@provablehq/wasm 0.9.10-testnet-rc → 0.9.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -19,7 +19,7 @@ export function verifyFunctionExecution(execution: Execution, verifying_key: Ver
19
19
  /**
20
20
  * Set test consensus version heights for testing.
21
21
  *
22
- * @params {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
22
+ * @param {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
23
23
  *
24
24
  * @example
25
25
  * import { getOrInitConsensusVersionHeights } from @provablehq/sdk;
@@ -156,6 +156,12 @@ export class Authorization {
156
156
  * @param {Uint8Array} bytes Left-endian bytes representing the Authorization.
157
157
  */
158
158
  static fromBytesLe(bytes: Uint8Array): Authorization;
159
+ /**
160
+ * Get the function name.
161
+ *
162
+ * @returns {string} The function name.
163
+ */
164
+ functionName(): string;
159
165
  /**
160
166
  * Returns `true` if the Authorization is for `credits.aleo/fee_public`.
161
167
  */
@@ -2331,26 +2337,31 @@ export class ProgramManager {
2331
2337
  * @returns {u64} Fee in microcredits
2332
2338
  */
2333
2339
  static estimateFinalizeFee(program: string, _function: string): bigint;
2340
+ /**
2341
+ * Execute an authorization.
2342
+ *
2343
+ * @param authorization The authorization to execute.
2344
+ * @param fee_authorization The fee authorization to execute.
2345
+ * @param program The program authorized to be executed.
2346
+ * @param imports The imports of the program being executed.
2347
+ * @param url The url to get the inclusion proving information from.
2348
+ * @param offline_query Optional offline query object if building a Transaction offline.
2349
+ */
2350
+ static executeAuthorization(authorization: Authorization, fee_authorization: Authorization | null | undefined, program: string, proving_key?: ProvingKey | null, verifying_key?: VerifyingKey | null, fee_proving_key?: ProvingKey | null, fee_verifying_key?: VerifyingKey | null, imports?: object | null, url?: string | null, offline_query?: OfflineQuery | null): Promise<Transaction>;
2334
2351
  /**
2335
2352
  * Estimate Fee for Aleo function execution. Note if "cache" is set to true, the proving and
2336
2353
  * verifying keys will be stored in the ProgramManager's memory and used for subsequent
2337
2354
  * program executions.
2338
2355
  *
2339
- * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network
2340
- *
2341
- * @param private_key The private key of the sender
2342
- * @param program The source code of the program to estimate the execution fee for
2343
- * @param function The name of the function to execute
2344
- * @param inputs A javascript array of inputs to the function
2345
- * @param url The url of the Aleo network node to send the transaction to
2356
+ * @param program The source code of the program to estimate the execution fee for.
2357
+ * @param function The name of the function to estimate the execution fee for.
2346
2358
  * @param imports (optional) Provide a list of imports to use for the fee estimation in the
2347
2359
  * form of a javascript object where the keys are a string of the program name and the values
2348
2360
  * are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
2349
- * @param proving_key (optional) Provide a verifying key to use for the fee estimation
2350
- * @param verifying_key (optional) Provide a verifying key to use for the fee estimation
2361
+ * @param edition {
2351
2362
  * @returns {u64} Fee in microcredits
2352
2363
  */
2353
- static estimateExecutionFee(private_key: PrivateKey, program: string, _function: string, inputs: Array<any>, url?: string | null, imports?: object | null, proving_key?: ProvingKey | null, verifying_key?: VerifyingKey | null, offline_query?: OfflineQuery | null, edition?: number | null): Promise<bigint>;
2364
+ static estimateExecutionFee(program: string, _function: string, imports?: object | null, edition?: number | null): Promise<bigint>;
2354
2365
  /**
2355
2366
  * Execute an arbitrary function locally
2356
2367
  *
@@ -2372,6 +2383,20 @@ export class ProgramManager {
2372
2383
  * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution
2373
2384
  */
2374
2385
  static executeFunctionOffline(private_key: PrivateKey, program: string, _function: string, inputs: Array<any>, prove_execution: boolean, cache: boolean, imports?: object | null, proving_key?: ProvingKey | null, verifying_key?: VerifyingKey | null, url?: string | null, offline_query?: OfflineQuery | null, edition?: number | null): Promise<ExecutionResponse>;
2386
+ /**
2387
+ * Estimate Fee for an Authorization.
2388
+ *
2389
+ * @param authorization Authorization to estimate the fee for.
2390
+ * @param program The program the Authorization is for.
2391
+ * @param imports Provide a list of imports to use for the fee estimation in the
2392
+ * form of a javascript object where the keys are a string of the program name and the values
2393
+ * are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
2394
+ * @param offline_query The offline query object used to insert the global state root and state paths needed to create
2395
+ * a valid inclusion proof offline.
2396
+ * @param edition: Optional edition to estimate the fee for.
2397
+ * @returns {u64} Fee in microcredits
2398
+ */
2399
+ static estimateFeeForAuthorization(authorization: Authorization, program: string, imports?: object | null, edition?: number | null): Promise<bigint>;
2375
2400
  /**
2376
2401
  * Execute Aleo function and create an Aleo execution transaction
2377
2402
  *
Binary file
@@ -267,7 +267,7 @@ function verifyFunctionExecution(execution, verifying_key, program, function_id,
267
267
  /**
268
268
  * Set test consensus version heights for testing.
269
269
  *
270
- * @params {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
270
+ * @param {string | undefined} heights The block heights at which each consensus version applies. This input should be a simple csv list of block heights and there should be one number for each consensus version. If left undefined, the default test heights will be applied.
271
271
  *
272
272
  * @example
273
273
  * import { getOrInitConsensusVersionHeights } from @provablehq/sdk;
@@ -303,12 +303,16 @@ function getArrayJsValueFromWasm0(ptr, len) {
303
303
  }
304
304
  return result;
305
305
  }
306
- function __wbg_adapter_40(arg0, arg1, arg2) {
307
- wasm.__wbindgen_export_6(arg0, arg1, addHeapObject(arg2));
306
+ function __wbg_adapter_40(arg0, arg1) {
307
+ wasm.__wbindgen_export_6(arg0, arg1);
308
308
  }
309
309
 
310
- function __wbg_adapter_867(arg0, arg1, arg2, arg3) {
311
- wasm.__wbindgen_export_7(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
310
+ function __wbg_adapter_43(arg0, arg1, arg2) {
311
+ wasm.__wbindgen_export_7(arg0, arg1, addHeapObject(arg2));
312
+ }
313
+
314
+ function __wbg_adapter_873(arg0, arg1, arg2, arg3) {
315
+ wasm.__wbindgen_export_8(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));
312
316
  }
313
317
 
314
318
  const __wbindgen_enum_RequestCredentials = ["omit", "same-origin", "include"];
@@ -686,6 +690,36 @@ class Authorization {
686
690
  wasm.__wbindgen_add_to_stack_pointer(16);
687
691
  }
688
692
  }
693
+ /**
694
+ * Get the function name.
695
+ *
696
+ * @returns {string} The function name.
697
+ * @returns {string}
698
+ */
699
+ functionName() {
700
+ let deferred2_0;
701
+ let deferred2_1;
702
+ try {
703
+ const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);
704
+ wasm.authorization_functionName(retptr, this.__wbg_ptr);
705
+ var r0 = getDataViewMemory0().getInt32(retptr + 4 * 0, true);
706
+ var r1 = getDataViewMemory0().getInt32(retptr + 4 * 1, true);
707
+ var r2 = getDataViewMemory0().getInt32(retptr + 4 * 2, true);
708
+ var r3 = getDataViewMemory0().getInt32(retptr + 4 * 3, true);
709
+ var ptr1 = r0;
710
+ var len1 = r1;
711
+ if (r3) {
712
+ ptr1 = 0; len1 = 0;
713
+ throw takeObject(r2);
714
+ }
715
+ deferred2_0 = ptr1;
716
+ deferred2_1 = len1;
717
+ return getStringFromWasm0(ptr1, len1);
718
+ } finally {
719
+ wasm.__wbindgen_add_to_stack_pointer(16);
720
+ wasm.__wbindgen_export_2(deferred2_0, deferred2_1, 1);
721
+ }
722
+ }
689
723
  /**
690
724
  * Returns `true` if the Authorization is for `credits.aleo/fee_public`.
691
725
  * @returns {boolean}
@@ -7859,43 +7893,36 @@ class ProgramManager {
7859
7893
  }
7860
7894
  }
7861
7895
  /**
7862
- * Estimate Fee for Aleo function execution. Note if "cache" is set to true, the proving and
7863
- * verifying keys will be stored in the ProgramManager's memory and used for subsequent
7864
- * program executions.
7896
+ * Execute an authorization.
7865
7897
  *
7866
- * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network
7867
- *
7868
- * @param private_key The private key of the sender
7869
- * @param program The source code of the program to estimate the execution fee for
7870
- * @param function The name of the function to execute
7871
- * @param inputs A javascript array of inputs to the function
7872
- * @param url The url of the Aleo network node to send the transaction to
7873
- * @param imports (optional) Provide a list of imports to use for the fee estimation in the
7874
- * form of a javascript object where the keys are a string of the program name and the values
7875
- * are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
7876
- * @param proving_key (optional) Provide a verifying key to use for the fee estimation
7877
- * @param verifying_key (optional) Provide a verifying key to use for the fee estimation
7878
- * @returns {u64} Fee in microcredits
7879
- * @param {PrivateKey} private_key
7898
+ * @param authorization The authorization to execute.
7899
+ * @param fee_authorization The fee authorization to execute.
7900
+ * @param program The program authorized to be executed.
7901
+ * @param imports The imports of the program being executed.
7902
+ * @param url The url to get the inclusion proving information from.
7903
+ * @param offline_query Optional offline query object if building a Transaction offline.
7904
+ * @param {Authorization} authorization
7905
+ * @param {Authorization | null | undefined} fee_authorization
7880
7906
  * @param {string} program
7881
- * @param {string} _function
7882
- * @param {Array<any>} inputs
7883
- * @param {string | null} [url]
7884
- * @param {object | null} [imports]
7885
7907
  * @param {ProvingKey | null} [proving_key]
7886
7908
  * @param {VerifyingKey | null} [verifying_key]
7909
+ * @param {ProvingKey | null} [fee_proving_key]
7910
+ * @param {VerifyingKey | null} [fee_verifying_key]
7911
+ * @param {object | null} [imports]
7912
+ * @param {string | null} [url]
7887
7913
  * @param {OfflineQuery | null} [offline_query]
7888
- * @param {number | null} [edition]
7889
- * @returns {Promise<bigint>}
7914
+ * @returns {Promise<Transaction>}
7890
7915
  */
7891
- static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query, edition) {
7892
- _assertClass(private_key, PrivateKey);
7893
- const ptr0 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7894
- const len0 = WASM_VECTOR_LEN;
7895
- const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7896
- const len1 = WASM_VECTOR_LEN;
7897
- var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7898
- var len2 = WASM_VECTOR_LEN;
7916
+ static executeAuthorization(authorization, fee_authorization, program, proving_key, verifying_key, fee_proving_key, fee_verifying_key, imports, url, offline_query) {
7917
+ _assertClass(authorization, Authorization);
7918
+ var ptr0 = authorization.__destroy_into_raw();
7919
+ let ptr1 = 0;
7920
+ if (!isLikeNone(fee_authorization)) {
7921
+ _assertClass(fee_authorization, Authorization);
7922
+ ptr1 = fee_authorization.__destroy_into_raw();
7923
+ }
7924
+ const ptr2 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7925
+ const len2 = WASM_VECTOR_LEN;
7899
7926
  let ptr3 = 0;
7900
7927
  if (!isLikeNone(proving_key)) {
7901
7928
  _assertClass(proving_key, ProvingKey);
@@ -7907,11 +7934,49 @@ class ProgramManager {
7907
7934
  ptr4 = verifying_key.__destroy_into_raw();
7908
7935
  }
7909
7936
  let ptr5 = 0;
7937
+ if (!isLikeNone(fee_proving_key)) {
7938
+ _assertClass(fee_proving_key, ProvingKey);
7939
+ ptr5 = fee_proving_key.__destroy_into_raw();
7940
+ }
7941
+ let ptr6 = 0;
7942
+ if (!isLikeNone(fee_verifying_key)) {
7943
+ _assertClass(fee_verifying_key, VerifyingKey);
7944
+ ptr6 = fee_verifying_key.__destroy_into_raw();
7945
+ }
7946
+ var ptr7 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7947
+ var len7 = WASM_VECTOR_LEN;
7948
+ let ptr8 = 0;
7910
7949
  if (!isLikeNone(offline_query)) {
7911
7950
  _assertClass(offline_query, OfflineQuery);
7912
- ptr5 = offline_query.__destroy_into_raw();
7951
+ ptr8 = offline_query.__destroy_into_raw();
7913
7952
  }
7914
- const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5, isLikeNone(edition) ? 0xFFFFFF : edition);
7953
+ const ret = wasm.programmanager_executeAuthorization(ptr0, ptr1, ptr2, len2, ptr3, ptr4, ptr5, ptr6, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr7, len7, ptr8);
7954
+ return takeObject(ret);
7955
+ }
7956
+ /**
7957
+ * Estimate Fee for Aleo function execution. Note if "cache" is set to true, the proving and
7958
+ * verifying keys will be stored in the ProgramManager's memory and used for subsequent
7959
+ * program executions.
7960
+ *
7961
+ * @param program The source code of the program to estimate the execution fee for.
7962
+ * @param function The name of the function to estimate the execution fee for.
7963
+ * @param imports (optional) Provide a list of imports to use for the fee estimation in the
7964
+ * form of a javascript object where the keys are a string of the program name and the values
7965
+ * are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
7966
+ * @param edition {
7967
+ * @returns {u64} Fee in microcredits
7968
+ * @param {string} program
7969
+ * @param {string} _function
7970
+ * @param {object | null} [imports]
7971
+ * @param {number | null} [edition]
7972
+ * @returns {Promise<bigint>}
7973
+ */
7974
+ static estimateExecutionFee(program, _function, imports, edition) {
7975
+ const ptr0 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7976
+ const len0 = WASM_VECTOR_LEN;
7977
+ const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
7978
+ const len1 = WASM_VECTOR_LEN;
7979
+ const ret = wasm.programmanager_estimateExecutionFee(ptr0, len0, ptr1, len1, isLikeNone(imports) ? 0 : addHeapObject(imports), isLikeNone(edition) ? 0xFFFFFF : edition);
7915
7980
  return takeObject(ret);
7916
7981
  }
7917
7982
  /**
@@ -7973,6 +8038,31 @@ class ProgramManager {
7973
8038
  const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5, isLikeNone(edition) ? 0xFFFFFF : edition);
7974
8039
  return takeObject(ret);
7975
8040
  }
8041
+ /**
8042
+ * Estimate Fee for an Authorization.
8043
+ *
8044
+ * @param authorization Authorization to estimate the fee for.
8045
+ * @param program The program the Authorization is for.
8046
+ * @param imports Provide a list of imports to use for the fee estimation in the
8047
+ * form of a javascript object where the keys are a string of the program name and the values
8048
+ * are a string representing the program source code \{ "hello.aleo": "hello.aleo source code" \}
8049
+ * @param offline_query The offline query object used to insert the global state root and state paths needed to create
8050
+ * a valid inclusion proof offline.
8051
+ * @param edition: Optional edition to estimate the fee for.
8052
+ * @returns {u64} Fee in microcredits
8053
+ * @param {Authorization} authorization
8054
+ * @param {string} program
8055
+ * @param {object | null} [imports]
8056
+ * @param {number | null} [edition]
8057
+ * @returns {Promise<bigint>}
8058
+ */
8059
+ static estimateFeeForAuthorization(authorization, program, imports, edition) {
8060
+ _assertClass(authorization, Authorization);
8061
+ const ptr0 = passStringToWasm0(program, wasm.__wbindgen_export_3, wasm.__wbindgen_export_4);
8062
+ const len0 = WASM_VECTOR_LEN;
8063
+ const ret = wasm.programmanager_estimateFeeForAuthorization(authorization.__wbg_ptr, ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports), isLikeNone(edition) ? 0xFFFFFF : edition);
8064
+ return takeObject(ret);
8065
+ }
7976
8066
  /**
7977
8067
  * Execute Aleo function and create an Aleo execution transaction
7978
8068
  *
@@ -13010,6 +13100,9 @@ async function __wbg_load(module, imports) {
13010
13100
  function __wbg_get_imports() {
13011
13101
  const imports = {};
13012
13102
  imports.wbg = {};
13103
+ imports.wbg.__wbg_abort_410ec47a64ac6117 = function(arg0, arg1) {
13104
+ getObject(arg0).abort(getObject(arg1));
13105
+ };
13013
13106
  imports.wbg.__wbg_abort_775ef1d17fc65868 = function(arg0) {
13014
13107
  getObject(arg0).abort();
13015
13108
  };
@@ -13048,6 +13141,10 @@ function __wbg_get_imports() {
13048
13141
  const ret = Ciphertext.__wrap(arg0);
13049
13142
  return addHeapObject(ret);
13050
13143
  };
13144
+ imports.wbg.__wbg_clearTimeout_86721db0036bea98 = function(arg0) {
13145
+ const ret = clearTimeout(takeObject(arg0));
13146
+ return addHeapObject(ret);
13147
+ };
13051
13148
  imports.wbg.__wbg_crypto_ed58b8e10a292839 = function(arg0) {
13052
13149
  const ret = getObject(arg0).crypto;
13053
13150
  return addHeapObject(ret);
@@ -13079,6 +13176,10 @@ function __wbg_get_imports() {
13079
13176
  const ret = getObject(arg0).fetch(getObject(arg1));
13080
13177
  return addHeapObject(ret);
13081
13178
  };
13179
+ imports.wbg.__wbg_fetch_d36a73832f0a45e8 = function(arg0) {
13180
+ const ret = fetch(getObject(arg0));
13181
+ return addHeapObject(ret);
13182
+ };
13082
13183
  imports.wbg.__wbg_fetch_f1856afdb49415d1 = function(arg0) {
13083
13184
  const ret = fetch(getObject(arg0));
13084
13185
  return addHeapObject(ret);
@@ -13144,7 +13245,7 @@ function __wbg_get_imports() {
13144
13245
  const ret = getObject(arg0).length;
13145
13246
  return ret;
13146
13247
  };
13147
- imports.wbg.__wbg_log_bac25b70f2db29a3 = function(arg0, arg1) {
13248
+ imports.wbg.__wbg_log_3d00345a85838c37 = function(arg0, arg1) {
13148
13249
  console.log(getStringFromWasm0(arg0, arg1));
13149
13250
  };
13150
13251
  imports.wbg.__wbg_msCrypto_0a36e2ec3a343d26 = function(arg0) {
@@ -13162,7 +13263,7 @@ function __wbg_get_imports() {
13162
13263
  const a = state0.a;
13163
13264
  state0.a = 0;
13164
13265
  try {
13165
- return __wbg_adapter_867(a, state0.b, arg0, arg1);
13266
+ return __wbg_adapter_873(a, state0.b, arg0, arg1);
13166
13267
  } finally {
13167
13268
  state0.a = a;
13168
13269
  }
@@ -13310,6 +13411,10 @@ function __wbg_get_imports() {
13310
13411
  imports.wbg.__wbg_send_40a47636ff90f64d = function() { return handleError(function (arg0) {
13311
13412
  getObject(arg0).send();
13312
13413
  }, arguments) };
13414
+ imports.wbg.__wbg_setTimeout_2e707715f8cc9497 = function(arg0, arg1) {
13415
+ const ret = setTimeout(getObject(arg0), arg1);
13416
+ return addHeapObject(ret);
13417
+ };
13313
13418
  imports.wbg.__wbg_set_37837023f3d740e8 = function(arg0, arg1, arg2) {
13314
13419
  getObject(arg0)[arg1 >>> 0] = takeObject(arg2);
13315
13420
  };
@@ -13349,7 +13454,7 @@ function __wbg_get_imports() {
13349
13454
  const ret = Signature.__wrap(arg0);
13350
13455
  return addHeapObject(ret);
13351
13456
  };
13352
- imports.wbg.__wbg_spawnWorker_231c975bbb3598af = function(arg0, arg1, arg2, arg3) {
13457
+ imports.wbg.__wbg_spawnWorker_11a3cff24c5879d7 = function(arg0, arg1, arg2, arg3) {
13353
13458
  const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);
13354
13459
  return addHeapObject(ret);
13355
13460
  };
@@ -13469,12 +13574,16 @@ function __wbg_get_imports() {
13469
13574
  const ret = false;
13470
13575
  return ret;
13471
13576
  };
13472
- imports.wbg.__wbindgen_closure_wrapper7347 = function(arg0, arg1, arg2) {
13473
- const ret = makeMutClosure(arg0, arg1, 548, __wbg_adapter_40);
13577
+ imports.wbg.__wbindgen_closure_wrapper7312 = function(arg0, arg1, arg2) {
13578
+ const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_40);
13579
+ return addHeapObject(ret);
13580
+ };
13581
+ imports.wbg.__wbindgen_closure_wrapper7964 = function(arg0, arg1, arg2) {
13582
+ const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_43);
13474
13583
  return addHeapObject(ret);
13475
13584
  };
13476
- imports.wbg.__wbindgen_closure_wrapper7352 = function(arg0, arg1, arg2) {
13477
- const ret = makeMutClosure(arg0, arg1, 548, __wbg_adapter_40);
13585
+ imports.wbg.__wbindgen_closure_wrapper7968 = function(arg0, arg1, arg2) {
13586
+ const ret = makeMutClosure(arg0, arg1, 533, __wbg_adapter_43);
13478
13587
  return addHeapObject(ret);
13479
13588
  };
13480
13589
  imports.wbg.__wbindgen_is_function = function(arg0) {