@renown/sdk 6.0.2-staging.2 → 6.0.2-staging.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (147) hide show
  1. package/README.md +1 -0
  2. package/dist/index.d.ts +77 -0
  3. package/dist/index.d.ts.map +1 -0
  4. package/dist/index.js +173 -0
  5. package/dist/index.js.map +1 -0
  6. package/dist/node.d.ts +136 -0
  7. package/dist/node.d.ts.map +1 -0
  8. package/dist/node.js +305 -0
  9. package/dist/node.js.map +1 -0
  10. package/dist/renown-builder-xQpZet3I.js +816 -0
  11. package/dist/renown-builder-xQpZet3I.js.map +1 -0
  12. package/dist/utils-D7B6E7_Z.d.ts +682 -0
  13. package/dist/utils-D7B6E7_Z.d.ts.map +1 -0
  14. package/package.json +14 -13
  15. package/dist/src/common.d.ts +0 -23
  16. package/dist/src/common.d.ts.map +0 -1
  17. package/dist/src/common.js +0 -145
  18. package/dist/src/common.js.map +0 -1
  19. package/dist/src/constants.d.ts +0 -130
  20. package/dist/src/constants.d.ts.map +0 -1
  21. package/dist/src/constants.js +0 -40
  22. package/dist/src/constants.js.map +0 -1
  23. package/dist/src/crypto/browser-key-storage.d.ts +0 -10
  24. package/dist/src/crypto/browser-key-storage.d.ts.map +0 -1
  25. package/dist/src/crypto/browser-key-storage.js +0 -76
  26. package/dist/src/crypto/browser-key-storage.js.map +0 -1
  27. package/dist/src/crypto/common.d.ts +0 -6
  28. package/dist/src/crypto/common.d.ts.map +0 -1
  29. package/dist/src/crypto/common.js +0 -8
  30. package/dist/src/crypto/common.js.map +0 -1
  31. package/dist/src/crypto/index.d.ts +0 -3
  32. package/dist/src/crypto/index.d.ts.map +0 -1
  33. package/dist/src/crypto/index.js +0 -3
  34. package/dist/src/crypto/index.js.map +0 -1
  35. package/dist/src/crypto/memory-key-storage.d.ts +0 -9
  36. package/dist/src/crypto/memory-key-storage.d.ts.map +0 -1
  37. package/dist/src/crypto/memory-key-storage.js +0 -18
  38. package/dist/src/crypto/memory-key-storage.js.map +0 -1
  39. package/dist/src/crypto/node-key-storage.d.ts +0 -21
  40. package/dist/src/crypto/node-key-storage.d.ts.map +0 -1
  41. package/dist/src/crypto/node-key-storage.js +0 -107
  42. package/dist/src/crypto/node-key-storage.js.map +0 -1
  43. package/dist/src/crypto/node.d.ts +0 -3
  44. package/dist/src/crypto/node.d.ts.map +0 -1
  45. package/dist/src/crypto/node.js +0 -3
  46. package/dist/src/crypto/node.js.map +0 -1
  47. package/dist/src/crypto/renown-crypto-builder.d.ts +0 -11
  48. package/dist/src/crypto/renown-crypto-builder.d.ts.map +0 -1
  49. package/dist/src/crypto/renown-crypto-builder.js +0 -34
  50. package/dist/src/crypto/renown-crypto-builder.js.map +0 -1
  51. package/dist/src/crypto/renown-crypto.d.ts +0 -26
  52. package/dist/src/crypto/renown-crypto.d.ts.map +0 -1
  53. package/dist/src/crypto/renown-crypto.js +0 -56
  54. package/dist/src/crypto/renown-crypto.js.map +0 -1
  55. package/dist/src/crypto/signer.d.ts +0 -74
  56. package/dist/src/crypto/signer.d.ts.map +0 -1
  57. package/dist/src/crypto/signer.js +0 -306
  58. package/dist/src/crypto/signer.js.map +0 -1
  59. package/dist/src/crypto/types.d.ts +0 -27
  60. package/dist/src/crypto/types.d.ts.map +0 -1
  61. package/dist/src/crypto/types.js +0 -2
  62. package/dist/src/crypto/types.js.map +0 -1
  63. package/dist/src/crypto/utils.d.ts +0 -13
  64. package/dist/src/crypto/utils.d.ts.map +0 -1
  65. package/dist/src/crypto/utils.js +0 -39
  66. package/dist/src/crypto/utils.js.map +0 -1
  67. package/dist/src/event/event.browser.d.ts +0 -10
  68. package/dist/src/event/event.browser.d.ts.map +0 -1
  69. package/dist/src/event/event.browser.js +0 -24
  70. package/dist/src/event/event.browser.js.map +0 -1
  71. package/dist/src/event/event.node.d.ts +0 -8
  72. package/dist/src/event/event.node.d.ts.map +0 -1
  73. package/dist/src/event/event.node.js +0 -17
  74. package/dist/src/event/event.node.js.map +0 -1
  75. package/dist/src/event/memory.d.ts +0 -8
  76. package/dist/src/event/memory.d.ts.map +0 -1
  77. package/dist/src/event/memory.js +0 -16
  78. package/dist/src/event/memory.js.map +0 -1
  79. package/dist/src/event/types.d.ts +0 -16
  80. package/dist/src/event/types.d.ts.map +0 -1
  81. package/dist/src/event/types.js +0 -2
  82. package/dist/src/event/types.js.map +0 -1
  83. package/dist/src/index.d.ts +0 -8
  84. package/dist/src/index.d.ts.map +0 -1
  85. package/dist/src/index.js +0 -8
  86. package/dist/src/index.js.map +0 -1
  87. package/dist/src/init.browser.d.ts +0 -52
  88. package/dist/src/init.browser.d.ts.map +0 -1
  89. package/dist/src/init.browser.js +0 -66
  90. package/dist/src/init.browser.js.map +0 -1
  91. package/dist/src/init.node.d.ts +0 -29
  92. package/dist/src/init.node.d.ts.map +0 -1
  93. package/dist/src/init.node.js +0 -30
  94. package/dist/src/init.node.js.map +0 -1
  95. package/dist/src/node.d.ts +0 -10
  96. package/dist/src/node.d.ts.map +0 -1
  97. package/dist/src/node.js +0 -10
  98. package/dist/src/node.js.map +0 -1
  99. package/dist/src/profile.d.ts +0 -3
  100. package/dist/src/profile.d.ts.map +0 -1
  101. package/dist/src/profile.js +0 -22
  102. package/dist/src/profile.js.map +0 -1
  103. package/dist/src/renown-builder.d.ts +0 -68
  104. package/dist/src/renown-builder.d.ts.map +0 -1
  105. package/dist/src/renown-builder.js +0 -130
  106. package/dist/src/renown-builder.js.map +0 -1
  107. package/dist/src/storage/common.d.ts +0 -17
  108. package/dist/src/storage/common.d.ts.map +0 -1
  109. package/dist/src/storage/common.js +0 -20
  110. package/dist/src/storage/common.js.map +0 -1
  111. package/dist/src/storage/storage.browser.d.ts +0 -10
  112. package/dist/src/storage/storage.browser.d.ts.map +0 -1
  113. package/dist/src/storage/storage.browser.js +0 -27
  114. package/dist/src/storage/storage.browser.js.map +0 -1
  115. package/dist/src/storage/storage.node.d.ts +0 -11
  116. package/dist/src/storage/storage.node.d.ts.map +0 -1
  117. package/dist/src/storage/storage.node.js +0 -42
  118. package/dist/src/storage/storage.node.js.map +0 -1
  119. package/dist/src/types.d.ts +0 -126
  120. package/dist/src/types.d.ts.map +0 -1
  121. package/dist/src/types.js +0 -2
  122. package/dist/src/types.js.map +0 -1
  123. package/dist/src/utils.d.ts +0 -24
  124. package/dist/src/utils.d.ts.map +0 -1
  125. package/dist/src/utils.js +0 -94
  126. package/dist/src/utils.js.map +0 -1
  127. package/dist/test/auth.test.d.ts +0 -2
  128. package/dist/test/auth.test.d.ts.map +0 -1
  129. package/dist/test/auth.test.js +0 -13
  130. package/dist/test/auth.test.js.map +0 -1
  131. package/dist/test/crypto/signer.test.d.ts +0 -2
  132. package/dist/test/crypto/signer.test.d.ts.map +0 -1
  133. package/dist/test/crypto/signer.test.js +0 -184
  134. package/dist/test/crypto/signer.test.js.map +0 -1
  135. package/dist/test/renown.test.d.ts +0 -2
  136. package/dist/test/renown.test.d.ts.map +0 -1
  137. package/dist/test/renown.test.js +0 -287
  138. package/dist/test/renown.test.js.map +0 -1
  139. package/dist/test/storage.node.test.d.ts +0 -2
  140. package/dist/test/storage.node.test.d.ts.map +0 -1
  141. package/dist/test/storage.node.test.js +0 -66
  142. package/dist/test/storage.node.test.js.map +0 -1
  143. package/dist/tsconfig.tsbuildinfo +0 -1
  144. package/dist/vitest.config.d.ts +0 -3
  145. package/dist/vitest.config.d.ts.map +0 -1
  146. package/dist/vitest.config.js +0 -7
  147. package/dist/vitest.config.js.map +0 -1
package/dist/node.js ADDED
@@ -0,0 +1,305 @@
1
+ import { C as DEFAULT_RENOWN_CHAIN_ID, D as ISSUER_TYPE, E as DOMAIN_TYPE, O as VERIFIABLE_CREDENTIAL_EIP712_TYPE, S as CREDENTIAL_TYPES, T as DEFAULT_RENOWN_URL, _ as getResolver, a as BaseStorage, b as CREDENTIAL_SCHEMA_EIP712_TYPE, c as extractResultingHashFromSignature, d as MemoryKeyStorage, f as RenownCryptoBuilder, g as createAuthBearerToken, h as assertIsAuthCredential, i as RenownMemoryStorage, l as parseSignatureHashField, m as RenownCrypto, n as fetchRenownProfile, o as RenownCryptoSigner, p as ConnectCrypto, r as Renown, s as createSignatureVerifier, t as BaseRenownBuilder, u as signatureHasResultingHash, v as parsePkhDid, w as DEFAULT_RENOWN_NETWORK_ID, x as CREDENTIAL_SUBJECT_TYPE, y as verifyAuthBearerToken } from "./renown-builder-xQpZet3I.js";
2
+ import { existsSync, mkdirSync, readFileSync, unlinkSync, writeFileSync } from "node:fs";
3
+ import { dirname, join } from "node:path";
4
+ import { EventEmitter } from "node:events";
5
+ //#region src/crypto/node-key-storage.ts
6
+ const RENOWN_PRIVATE_KEY_ENV = "PH_RENOWN_PRIVATE_KEY";
7
+ const DEFAULT_KEYPAIR_PATH = ".ph/.keypair.json";
8
+ /**
9
+ * Key storage that supports:
10
+ * 1. PH_RENOWN_PRIVATE_KEY environment variable (JSON-encoded JwkKeyPair)
11
+ * 2. Custom file path passed via options
12
+ * 3. Falls back to file storage at .ph/.keypair.json in current working directory
13
+ */
14
+ var NodeKeyStorage = class {
15
+ #filePath;
16
+ #envKeyName;
17
+ #logger;
18
+ static DEFAULT_KEYPAIR_PATH = DEFAULT_KEYPAIR_PATH;
19
+ static RENOWN_PRIVATE_KEY_ENV = RENOWN_PRIVATE_KEY_ENV;
20
+ constructor(filePath, options = {}) {
21
+ this.#filePath = filePath || join(process.cwd(), ".ph/.keypair.json");
22
+ this.#envKeyName = options.envKeyName || "PH_RENOWN_PRIVATE_KEY";
23
+ this.#logger = options.logger;
24
+ const dir = dirname(this.#filePath);
25
+ if (!existsSync(dir)) mkdirSync(dir, { recursive: true });
26
+ }
27
+ loadKeyPair() {
28
+ const envKey = process.env[this.#envKeyName];
29
+ if (envKey) try {
30
+ const keyPairJson = JSON.parse(envKey);
31
+ const keyPair = this.#parseKeyPair(keyPairJson);
32
+ this.#logger?.debug("Loaded keypair from environment variable");
33
+ return Promise.resolve(keyPair);
34
+ } catch (e) {
35
+ throw new Error(`Failed to parse ${this.#envKeyName}: ${e instanceof Error ? e.message : String(e)}`, { cause: e });
36
+ }
37
+ return Promise.resolve(this.#loadFromFile());
38
+ }
39
+ async saveKeyPair(keyPair) {
40
+ if (process.env[this.#envKeyName]) return;
41
+ this.#saveToFile(keyPair);
42
+ return Promise.resolve();
43
+ }
44
+ removeKeyPair() {
45
+ if (process.env[this.#envKeyName]) delete process.env[this.#envKeyName];
46
+ if (existsSync(this.#filePath)) unlinkSync(this.#filePath);
47
+ return Promise.resolve();
48
+ }
49
+ #loadFromFile() {
50
+ try {
51
+ if (!existsSync(this.#filePath)) return;
52
+ const data = readFileSync(this.#filePath, "utf-8");
53
+ const parsed = JSON.parse(data);
54
+ const keyPair = this.#parseKeyPair(parsed);
55
+ this.#logger?.debug(`Loaded keypair from ${this.#filePath}`);
56
+ return keyPair;
57
+ } catch (e) {
58
+ throw new Error(`Failed to parse ${this.#filePath}: ${e instanceof Error ? e.message : String(e)}`, { cause: e });
59
+ }
60
+ }
61
+ #saveToFile(keyPair) {
62
+ const data = { keyPair };
63
+ writeFileSync(this.#filePath, JSON.stringify(data, null, 2), "utf-8");
64
+ this.#logger?.debug(`Saved keypair to ${this.#filePath}`);
65
+ }
66
+ #parseKeyPair(json) {
67
+ if (typeof json !== "object") throw new Error("Invalid keyPair format:" + JSON.stringify(json));
68
+ const object = json;
69
+ let keyPair;
70
+ if ("keyPair" in object) keyPair = object.keyPair;
71
+ else keyPair = object;
72
+ if ("publicKey" in keyPair && "privateKey" in keyPair) return keyPair;
73
+ else throw new Error("Invalid keyPair format:" + JSON.stringify(json));
74
+ }
75
+ };
76
+ //#endregion
77
+ //#region src/event/event.node.ts
78
+ var NodeEventEmitter = class {
79
+ #emitter = new EventEmitter();
80
+ constructor() {
81
+ this.#emitter.setMaxListeners(0);
82
+ }
83
+ on(event, listener) {
84
+ this.#emitter.on(event, listener);
85
+ return () => {
86
+ this.#emitter.removeListener(event.toString(), listener);
87
+ };
88
+ }
89
+ emit(event, data) {
90
+ this.#emitter.emit(event.toString(), data);
91
+ }
92
+ };
93
+ //#endregion
94
+ //#region src/storage/storage.node.ts
95
+ var NodeStorage = class extends BaseStorage {
96
+ filePath;
97
+ constructor(filePath) {
98
+ super();
99
+ this.filePath = filePath;
100
+ mkdirSync(dirname(this.filePath), { recursive: true });
101
+ if (!existsSync(this.filePath)) writeFileSync(this.filePath, JSON.stringify({}));
102
+ }
103
+ readData() {
104
+ const data = readFileSync(this.filePath, "utf-8");
105
+ return JSON.parse(data);
106
+ }
107
+ writeData(data) {
108
+ writeFileSync(this.filePath, JSON.stringify(data, null, 2));
109
+ }
110
+ get(key) {
111
+ return this.readData()[key];
112
+ }
113
+ set(key, value) {
114
+ const data = this.readData();
115
+ if (value === void 0) delete data[key];
116
+ else data[key] = value;
117
+ this.writeData(data);
118
+ }
119
+ delete(key) {
120
+ const data = this.readData();
121
+ delete data[key];
122
+ this.writeData(data);
123
+ }
124
+ };
125
+ //#endregion
126
+ //#region src/init.node.ts
127
+ var NodeRenownEventEmitter = class extends NodeEventEmitter {};
128
+ var NodeRenownStorage = class extends NodeStorage {};
129
+ const DEFAULT_RENOWN_STORAGE_PATH = "./.ph/.renown.json";
130
+ /**
131
+ * Node.js-specific Renown builder with pre-configured defaults.
132
+ * Uses file-based storage for both user data and key storage.
133
+ */
134
+ var RenownBuilder = class extends BaseRenownBuilder {
135
+ /**
136
+ * @param appName - Application name used for signing context
137
+ * @param options - Node.js-specific configuration options
138
+ */
139
+ constructor(appName, options = {}) {
140
+ super(appName);
141
+ const { storagePath = DEFAULT_RENOWN_STORAGE_PATH, keyPath, baseUrl } = options;
142
+ this.withKeyPairStorage(new NodeKeyStorage(keyPath));
143
+ this.withStorage(new NodeRenownStorage(storagePath));
144
+ this.withEventEmitter(new NodeRenownEventEmitter());
145
+ if (baseUrl) this.withBaseUrl(baseUrl);
146
+ }
147
+ };
148
+ //#endregion
149
+ //#region src/login.node.ts
150
+ const DEFAULT_TIMEOUT_MS = 300 * 1e3;
151
+ const POLL_INTERVAL_MS = 2e3;
152
+ const SECONDS_IN_DAY = 1440 * 60;
153
+ function abortReason(signal) {
154
+ if (signal.reason instanceof Error) return signal.reason;
155
+ if (signal.reason) return new Error(String(signal.reason));
156
+ return new DOMException("Aborted", "AbortError");
157
+ }
158
+ function sleep(ms, signal) {
159
+ return new Promise((resolve, reject) => {
160
+ if (signal?.aborted) {
161
+ reject(abortReason(signal));
162
+ return;
163
+ }
164
+ const onAbort = () => {
165
+ clearTimeout(timer);
166
+ reject(abortReason(signal));
167
+ };
168
+ const timer = setTimeout(() => {
169
+ signal?.removeEventListener("abort", onAbort);
170
+ resolve();
171
+ }, ms);
172
+ signal?.addEventListener("abort", onAbort, { once: true });
173
+ });
174
+ }
175
+ /**
176
+ * Open a URL in the default browser (cross-platform).
177
+ */
178
+ async function openBrowser(url) {
179
+ const { execFile } = await import("node:child_process");
180
+ const { promisify } = await import("node:util");
181
+ const execFileAsync = promisify(execFile);
182
+ const platform = process.platform;
183
+ if (platform === "darwin") await execFileAsync("open", [url]);
184
+ else if (platform === "win32") await execFileAsync("cmd", [
185
+ "/c",
186
+ "start",
187
+ "",
188
+ url
189
+ ]);
190
+ else await execFileAsync("xdg-open", [url]);
191
+ }
192
+ async function pollSession(renownUrl, sessionId, timeoutMs, onPollTick, signal) {
193
+ const startTime = Date.now();
194
+ const sessionUrl = new URL(`/api/console/session/${sessionId}`, renownUrl).toString();
195
+ while (Date.now() - startTime < timeoutMs) {
196
+ signal?.throwIfAborted();
197
+ try {
198
+ const response = await fetch(sessionUrl, { signal });
199
+ if (response.ok) {
200
+ const data = await response.json();
201
+ if (data.status === "ready") return data;
202
+ }
203
+ } catch (error) {
204
+ if (error instanceof DOMException && error.name === "AbortError") throw error;
205
+ }
206
+ onPollTick?.();
207
+ await sleep(POLL_INTERVAL_MS, signal);
208
+ }
209
+ return null;
210
+ }
211
+ /**
212
+ * Perform a browser-based login flow with Renown.
213
+ * Opens the user's browser to authenticate, then polls for completion.
214
+ * Throws if already authenticated or if the flow times out.
215
+ * If the browser fails to open, the flow continues polling — callers
216
+ * can use onBrowserOpenFailed to show the URL as a fallback.
217
+ */
218
+ async function browserLogin(renown, options) {
219
+ if (renown.user?.credential) throw new Error(`Already authenticated as ${renown.user.address}. Logout first.`);
220
+ const timeoutMs = options.timeoutMs ?? DEFAULT_TIMEOUT_MS;
221
+ const sessionId = crypto.randomUUID();
222
+ const loginUrl = new URL("/console", options.renownUrl);
223
+ loginUrl.searchParams.set("session", sessionId);
224
+ loginUrl.searchParams.set("connect", renown.did);
225
+ loginUrl.searchParams.set("app", renown.did);
226
+ const url = loginUrl.toString();
227
+ options.onLoginUrl?.(url, sessionId);
228
+ try {
229
+ await openBrowser(url);
230
+ } catch {
231
+ options.onBrowserOpenFailed?.(url);
232
+ }
233
+ const result = await pollSession(options.renownUrl, sessionId, timeoutMs, options.onPollTick, options.signal);
234
+ if (!result) throw new Error("Authentication timed out.");
235
+ return {
236
+ user: await renown.login(result.did),
237
+ cliDid: renown.did
238
+ };
239
+ }
240
+ /**
241
+ * Get the current authentication status from a Renown instance.
242
+ */
243
+ function getAuthStatus(renown) {
244
+ const user = renown.user;
245
+ const credential = user?.credential;
246
+ return {
247
+ authenticated: !!credential,
248
+ address: user?.address,
249
+ userDid: user?.did,
250
+ chainId: user?.chainId,
251
+ cliDid: renown.did,
252
+ authenticatedAt: credential ? new Date(credential.issuanceDate) : void 0,
253
+ baseUrl: renown.baseUrl
254
+ };
255
+ }
256
+ /**
257
+ * Generate a bearer token for API authentication.
258
+ * Requires the user to be authenticated (via browserLogin or equivalent).
259
+ * Throws if not authenticated.
260
+ */
261
+ async function generateAccessToken(renown, options) {
262
+ const user = renown.user;
263
+ if (!user?.credential) throw new Error("Not authenticated. Login first to generate access tokens.");
264
+ return {
265
+ token: await renown.getBearerToken(options ?? {}),
266
+ did: renown.did,
267
+ address: user.address,
268
+ expiresIn: options?.expiresIn ?? 0
269
+ };
270
+ }
271
+ /**
272
+ * Parse a human-readable expiry string to seconds.
273
+ * Supports formats: "7d" (days), "24h" (hours), "3600" (seconds), "3600s" (seconds).
274
+ * Only accepts positive integers — decimals like "1.5h" are rejected.
275
+ */
276
+ function parseExpiry(expiry) {
277
+ const match = expiry.trim().toLowerCase().match(/^(\d+)(d|h|s)?$/);
278
+ if (!match) throw new Error(`Invalid expiry format: ${expiry}. Expected a positive integer with optional suffix: "7d", "24h", "3600s", or "3600".`);
279
+ const value = Number(match[1]);
280
+ const unit = match[2];
281
+ if (value <= 0) throw new Error(`Invalid expiry format: ${expiry}. Value must be a positive integer.`);
282
+ switch (unit) {
283
+ case "d": return value * SECONDS_IN_DAY;
284
+ case "h": return value * 60 * 60;
285
+ default: return value;
286
+ }
287
+ }
288
+ /**
289
+ * Format an expiry duration in seconds to a human-readable string.
290
+ */
291
+ function formatExpiry(expiresIn) {
292
+ const days = Math.floor(expiresIn / SECONDS_IN_DAY);
293
+ const hours = Math.floor(expiresIn % SECONDS_IN_DAY / 3600);
294
+ if (days > 0) {
295
+ const dayStr = `${days} day${days !== 1 ? "s" : ""}`;
296
+ if (hours > 0) return `${dayStr} and ${hours} hour${hours !== 1 ? "s" : ""}`;
297
+ return dayStr;
298
+ }
299
+ if (hours > 0) return `${hours} hour${hours !== 1 ? "s" : ""}`;
300
+ return `${expiresIn} second${expiresIn !== 1 ? "s" : ""}`;
301
+ }
302
+ //#endregion
303
+ export { BaseRenownBuilder, CREDENTIAL_SCHEMA_EIP712_TYPE, CREDENTIAL_SUBJECT_TYPE, CREDENTIAL_TYPES, ConnectCrypto, DEFAULT_KEYPAIR_PATH, DEFAULT_RENOWN_CHAIN_ID, DEFAULT_RENOWN_NETWORK_ID, DEFAULT_RENOWN_STORAGE_PATH, DEFAULT_RENOWN_URL, DOMAIN_TYPE, ISSUER_TYPE, MemoryKeyStorage, NodeEventEmitter, NodeKeyStorage, NodeRenownEventEmitter, NodeRenownStorage, NodeStorage, RENOWN_PRIVATE_KEY_ENV, Renown, RenownBuilder, RenownCrypto, RenownCryptoBuilder, RenownCryptoSigner, RenownMemoryStorage, VERIFIABLE_CREDENTIAL_EIP712_TYPE, assertIsAuthCredential, browserLogin, createAuthBearerToken, createSignatureVerifier, extractResultingHashFromSignature, fetchRenownProfile, formatExpiry, generateAccessToken, getAuthStatus, getResolver, openBrowser, parseExpiry, parsePkhDid, parseSignatureHashField, signatureHasResultingHash, verifyAuthBearerToken };
304
+
305
+ //# sourceMappingURL=node.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"node.js","names":["#filePath","#envKeyName","#logger","#parseKeyPair","#loadFromFile","#saveToFile","#emitter"],"sources":["../src/crypto/node-key-storage.ts","../src/event/event.node.ts","../src/storage/storage.node.ts","../src/init.node.ts","../src/login.node.ts"],"sourcesContent":["import {\n existsSync,\n mkdirSync,\n readFileSync,\n unlinkSync,\n writeFileSync,\n} from \"node:fs\";\nimport { dirname, join } from \"node:path\";\nimport type { ILogger } from \"../utils.js\";\nimport type { JsonWebKeyPairStorage, JwkKeyPair } from \"./types.js\";\n\nexport const RENOWN_PRIVATE_KEY_ENV = \"PH_RENOWN_PRIVATE_KEY\";\nexport const DEFAULT_KEYPAIR_PATH = \".ph/.keypair.json\";\n\n/**\n * Key storage that supports:\n * 1. PH_RENOWN_PRIVATE_KEY environment variable (JSON-encoded JwkKeyPair)\n * 2. Custom file path passed via options\n * 3. Falls back to file storage at .ph/.keypair.json in current working directory\n */\nexport class NodeKeyStorage implements JsonWebKeyPairStorage {\n #filePath: string;\n #envKeyName: string;\n #logger?: ILogger;\n\n static readonly DEFAULT_KEYPAIR_PATH = DEFAULT_KEYPAIR_PATH;\n static readonly RENOWN_PRIVATE_KEY_ENV = RENOWN_PRIVATE_KEY_ENV;\n\n constructor(\n filePath?: string,\n options: { envKeyName?: string; logger?: ILogger } = {},\n ) {\n this.#filePath = filePath || join(process.cwd(), DEFAULT_KEYPAIR_PATH);\n this.#envKeyName = options.envKeyName || RENOWN_PRIVATE_KEY_ENV;\n this.#logger = options.logger;\n\n // Ensure directory exists\n const dir = dirname(this.#filePath);\n if (!existsSync(dir)) {\n mkdirSync(dir, { recursive: true });\n }\n }\n\n loadKeyPair(): Promise<JwkKeyPair | undefined> {\n // First check environment variable\n const envKey = process.env[this.#envKeyName];\n if (envKey) {\n try {\n const keyPairJson = JSON.parse(envKey) as unknown;\n const keyPair: JwkKeyPair = this.#parseKeyPair(keyPairJson);\n\n // Validate it has the required structure\n this.#logger?.debug(\"Loaded keypair from environment variable\");\n return Promise.resolve(keyPair);\n } catch (e) {\n throw new Error(\n `Failed to parse ${this.#envKeyName}: ${e instanceof Error ? e.message : String(e)}`,\n {\n cause: e,\n },\n );\n }\n }\n\n // Fall back to file storage\n return Promise.resolve(this.#loadFromFile());\n }\n\n async saveKeyPair(keyPair: JwkKeyPair): Promise<void> {\n // Don't save if using env var\n if (process.env[this.#envKeyName]) {\n return;\n }\n\n // Save to file\n this.#saveToFile(keyPair);\n return Promise.resolve();\n }\n\n removeKeyPair(): Promise<void> {\n if (process.env[this.#envKeyName]) {\n delete process.env[this.#envKeyName];\n }\n if (existsSync(this.#filePath)) {\n unlinkSync(this.#filePath);\n }\n return Promise.resolve();\n }\n\n #loadFromFile(): JwkKeyPair | undefined {\n try {\n if (!existsSync(this.#filePath)) {\n return undefined;\n }\n const data = readFileSync(this.#filePath, \"utf-8\");\n const parsed = JSON.parse(data) as unknown;\n const keyPair: JwkKeyPair = this.#parseKeyPair(parsed);\n this.#logger?.debug(`Loaded keypair from ${this.#filePath}`);\n return keyPair;\n } catch (e) {\n throw new Error(\n `Failed to parse ${this.#filePath}: ${e instanceof Error ? e.message : String(e)}`,\n {\n cause: e,\n },\n );\n }\n }\n\n #saveToFile(keyPair: JwkKeyPair): void {\n const data = { keyPair };\n writeFileSync(this.#filePath, JSON.stringify(data, null, 2), \"utf-8\");\n this.#logger?.debug(`Saved keypair to ${this.#filePath}`);\n }\n\n #parseKeyPair(json: unknown): JwkKeyPair {\n if (typeof json !== \"object\") {\n throw new Error(\"Invalid keyPair format:\" + JSON.stringify(json));\n }\n\n const object = json as JwkKeyPair | { keyPair: JwkKeyPair };\n let keyPair: JwkKeyPair;\n if (\"keyPair\" in object) {\n keyPair = object.keyPair;\n } else {\n keyPair = object;\n }\n\n if (\"publicKey\" in keyPair && \"privateKey\" in keyPair) {\n return keyPair;\n } else {\n throw new Error(\"Invalid keyPair format:\" + JSON.stringify(json));\n }\n }\n}\n","import { EventEmitter } from \"node:events\";\nimport type { IEventEmitter } from \"./types.js\";\n\nexport class NodeEventEmitter<\n Events extends Record<string, unknown>,\n> implements IEventEmitter<Events> {\n #emitter = new EventEmitter();\n\n constructor() {\n this.#emitter.setMaxListeners(0);\n }\n\n on<K extends keyof Events>(\n event: K,\n listener: (data: Events[K]) => void,\n ): () => void {\n this.#emitter.on(event as string, listener);\n return () => {\n this.#emitter.removeListener(event.toString(), listener);\n };\n }\n\n emit<K extends keyof Events>(event: K, data: Events[K]): void {\n this.#emitter.emit(event.toString(), data);\n }\n}\n","import { existsSync, mkdirSync, readFileSync, writeFileSync } from \"node:fs\";\nimport { dirname } from \"node:path\";\nimport { BaseStorage } from \"./common.js\";\n\nexport class NodeStorage<\n T extends Record<string, unknown> = Record<string, unknown>,\n> extends BaseStorage<T> {\n private readonly filePath: string;\n\n constructor(filePath: string) {\n super();\n this.filePath = filePath;\n\n const parentFolder = dirname(this.filePath);\n mkdirSync(parentFolder, { recursive: true });\n\n if (!existsSync(this.filePath)) {\n writeFileSync(this.filePath, JSON.stringify({}));\n }\n }\n\n private readData(): T {\n const data = readFileSync(this.filePath, \"utf-8\");\n return JSON.parse(data) as T;\n }\n\n private writeData(data: T): void {\n writeFileSync(this.filePath, JSON.stringify(data, null, 2));\n }\n\n get<Key extends keyof T>(key: Key): T[Key] | undefined {\n const data = this.readData();\n return data[key];\n }\n\n set<Key extends keyof T>(key: Key, value?: T[Key]): void {\n const data = this.readData();\n if (value === undefined) {\n delete data[key];\n } else {\n data[key] = value;\n }\n this.writeData(data);\n }\n\n delete(key: keyof T): void {\n const data = this.readData();\n delete data[key];\n this.writeData(data);\n }\n}\n","import { NodeKeyStorage } from \"./crypto/node-key-storage.js\";\nimport { NodeEventEmitter } from \"./event/event.node.js\";\nimport { BaseRenownBuilder } from \"./renown-builder.js\";\nimport { NodeStorage } from \"./storage/storage.node.js\";\nimport type { RenownEvents, RenownStorageMap } from \"./types.js\";\n\nexport class NodeRenownEventEmitter extends NodeEventEmitter<RenownEvents> {}\nexport class NodeRenownStorage extends NodeStorage<RenownStorageMap> {}\n\nexport const DEFAULT_RENOWN_STORAGE_PATH = \"./.ph/.renown.json\";\n\nexport interface NodeRenownBuilderOptions {\n /** File path for user storage. Defaults to \".ph/.renown.json\" in cwd */\n storagePath?: string;\n /** File path for keypair storage. Defaults to \".ph/.keypair.json\" in cwd */\n keyPath?: string;\n /** Renown server URL. Defaults to https://www.renown.id */\n baseUrl?: string;\n}\n\n/**\n * Node.js-specific Renown builder with pre-configured defaults.\n * Uses file-based storage for both user data and key storage.\n */\nexport class RenownBuilder extends BaseRenownBuilder {\n /**\n * @param appName - Application name used for signing context\n * @param options - Node.js-specific configuration options\n */\n constructor(appName: string, options: NodeRenownBuilderOptions = {}) {\n super(appName);\n\n const {\n storagePath = DEFAULT_RENOWN_STORAGE_PATH,\n keyPath,\n baseUrl,\n } = options;\n\n this.withKeyPairStorage(new NodeKeyStorage(keyPath));\n this.withStorage(new NodeRenownStorage(storagePath));\n this.withEventEmitter(new NodeRenownEventEmitter());\n if (baseUrl) {\n this.withBaseUrl(baseUrl);\n }\n }\n}\n","import type { CreateBearerTokenOptions, IRenown, User } from \"./types.js\";\n\nconst DEFAULT_TIMEOUT_MS = 5 * 60 * 1000; // 5 minutes\nconst POLL_INTERVAL_MS = 2000; // 2 seconds\nconst SECONDS_IN_DAY = 24 * 60 * 60;\n\nexport interface BrowserLoginOptions {\n /** Renown server URL */\n renownUrl: string;\n /** Timeout in milliseconds. Defaults to 5 minutes. */\n timeoutMs?: number;\n /** Called with the login URL and session ID before the browser is opened */\n onLoginUrl?: (url: string, sessionId: string) => void;\n /** Called on each poll tick while waiting for authentication */\n onPollTick?: () => void;\n /** Called when the browser failed to open automatically */\n onBrowserOpenFailed?: (url: string) => void;\n /** AbortSignal to cancel the login flow */\n signal?: AbortSignal;\n}\n\nexport interface BrowserLoginResult {\n user: User;\n cliDid: string;\n}\n\nexport interface AuthStatusResult {\n authenticated: boolean;\n address?: string;\n userDid?: string;\n chainId?: number;\n cliDid: string;\n authenticatedAt?: Date;\n baseUrl: string;\n}\n\ninterface PendingSessionResponse {\n sessionId: string;\n status: \"pending\";\n}\n\ninterface ReadySessionResponse {\n sessionId: string;\n status: \"ready\";\n address: string;\n chainId: number;\n did: string;\n credentialId: string;\n userDocumentId: string;\n}\n\ntype SessionResponse = PendingSessionResponse | ReadySessionResponse;\n\nfunction abortReason(signal: AbortSignal): Error {\n if (signal.reason instanceof Error) return signal.reason;\n if (signal.reason) return new Error(String(signal.reason));\n return new DOMException(\"Aborted\", \"AbortError\");\n}\n\nfunction sleep(ms: number, signal?: AbortSignal): Promise<void> {\n return new Promise((resolve, reject) => {\n if (signal?.aborted) {\n reject(abortReason(signal));\n return;\n }\n const onAbort = () => {\n clearTimeout(timer);\n reject(abortReason(signal!));\n };\n const timer = setTimeout(() => {\n signal?.removeEventListener(\"abort\", onAbort);\n resolve();\n }, ms);\n signal?.addEventListener(\"abort\", onAbort, { once: true });\n });\n}\n\n/**\n * Open a URL in the default browser (cross-platform).\n */\nexport async function openBrowser(url: string): Promise<void> {\n const { execFile } = await import(\"node:child_process\");\n const { promisify } = await import(\"node:util\");\n const execFileAsync = promisify(execFile);\n const platform = process.platform;\n\n if (platform === \"darwin\") {\n await execFileAsync(\"open\", [url]);\n } else if (platform === \"win32\") {\n await execFileAsync(\"cmd\", [\"/c\", \"start\", \"\", url]);\n } else {\n await execFileAsync(\"xdg-open\", [url]);\n }\n}\n\nasync function pollSession(\n renownUrl: string,\n sessionId: string,\n timeoutMs: number,\n onPollTick?: () => void,\n signal?: AbortSignal,\n): Promise<ReadySessionResponse | null> {\n const startTime = Date.now();\n const sessionUrl = new URL(\n `/api/console/session/${sessionId}`,\n renownUrl,\n ).toString();\n\n while (Date.now() - startTime < timeoutMs) {\n signal?.throwIfAborted();\n try {\n const response = await fetch(sessionUrl, { signal });\n if (response.ok) {\n const data = (await response.json()) as SessionResponse;\n if (data.status === \"ready\") {\n return data;\n }\n }\n } catch (error) {\n if (error instanceof DOMException && error.name === \"AbortError\")\n throw error;\n // Network error, will retry\n }\n onPollTick?.();\n await sleep(POLL_INTERVAL_MS, signal);\n }\n\n return null;\n}\n\n/**\n * Perform a browser-based login flow with Renown.\n * Opens the user's browser to authenticate, then polls for completion.\n * Throws if already authenticated or if the flow times out.\n * If the browser fails to open, the flow continues polling — callers\n * can use onBrowserOpenFailed to show the URL as a fallback.\n */\nexport async function browserLogin(\n renown: IRenown,\n options: BrowserLoginOptions,\n): Promise<BrowserLoginResult> {\n if (renown.user?.credential) {\n throw new Error(\n `Already authenticated as ${renown.user.address}. Logout first.`,\n );\n }\n\n const timeoutMs = options.timeoutMs ?? DEFAULT_TIMEOUT_MS;\n const sessionId = crypto.randomUUID();\n\n const loginUrl = new URL(\"/console\", options.renownUrl);\n loginUrl.searchParams.set(\"session\", sessionId);\n loginUrl.searchParams.set(\"connect\", renown.did);\n loginUrl.searchParams.set(\"app\", renown.did);\n\n const url = loginUrl.toString();\n options.onLoginUrl?.(url, sessionId);\n\n try {\n await openBrowser(url);\n } catch {\n options.onBrowserOpenFailed?.(url);\n }\n\n const result = await pollSession(\n options.renownUrl,\n sessionId,\n timeoutMs,\n options.onPollTick,\n options.signal,\n );\n\n if (!result) {\n throw new Error(\"Authentication timed out.\");\n }\n\n const user = await renown.login(result.did);\n return { user, cliDid: renown.did };\n}\n\n/**\n * Get the current authentication status from a Renown instance.\n */\nexport function getAuthStatus(renown: IRenown): AuthStatusResult {\n const user = renown.user;\n const credential = user?.credential;\n\n return {\n authenticated: !!credential,\n address: user?.address,\n userDid: user?.did,\n chainId: user?.chainId,\n cliDid: renown.did,\n authenticatedAt: credential ? new Date(credential.issuanceDate) : undefined,\n baseUrl: renown.baseUrl,\n };\n}\n\nexport interface AccessTokenResult {\n token: string;\n did: string;\n address: string;\n expiresIn: number;\n}\n\n/**\n * Generate a bearer token for API authentication.\n * Requires the user to be authenticated (via browserLogin or equivalent).\n * Throws if not authenticated.\n */\nexport async function generateAccessToken(\n renown: IRenown,\n options?: CreateBearerTokenOptions,\n): Promise<AccessTokenResult> {\n const user = renown.user;\n if (!user?.credential) {\n throw new Error(\n \"Not authenticated. Login first to generate access tokens.\",\n );\n }\n\n const token = await renown.getBearerToken(options ?? {});\n\n return {\n token,\n did: renown.did,\n address: user.address,\n expiresIn: options?.expiresIn ?? 0,\n };\n}\n\n/**\n * Parse a human-readable expiry string to seconds.\n * Supports formats: \"7d\" (days), \"24h\" (hours), \"3600\" (seconds), \"3600s\" (seconds).\n * Only accepts positive integers — decimals like \"1.5h\" are rejected.\n */\nexport function parseExpiry(expiry: string): number {\n const trimmed = expiry.trim().toLowerCase();\n const match = trimmed.match(/^(\\d+)(d|h|s)?$/);\n\n if (!match) {\n throw new Error(\n `Invalid expiry format: ${expiry}. Expected a positive integer with optional suffix: \"7d\", \"24h\", \"3600s\", or \"3600\".`,\n );\n }\n\n const value = Number(match[1]);\n const unit = match[2];\n\n if (value <= 0) {\n throw new Error(\n `Invalid expiry format: ${expiry}. Value must be a positive integer.`,\n );\n }\n\n switch (unit) {\n case \"d\":\n return value * SECONDS_IN_DAY;\n case \"h\":\n return value * 60 * 60;\n default:\n return value;\n }\n}\n\n/**\n * Format an expiry duration in seconds to a human-readable string.\n */\nexport function formatExpiry(expiresIn: number): string {\n const days = Math.floor(expiresIn / SECONDS_IN_DAY);\n const hours = Math.floor((expiresIn % SECONDS_IN_DAY) / 3600);\n\n if (days > 0) {\n const dayStr = `${days} day${days !== 1 ? \"s\" : \"\"}`;\n if (hours > 0) {\n return `${dayStr} and ${hours} hour${hours !== 1 ? \"s\" : \"\"}`;\n }\n return dayStr;\n }\n\n if (hours > 0) {\n return `${hours} hour${hours !== 1 ? \"s\" : \"\"}`;\n }\n\n return `${expiresIn} second${expiresIn !== 1 ? \"s\" : \"\"}`;\n}\n"],"mappings":";;;;;AAWA,MAAa,yBAAyB;AACtC,MAAa,uBAAuB;;;;;;;AAQpC,IAAa,iBAAb,MAA6D;CAC3D;CACA;CACA;CAEA,OAAgB,uBAAuB;CACvC,OAAgB,yBAAyB;CAEzC,YACE,UACA,UAAqD,EAAE,EACvD;AACA,QAAA,WAAiB,YAAY,KAAK,QAAQ,KAAK,EAAA,oBAAuB;AACtE,QAAA,aAAmB,QAAQ,cAAA;AAC3B,QAAA,SAAe,QAAQ;EAGvB,MAAM,MAAM,QAAQ,MAAA,SAAe;AACnC,MAAI,CAAC,WAAW,IAAI,CAClB,WAAU,KAAK,EAAE,WAAW,MAAM,CAAC;;CAIvC,cAA+C;EAE7C,MAAM,SAAS,QAAQ,IAAI,MAAA;AAC3B,MAAI,OACF,KAAI;GACF,MAAM,cAAc,KAAK,MAAM,OAAO;GACtC,MAAM,UAAsB,MAAA,aAAmB,YAAY;AAG3D,SAAA,QAAc,MAAM,2CAA2C;AAC/D,UAAO,QAAQ,QAAQ,QAAQ;WACxB,GAAG;AACV,SAAM,IAAI,MACR,mBAAmB,MAAA,WAAiB,IAAI,aAAa,QAAQ,EAAE,UAAU,OAAO,EAAE,IAClF,EACE,OAAO,GACR,CACF;;AAKL,SAAO,QAAQ,QAAQ,MAAA,cAAoB,CAAC;;CAG9C,MAAM,YAAY,SAAoC;AAEpD,MAAI,QAAQ,IAAI,MAAA,YACd;AAIF,QAAA,WAAiB,QAAQ;AACzB,SAAO,QAAQ,SAAS;;CAG1B,gBAA+B;AAC7B,MAAI,QAAQ,IAAI,MAAA,YACd,QAAO,QAAQ,IAAI,MAAA;AAErB,MAAI,WAAW,MAAA,SAAe,CAC5B,YAAW,MAAA,SAAe;AAE5B,SAAO,QAAQ,SAAS;;CAG1B,gBAAwC;AACtC,MAAI;AACF,OAAI,CAAC,WAAW,MAAA,SAAe,CAC7B;GAEF,MAAM,OAAO,aAAa,MAAA,UAAgB,QAAQ;GAClD,MAAM,SAAS,KAAK,MAAM,KAAK;GAC/B,MAAM,UAAsB,MAAA,aAAmB,OAAO;AACtD,SAAA,QAAc,MAAM,uBAAuB,MAAA,WAAiB;AAC5D,UAAO;WACA,GAAG;AACV,SAAM,IAAI,MACR,mBAAmB,MAAA,SAAe,IAAI,aAAa,QAAQ,EAAE,UAAU,OAAO,EAAE,IAChF,EACE,OAAO,GACR,CACF;;;CAIL,YAAY,SAA2B;EACrC,MAAM,OAAO,EAAE,SAAS;AACxB,gBAAc,MAAA,UAAgB,KAAK,UAAU,MAAM,MAAM,EAAE,EAAE,QAAQ;AACrE,QAAA,QAAc,MAAM,oBAAoB,MAAA,WAAiB;;CAG3D,cAAc,MAA2B;AACvC,MAAI,OAAO,SAAS,SAClB,OAAM,IAAI,MAAM,4BAA4B,KAAK,UAAU,KAAK,CAAC;EAGnE,MAAM,SAAS;EACf,IAAI;AACJ,MAAI,aAAa,OACf,WAAU,OAAO;MAEjB,WAAU;AAGZ,MAAI,eAAe,WAAW,gBAAgB,QAC5C,QAAO;MAEP,OAAM,IAAI,MAAM,4BAA4B,KAAK,UAAU,KAAK,CAAC;;;;;AChIvE,IAAa,mBAAb,MAEmC;CACjC,WAAW,IAAI,cAAc;CAE7B,cAAc;AACZ,QAAA,QAAc,gBAAgB,EAAE;;CAGlC,GACE,OACA,UACY;AACZ,QAAA,QAAc,GAAG,OAAiB,SAAS;AAC3C,eAAa;AACX,SAAA,QAAc,eAAe,MAAM,UAAU,EAAE,SAAS;;;CAI5D,KAA6B,OAAU,MAAuB;AAC5D,QAAA,QAAc,KAAK,MAAM,UAAU,EAAE,KAAK;;;;;ACnB9C,IAAa,cAAb,cAEU,YAAe;CACvB;CAEA,YAAY,UAAkB;AAC5B,SAAO;AACP,OAAK,WAAW;AAGhB,YADqB,QAAQ,KAAK,SAAS,EACnB,EAAE,WAAW,MAAM,CAAC;AAE5C,MAAI,CAAC,WAAW,KAAK,SAAS,CAC5B,eAAc,KAAK,UAAU,KAAK,UAAU,EAAE,CAAC,CAAC;;CAIpD,WAAsB;EACpB,MAAM,OAAO,aAAa,KAAK,UAAU,QAAQ;AACjD,SAAO,KAAK,MAAM,KAAK;;CAGzB,UAAkB,MAAe;AAC/B,gBAAc,KAAK,UAAU,KAAK,UAAU,MAAM,MAAM,EAAE,CAAC;;CAG7D,IAAyB,KAA8B;AAErD,SADa,KAAK,UAAU,CAChB;;CAGd,IAAyB,KAAU,OAAsB;EACvD,MAAM,OAAO,KAAK,UAAU;AAC5B,MAAI,UAAU,KAAA,EACZ,QAAO,KAAK;MAEZ,MAAK,OAAO;AAEd,OAAK,UAAU,KAAK;;CAGtB,OAAO,KAAoB;EACzB,MAAM,OAAO,KAAK,UAAU;AAC5B,SAAO,KAAK;AACZ,OAAK,UAAU,KAAK;;;;;AC1CxB,IAAa,yBAAb,cAA4C,iBAA+B;AAC3E,IAAa,oBAAb,cAAuC,YAA8B;AAErE,MAAa,8BAA8B;;;;;AAe3C,IAAa,gBAAb,cAAmC,kBAAkB;;;;;CAKnD,YAAY,SAAiB,UAAoC,EAAE,EAAE;AACnE,QAAM,QAAQ;EAEd,MAAM,EACJ,cAAc,6BACd,SACA,YACE;AAEJ,OAAK,mBAAmB,IAAI,eAAe,QAAQ,CAAC;AACpD,OAAK,YAAY,IAAI,kBAAkB,YAAY,CAAC;AACpD,OAAK,iBAAiB,IAAI,wBAAwB,CAAC;AACnD,MAAI,QACF,MAAK,YAAY,QAAQ;;;;;ACxC/B,MAAM,qBAAqB,MAAS;AACpC,MAAM,mBAAmB;AACzB,MAAM,iBAAiB,OAAU;AAiDjC,SAAS,YAAY,QAA4B;AAC/C,KAAI,OAAO,kBAAkB,MAAO,QAAO,OAAO;AAClD,KAAI,OAAO,OAAQ,QAAO,IAAI,MAAM,OAAO,OAAO,OAAO,CAAC;AAC1D,QAAO,IAAI,aAAa,WAAW,aAAa;;AAGlD,SAAS,MAAM,IAAY,QAAqC;AAC9D,QAAO,IAAI,SAAS,SAAS,WAAW;AACtC,MAAI,QAAQ,SAAS;AACnB,UAAO,YAAY,OAAO,CAAC;AAC3B;;EAEF,MAAM,gBAAgB;AACpB,gBAAa,MAAM;AACnB,UAAO,YAAY,OAAQ,CAAC;;EAE9B,MAAM,QAAQ,iBAAiB;AAC7B,WAAQ,oBAAoB,SAAS,QAAQ;AAC7C,YAAS;KACR,GAAG;AACN,UAAQ,iBAAiB,SAAS,SAAS,EAAE,MAAM,MAAM,CAAC;GAC1D;;;;;AAMJ,eAAsB,YAAY,KAA4B;CAC5D,MAAM,EAAE,aAAa,MAAM,OAAO;CAClC,MAAM,EAAE,cAAc,MAAM,OAAO;CACnC,MAAM,gBAAgB,UAAU,SAAS;CACzC,MAAM,WAAW,QAAQ;AAEzB,KAAI,aAAa,SACf,OAAM,cAAc,QAAQ,CAAC,IAAI,CAAC;UACzB,aAAa,QACtB,OAAM,cAAc,OAAO;EAAC;EAAM;EAAS;EAAI;EAAI,CAAC;KAEpD,OAAM,cAAc,YAAY,CAAC,IAAI,CAAC;;AAI1C,eAAe,YACb,WACA,WACA,WACA,YACA,QACsC;CACtC,MAAM,YAAY,KAAK,KAAK;CAC5B,MAAM,aAAa,IAAI,IACrB,wBAAwB,aACxB,UACD,CAAC,UAAU;AAEZ,QAAO,KAAK,KAAK,GAAG,YAAY,WAAW;AACzC,UAAQ,gBAAgB;AACxB,MAAI;GACF,MAAM,WAAW,MAAM,MAAM,YAAY,EAAE,QAAQ,CAAC;AACpD,OAAI,SAAS,IAAI;IACf,MAAM,OAAQ,MAAM,SAAS,MAAM;AACnC,QAAI,KAAK,WAAW,QAClB,QAAO;;WAGJ,OAAO;AACd,OAAI,iBAAiB,gBAAgB,MAAM,SAAS,aAClD,OAAM;;AAGV,gBAAc;AACd,QAAM,MAAM,kBAAkB,OAAO;;AAGvC,QAAO;;;;;;;;;AAUT,eAAsB,aACpB,QACA,SAC6B;AAC7B,KAAI,OAAO,MAAM,WACf,OAAM,IAAI,MACR,4BAA4B,OAAO,KAAK,QAAQ,iBACjD;CAGH,MAAM,YAAY,QAAQ,aAAa;CACvC,MAAM,YAAY,OAAO,YAAY;CAErC,MAAM,WAAW,IAAI,IAAI,YAAY,QAAQ,UAAU;AACvD,UAAS,aAAa,IAAI,WAAW,UAAU;AAC/C,UAAS,aAAa,IAAI,WAAW,OAAO,IAAI;AAChD,UAAS,aAAa,IAAI,OAAO,OAAO,IAAI;CAE5C,MAAM,MAAM,SAAS,UAAU;AAC/B,SAAQ,aAAa,KAAK,UAAU;AAEpC,KAAI;AACF,QAAM,YAAY,IAAI;SAChB;AACN,UAAQ,sBAAsB,IAAI;;CAGpC,MAAM,SAAS,MAAM,YACnB,QAAQ,WACR,WACA,WACA,QAAQ,YACR,QAAQ,OACT;AAED,KAAI,CAAC,OACH,OAAM,IAAI,MAAM,4BAA4B;AAI9C,QAAO;EAAE,MADI,MAAM,OAAO,MAAM,OAAO,IAAI;EAC5B,QAAQ,OAAO;EAAK;;;;;AAMrC,SAAgB,cAAc,QAAmC;CAC/D,MAAM,OAAO,OAAO;CACpB,MAAM,aAAa,MAAM;AAEzB,QAAO;EACL,eAAe,CAAC,CAAC;EACjB,SAAS,MAAM;EACf,SAAS,MAAM;EACf,SAAS,MAAM;EACf,QAAQ,OAAO;EACf,iBAAiB,aAAa,IAAI,KAAK,WAAW,aAAa,GAAG,KAAA;EAClE,SAAS,OAAO;EACjB;;;;;;;AAeH,eAAsB,oBACpB,QACA,SAC4B;CAC5B,MAAM,OAAO,OAAO;AACpB,KAAI,CAAC,MAAM,WACT,OAAM,IAAI,MACR,4DACD;AAKH,QAAO;EACL,OAHY,MAAM,OAAO,eAAe,WAAW,EAAE,CAAC;EAItD,KAAK,OAAO;EACZ,SAAS,KAAK;EACd,WAAW,SAAS,aAAa;EAClC;;;;;;;AAQH,SAAgB,YAAY,QAAwB;CAElD,MAAM,QADU,OAAO,MAAM,CAAC,aAAa,CACrB,MAAM,kBAAkB;AAE9C,KAAI,CAAC,MACH,OAAM,IAAI,MACR,0BAA0B,OAAO,sFAClC;CAGH,MAAM,QAAQ,OAAO,MAAM,GAAG;CAC9B,MAAM,OAAO,MAAM;AAEnB,KAAI,SAAS,EACX,OAAM,IAAI,MACR,0BAA0B,OAAO,qCAClC;AAGH,SAAQ,MAAR;EACE,KAAK,IACH,QAAO,QAAQ;EACjB,KAAK,IACH,QAAO,QAAQ,KAAK;EACtB,QACE,QAAO;;;;;;AAOb,SAAgB,aAAa,WAA2B;CACtD,MAAM,OAAO,KAAK,MAAM,YAAY,eAAe;CACnD,MAAM,QAAQ,KAAK,MAAO,YAAY,iBAAkB,KAAK;AAE7D,KAAI,OAAO,GAAG;EACZ,MAAM,SAAS,GAAG,KAAK,MAAM,SAAS,IAAI,MAAM;AAChD,MAAI,QAAQ,EACV,QAAO,GAAG,OAAO,OAAO,MAAM,OAAO,UAAU,IAAI,MAAM;AAE3D,SAAO;;AAGT,KAAI,QAAQ,EACV,QAAO,GAAG,MAAM,OAAO,UAAU,IAAI,MAAM;AAG7C,QAAO,GAAG,UAAU,SAAS,cAAc,IAAI,MAAM"}