAI,WAAW;AACb,gBAAU,OAAO,QAAQ;AACzB,WAAK,OAAO,IAAI,qBAAqB,0BAA0B,EAAE,MAAM,CAAC;AAAA,IAC1E;AAAA,EACF;AAAA,EAEQ,KAAK,OAA8B,MAAkB;AAC3D,UAAM,YAAY,KAAK,eAAe,IAAI,KAAK;AAC/C,QAAI,aAAa,UAAU,OAAO,GAAG;AACnC,WAAK,OAAO,IAAI,qBAAqB,kBAAkB,EAAE,OAAO,eAAe,UAAU,MAAM,KAAK,CAAC;AACrG,gBAAU,QAAQ,cAAY;AAC5B,YAAI;AACF,mBAAS,IAAI;AAAA,QACf,SAAS,OAAO;AACd,eAAK,OAAO,MAAM,qBAAqB,wBAAwB,EAAE,OAAO,MAAM,CAAC;AAAA,QACjF;AAAA,MACF,CAAC;AAAA,IACH;AAAA,EACF;AAAA;AAAA;AAAA;AAAA,EAKQ,qBAAqB,WAA0C;AAErE,UAAM,UAAU,UAAU,MAAM,GAAG,EAAE,CAAC,EAAE,YAAY;AAGpD,QAAI;AACJ,YAAQ,SAAS;AAAA,MACf,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AAAA,MACL,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF,KAAK;AACH,4BAAoB,0BAAY;AAChC;AAAA,MACF;AAEE,4BAAoB,0BAAY;AAChC;AAAA,IACJ;AAGA,UAAM,kBAAkB,KAAK,UAAU;AAAA,MACrC,UAAQ,KAAK,YAAY,YAAY,MAAM,kBAAkB,YAAY;AAAA,IAC3E;AAEA,WAAO,iBAAiB;AAAA,EAC1B;AAAA,EAEA,MAAc,4BAA4B,UAA4C;AAEpF,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,YAAY,MAAM;AAAA,MACtB,MAAM,KAAK,OAAQ,mBAAmB,UAAU,QAAW,eAAe;AAAA,MAC1E;AAAA,MACA,KAAK;AAAA,IACP,EAAE,MAAM,OAAM,UAAS;AACrB,WAAK,OAAO,MAAM,qBAAqB,0DAA0D;AAAA,QAC/F;AAAA,QACA,OAAO,MAAM;AAAA,QACb;AAAA,MACF,CAAC;AAED,YAAM,KAAK,QAAQ,aAAa;AAChC,WAAK,SAAS;AACd,WAAK,WAAW;AAChB,WAAK,YAAY,CAAC;AAClB,YAAM;AAAA,IACR,CAAC;AAGD,WAAO,UAAU,OAAO,UAAQ,KAAK,OAAO,aAAa,KAAK,UAAQ,SAAS,KAAK,WAAW,CAAC;AAAA,EAClG;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,wBAAwB,SAAkD;AACtF,QAAI,CAAC;AAAS,aAAO;AAErB,SAAK,OAAO,IAAI,qBAAqB,sCAAsC;AAAA,MACzE,WAAW,QAAQ;AAAA,MACnB,QAAQ,QAAQ;AAAA,MAChB,UAAU,QAAQ;AAAA,IACpB,CAAC;AAGD,QAAI,QAAQ,WAAW,aAAa;AAClC,YAAM,eAAe,KAAK,kBAAkB,SAAS,YAAY;AAGjE,UAAI,QAAQ,WAAW,aAAa,CAAC,cAAc;AACjD,aAAK,OAAO,KAAK,qBAAqB,wEAAwE;AAAA,UAC5G,WAAW,QAAQ;AAAA,UACnB,QAAQ,QAAQ;AAAA,QAClB,CAAC;AAED,cAAM,KAAK,QAAQ,aAAa;AAChC,eAAO;AAAA,MACT,WAES,gBAAgB,iBAAiB,QAAQ,WAAW;AAC3D,aAAK,OAAO,KAAK,qBAAqB,gCAAgC;AAAA,UACpE,iBAAiB,QAAQ;AAAA,UACzB;AAAA,QACF,CAAC;AACD,cAAM,KAAK,QAAQ,aAAa;AAChC,eAAO;AAAA,MACT;AAAA,IACF;AAGA,QAAI,QAAQ,WAAW,eAAe,CAAC,KAAK,eAAe,OAAO,GAAG;AACnE,WAAK,OAAO;AAAA,QACV;AAAA,QACA;AAAA,QACA;AAAA,UACE,WAAW,QAAQ;AAAA,UACnB,wBAAwB,QAAQ;AAAA,UAChC,aAAa,KAAK,IAAI;AAAA,UACtB,SAAS,QAAQ,yBAAyB,KAAK,IAAI;AAAA,QACrD;AAAA,MACF;AAEA,YAAM,KAAK,QAAQ,aAAa;AAChC,aAAO;AAAA,IACT;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,sBAAsB,eAAuD;AACzF,SAAK,OAAO,IAAI,qBAAqB,0BAA0B;AAC/D,QAAI,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC5C,cAAU,MAAM,KAAK,wBAAwB,OAAO;AAEpD,QAAI,CAAC,SAAS;AACZ,WAAK,OAAO,IAAI,qBAAqB,2BAA2B;AAChE,aAAO;AAAA,IACT;AAIA,QAAI,QAAQ,WAAW,aAAa;AAClC,WAAK,OAAO,KAAK,qBAAqB,oCAAoC;AAAA,QACxE,WAAW,QAAQ;AAAA,QACnB,UAAU,QAAQ;AAAA,MACpB,CAAC;AAED,YAAM,KAAK,4BAA4B,OAAO;AAE9C,cAAQ,WAAW,KAAK,IAAI;AAC5B,YAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAK,OAAO,KAAK,qBAAqB,+CAA+C;AAAA,QACnF,UAAU,KAAK;AAAA,QACf,cAAc,KAAK,UAAU;AAAA,MAC/B,CAAC;AAGD,YAAM,KAAK,yBAAyB;AAEpC,YAAM,SAAwB;AAAA,QAC5B,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,QACR,YAAY,QAAQ;AAAA,QACpB,cAAc,QAAQ;AAAA,MACxB;AAEA,WAAK,KAAK,WAAW;AAAA,QACnB,GAAG;AAAA,QACH,QAAQ;AAAA,MACV,CAAC;AAED,aAAO;AAAA,IACT;AAIA,SAAK,OAAO,IAAI,qBAAqB,0DAA0D;AAC/F,QAAI,KAAK,aAAa,wBAAwB;AAC5C,YAAM,aAAa,KAAK,aAAa,uBAAuB,QAAQ,YAAY;AAChF,UAAI,YAAY;AACd,aAAK,OAAO,KAAK,qBAAqB,0BAA0B;AAAA,UAC9D,UAAU,WAAW;AAAA,UACrB,UAAU,WAAW;AAAA,QACvB,CAAC;AAED,YAAI;AACF,iBAAO,MAAM,KAAK,uBAAuB,UAAU;AAAA,QACrD,SAAS,OAAO;AAGd,cAAI,iBAAiB,SAAS,MAAM,QAAQ,SAAS,iCAAiC,KAAK,CAAC,eAAe;AACzG,iBAAK,OAAO;AAAA,cACV;AAAA,cACA;AAAA,cACA;AAAA,gBACE,OAAO,MAAM;AAAA,gBACb,UAAU,WAAW;AAAA,cACvB;AAAA,YACF;AAGA,kBAAM,KAAK,QAAQ,aAAa;AAChC,mBAAO;AAAA,UACT;AAGA,gBAAM;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAEA,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA,EAMQ,oBAAoB,aAAgC;AAC1D,QAAI,CAAC,6BAA6B,SAAS,YAAY,QAAQ,GAAG;AAChE,YAAM,IAAI;AAAA,QACR,0BAA0B,YAAY,QAAQ,aAAa,6BAA6B,KAAK,IAAI,CAAC;AAAA,MACpG;AAAA,IACF;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOQ,eAAe,SAAkC;AACvD,QAAI,CAAC,SAAS;AACZ,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,YAAY,CAAC,QAAQ,kBAAkB,CAAC,QAAQ,aAAa;AACxE,WAAK,OAAO,IAAI,qBAAqB,mCAAmC;AAAA,QACtE,aAAa,CAAC,CAAC,QAAQ;AAAA,QACvB,mBAAmB,CAAC,CAAC,QAAQ;AAAA,QAC7B,gBAAgB,CAAC,CAAC,QAAQ;AAAA,MAC5B,CAAC;AACD,aAAO;AAAA,IACT;AAEA,QAAI,QAAQ,WAAW,aAAa;AAClC,WAAK,OAAO,IAAI,qBAAqB,yBAAyB,EAAE,QAAQ,QAAQ,OAAO,CAAC;AACxF,aAAO;AAAA,IACT;AAEA,QAAI,CAAC,QAAQ,wBAAwB;AACnC,WAAK,OAAO,IAAI,qBAAqB,kDAAkD;AAAA,QACrF,WAAW,QAAQ;AAAA,MACrB,CAAC;AACD,aAAO;AAAA,IACT;AAEA,QAAI,KAAK,IAAI,KAAK,QAAQ,wBAAwB;AAChD,WAAK,OAAO,IAAI,qBAAqB,0CAA0C;AAAA,QAC7E,wBAAwB,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,QAC7E,MAAK,oBAAI,KAAK,GAAE,YAAY;AAAA,MAC9B,CAAC;AACD,aAAO;AAAA,IACT;AAEA,SAAK,OAAO,IAAI,qBAAqB,oBAAoB;AAAA,MACvD,WAAW,QAAQ;AAAA,MACnB,UAAU,QAAQ;AAAA,MAClB,sBAAsB,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,IAC7E,CAAC;AACD,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAM,cAA6B;AACjC,QAAI;AACF,WAAK,OAAO,IAAI,qBAAqB,+BAA+B;AAEpE,WAAK,KAAK,iBAAiB,EAAE,QAAQ,eAAe,CAAC;AAErD,YAAM,SAAS,MAAM,KAAK,sBAAsB,IAAI;AAEpD,UAAI,QAAQ;AACV,aAAK,OAAO,KAAK,qBAAqB,2BAA2B;AAAA,UAC/D,UAAU,OAAO;AAAA,UACjB,cAAc,OAAO,UAAU;AAAA,QACjC,CAAC;AAED,aAAK,KAAK,WAAW;AAAA,UACnB,GAAG;AAAA,UACH,QAAQ;AAAA,QACV,CAAC;AACD;AAAA,MACF;AAEA,WAAK,OAAO,IAAI,qBAAqB,6CAA6C;AAElF,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO;AAAA,QACP,QAAQ;AAAA,MACV,CAAC;AAAA,IACH,SAAS,OAAO;AACd,WAAK,OAAO,MAAM,qBAAqB,uBAAuB;AAAA,QAC5D,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,MAC9D,CAAC;AAED,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO,iBAAiB,QAAQ,MAAM,UAAU;AAAA,QAChD,QAAQ;AAAA,MACV,CAAC;AAED,YAAM,KAAK,QAAQ,8BAA8B,IAAI;AAAA,IACvD;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,oBAA8C;AAC1D,SAAK,OAAO,IAAI,qBAAqB,sBAAsB;AAC3D,UAAM,KAAK,QAAQ,KAAK;AAGxB,SAAK,OAAO,IAAI,qBAAqB,6DAA6D;AAClG,UAAM,cAAc,MAAM,KAAK,QAAQ,aAAa;AACpD,SAAK,OAAO,IAAI,qBAAqB,0CAA0C;AAAA,MAC7E,WAAW,YAAY;AAAA,MACvB,OAAO,YAAY;AAAA,MACnB,WAAW,KAAK,QAAQ;AAAA,IAC1B,CAAC;AAED,UAAM,cAAc;AAEpB,SAAK,OAAO,KAAK,qBAAqB,kDAAkD;AAAA,MACtF,WAAW,YAAY;AAAA,MACvB,OAAO,YAAY;AAAA,IACrB,CAAC;AAED,WAAO,EAAE,aAAa,YAAY;AAAA,EACpC;AAAA,EAEA,MAAc,+BAA+B,aAA0B,aAAsC;AAG3G,UAAM,aAAa,IAAI,4BAAc;AAAA,MACnC,YAAY,KAAK,OAAO;AAAA,MACxB,SAAS;AAAA,QACP,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,MACzC;AAAA,IACF,CAAC;AAGD,UAAM,eAAe,KAAK,SAAS,QAAQ;AAC3C,UAAM,cAAc,YAAY,UAAU,MAAM,GAAG,CAAC;AAEpD,UAAM,mBAAmB,GAAG,KAAK,OAAO,MAAM,UAAU,GAAG,CAAC,CAAC,IAAI,YAAY,IAAI,WAAW;AAE5F,SAAK,OAAO,IAAI,qBAAqB,wCAAwC;AAAA,MAC3E;AAAA,MACA,WAAW,YAAY;AAAA,MACvB,UAAU;AAAA,IACZ,CAAC;AAGD,UAAM,yBAAqB,kCAAgB,aAAAC,QAAK,OAAO,YAAY,SAAS,CAAC;AAE7E,UAAM,WAAW,YAAQ,yBAAW,CAAC;AACrC,UAAM,EAAE,eAAe,IAAI,MAAM,WAAW,mBAAmB,kBAAkB;AAAA,MAC/E;AAAA,QACE;AAAA,QACA,MAAM;AAAA,QACN,gBAAgB;AAAA,UACd;AAAA,YACE,mBAAmB,QAAQ,WAAW;AAAA,YACtC,mBAAmB;AAAA,YACnB,WAAW;AAAA,YACX,WAAW;AAAA,YACX;AAAA,UACF;AAAA,QACF;AAAA,MACF;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,uCAAuC,EAAE,eAAe,CAAC;AAE/F,WAAO;AAAA,EACT;AAAA,EAEA,MAAM,QAAQ,aAAkD;AAC9D,QAAI;AACF,WAAK,OAAO,KAAK,qBAAqB,sCAAsC;AAAA,QAC1E,aAAa;AAAA,UACX,UAAU,YAAY;AAAA,QACxB;AAAA,MACF,CAAC;AAGD,WAAK,KAAK,iBAAiB;AAAA,QACzB,QAAQ;AAAA,QACR,aAAa,EAAE,UAAU,YAAY,SAAS;AAAA,MAChD,CAAC;AAGD,YAAM,iBAAiB,MAAM,KAAK,sBAAsB,KAAK;AAC7D,UAAI,gBAAgB;AAElB,aAAK,OAAO,KAAK,qBAAqB,4CAA4C;AAAA,UAChF,UAAU,eAAe;AAAA,UACzB,cAAc,eAAe,UAAU;AAAA,QACzC,CAAC;AAGD,aAAK,KAAK,WAAW;AAAA,UACnB,GAAG;AAAA,UACH,QAAQ;AAAA,QACV,CAAC;AAED,eAAO;AAAA,MACT;AAGA,WAAK,oBAAoB,WAAW;AAIpC,WAAK,OAAO;AAAA,QACV;AAAA,QACA;AAAA,MACF;AACA,YAAM,EAAE,aAAa,YAAY,IAAI,MAAM,KAAK,kBAAkB;AAClE,YAAM,UAAU,MAAM,KAAK,eAAe,YAAY,WAAW,aAAa,aAAa,WAAW;AAGtG,UAAI,CAAC,SAAS;AAEZ,eAAO;AAAA,UACL,WAAW,CAAC;AAAA,UACZ,QAAQ;AAAA,UACR,cAAc,YAAY;AAAA,QAC5B;AAAA,MACF;AAIA,UAAI,KAAK,OAAO,uBAAuB,cAAc;AACnD,gBAAQ,WAAW,KAAK,IAAI;AAC5B,cAAM,KAAK,QAAQ,YAAY,OAAO;AAAA,MACxC;AAGA,YAAM,KAAK,4BAA4B,OAAO;AAG9C,YAAM,KAAK,yBAAyB;AAEpC,YAAM,SAAwB;AAAA,QAC5B,UAAU,KAAK;AAAA,QACf,WAAW,KAAK;AAAA,QAChB,QAAQ;AAAA,QACR,YAAY,SAAS;AAAA,QACrB,cAAc,SAAS;AAAA,MACzB;AAGA,WAAK,KAAK,WAAW;AAAA,QACnB,GAAG;AAAA,QACH,QAAQ;AAAA,MACV,CAAC;AAED,aAAO;AAAA,IACT,SAAS,OAAO;AAEd,WAAK,OAAO,MAAM,qBAAqB,6BAA6B;AAAA,QAClE,OACE,iBAAiB,QACb;AAAA,UACE,MAAM,MAAM;AAAA,UACZ,SAAS,MAAM;AAAA,UACf,OAAO,MAAM;AAAA,QACf,IACA;AAAA,MACR,CAAC;AAGD,WAAK,KAAK,iBAAiB;AAAA,QACzB,OAAO,iBAAiB,QAAQ,MAAM,UAAU,OAAO,KAAK;AAAA,QAC5D,QAAQ;AAAA,MACV,CAAC;AAGD,UAAI,iBAAiB,OAAO;AAE1B,YAAI,MAAM,QAAQ,SAAS,WAAW,KAAK,MAAM,QAAQ,SAAS,SAAS,GAAG;AAC5E,gBAAM,IAAI;AAAA,YACR;AAAA,UACF;AAAA,QACF;AAEA,YAAI,MAAM,QAAQ,SAAS,SAAS,KAAK,MAAM,QAAQ,SAAS,OAAO,GAAG;AACxE,gBAAM,IAAI;AAAA,YACR;AAAA,UACF;AAAA,QACF;AAEA,YAAI,MAAM,QAAQ,SAAS,KAAK,KAAK,MAAM,QAAQ,SAAS,KAAK,GAAG;AAClE,gBAAM,IAAI,MAAM,6BAA6B,MAAM,OAAO,EAAE;AAAA,QAC9D;AAEA,YAAI,MAAM,QAAQ,SAAS,gBAAgB,KAAK,MAAM,QAAQ,SAAS,MAAM,GAAG;AAC9E,gBAAM,IAAI,MAAM,yBAAyB,MAAM,OAAO,EAAE;AAAA,QAC1D;AAEA,YAAI,MAAM,QAAQ,SAAS,cAAc,KAAK,MAAM,QAAQ,SAAS,QAAQ,GAAG;AAC9E,gBAAM,IAAI,MAAM,0BAA0B,MAAM,OAAO,EAAE;AAAA,QAC3D;AAGA,cAAM;AAAA,MACR;AAGA,YAAM,IAAI,MAAM,sCAAsC,OAAO,KAAK,CAAC,EAAE;AAAA,IACvE;AAAA,EACF;AAAA,EAEA,MAAM,WAAW,6BAA6B,MAAqB;AACjE,UAAM,eAAe,KAAK,WAAW;AAIrC,UAAM,KAAK,QAAQ,8BAA8B,0BAA0B;AAC3E,SAAK,OAAO,IAAI,qBAAqB,kDAAkD;AAEvF,UAAM,KAAK,QAAQ,aAAa;AAEhC,SAAK,SAAS;AACd,SAAK,WAAW;AAChB,SAAK,YAAY,CAAC;AAClB,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAGzE,QAAI,cAAc;AAChB,WAAK,KAAK,cAAc;AAAA,QACtB,QAAQ;AAAA,MACV,CAAC;AAAA,IACH;AAAA,EACF;AAAA,EAEA,MAAM,YAAY,QAA2D;AAC3E,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,mBAAmB;AAAA,MACvD,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAGD,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,cAAc,MAAM,KAAK,OAAO,gBAAgB;AAAA,MACpD,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,MAChB,WAAW,OAAO;AAAA,MAClB;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,+BAA+B;AAAA,MACnE,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAGD,eAAO,0CAAyB,aAAa,OAAO,SAAS;AAAA,EAC/D;AAAA,EAEA,MAAM,oBAAoB,QAA2D;AACnF,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,mBAAmB;AAAA,MACvD,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAED,UAAM,eAAe,CAAC,QAAgB,mBAAmB,KAAK,GAAG;AAEjE,UAAM,qBAAqB,MAAM;AAC/B,UAAI,aAAa,OAAO,OAAO,GAAG;AAChC,cAAM,aAAa,OAAO,QAAQ,MAAM,CAAC;AACzC,cAAM,gBAAgB,WAAW,SAAS,MAAM,IAAI,aAAa,IAAI,UAAU;AAC/E,eAAO,qBAAO,KAAK,eAAe,KAAK,EAAE,SAAS,MAAM;AAAA,MAC1D;AACA,aAAO,OAAO;AAAA,IAChB,GAAG;AAGH,UAAM,uBAAmB,oCAAkB,iBAAiB;AAG5D,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,cAAc,MAAM,KAAK,OAAO,oBAAoB;AAAA,MACxD,UAAU,KAAK;AAAA,MACf,SAAS;AAAA,MACT,WAAW,OAAO;AAAA,MAClB;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,+BAA+B;AAAA,MACnE,UAAU,KAAK;AAAA,MACf,SAAS,OAAO;AAAA,IAClB,CAAC;AAGD,eAAO,0CAAyB,aAAa,OAAO,SAAS;AAAA,EAC/D;AAAA,EAEA,MAAM,gBAAgB,QAA+D;AACnF,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,sBAAsB;AAAA,MAC1D,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,IACpB,CAAC;AAGD,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAG3D,UAAM,cAAc,MAAM,KAAK,OAAO,sBAAsB;AAAA,MAC1D,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,MAClB,WAAW,OAAO;AAAA,MAClB;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,kCAAkC;AAAA,MACtE,UAAU,KAAK;AAAA,IACjB,CAAC;AAGD,eAAO,0CAAyB,aAAa,OAAO,SAAS;AAAA,EAC/D;AAAA,EAEA,MAAM,gBAAgB,QAAiE;AACrF,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,uBAAuB;AAAA,MAC3D,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,IACpB,CAAC;AAGD,UAAM,oBAAoB,UAAM,uCAAsB,OAAO,aAAa,OAAO,SAAS;AAG1F,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAE3D,SAAK,OAAO,IAAI,qBAAqB,kCAAkC;AAAA,MACrE,UAAU,KAAK;AAAA,MACf,aAAa;AAAA,MACb;AAAA,IACF,CAAC;AAED,UAAM,qBAAqB,kBAAkB;AAC7C,QAAI,CAAC,oBAAoB;AACvB,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AAEA,UAAM,UAAU,KAAK,qBAAqB,OAAO,SAAS;AAC1D,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,gCAAgC,OAAO,SAAS,EAAE;AAAA,IACpE;AAIA,UAAM,cAAc,MAAM,KAAK,OAAO,gBAAgB;AAAA,MACpD,UAAU,KAAK;AAAA,MACf,aAAa;AAAA,MACb,WAAW,OAAO;AAAA,MAClB;AAAA,MACA;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAAA,MACvE,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,MAClB,gBAAgB,YAAY;AAAA,IAC9B,CAAC;AAGD,WAAO,UAAM,0CAAyB,YAAY,gBAAgB,OAAO,SAAS;AAAA,EACpF;AAAA,EAEA,MAAM,uBAAuB,QAAwE;AACnG,QAAI,CAAC,KAAK,UAAU,CAAC,KAAK,UAAU;AAClC,YAAM,IAAI,MAAM,eAAe;AAAA,IACjC;AAGA,UAAM,KAAK,yBAAyB;AAEpC,SAAK,OAAO,KAAK,qBAAqB,mCAAmC;AAAA,MACvE,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,IACpB,CAAC;AAGD,UAAM,oBAAoB,UAAM,uCAAsB,OAAO,aAAa,OAAO,SAAS;AAG1F,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,UAAM,kBAAkB,SAAS,0BAA0B;AAE3D,SAAK,OAAO,IAAI,qBAAqB,kCAAkC;AAAA,MACrE,UAAU,KAAK;AAAA,MACf,aAAa;AAAA,MACb;AAAA,IACF,CAAC;AAED,UAAM,qBAAqB,kBAAkB;AAC7C,QAAI,CAAC,oBAAoB;AACvB,YAAM,IAAI,MAAM,sDAAsD;AAAA,IACxE;AAEA,UAAM,UAAU,KAAK,qBAAqB,OAAO,SAAS;AAC1D,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,gCAAgC,OAAO,SAAS,EAAE;AAAA,IACpE;AAIA,QAAI;AACJ,QAAI;AACF,oBAAc,MAAM,KAAK,OAAO,uBAAuB;AAAA,QACrD,UAAU,KAAK;AAAA,QACf,aAAa;AAAA,QACb,WAAW,OAAO;AAAA,QAClB;AAAA,QACA;AAAA,MACF,CAAC;AAAA,IACH,SAAS,OAAY;AAEnB,UAAI,iBAAiB,kCAAoB;AACvC,aAAK,KAAK,0BAA0B,EAAE,MAAM,CAAC;AAAA,MAC/C;AACA,YAAM;AAAA,IACR;AAEA,SAAK,OAAO,KAAK,qBAAqB,4CAA4C;AAAA,MAChF,UAAU,KAAK;AAAA,MACf,WAAW,OAAO;AAAA,MAClB,MAAM,YAAY;AAAA,MAClB,gBAAgB,YAAY;AAAA,IAC9B,CAAC;AAGD,WAAO,UAAM,0CAAyB,YAAY,gBAAgB,OAAO,WAAW,YAAY,IAAI;AAAA,EACtG;AAAA,EAEA,eAAgC;AAC9B,WAAO,KAAK;AAAA,EACd;AAAA,EAEA,cAAuB;AACrB,WAAO,KAAK,WAAW,QAAQ,KAAK,aAAa;AAAA,EACnD;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,eACZ,WACA,aACA,aACA,aACyB;AACzB,QAAI,KAAK,OAAO,uBAAuB,eAAe;AACpD,WAAK,OAAO,KAAK,qBAAqB,gDAAgD;AAAA,QACpF,cAAc,YAAY;AAAA,MAC5B,CAAC;AAED,UAAI,YAAY,aAAa,WAAW;AACtC,eAAO,MAAM,KAAK,kBAAkB,WAAW,aAAa,WAAW;AAAA,MACzE,OAAO;AAGL,aAAK,OAAO,KAAK,qBAAqB,+CAA+C;AAAA,UACnF;AAAA,UACA,UAAU,aAAa;AAAA,QACzB,CAAC;AACD,eAAO,MAAM,KAAK,mBAAmB,WAAW,aAAa,WAAW;AAAA,MAC1E;AAAA,IACF,OAAO;AACL,WAAK,OAAO,KAAK,qBAAqB,uBAAuB;AAAA,QAC3D;AAAA,MACF,CAAC;AAGD,YAAM,iBAAiB,MAAM,KAAK,+BAA+B,aAAa,WAAW;AAGzF,YAAM,aAAa,IAAI;AAAA,QACrB;AAAA,UACE,YAAY,KAAK,OAAO;AAAA,UACxB;AAAA,UACA,SAAS;AAAA,YACP,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,UACzC;AAAA,QACF;AAAA,QACA,KAAK;AAAA,MACP;AAEA,YAAM,SAAS,MAAM,WAAW,aAAa,UAAU,KAAK,IAAI,CAAC,EAAE;AACnE,YAAM,WAAW,OAAO;AAGxB,YAAM,MAAM,KAAK,IAAI;AACrB,YAAM,UAAmB;AAAA,QACvB,WAAW,kBAAkB;AAAA,QAC7B;AAAA,QACA;AAAA,QACA,OAAO,KAAK,OAAO;AAAA,QACnB;AAAA,QACA,cAAc;AAAA;AAAA,QACd,wBAAwB;AAAA;AAAA,QACxB,QAAQ;AAAA,QACR,WAAW;AAAA,QACX,UAAU;AAAA,QACV,wBAAwB;AAAA,QACxB,wBAAwB,KAAK,IAAI,IAAI;AAAA,QACrC,oBAAoB;AAAA,MACtB;AAEA,YAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAK,OAAO,KAAK,qBAAqB,mCAAmC,EAAE,UAAU,eAAe,CAAC;AACrG,aAAO;AAAA,IACT;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAcA,MAAc,kBAAkB,WAAmB,aAA0B,aAAuC;AAClH,SAAK,OAAO,KAAK,qBAAqB,sCAAsC;AAG5E,UAAM,cAAc,KAAK,mBAAmB,YAAY;AAExD,QAAI,CAAC,aAAa;AAChB,WAAK,OAAO,MAAM,qBAAqB,2BAA2B;AAGlE,YAAM,IAAI;AAAA,QACR;AAAA,MACF;AAAA,IACF;AAEA,SAAK,OAAO,KAAK,qBAAqB,sDAAsD;AAE5F,UAAM,YAAY,kBAAkB;AAEpC,UAAM,aAAa,MAAM,KAAK,mBAAmB,aAAa;AAAA,MAC5D;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB;AAAA,IACF,CAAC;AAED,SAAK,OAAO,KAAK,qBAAqB,oCAAoC;AAAA,MACxE,UAAU,WAAW;AAAA,MACrB,gBAAgB,WAAW;AAAA,IAC7B,CAAC;AAGD,UAAM,uBAAuB,WAAW,cAAc,IAAI,WAAW,cAAc;AAGnF,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,UAAmB;AAAA,MACvB;AAAA,MACA,UAAU,WAAW;AAAA,MACrB,gBAAgB,WAAW;AAAA,MAC3B,OAAO,KAAK,OAAO;AAAA,MACnB;AAAA,MACA,cAAc;AAAA,MACd,wBAAwB,WAAW;AAAA,MACnC,QAAQ;AAAA,MACR,WAAW;AAAA,MACX,UAAU;AAAA,MACV,wBAAwB;AAAA,MACxB,wBAAwB,MAAM;AAAA,MAC9B,oBAAoB;AAAA,MACpB,YAAY,WAAW;AAAA,IACzB;AAEA,SAAK,OAAO,IAAI,qBAAqB,wBAAwB;AAC7D,UAAM,KAAK,QAAQ,YAAY,OAAO;AAEtC,WAAO;AAAA,EACT;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,EAOA,MAAc,mBACZ,WACA,aACA,aACyB;AACzB,SAAK,OAAO,KAAK,qBAAqB,8DAA8D;AAAA,MAClG,UAAU,YAAY;AAAA,MACtB,gBAAgB,CAAC,CAAC,KAAK,OAAO,YAAY;AAAA,MAC1C,SAAS,KAAK,OAAO,YAAY;AAAA,IACnC,CAAC;AAID,UAAM,MAAM,KAAK,IAAI;AACrB,UAAM,YAAY,kBAAkB;AACpC,UAAM,cAAuB;AAAA,MAC3B;AAAA,MACA,UAAU,eAAe,GAAG;AAAA;AAAA,MAC5B,gBAAgB,YAAY,GAAG;AAAA;AAAA,MAC/B,OAAO,KAAK,OAAO;AAAA,MACnB;AAAA,MACA,cAAc,YAAY;AAAA,MAC1B,wBAAwB;AAAA;AAAA,MACxB,QAAQ;AAAA,MACR,WAAW;AAAA,MACX,UAAU;AAAA,MACV,wBAAwB;AAAA,MACxB,wBAAwB,MAAM;AAAA,MAC9B,oBAAoB;AAAA,IACtB;AACA,SAAK,OAAO,IAAI,qBAAqB,4CAA4C;AAAA,MAC/E,WAAW,YAAY;AAAA,MACvB,cAAc,YAAY;AAAA,IAC5B,CAAC;AAGD,gBAAY,WAAW,KAAK,IAAI;AAChC,UAAM,KAAK,QAAQ,YAAY,WAAW;AAG1C,UAAM,6BAA6B,MAAM,KAAK,QAAQ,8BAA8B;AAEpF,SAAK,OAAO,KAAK,qBAAqB,qCAAqC;AAAA,MACzE;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB,UAAU,aAAa;AAAA,MACvB,SAAS,KAAK,OAAO,YAAY;AAAA,MACjC,sBAAsB;AAAA,MACtB,cAAc,CAAC;AAAA,IACjB,CAAC;AAGD,UAAM,aAAa,MAAM,KAAK,aAAa,aAAa;AAAA,MACtD;AAAA,MACA,OAAO,KAAK,OAAO;AAAA,MACnB,UAAU,aAAa;AAAA,MACvB,aAAa,KAAK,OAAO,YAAY;AAAA,MACrC,SAAS,KAAK,OAAO,YAAY;AAAA,MACjC;AAAA;AAAA,MAEA,sBAAsB;AAAA;AAAA,MACtB,cAAc,CAAC;AAAA;AAAA,IACjB,CAAC;AAED,QAAI,cAAc,cAAc,YAAY;AAE1C,WAAK,OAAO,KAAK,qBAAqB,2CAA2C;AAAA,QAC/E,UAAU,WAAW;AAAA,QACrB,gBAAgB,WAAW;AAAA,QAC3B,UAAU,WAAW;AAAA,MACvB,CAAC;AAGD,kBAAY,WAAW,WAAW;AAClC,kBAAY,iBAAiB,WAAW;AACxC,kBAAY,eAAe,WAAW,YAAY,YAAY;AAC9D,kBAAY,yBAAyB,WAAW;AAChD,kBAAY,aAAa,WAAW;AACpC,kBAAY,SAAS;AACrB,kBAAY,WAAW,KAAK,IAAI;AAGhC,UAAI,WAAW,cAAc,GAAG;AAC9B,cAAMC,OAAM,KAAK,IAAI;AACrB,oBAAY,yBAAyBA;AACrC,oBAAY,yBAAyBA,OAAM,WAAW;AACtD,aAAK,OAAO,IAAI,qBAAqB,iEAAiE;AAAA,UACpG,aAAa,WAAW;AAAA,UACxB,WAAW,IAAI,KAAK,YAAY,sBAAsB,EAAE,YAAY;AAAA,QACtE,CAAC;AAAA,MACH;AAEA,YAAM,KAAK,QAAQ,YAAY,WAAW;AAG1C,YAAM,KAAK,QAAQ,8BAA8B,KAAK;AACtD,WAAK,OAAO,IAAI,qBAAqB,qDAAqD;AAE1F,aAAO;AAAA,IACT;AAEA,SAAK,OAAO,KAAK,qBAAqB,oEAAoE;AAE1G,WAAO;AAAA,EACT;AAAA,EAEA,MAAc,uBAAuB,YAAgD;AAEnF,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAE9C,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,4DAA4D;AAAA,IAC9E;AAGA,YAAQ,WAAW,WAAW;AAC9B,YAAQ,eAAe,WAAW,YAAY,QAAQ;AACtD,YAAQ,iBAAiB,WAAW;AACpC,YAAQ,yBAAyB,WAAW;AAC5C,YAAQ,aAAa,WAAW;AAChC,YAAQ,SAAS;AACjB,YAAQ,WAAW,KAAK,IAAI;AAG5B,QAAI,WAAW,cAAc,GAAG;AAC9B,YAAM,MAAM,KAAK,IAAI;AACrB,cAAQ,yBAAyB;AACjC,cAAQ,yBAAyB,MAAM,WAAW;AAClD,WAAK,OAAO,IAAI,qBAAqB,uDAAuD;AAAA,QAC1F,aAAa,WAAW;AAAA,QACxB,WAAW,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,MAClE,CAAC;AAAA,IACH;AAEA,UAAM,KAAK,QAAQ,YAAY,OAAO;AAItC,UAAM,KAAK,QAAQ,8BAA8B,KAAK;AACtD,SAAK,OAAO,IAAI,qBAAqB,qDAAqD;AAE1F,UAAM,KAAK,4BAA4B,OAAO;AAG9C,UAAM,KAAK,yBAAyB;AAEpC,WAAO;AAAA,MACL,UAAU,KAAK;AAAA,MACf,WAAW,KAAK;AAAA,MAChB,QAAQ;AAAA,MACR,YAAY,QAAQ;AAAA,MACpB,cAAc,QAAQ;AAAA,IACxB;AAAA,EACF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,2BAA0C;AAEtD,UAAM,UAAU,MAAM,KAAK,QAAQ,WAAW;AAC9C,QAAI,CAAC,SAAS;AACZ,YAAM,IAAI,MAAM,yBAAyB;AAAA,IAC3C;AAEA,UAAM,MAAM,KAAK,IAAI;AAGrB,QAAI,CAAC,QAAQ,wBAAwB;AACnC,WAAK,OAAO,KAAK,qBAAqB,oEAAoE;AAC1G,YAAM,KAAK,WAAW,KAAK;AAC3B,YAAM,IAAI,MAAM,gDAAgD;AAAA,IAClE;AAEA,UAAM,kBAAkB,QAAQ,yBAAyB;AAEzD,SAAK,OAAO,IAAI,qBAAqB,qCAAqC;AAAA,MACxE,WAAW,IAAI,KAAK,QAAQ,sBAAsB,EAAE,YAAY;AAAA,MAChE;AAAA,IACF,CAAC;AAGD,QAAI,mBAAmB,GAAG;AACxB,WAAK,OAAO,MAAM,qBAAqB,0CAA0C;AACjF,YAAM,KAAK,WAAW,KAAK;AAC3B,YAAM,IAAI,MAAM,uBAAuB;AAAA,IACzC;AAAA,EAGF;AAAA;AAAA;AAAA;AAAA;AAAA,EAMA,MAAc,4BAA4B,SAAiC;AAEzE,SAAK,OAAO,IAAI,qBAAqB,2CAA2C;AAAA,MAC9E,gBAAgB,QAAQ;AAAA,MACxB,UAAU,QAAQ;AAAA,MAClB,OAAO,QAAQ;AAAA,IACjB,CAAC;AAGD,QAAI,CAAC,KAAK,QAAQ,WAAW,GAAG;AAC9B,YAAM,KAAK,QAAQ,KAAK;AAAA,IAC1B;AAGA,SAAK,SAAS,IAAI;AAAA,MAChB;AAAA,QACE,YAAY,KAAK,OAAO;AAAA,QACxB,gBAAgB,QAAQ;AAAA,QACxB,SAAS;AAAA,UACP,GAAI,KAAK,SAAS,oBAAoB,CAAC;AAAA,QACzC;AAAA,MACF;AAAA,MACA,KAAK;AAAA,IACP;AAEA,SAAK,WAAW,QAAQ;AAGxB,SAAK,YAAY,MAAM,KAAK,4BAA4B,QAAQ,QAAQ;AAAA,EAC1E;AACF;","names":["import_parsers","import_bs58","bs58","import_constants","import_eventemitter3","bs58","now"]}