@solana/web3.js 2.0.0-experimental.a7f0f86 → 2.0.0-experimental.a8f1f88

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -12,8 +12,8 @@ this.globalThis.solanaWeb3 = (function (exports) {
12
12
  var __esm = (fn, res) => function __init() {
13
13
  return fn && (res = (0, fn[__getOwnPropNames(fn)[0]])(fn = 0)), res;
14
14
  };
15
- var __commonJS = (cb, mod) => function __require() {
16
- return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
15
+ var __commonJS = (cb, mod2) => function __require() {
16
+ return mod2 || (0, cb[__getOwnPropNames(cb)[0]])((mod2 = { exports: {} }).exports, mod2), mod2.exports;
17
17
  };
18
18
  var __copyProps = (to, from, except, desc) => {
19
19
  if (from && typeof from === "object" || typeof from === "function") {
@@ -23,13 +23,13 @@ this.globalThis.solanaWeb3 = (function (exports) {
23
23
  }
24
24
  return to;
25
25
  };
26
- var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__getProtoOf(mod)) : {}, __copyProps(
26
+ var __toESM = (mod2, isNodeMode, target) => (target = mod2 != null ? __create(__getProtoOf(mod2)) : {}, __copyProps(
27
27
  // If the importer is in node compatibility mode or this is not an ESM
28
28
  // file that has been converted to a CommonJS file using a Babel-
29
29
  // compatible transform (i.e. "__esModule" has not been set), then set
30
30
  // "default" to the CommonJS "module.exports" for node compatibility.
31
- isNodeMode || !mod || !mod.__esModule ? __defProp(target, "default", { value: mod, enumerable: true }) : target,
32
- mod
31
+ isNodeMode || !mod2 || !mod2.__esModule ? __defProp(target, "default", { value: mod2, enumerable: true }) : target,
32
+ mod2
33
33
  ));
34
34
  var __publicField = (obj, key, value) => {
35
35
  __defNormalProp(obj, typeof key !== "symbol" ? key + "" : key, value);
@@ -122,53 +122,16 @@ this.globalThis.solanaWeb3 = (function (exports) {
122
122
  // src/index.ts
123
123
  init_env_shim();
124
124
 
125
- // ../instructions/dist/index.browser.js
126
- init_env_shim();
127
- var AccountRole = /* @__PURE__ */ ((AccountRole2) => {
128
- AccountRole2[AccountRole2["WRITABLE_SIGNER"] = /* 3 */
129
- 3] = "WRITABLE_SIGNER";
130
- AccountRole2[AccountRole2["READONLY_SIGNER"] = /* 2 */
131
- 2] = "READONLY_SIGNER";
132
- AccountRole2[AccountRole2["WRITABLE"] = /* 1 */
133
- 1] = "WRITABLE";
134
- AccountRole2[AccountRole2["READONLY"] = /* 0 */
135
- 0] = "READONLY";
136
- return AccountRole2;
137
- })(AccountRole || {});
138
- var IS_SIGNER_BITMASK = 2;
139
- var IS_WRITABLE_BITMASK = 1;
140
- function downgradeRoleToNonSigner(role) {
141
- return role & ~IS_SIGNER_BITMASK;
142
- }
143
- function downgradeRoleToReadonly(role) {
144
- return role & ~IS_WRITABLE_BITMASK;
145
- }
146
- function isSignerRole(role) {
147
- return role >= 2;
148
- }
149
- function isWritableRole(role) {
150
- return (role & IS_WRITABLE_BITMASK) !== 0;
151
- }
152
- function mergeRoles(roleA, roleB) {
153
- return roleA | roleB;
154
- }
155
- function upgradeRoleToSigner(role) {
156
- return role | IS_SIGNER_BITMASK;
157
- }
158
- function upgradeRoleToWritable(role) {
159
- return role | IS_WRITABLE_BITMASK;
160
- }
161
-
162
- // ../keys/dist/index.browser.js
125
+ // ../addresses/dist/index.browser.js
163
126
  init_env_shim();
164
127
 
165
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.2/node_modules/@metaplex-foundation/umi-serializers/dist/esm/index.mjs
128
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/index.mjs
166
129
  init_env_shim();
167
130
 
168
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.2/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/index.mjs
131
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.9/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/index.mjs
169
132
  init_env_shim();
170
133
 
171
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.2/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/bytes.mjs
134
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.9/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/bytes.mjs
172
135
  init_env_shim();
173
136
  var mergeBytes = (bytesArr) => {
174
137
  const totalLength = bytesArr.reduce((total, arr) => total + arr.length, 0);
@@ -180,16 +143,16 @@ this.globalThis.solanaWeb3 = (function (exports) {
180
143
  });
181
144
  return result;
182
145
  };
183
- var padBytes = (bytes, length) => {
184
- if (bytes.length >= length)
185
- return bytes;
146
+ var padBytes = (bytes2, length) => {
147
+ if (bytes2.length >= length)
148
+ return bytes2;
186
149
  const paddedBytes = new Uint8Array(length).fill(0);
187
- paddedBytes.set(bytes);
150
+ paddedBytes.set(bytes2);
188
151
  return paddedBytes;
189
152
  };
190
- var fixBytes = (bytes, length) => padBytes(bytes.slice(0, length), length);
153
+ var fixBytes = (bytes2, length) => padBytes(bytes2.slice(0, length), length);
191
154
 
192
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.2/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/errors.mjs
155
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.9/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/errors.mjs
193
156
  init_env_shim();
194
157
  var DeserializingEmptyBufferError = class extends Error {
195
158
  constructor(serializer) {
@@ -203,8 +166,15 @@ this.globalThis.solanaWeb3 = (function (exports) {
203
166
  __publicField(this, "name", "NotEnoughBytesError");
204
167
  }
205
168
  };
169
+ var ExpectedFixedSizeSerializerError = class extends Error {
170
+ constructor(message) {
171
+ message ?? (message = "Expected a fixed-size serializer, got a variable-size one.");
172
+ super(message);
173
+ __publicField(this, "name", "ExpectedFixedSizeSerializerError");
174
+ }
175
+ };
206
176
 
207
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.2/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/fixSerializer.mjs
177
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.9/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/fixSerializer.mjs
208
178
  init_env_shim();
209
179
  function fixSerializer(serializer, fixedBytes, description) {
210
180
  return {
@@ -226,13 +196,28 @@ this.globalThis.solanaWeb3 = (function (exports) {
226
196
  };
227
197
  }
228
198
 
229
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/index.mjs
199
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-core@0.8.9/node_modules/@metaplex-foundation/umi-serializers-core/dist/esm/mapSerializer.mjs
200
+ init_env_shim();
201
+ function mapSerializer(serializer, unmap, map) {
202
+ return {
203
+ description: serializer.description,
204
+ fixedSize: serializer.fixedSize,
205
+ maxSize: serializer.maxSize,
206
+ serialize: (value) => serializer.serialize(unmap(value)),
207
+ deserialize: (buffer, offset = 0) => {
208
+ const [value, length] = serializer.deserialize(buffer, offset);
209
+ return map ? [map(value, buffer, offset), length] : [value, length];
210
+ }
211
+ };
212
+ }
213
+
214
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/index.mjs
230
215
  init_env_shim();
231
216
 
232
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/baseX.mjs
217
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/baseX.mjs
233
218
  init_env_shim();
234
219
 
235
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/errors.mjs
220
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/errors.mjs
236
221
  init_env_shim();
237
222
  var InvalidBaseStringError = class extends Error {
238
223
  constructor(value, base, cause) {
@@ -243,7 +228,7 @@ this.globalThis.solanaWeb3 = (function (exports) {
243
228
  }
244
229
  };
245
230
 
246
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/baseX.mjs
231
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/baseX.mjs
247
232
  var baseX = (alphabet) => {
248
233
  const base = alphabet.length;
249
234
  const baseBigInt = BigInt(base);
@@ -280,13 +265,13 @@ this.globalThis.solanaWeb3 = (function (exports) {
280
265
  deserialize(buffer, offset = 0) {
281
266
  if (buffer.length === 0)
282
267
  return ["", 0];
283
- const bytes = buffer.slice(offset);
284
- let trailIndex = bytes.findIndex((n) => n !== 0);
285
- trailIndex = trailIndex === -1 ? bytes.length : trailIndex;
268
+ const bytes2 = buffer.slice(offset);
269
+ let trailIndex = bytes2.findIndex((n) => n !== 0);
270
+ trailIndex = trailIndex === -1 ? bytes2.length : trailIndex;
286
271
  const leadingZeroes = alphabet[0].repeat(trailIndex);
287
- if (trailIndex === bytes.length)
272
+ if (trailIndex === bytes2.length)
288
273
  return [leadingZeroes, buffer.length];
289
- let base10Number = bytes.slice(trailIndex).reduce((sum, byte) => sum * 256n + BigInt(byte), 0n);
274
+ let base10Number = bytes2.slice(trailIndex).reduce((sum, byte) => sum * 256n + BigInt(byte), 0n);
290
275
  const tailChars = [];
291
276
  while (base10Number > 0n) {
292
277
  tailChars.unshift(alphabet[Number(base10Number % baseBigInt)]);
@@ -297,18 +282,18 @@ this.globalThis.solanaWeb3 = (function (exports) {
297
282
  };
298
283
  };
299
284
 
300
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/base58.mjs
285
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/base58.mjs
301
286
  init_env_shim();
302
287
  var base58 = baseX("123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz");
303
288
 
304
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/nullCharacters.mjs
289
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/nullCharacters.mjs
305
290
  init_env_shim();
306
291
  var removeNullCharacters = (value) => (
307
292
  // eslint-disable-next-line no-control-regex
308
293
  value.replace(/\u0000/g, "")
309
294
  );
310
295
 
311
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.2/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/utf8.mjs
296
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-encodings@0.8.9/node_modules/@metaplex-foundation/umi-serializers-encodings/dist/esm/utf8.mjs
312
297
  init_env_shim();
313
298
  var utf8 = {
314
299
  description: "utf8",
@@ -323,10 +308,10 @@ this.globalThis.solanaWeb3 = (function (exports) {
323
308
  }
324
309
  };
325
310
 
326
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.2/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/index.mjs
311
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/index.mjs
327
312
  init_env_shim();
328
313
 
329
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.2/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/common.mjs
314
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/common.mjs
330
315
  init_env_shim();
331
316
  var Endian;
332
317
  (function(Endian2) {
@@ -334,7 +319,7 @@ this.globalThis.solanaWeb3 = (function (exports) {
334
319
  Endian2["Big"] = "be";
335
320
  })(Endian || (Endian = {}));
336
321
 
337
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.2/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/errors.mjs
322
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/errors.mjs
338
323
  init_env_shim();
339
324
  var NumberOutOfRangeError = class extends RangeError {
340
325
  constructor(serializer, min, max, actual) {
@@ -343,7 +328,7 @@ this.globalThis.solanaWeb3 = (function (exports) {
343
328
  }
344
329
  };
345
330
 
346
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.2/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/utils.mjs
331
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/utils.mjs
347
332
  init_env_shim();
348
333
  function numberFactory(input) {
349
334
  let littleEndian;
@@ -364,31 +349,42 @@ this.globalThis.solanaWeb3 = (function (exports) {
364
349
  input.set(new DataView(buffer), value, littleEndian);
365
350
  return new Uint8Array(buffer);
366
351
  },
367
- deserialize(bytes, offset = 0) {
368
- const slice = bytes.slice(offset, offset + input.size);
352
+ deserialize(bytes2, offset = 0) {
353
+ const slice = bytes2.slice(offset, offset + input.size);
369
354
  assertEnoughBytes("i8", slice, input.size);
370
355
  const view = toDataView(slice);
371
356
  return [input.get(view, littleEndian), offset + input.size];
372
357
  }
373
358
  };
374
359
  }
375
- var toArrayBuffer = (array) => array.buffer.slice(array.byteOffset, array.byteLength + array.byteOffset);
376
- var toDataView = (array) => new DataView(toArrayBuffer(array));
360
+ var toArrayBuffer = (array2) => array2.buffer.slice(array2.byteOffset, array2.byteLength + array2.byteOffset);
361
+ var toDataView = (array2) => new DataView(toArrayBuffer(array2));
377
362
  var assertRange = (serializer, min, max, value) => {
378
363
  if (value < min || value > max) {
379
364
  throw new NumberOutOfRangeError(serializer, min, max, value);
380
365
  }
381
366
  };
382
- var assertEnoughBytes = (serializer, bytes, expected) => {
383
- if (bytes.length === 0) {
367
+ var assertEnoughBytes = (serializer, bytes2, expected) => {
368
+ if (bytes2.length === 0) {
384
369
  throw new DeserializingEmptyBufferError(serializer);
385
370
  }
386
- if (bytes.length < expected) {
387
- throw new NotEnoughBytesError(serializer, expected, bytes.length);
371
+ if (bytes2.length < expected) {
372
+ throw new NotEnoughBytesError(serializer, expected, bytes2.length);
388
373
  }
389
374
  };
390
375
 
391
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.2/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/u32.mjs
376
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/u8.mjs
377
+ init_env_shim();
378
+ var u8 = (options = {}) => numberFactory({
379
+ name: "u8",
380
+ size: 1,
381
+ range: [0, Number("0xff")],
382
+ set: (view, value) => view.setUint8(0, Number(value)),
383
+ get: (view) => view.getUint8(0),
384
+ options
385
+ });
386
+
387
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/u32.mjs
392
388
  init_env_shim();
393
389
  var u32 = (options = {}) => numberFactory({
394
390
  name: "u32",
@@ -399,13 +395,195 @@ this.globalThis.solanaWeb3 = (function (exports) {
399
395
  options
400
396
  });
401
397
 
402
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.2/node_modules/@metaplex-foundation/umi-serializers/dist/esm/utils.mjs
398
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers-numbers@0.8.9/node_modules/@metaplex-foundation/umi-serializers-numbers/dist/esm/shortU16.mjs
399
+ init_env_shim();
400
+ var shortU16 = (options = {}) => ({
401
+ description: options.description ?? "shortU16",
402
+ fixedSize: null,
403
+ maxSize: 3,
404
+ serialize: (value) => {
405
+ assertRange("shortU16", 0, 65535, value);
406
+ const bytes2 = [0];
407
+ for (let ii = 0; ; ii += 1) {
408
+ const alignedValue = value >> ii * 7;
409
+ if (alignedValue === 0) {
410
+ break;
411
+ }
412
+ const nextSevenBits = 127 & alignedValue;
413
+ bytes2[ii] = nextSevenBits;
414
+ if (ii > 0) {
415
+ bytes2[ii - 1] |= 128;
416
+ }
417
+ }
418
+ return new Uint8Array(bytes2);
419
+ },
420
+ deserialize: (bytes2, offset = 0) => {
421
+ let value = 0;
422
+ let byteCount = 0;
423
+ while (++byteCount) {
424
+ const byteIndex = byteCount - 1;
425
+ const currentByte = bytes2[offset + byteIndex];
426
+ const nextSevenBits = 127 & currentByte;
427
+ value |= nextSevenBits << byteIndex * 7;
428
+ if ((currentByte & 128) === 0) {
429
+ break;
430
+ }
431
+ }
432
+ return [value, offset + byteCount];
433
+ }
434
+ });
435
+
436
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/array.mjs
437
+ init_env_shim();
438
+
439
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/errors.mjs
440
+ init_env_shim();
441
+ var InvalidNumberOfItemsError = class extends Error {
442
+ constructor(serializer, expected, actual) {
443
+ super(`Expected [${serializer}] to have ${expected} items, got ${actual}.`);
444
+ __publicField(this, "name", "InvalidNumberOfItemsError");
445
+ }
446
+ };
447
+ var InvalidArrayLikeRemainderSizeError = class extends Error {
448
+ constructor(remainderSize, itemSize) {
449
+ super(`The remainder of the buffer (${remainderSize} bytes) cannot be split into chunks of ${itemSize} bytes. Serializers of "remainder" size must have a remainder that is a multiple of its item size. In other words, ${remainderSize} modulo ${itemSize} should be equal to zero.`);
450
+ __publicField(this, "name", "InvalidArrayLikeRemainderSizeError");
451
+ }
452
+ };
453
+ var UnrecognizedArrayLikeSerializerSizeError = class extends Error {
454
+ constructor(size) {
455
+ super(`Unrecognized array-like serializer size: ${JSON.stringify(size)}`);
456
+ __publicField(this, "name", "UnrecognizedArrayLikeSerializerSizeError");
457
+ }
458
+ };
459
+
460
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/utils.mjs
461
+ init_env_shim();
462
+
463
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/sumSerializerSizes.mjs
403
464
  init_env_shim();
465
+ function sumSerializerSizes(sizes) {
466
+ return sizes.reduce((all, size) => all === null || size === null ? null : all + size, 0);
467
+ }
468
+
469
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/utils.mjs
470
+ function getResolvedSize(size, childrenSizes, bytes2, offset) {
471
+ if (typeof size === "number") {
472
+ return [size, offset];
473
+ }
474
+ if (typeof size === "object") {
475
+ return size.deserialize(bytes2, offset);
476
+ }
477
+ if (size === "remainder") {
478
+ const childrenSize = sumSerializerSizes(childrenSizes);
479
+ if (childrenSize === null) {
480
+ throw new ExpectedFixedSizeSerializerError('Serializers of "remainder" size must have fixed-size items.');
481
+ }
482
+ const remainder = bytes2.slice(offset).length;
483
+ if (remainder % childrenSize !== 0) {
484
+ throw new InvalidArrayLikeRemainderSizeError(remainder, childrenSize);
485
+ }
486
+ return [remainder / childrenSize, offset];
487
+ }
488
+ throw new UnrecognizedArrayLikeSerializerSizeError(size);
489
+ }
404
490
  function getSizeDescription(size) {
405
491
  return typeof size === "object" ? size.description : `${size}`;
406
492
  }
493
+ function getSizeFromChildren(size, childrenSizes) {
494
+ if (typeof size !== "number")
495
+ return null;
496
+ if (size === 0)
497
+ return 0;
498
+ const childrenSize = sumSerializerSizes(childrenSizes);
499
+ return childrenSize === null ? null : childrenSize * size;
500
+ }
501
+ function getSizePrefix(size, realSize) {
502
+ return typeof size === "object" ? size.serialize(realSize) : new Uint8Array();
503
+ }
504
+
505
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/array.mjs
506
+ function array(item, options = {}) {
507
+ const size = options.size ?? u32();
508
+ if (size === "remainder" && item.fixedSize === null) {
509
+ throw new ExpectedFixedSizeSerializerError('Serializers of "remainder" size must have fixed-size items.');
510
+ }
511
+ return {
512
+ description: options.description ?? `array(${item.description}; ${getSizeDescription(size)})`,
513
+ fixedSize: getSizeFromChildren(size, [item.fixedSize]),
514
+ maxSize: getSizeFromChildren(size, [item.maxSize]),
515
+ serialize: (value) => {
516
+ if (typeof size === "number" && value.length !== size) {
517
+ throw new InvalidNumberOfItemsError("array", size, value.length);
518
+ }
519
+ return mergeBytes([getSizePrefix(size, value.length), ...value.map((v) => item.serialize(v))]);
520
+ },
521
+ deserialize: (bytes2, offset = 0) => {
522
+ if (typeof size === "object" && bytes2.slice(offset).length === 0) {
523
+ return [[], offset];
524
+ }
525
+ const [resolvedSize, newOffset] = getResolvedSize(size, [item.fixedSize], bytes2, offset);
526
+ offset = newOffset;
527
+ const values = [];
528
+ for (let i = 0; i < resolvedSize; i += 1) {
529
+ const [value, newOffset2] = item.deserialize(bytes2, offset);
530
+ values.push(value);
531
+ offset = newOffset2;
532
+ }
533
+ return [values, offset];
534
+ }
535
+ };
536
+ }
407
537
 
408
- // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.2/node_modules/@metaplex-foundation/umi-serializers/dist/esm/string.mjs
538
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/bytes.mjs
539
+ init_env_shim();
540
+ function bytes(options = {}) {
541
+ const size = options.size ?? "variable";
542
+ const description = options.description ?? `bytes(${getSizeDescription(size)})`;
543
+ const byteSerializer = {
544
+ description,
545
+ fixedSize: null,
546
+ maxSize: null,
547
+ serialize: (value) => new Uint8Array(value),
548
+ deserialize: (bytes2, offset = 0) => {
549
+ const slice = bytes2.slice(offset);
550
+ return [slice, offset + slice.length];
551
+ }
552
+ };
553
+ if (size === "variable") {
554
+ return byteSerializer;
555
+ }
556
+ if (typeof size === "number") {
557
+ return fixSerializer(byteSerializer, size, description);
558
+ }
559
+ return {
560
+ description,
561
+ fixedSize: null,
562
+ maxSize: null,
563
+ serialize: (value) => {
564
+ const contentBytes = byteSerializer.serialize(value);
565
+ const lengthBytes = size.serialize(contentBytes.length);
566
+ return mergeBytes([lengthBytes, contentBytes]);
567
+ },
568
+ deserialize: (buffer, offset = 0) => {
569
+ if (buffer.slice(offset).length === 0) {
570
+ throw new DeserializingEmptyBufferError("bytes");
571
+ }
572
+ const [lengthBigInt, lengthOffset] = size.deserialize(buffer, offset);
573
+ const length = Number(lengthBigInt);
574
+ offset = lengthOffset;
575
+ const contentBuffer = buffer.slice(offset, offset + length);
576
+ if (contentBuffer.length < length) {
577
+ throw new NotEnoughBytesError("bytes", length, contentBuffer.length);
578
+ }
579
+ const [value, contentOffset] = byteSerializer.deserialize(contentBuffer);
580
+ offset += contentOffset;
581
+ return [value, offset];
582
+ }
583
+ };
584
+ }
585
+
586
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/string.mjs
409
587
  init_env_shim();
410
588
  function string(options = {}) {
411
589
  const size = options.size ?? u32();
@@ -446,6 +624,97 @@ this.globalThis.solanaWeb3 = (function (exports) {
446
624
  }
447
625
  };
448
626
  }
627
+
628
+ // ../../node_modules/.pnpm/@metaplex-foundation+umi-serializers@0.8.9/node_modules/@metaplex-foundation/umi-serializers/dist/esm/struct.mjs
629
+ init_env_shim();
630
+ function struct(fields, options = {}) {
631
+ const fieldDescriptions = fields.map(([name, serializer]) => `${String(name)}: ${serializer.description}`).join(", ");
632
+ return {
633
+ description: options.description ?? `struct(${fieldDescriptions})`,
634
+ fixedSize: sumSerializerSizes(fields.map(([, field]) => field.fixedSize)),
635
+ maxSize: sumSerializerSizes(fields.map(([, field]) => field.maxSize)),
636
+ serialize: (struct2) => {
637
+ const fieldBytes = fields.map(([key, serializer]) => serializer.serialize(struct2[key]));
638
+ return mergeBytes(fieldBytes);
639
+ },
640
+ deserialize: (bytes2, offset = 0) => {
641
+ const struct2 = {};
642
+ fields.forEach(([key, serializer]) => {
643
+ const [value, newOffset] = serializer.deserialize(bytes2, offset);
644
+ offset = newOffset;
645
+ struct2[key] = value;
646
+ });
647
+ return [struct2, offset];
648
+ }
649
+ };
650
+ }
651
+
652
+ // ../assertions/dist/index.browser.js
653
+ init_env_shim();
654
+ function assertIsSecureContext() {
655
+ if (!globalThis.isSecureContext) {
656
+ throw new Error(
657
+ "Cryptographic operations are only allowed in secure browser contexts. Read more here: https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts"
658
+ );
659
+ }
660
+ }
661
+ var cachedEd25519Decision;
662
+ async function isEd25519CurveSupported(subtle) {
663
+ if (cachedEd25519Decision === void 0) {
664
+ cachedEd25519Decision = new Promise((resolve) => {
665
+ subtle.generateKey(
666
+ "Ed25519",
667
+ /* extractable */
668
+ false,
669
+ ["sign", "verify"]
670
+ ).catch(() => {
671
+ resolve(cachedEd25519Decision = false);
672
+ }).then(() => {
673
+ resolve(cachedEd25519Decision = true);
674
+ });
675
+ });
676
+ }
677
+ if (typeof cachedEd25519Decision === "boolean") {
678
+ return cachedEd25519Decision;
679
+ } else {
680
+ return await cachedEd25519Decision;
681
+ }
682
+ }
683
+ async function assertDigestCapabilityIsAvailable() {
684
+ assertIsSecureContext();
685
+ if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.digest !== "function") {
686
+ throw new Error("No digest implementation could be found");
687
+ }
688
+ }
689
+ async function assertKeyGenerationIsAvailable() {
690
+ assertIsSecureContext();
691
+ if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.generateKey !== "function") {
692
+ throw new Error("No key generation implementation could be found");
693
+ }
694
+ if (!await isEd25519CurveSupported(globalThis.crypto.subtle)) {
695
+ throw new Error(
696
+ "This runtime does not support the generation of Ed25519 key pairs.\n\nInstall and import `@solana/webcrypto-ed25519-polyfill` before generating keys in environments that do not support Ed25519.\n\nFor a list of runtimes that currently support Ed25519 operations, visit https://github.com/WICG/webcrypto-secure-curves/issues/20"
697
+ );
698
+ }
699
+ }
700
+ async function assertKeyExporterIsAvailable() {
701
+ assertIsSecureContext();
702
+ if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.exportKey !== "function") {
703
+ throw new Error("No key export implementation could be found");
704
+ }
705
+ }
706
+ async function assertSigningCapabilityIsAvailable() {
707
+ assertIsSecureContext();
708
+ if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.sign !== "function") {
709
+ throw new Error("No signing implementation could be found");
710
+ }
711
+ }
712
+ async function assertVerificationCapabilityIsAvailable() {
713
+ assertIsSecureContext();
714
+ if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.verify !== "function") {
715
+ throw new Error("No signature verification implementation could be found");
716
+ }
717
+ }
449
718
  function assertIsBase58EncodedAddress(putativeBase58EncodedAddress) {
450
719
  try {
451
720
  if (
@@ -455,123 +724,1006 @@ this.globalThis.solanaWeb3 = (function (exports) {
455
724
  ) {
456
725
  throw new Error("Expected input string to decode to a byte array of length 32.");
457
726
  }
458
- const bytes = base58.serialize(putativeBase58EncodedAddress);
459
- const numBytes = bytes.byteLength;
727
+ const bytes2 = base58.serialize(putativeBase58EncodedAddress);
728
+ const numBytes = bytes2.byteLength;
729
+ if (numBytes !== 32) {
730
+ throw new Error(`Expected input string to decode to a byte array of length 32. Actual length: ${numBytes}`);
731
+ }
732
+ } catch (e3) {
733
+ throw new Error(`\`${putativeBase58EncodedAddress}\` is not a base-58 encoded address`, {
734
+ cause: e3
735
+ });
736
+ }
737
+ }
738
+ function getBase58EncodedAddressCodec(config) {
739
+ return string({
740
+ description: config?.description ?? ("A 32-byte account address" ),
741
+ encoding: base58,
742
+ size: 32
743
+ });
744
+ }
745
+ function getBase58EncodedAddressComparator() {
746
+ return new Intl.Collator("en", {
747
+ caseFirst: "lower",
748
+ ignorePunctuation: false,
749
+ localeMatcher: "best fit",
750
+ numeric: false,
751
+ sensitivity: "variant",
752
+ usage: "sort"
753
+ }).compare;
754
+ }
755
+ var D = 37095705934669439343138083508754565189542113879843219016388785533085940283555n;
756
+ var P = 57896044618658097711785492504343953926634992332820282019728792003956564819949n;
757
+ var RM1 = 19681161376707505956807079304988542015446066515923890162744021073123829784752n;
758
+ function mod(a) {
759
+ const r = a % P;
760
+ return r >= 0n ? r : P + r;
761
+ }
762
+ function pow2(x, power) {
763
+ let r = x;
764
+ while (power-- > 0n) {
765
+ r *= r;
766
+ r %= P;
767
+ }
768
+ return r;
769
+ }
770
+ function pow_2_252_3(x) {
771
+ const x2 = x * x % P;
772
+ const b2 = x2 * x % P;
773
+ const b4 = pow2(b2, 2n) * b2 % P;
774
+ const b5 = pow2(b4, 1n) * x % P;
775
+ const b10 = pow2(b5, 5n) * b5 % P;
776
+ const b20 = pow2(b10, 10n) * b10 % P;
777
+ const b40 = pow2(b20, 20n) * b20 % P;
778
+ const b80 = pow2(b40, 40n) * b40 % P;
779
+ const b160 = pow2(b80, 80n) * b80 % P;
780
+ const b240 = pow2(b160, 80n) * b80 % P;
781
+ const b250 = pow2(b240, 10n) * b10 % P;
782
+ const pow_p_5_8 = pow2(b250, 2n) * x % P;
783
+ return pow_p_5_8;
784
+ }
785
+ function uvRatio(u, v) {
786
+ const v3 = mod(v * v * v);
787
+ const v7 = mod(v3 * v3 * v);
788
+ const pow = pow_2_252_3(u * v7);
789
+ let x = mod(u * v3 * pow);
790
+ const vx2 = mod(v * x * x);
791
+ const root1 = x;
792
+ const root2 = mod(x * RM1);
793
+ const useRoot1 = vx2 === u;
794
+ const useRoot2 = vx2 === mod(-u);
795
+ const noRoot = vx2 === mod(-u * RM1);
796
+ if (useRoot1)
797
+ x = root1;
798
+ if (useRoot2 || noRoot)
799
+ x = root2;
800
+ if ((mod(x) & 1n) === 1n)
801
+ x = mod(-x);
802
+ if (!useRoot1 && !useRoot2) {
803
+ return null;
804
+ }
805
+ return x;
806
+ }
807
+ function pointIsOnCurve(y, lastByte) {
808
+ const y2 = mod(y * y);
809
+ const u = mod(y2 - 1n);
810
+ const v = mod(D * y2 + 1n);
811
+ const x = uvRatio(u, v);
812
+ if (x === null) {
813
+ return false;
814
+ }
815
+ const isLastByteOdd = (lastByte & 128) !== 0;
816
+ if (x === 0n && isLastByteOdd) {
817
+ return false;
818
+ }
819
+ return true;
820
+ }
821
+ function byteToHex(byte) {
822
+ const hexString = byte.toString(16);
823
+ if (hexString.length === 1) {
824
+ return `0${hexString}`;
825
+ } else {
826
+ return hexString;
827
+ }
828
+ }
829
+ function decompressPointBytes(bytes2) {
830
+ const hexString = bytes2.reduce((acc, byte, ii) => `${byteToHex(ii === 31 ? byte & ~128 : byte)}${acc}`, "");
831
+ const integerLiteralString = `0x${hexString}`;
832
+ return BigInt(integerLiteralString);
833
+ }
834
+ async function compressedPointBytesAreOnCurve(bytes2) {
835
+ if (bytes2.byteLength !== 32) {
836
+ return false;
837
+ }
838
+ const y = decompressPointBytes(bytes2);
839
+ return pointIsOnCurve(y, bytes2[31]);
840
+ }
841
+ var MAX_SEED_LENGTH = 32;
842
+ var MAX_SEEDS = 16;
843
+ var PDA_MARKER_BYTES = [
844
+ // The string 'ProgramDerivedAddress'
845
+ 80,
846
+ 114,
847
+ 111,
848
+ 103,
849
+ 114,
850
+ 97,
851
+ 109,
852
+ 68,
853
+ 101,
854
+ 114,
855
+ 105,
856
+ 118,
857
+ 101,
858
+ 100,
859
+ 65,
860
+ 100,
861
+ 100,
862
+ 114,
863
+ 101,
864
+ 115,
865
+ 115
866
+ ];
867
+ var PointOnCurveError = class extends Error {
868
+ };
869
+ async function createProgramDerivedAddress({ programAddress, seeds }) {
870
+ await assertDigestCapabilityIsAvailable();
871
+ if (seeds.length > MAX_SEEDS) {
872
+ throw new Error(`A maximum of ${MAX_SEEDS} seeds may be supplied when creating an address`);
873
+ }
874
+ let textEncoder;
875
+ const seedBytes = seeds.reduce((acc, seed, ii) => {
876
+ const bytes2 = typeof seed === "string" ? (textEncoder || (textEncoder = new TextEncoder())).encode(seed) : seed;
877
+ if (bytes2.byteLength > MAX_SEED_LENGTH) {
878
+ throw new Error(`The seed at index ${ii} exceeds the maximum length of 32 bytes`);
879
+ }
880
+ acc.push(...bytes2);
881
+ return acc;
882
+ }, []);
883
+ const base58EncodedAddressCodec = getBase58EncodedAddressCodec();
884
+ const programAddressBytes = base58EncodedAddressCodec.serialize(programAddress);
885
+ const addressBytesBuffer = await crypto.subtle.digest(
886
+ "SHA-256",
887
+ new Uint8Array([...seedBytes, ...programAddressBytes, ...PDA_MARKER_BYTES])
888
+ );
889
+ const addressBytes = new Uint8Array(addressBytesBuffer);
890
+ if (await compressedPointBytesAreOnCurve(addressBytes)) {
891
+ throw new PointOnCurveError("Invalid seeds; point must fall off the Ed25519 curve");
892
+ }
893
+ return base58EncodedAddressCodec.deserialize(addressBytes)[0];
894
+ }
895
+ async function getProgramDerivedAddress({ programAddress, seeds }) {
896
+ let bumpSeed = 255;
897
+ while (bumpSeed > 0) {
898
+ try {
899
+ return {
900
+ bumpSeed,
901
+ pda: await createProgramDerivedAddress({
902
+ programAddress,
903
+ seeds: [...seeds, new Uint8Array([bumpSeed])]
904
+ })
905
+ };
906
+ } catch (e3) {
907
+ if (e3 instanceof PointOnCurveError) {
908
+ bumpSeed--;
909
+ } else {
910
+ throw e3;
911
+ }
912
+ }
913
+ }
914
+ throw new Error("Unable to find a viable program address bump seed");
915
+ }
916
+ async function createAddressWithSeed({
917
+ baseAddress,
918
+ programAddress,
919
+ seed
920
+ }) {
921
+ const { serialize: serialize4, deserialize: deserialize2 } = getBase58EncodedAddressCodec();
922
+ const seedBytes = typeof seed === "string" ? new TextEncoder().encode(seed) : seed;
923
+ if (seedBytes.byteLength > MAX_SEED_LENGTH) {
924
+ throw new Error(`The seed exceeds the maximum length of 32 bytes`);
925
+ }
926
+ const programAddressBytes = serialize4(programAddress);
927
+ if (programAddressBytes.length >= PDA_MARKER_BYTES.length && programAddressBytes.slice(-PDA_MARKER_BYTES.length).every((byte, index) => byte === PDA_MARKER_BYTES[index])) {
928
+ throw new Error(`programAddress cannot end with the PDA marker`);
929
+ }
930
+ const addressBytesBuffer = await crypto.subtle.digest(
931
+ "SHA-256",
932
+ new Uint8Array([...serialize4(baseAddress), ...seedBytes, ...programAddressBytes])
933
+ );
934
+ const addressBytes = new Uint8Array(addressBytesBuffer);
935
+ return deserialize2(addressBytes)[0];
936
+ }
937
+ async function getAddressFromPublicKey(publicKey) {
938
+ await assertKeyExporterIsAvailable();
939
+ if (publicKey.type !== "public" || publicKey.algorithm.name !== "Ed25519") {
940
+ throw new Error("The `CryptoKey` must be an `Ed25519` public key");
941
+ }
942
+ const publicKeyBytes = await crypto.subtle.exportKey("raw", publicKey);
943
+ const [base58EncodedAddress] = getBase58EncodedAddressCodec().deserialize(new Uint8Array(publicKeyBytes));
944
+ return base58EncodedAddress;
945
+ }
946
+
947
+ // ../instructions/dist/index.browser.js
948
+ init_env_shim();
949
+ var AccountRole = /* @__PURE__ */ ((AccountRole22) => {
950
+ AccountRole22[AccountRole22["WRITABLE_SIGNER"] = /* 3 */
951
+ 3] = "WRITABLE_SIGNER";
952
+ AccountRole22[AccountRole22["READONLY_SIGNER"] = /* 2 */
953
+ 2] = "READONLY_SIGNER";
954
+ AccountRole22[AccountRole22["WRITABLE"] = /* 1 */
955
+ 1] = "WRITABLE";
956
+ AccountRole22[AccountRole22["READONLY"] = /* 0 */
957
+ 0] = "READONLY";
958
+ return AccountRole22;
959
+ })(AccountRole || {});
960
+ var IS_SIGNER_BITMASK = 2;
961
+ var IS_WRITABLE_BITMASK = 1;
962
+ function downgradeRoleToNonSigner(role) {
963
+ return role & ~IS_SIGNER_BITMASK;
964
+ }
965
+ function downgradeRoleToReadonly(role) {
966
+ return role & ~IS_WRITABLE_BITMASK;
967
+ }
968
+ function isSignerRole(role) {
969
+ return role >= 2;
970
+ }
971
+ function isWritableRole(role) {
972
+ return (role & IS_WRITABLE_BITMASK) !== 0;
973
+ }
974
+ function mergeRoles(roleA, roleB) {
975
+ return roleA | roleB;
976
+ }
977
+ function upgradeRoleToSigner(role) {
978
+ return role | IS_SIGNER_BITMASK;
979
+ }
980
+ function upgradeRoleToWritable(role) {
981
+ return role | IS_WRITABLE_BITMASK;
982
+ }
983
+
984
+ // ../keys/dist/index.browser.js
985
+ init_env_shim();
986
+ async function generateKeyPair() {
987
+ await assertKeyGenerationIsAvailable();
988
+ const keyPair = await crypto.subtle.generateKey(
989
+ /* algorithm */
990
+ "Ed25519",
991
+ // Native implementation status: https://github.com/WICG/webcrypto-secure-curves/issues/20
992
+ /* extractable */
993
+ false,
994
+ // Prevents the bytes of the private key from being visible to JS.
995
+ /* allowed uses */
996
+ ["sign", "verify"]
997
+ );
998
+ return keyPair;
999
+ }
1000
+ async function signBytes(key, data) {
1001
+ await assertSigningCapabilityIsAvailable();
1002
+ const signedData = await crypto.subtle.sign("Ed25519", key, data);
1003
+ return new Uint8Array(signedData);
1004
+ }
1005
+ async function verifySignature(key, signature, data) {
1006
+ await assertVerificationCapabilityIsAvailable();
1007
+ return await crypto.subtle.verify("Ed25519", key, signature, data);
1008
+ }
1009
+
1010
+ // ../transactions/dist/index.browser.js
1011
+ init_env_shim();
1012
+ function getUnsignedTransaction(transaction) {
1013
+ if ("signatures" in transaction) {
1014
+ const {
1015
+ signatures: _,
1016
+ // eslint-disable-line @typescript-eslint/no-unused-vars
1017
+ ...unsignedTransaction
1018
+ } = transaction;
1019
+ return unsignedTransaction;
1020
+ } else {
1021
+ return transaction;
1022
+ }
1023
+ }
1024
+ function assertIsBlockhash(putativeBlockhash) {
1025
+ try {
1026
+ if (
1027
+ // Lowest value (32 bytes of zeroes)
1028
+ putativeBlockhash.length < 32 || // Highest value (32 bytes of 255)
1029
+ putativeBlockhash.length > 44
1030
+ ) {
1031
+ throw new Error("Expected input string to decode to a byte array of length 32.");
1032
+ }
1033
+ const bytes3 = base58.serialize(putativeBlockhash);
1034
+ const numBytes = bytes3.byteLength;
460
1035
  if (numBytes !== 32) {
461
1036
  throw new Error(`Expected input string to decode to a byte array of length 32. Actual length: ${numBytes}`);
462
1037
  }
463
- } catch (e2) {
464
- throw new Error(`\`${putativeBase58EncodedAddress}\` is not a base-58 encoded address`, {
465
- cause: e2
466
- });
467
- }
468
- }
469
- function getBase58EncodedAddressCodec(config) {
470
- return string({
471
- description: config?.description ?? ("A 32-byte account address" ),
472
- encoding: base58,
473
- size: 32
474
- });
1038
+ } catch (e3) {
1039
+ throw new Error(`\`${putativeBlockhash}\` is not a blockhash`, {
1040
+ cause: e3
1041
+ });
1042
+ }
1043
+ }
1044
+ function setTransactionLifetimeUsingBlockhash(blockhashLifetimeConstraint, transaction) {
1045
+ if ("lifetimeConstraint" in transaction && transaction.lifetimeConstraint.blockhash === blockhashLifetimeConstraint.blockhash && transaction.lifetimeConstraint.lastValidBlockHeight === blockhashLifetimeConstraint.lastValidBlockHeight) {
1046
+ return transaction;
1047
+ }
1048
+ const out = {
1049
+ ...getUnsignedTransaction(transaction),
1050
+ lifetimeConstraint: blockhashLifetimeConstraint
1051
+ };
1052
+ Object.freeze(out);
1053
+ return out;
1054
+ }
1055
+ function createTransaction({
1056
+ version
1057
+ }) {
1058
+ const out = {
1059
+ instructions: [],
1060
+ version
1061
+ };
1062
+ Object.freeze(out);
1063
+ return out;
1064
+ }
1065
+ var AccountRole2 = /* @__PURE__ */ ((AccountRole22) => {
1066
+ AccountRole22[AccountRole22["WRITABLE_SIGNER"] = /* 3 */
1067
+ 3] = "WRITABLE_SIGNER";
1068
+ AccountRole22[AccountRole22["READONLY_SIGNER"] = /* 2 */
1069
+ 2] = "READONLY_SIGNER";
1070
+ AccountRole22[AccountRole22["WRITABLE"] = /* 1 */
1071
+ 1] = "WRITABLE";
1072
+ AccountRole22[AccountRole22["READONLY"] = /* 0 */
1073
+ 0] = "READONLY";
1074
+ return AccountRole22;
1075
+ })(AccountRole2 || {});
1076
+ var IS_WRITABLE_BITMASK2 = 1;
1077
+ function isSignerRole2(role) {
1078
+ return role >= 2;
1079
+ }
1080
+ function isWritableRole2(role) {
1081
+ return (role & IS_WRITABLE_BITMASK2) !== 0;
1082
+ }
1083
+ function mergeRoles2(roleA, roleB) {
1084
+ return roleA | roleB;
1085
+ }
1086
+ var RECENT_BLOCKHASHES_SYSVAR_ADDRESS = "SysvarRecentB1ockHashes11111111111111111111";
1087
+ var SYSTEM_PROGRAM_ADDRESS = "11111111111111111111111111111111";
1088
+ function assertIsDurableNonceTransaction(transaction) {
1089
+ if (!isDurableNonceTransaction(transaction)) {
1090
+ throw new Error("Transaction is not a durable nonce transaction");
1091
+ }
1092
+ }
1093
+ function createAdvanceNonceAccountInstruction(nonceAccountAddress, nonceAuthorityAddress) {
1094
+ return {
1095
+ accounts: [
1096
+ { address: nonceAccountAddress, role: AccountRole2.WRITABLE },
1097
+ {
1098
+ address: RECENT_BLOCKHASHES_SYSVAR_ADDRESS,
1099
+ role: AccountRole2.READONLY
1100
+ },
1101
+ { address: nonceAuthorityAddress, role: AccountRole2.READONLY_SIGNER }
1102
+ ],
1103
+ data: new Uint8Array([4, 0, 0, 0]),
1104
+ programAddress: SYSTEM_PROGRAM_ADDRESS
1105
+ };
1106
+ }
1107
+ function isAdvanceNonceAccountInstruction(instruction) {
1108
+ return instruction.programAddress === SYSTEM_PROGRAM_ADDRESS && // Test for `AdvanceNonceAccount` instruction data
1109
+ instruction.data != null && isAdvanceNonceAccountInstructionData(instruction.data) && // Test for exactly 3 accounts
1110
+ instruction.accounts?.length === 3 && // First account is nonce account address
1111
+ instruction.accounts[0].address != null && instruction.accounts[0].role === AccountRole2.WRITABLE && // Second account is recent blockhashes sysvar
1112
+ instruction.accounts[1].address === RECENT_BLOCKHASHES_SYSVAR_ADDRESS && instruction.accounts[1].role === AccountRole2.READONLY && // Third account is nonce authority account
1113
+ instruction.accounts[2].address != null && instruction.accounts[2].role === AccountRole2.READONLY_SIGNER;
1114
+ }
1115
+ function isAdvanceNonceAccountInstructionData(data) {
1116
+ return data.byteLength === 4 && data[0] === 4 && data[1] === 0 && data[2] === 0 && data[3] === 0;
1117
+ }
1118
+ function isDurableNonceTransaction(transaction) {
1119
+ return "lifetimeConstraint" in transaction && typeof transaction.lifetimeConstraint.nonce === "string" && transaction.instructions[0] != null && isAdvanceNonceAccountInstruction(transaction.instructions[0]);
1120
+ }
1121
+ function setTransactionLifetimeUsingDurableNonce({
1122
+ nonce,
1123
+ nonceAccountAddress,
1124
+ nonceAuthorityAddress
1125
+ }, transaction) {
1126
+ const isAlreadyDurableNonceTransaction = isDurableNonceTransaction(transaction);
1127
+ if (isAlreadyDurableNonceTransaction && transaction.lifetimeConstraint.nonce === nonce && transaction.instructions[0].accounts[0].address === nonceAccountAddress && transaction.instructions[0].accounts[2].address === nonceAuthorityAddress) {
1128
+ return transaction;
1129
+ }
1130
+ const out = {
1131
+ ...getUnsignedTransaction(transaction),
1132
+ instructions: [
1133
+ createAdvanceNonceAccountInstruction(nonceAccountAddress, nonceAuthorityAddress),
1134
+ ...isAlreadyDurableNonceTransaction ? transaction.instructions.slice(1) : transaction.instructions
1135
+ ],
1136
+ lifetimeConstraint: {
1137
+ nonce
1138
+ }
1139
+ };
1140
+ Object.freeze(out);
1141
+ return out;
1142
+ }
1143
+ function setTransactionFeePayer(feePayer, transaction) {
1144
+ if ("feePayer" in transaction && feePayer === transaction.feePayer) {
1145
+ return transaction;
1146
+ }
1147
+ const out = {
1148
+ ...getUnsignedTransaction(transaction),
1149
+ feePayer
1150
+ };
1151
+ Object.freeze(out);
1152
+ return out;
1153
+ }
1154
+ function appendTransactionInstruction(instruction, transaction) {
1155
+ const out = {
1156
+ ...getUnsignedTransaction(transaction),
1157
+ instructions: [...transaction.instructions, instruction]
1158
+ };
1159
+ Object.freeze(out);
1160
+ return out;
1161
+ }
1162
+ function prependTransactionInstruction(instruction, transaction) {
1163
+ const out = {
1164
+ ...getUnsignedTransaction(transaction),
1165
+ instructions: [instruction, ...transaction.instructions]
1166
+ };
1167
+ Object.freeze(out);
1168
+ return out;
1169
+ }
1170
+ function upsert(addressMap, address, update) {
1171
+ addressMap[address] = update(addressMap[address] ?? { role: AccountRole2.READONLY });
1172
+ }
1173
+ var TYPE = Symbol("AddressMapTypeProperty");
1174
+ function getAddressMapFromInstructions(feePayer, instructions) {
1175
+ const addressMap = {
1176
+ [feePayer]: { [TYPE]: 0, role: AccountRole2.WRITABLE_SIGNER }
1177
+ };
1178
+ const addressesOfInvokedPrograms = /* @__PURE__ */ new Set();
1179
+ for (const instruction of instructions) {
1180
+ upsert(addressMap, instruction.programAddress, (entry) => {
1181
+ addressesOfInvokedPrograms.add(instruction.programAddress);
1182
+ if (TYPE in entry) {
1183
+ if (isWritableRole2(entry.role)) {
1184
+ switch (entry[TYPE]) {
1185
+ case 0:
1186
+ throw new Error(
1187
+ `This transaction includes an address (\`${instruction.programAddress}\`) which is both invoked and set as the fee payer. Program addresses may not pay fees.`
1188
+ );
1189
+ default:
1190
+ throw new Error(
1191
+ `This transaction includes an address (\`${instruction.programAddress}\`) which is both invoked and marked writable. Program addresses may not be writable.`
1192
+ );
1193
+ }
1194
+ }
1195
+ if (entry[TYPE] === 2) {
1196
+ return entry;
1197
+ }
1198
+ }
1199
+ return { [TYPE]: 2, role: AccountRole2.READONLY };
1200
+ });
1201
+ let addressComparator;
1202
+ if (!instruction.accounts) {
1203
+ continue;
1204
+ }
1205
+ for (const account of instruction.accounts) {
1206
+ upsert(addressMap, account.address, (entry) => {
1207
+ const {
1208
+ // eslint-disable-next-line @typescript-eslint/no-unused-vars
1209
+ address: _,
1210
+ ...accountMeta
1211
+ } = account;
1212
+ if (TYPE in entry) {
1213
+ switch (entry[TYPE]) {
1214
+ case 0:
1215
+ return entry;
1216
+ case 1: {
1217
+ const nextRole = mergeRoles2(entry.role, accountMeta.role);
1218
+ if ("lookupTableAddress" in accountMeta) {
1219
+ const shouldReplaceEntry = (
1220
+ // Consider using the new LOOKUP_TABLE if its address is different...
1221
+ entry.lookupTableAddress !== accountMeta.lookupTableAddress && // ...and sorts before the existing one.
1222
+ (addressComparator || (addressComparator = getBase58EncodedAddressComparator()))(
1223
+ accountMeta.lookupTableAddress,
1224
+ entry.lookupTableAddress
1225
+ ) < 0
1226
+ );
1227
+ if (shouldReplaceEntry) {
1228
+ return {
1229
+ [TYPE]: 1,
1230
+ ...accountMeta,
1231
+ role: nextRole
1232
+ };
1233
+ }
1234
+ } else if (isSignerRole2(accountMeta.role)) {
1235
+ return {
1236
+ [TYPE]: 2,
1237
+ role: nextRole
1238
+ };
1239
+ }
1240
+ if (entry.role !== nextRole) {
1241
+ return {
1242
+ ...entry,
1243
+ role: nextRole
1244
+ };
1245
+ } else {
1246
+ return entry;
1247
+ }
1248
+ }
1249
+ case 2: {
1250
+ const nextRole = mergeRoles2(entry.role, accountMeta.role);
1251
+ if (
1252
+ // Check to see if this address represents a program that is invoked
1253
+ // in this transaction.
1254
+ addressesOfInvokedPrograms.has(account.address)
1255
+ ) {
1256
+ if (isWritableRole2(accountMeta.role)) {
1257
+ throw new Error(
1258
+ `This transaction includes an address (\`${account.address}\`) which is both invoked and marked writable. Program addresses may not be writable.`
1259
+ );
1260
+ }
1261
+ if (entry.role !== nextRole) {
1262
+ return {
1263
+ ...entry,
1264
+ role: nextRole
1265
+ };
1266
+ } else {
1267
+ return entry;
1268
+ }
1269
+ } else if ("lookupTableAddress" in accountMeta && // Static accounts can be 'upgraded' to lookup table accounts as
1270
+ // long as they are not require to sign the transaction.
1271
+ !isSignerRole2(entry.role)) {
1272
+ return {
1273
+ ...accountMeta,
1274
+ [TYPE]: 1,
1275
+ role: nextRole
1276
+ };
1277
+ } else {
1278
+ if (entry.role !== nextRole) {
1279
+ return {
1280
+ ...entry,
1281
+ role: nextRole
1282
+ };
1283
+ } else {
1284
+ return entry;
1285
+ }
1286
+ }
1287
+ }
1288
+ }
1289
+ }
1290
+ if ("lookupTableAddress" in accountMeta) {
1291
+ return {
1292
+ ...accountMeta,
1293
+ [TYPE]: 1
1294
+ /* LOOKUP_TABLE */
1295
+ };
1296
+ } else {
1297
+ return {
1298
+ ...accountMeta,
1299
+ [TYPE]: 2
1300
+ /* STATIC */
1301
+ };
1302
+ }
1303
+ });
1304
+ }
1305
+ }
1306
+ return addressMap;
1307
+ }
1308
+ function getOrderedAccountsFromAddressMap(addressMap) {
1309
+ let addressComparator;
1310
+ const orderedAccounts = Object.entries(addressMap).sort(([leftAddress, leftEntry], [rightAddress, rightEntry]) => {
1311
+ if (leftEntry[TYPE] !== rightEntry[TYPE]) {
1312
+ if (leftEntry[TYPE] === 0) {
1313
+ return -1;
1314
+ } else if (rightEntry[TYPE] === 0) {
1315
+ return 1;
1316
+ } else if (leftEntry[TYPE] === 2) {
1317
+ return -1;
1318
+ } else if (rightEntry[TYPE] === 2) {
1319
+ return 1;
1320
+ }
1321
+ }
1322
+ const leftIsSigner = isSignerRole2(leftEntry.role);
1323
+ if (leftIsSigner !== isSignerRole2(rightEntry.role)) {
1324
+ return leftIsSigner ? -1 : 1;
1325
+ }
1326
+ const leftIsWritable = isWritableRole2(leftEntry.role);
1327
+ if (leftIsWritable !== isWritableRole2(rightEntry.role)) {
1328
+ return leftIsWritable ? -1 : 1;
1329
+ }
1330
+ addressComparator || (addressComparator = getBase58EncodedAddressComparator());
1331
+ if (leftEntry[TYPE] === 1 && rightEntry[TYPE] === 1 && leftEntry.lookupTableAddress !== rightEntry.lookupTableAddress) {
1332
+ return addressComparator(leftEntry.lookupTableAddress, rightEntry.lookupTableAddress);
1333
+ } else {
1334
+ return addressComparator(leftAddress, rightAddress);
1335
+ }
1336
+ }).map(([address, addressMeta]) => ({
1337
+ address,
1338
+ ...addressMeta
1339
+ }));
1340
+ return orderedAccounts;
1341
+ }
1342
+ function getCompiledAddressTableLookups(orderedAccounts) {
1343
+ var _a;
1344
+ const index = {};
1345
+ for (const account of orderedAccounts) {
1346
+ if (!("lookupTableAddress" in account)) {
1347
+ continue;
1348
+ }
1349
+ const entry = index[_a = account.lookupTableAddress] || (index[_a] = {
1350
+ readableIndices: [],
1351
+ writableIndices: []
1352
+ });
1353
+ if (account.role === AccountRole2.WRITABLE) {
1354
+ entry.writableIndices.push(account.addressIndex);
1355
+ } else {
1356
+ entry.readableIndices.push(account.addressIndex);
1357
+ }
1358
+ }
1359
+ return Object.keys(index).sort(getBase58EncodedAddressComparator()).map((lookupTableAddress) => ({
1360
+ lookupTableAddress,
1361
+ ...index[lookupTableAddress]
1362
+ }));
1363
+ }
1364
+ function getCompiledMessageHeader(orderedAccounts) {
1365
+ let numReadonlyNonSignerAccounts = 0;
1366
+ let numReadonlySignerAccounts = 0;
1367
+ let numSignerAccounts = 0;
1368
+ for (const account of orderedAccounts) {
1369
+ if ("lookupTableAddress" in account) {
1370
+ break;
1371
+ }
1372
+ const accountIsWritable = isWritableRole2(account.role);
1373
+ if (isSignerRole2(account.role)) {
1374
+ numSignerAccounts++;
1375
+ if (!accountIsWritable) {
1376
+ numReadonlySignerAccounts++;
1377
+ }
1378
+ } else if (!accountIsWritable) {
1379
+ numReadonlyNonSignerAccounts++;
1380
+ }
1381
+ }
1382
+ return {
1383
+ numReadonlyNonSignerAccounts,
1384
+ numReadonlySignerAccounts,
1385
+ numSignerAccounts
1386
+ };
1387
+ }
1388
+ function getAccountIndex(orderedAccounts) {
1389
+ const out = {};
1390
+ for (const [index, account] of orderedAccounts.entries()) {
1391
+ out[account.address] = index;
1392
+ }
1393
+ return out;
1394
+ }
1395
+ function getCompiledInstructions(instructions, orderedAccounts) {
1396
+ const accountIndex = getAccountIndex(orderedAccounts);
1397
+ return instructions.map(({ accounts, data, programAddress }) => {
1398
+ return {
1399
+ programAddressIndex: accountIndex[programAddress],
1400
+ ...accounts ? { accountIndices: accounts.map(({ address }) => accountIndex[address]) } : null,
1401
+ ...data ? { data } : null
1402
+ };
1403
+ });
1404
+ }
1405
+ function getCompiledLifetimeToken(lifetimeConstraint) {
1406
+ if ("nonce" in lifetimeConstraint) {
1407
+ return lifetimeConstraint.nonce;
1408
+ }
1409
+ return lifetimeConstraint.blockhash;
1410
+ }
1411
+ function getCompiledStaticAccounts(orderedAccounts) {
1412
+ const firstLookupTableAccountIndex = orderedAccounts.findIndex((account) => "lookupTableAddress" in account);
1413
+ const orderedStaticAccounts = firstLookupTableAccountIndex === -1 ? orderedAccounts : orderedAccounts.slice(0, firstLookupTableAccountIndex);
1414
+ return orderedStaticAccounts.map(({ address }) => address);
1415
+ }
1416
+ function compileMessage(transaction) {
1417
+ const addressMap = getAddressMapFromInstructions(transaction.feePayer, transaction.instructions);
1418
+ const orderedAccounts = getOrderedAccountsFromAddressMap(addressMap);
1419
+ return {
1420
+ ...transaction.version !== "legacy" ? { addressTableLookups: getCompiledAddressTableLookups(orderedAccounts) } : null,
1421
+ header: getCompiledMessageHeader(orderedAccounts),
1422
+ instructions: getCompiledInstructions(transaction.instructions, orderedAccounts),
1423
+ lifetimeToken: getCompiledLifetimeToken(transaction.lifetimeConstraint),
1424
+ staticAccounts: getCompiledStaticAccounts(orderedAccounts),
1425
+ version: transaction.version
1426
+ };
1427
+ }
1428
+ function getAddressTableLookupCodec() {
1429
+ return struct(
1430
+ [
1431
+ [
1432
+ "lookupTableAddress",
1433
+ getBase58EncodedAddressCodec(
1434
+ {
1435
+ description: "The address of the address lookup table account from which instruction addresses should be looked up"
1436
+ }
1437
+ )
1438
+ ],
1439
+ [
1440
+ "writableIndices",
1441
+ array(u8(), {
1442
+ ...{
1443
+ description: "The indices of the accounts in the lookup table that should be loaded as writeable"
1444
+ } ,
1445
+ size: shortU16()
1446
+ })
1447
+ ],
1448
+ [
1449
+ "readableIndices",
1450
+ array(u8(), {
1451
+ ...{
1452
+ description: "The indices of the accounts in the lookup table that should be loaded as read-only"
1453
+ } ,
1454
+ size: shortU16()
1455
+ })
1456
+ ]
1457
+ ],
1458
+ {
1459
+ description: "A pointer to the address of an address lookup table, along with the readonly/writeable indices of the addresses that should be loaded from it"
1460
+ }
1461
+ );
1462
+ }
1463
+ function getMessageHeaderCodec() {
1464
+ return struct(
1465
+ [
1466
+ [
1467
+ "numSignerAccounts",
1468
+ u8(
1469
+ {
1470
+ description: "The expected number of addresses in the static address list belonging to accounts that are required to sign this transaction"
1471
+ }
1472
+ )
1473
+ ],
1474
+ [
1475
+ "numReadonlySignerAccounts",
1476
+ u8(
1477
+ {
1478
+ description: "The expected number of addresses in the static address list belonging to accounts that are required to sign this transaction, but may not be writable"
1479
+ }
1480
+ )
1481
+ ],
1482
+ [
1483
+ "numReadonlyNonSignerAccounts",
1484
+ u8(
1485
+ {
1486
+ description: "The expected number of addresses in the static address list belonging to accounts that are neither signers, nor writable"
1487
+ }
1488
+ )
1489
+ ]
1490
+ ],
1491
+ {
1492
+ description: "The transaction message header containing counts of the signer, readonly-signer, and readonly-nonsigner account addresses"
1493
+ }
1494
+ );
1495
+ }
1496
+ function getInstructionCodec() {
1497
+ return mapSerializer(
1498
+ struct([
1499
+ [
1500
+ "programAddressIndex",
1501
+ u8(
1502
+ {
1503
+ description: "The index of the program being called, according to the well-ordered accounts list for this transaction"
1504
+ }
1505
+ )
1506
+ ],
1507
+ [
1508
+ "accountIndices",
1509
+ array(
1510
+ u8({
1511
+ description: "The index of an account, according to the well-ordered accounts list for this transaction"
1512
+ }),
1513
+ {
1514
+ description: "An optional list of account indices, according to the well-ordered accounts list for this transaction, in the order in which the program being called expects them" ,
1515
+ size: shortU16()
1516
+ }
1517
+ )
1518
+ ],
1519
+ [
1520
+ "data",
1521
+ bytes({
1522
+ description: "An optional buffer of data passed to the instruction" ,
1523
+ size: shortU16()
1524
+ })
1525
+ ]
1526
+ ]),
1527
+ (value) => {
1528
+ if (value.accountIndices !== void 0 && value.data !== void 0) {
1529
+ return value;
1530
+ }
1531
+ return {
1532
+ ...value,
1533
+ accountIndices: value.accountIndices ?? [],
1534
+ data: value.data ?? new Uint8Array(0)
1535
+ };
1536
+ },
1537
+ (value) => {
1538
+ if (value.accountIndices.length && value.data.byteLength) {
1539
+ return value;
1540
+ }
1541
+ const { accountIndices, data, ...rest } = value;
1542
+ return {
1543
+ ...rest,
1544
+ ...accountIndices.length ? { accountIndices } : null,
1545
+ ...data.byteLength ? { data } : null
1546
+ };
1547
+ }
1548
+ );
475
1549
  }
476
- function getBase58EncodedAddressComparator() {
477
- return new Intl.Collator("en", {
478
- caseFirst: "lower",
479
- ignorePunctuation: false,
480
- localeMatcher: "best fit",
481
- numeric: false,
482
- sensitivity: "variant",
483
- usage: "sort"
484
- }).compare;
1550
+ function getError(type, name) {
1551
+ const functionSuffix = name + type[0].toUpperCase() + type.slice(1);
1552
+ return new Error(
1553
+ `No ${type} exists for ${name}. Use \`get${functionSuffix}()\` if you need a ${type}, and \`get${name}Codec()\` if you need to both encode and decode ${name}`
1554
+ );
485
1555
  }
486
- function assertIsSecureContext() {
487
- if (!globalThis.isSecureContext) {
488
- throw new Error(
489
- "Cryptographic operations are only allowed in secure browser contexts. Read more here: https://developer.mozilla.org/en-US/docs/Web/Security/Secure_Contexts"
490
- );
491
- }
1556
+ function getUnimplementedDecoder(name) {
1557
+ return () => {
1558
+ throw getError("decoder", name);
1559
+ };
492
1560
  }
493
- var cachedEd25519Decision;
494
- async function isEd25519CurveSupported(subtle) {
495
- if (cachedEd25519Decision === void 0) {
496
- cachedEd25519Decision = new Promise((resolve) => {
497
- subtle.generateKey(
498
- "Ed25519",
499
- /* extractable */
500
- false,
501
- ["sign", "verify"]
502
- ).catch(() => {
503
- resolve(cachedEd25519Decision = false);
504
- }).then(() => {
505
- resolve(cachedEd25519Decision = true);
506
- });
507
- });
508
- }
509
- if (typeof cachedEd25519Decision === "boolean") {
510
- return cachedEd25519Decision;
1561
+ var VERSION_FLAG_MASK = 128;
1562
+ var BASE_CONFIG = {
1563
+ description: "A single byte that encodes the version of the transaction" ,
1564
+ fixedSize: null,
1565
+ maxSize: 1
1566
+ };
1567
+ function deserialize(bytes3, offset = 0) {
1568
+ const firstByte = bytes3[offset];
1569
+ if ((firstByte & VERSION_FLAG_MASK) === 0) {
1570
+ return ["legacy", offset];
511
1571
  } else {
512
- return await cachedEd25519Decision;
1572
+ const version = firstByte ^ VERSION_FLAG_MASK;
1573
+ return [version, offset + 1];
513
1574
  }
514
1575
  }
515
- async function assertKeyGenerationIsAvailable() {
516
- assertIsSecureContext();
517
- if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.generateKey !== "function") {
518
- throw new Error("No key generation implementation could be found");
1576
+ function serialize(value) {
1577
+ if (value === "legacy") {
1578
+ return new Uint8Array();
519
1579
  }
520
- if (!await isEd25519CurveSupported(globalThis.crypto.subtle)) {
521
- throw new Error(
522
- "This runtime does not support the generation of Ed25519 key pairs.\n\nInstall and import `@solana/webcrypto-ed25519-polyfill` before generating keys in environments that do not support Ed25519.\n\nFor a list of runtimes that currently support Ed25519 operations, visit https://github.com/WICG/webcrypto-secure-curves/issues/20"
523
- );
1580
+ if (value < 0 || value > 127) {
1581
+ throw new Error(`Transaction version must be in the range [0, 127]. \`${value}\` given.`);
524
1582
  }
1583
+ return new Uint8Array([value | VERSION_FLAG_MASK]);
525
1584
  }
526
- async function assertKeyExporterIsAvailable() {
527
- assertIsSecureContext();
528
- if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.exportKey !== "function") {
529
- throw new Error("No key export implementation could be found");
530
- }
1585
+ function getTransactionVersionCodec() {
1586
+ return {
1587
+ ...BASE_CONFIG,
1588
+ deserialize,
1589
+ serialize
1590
+ };
531
1591
  }
532
- async function assertSigningCapabilityIsAvailable() {
533
- assertIsSecureContext();
534
- if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.sign !== "function") {
535
- throw new Error("No signing implementation could be found");
1592
+ var BASE_CONFIG2 = {
1593
+ description: "The wire format of a Solana transaction message" ,
1594
+ fixedSize: null,
1595
+ maxSize: null
1596
+ };
1597
+ function serialize2(compiledMessage) {
1598
+ if (compiledMessage.version === "legacy") {
1599
+ return struct(getPreludeStructSerializerTuple()).serialize(compiledMessage);
1600
+ } else {
1601
+ return mapSerializer(
1602
+ struct([
1603
+ ...getPreludeStructSerializerTuple(),
1604
+ ["addressTableLookups", getAddressTableLookupsSerializer()]
1605
+ ]),
1606
+ (value) => {
1607
+ if (value.version === "legacy") {
1608
+ return value;
1609
+ }
1610
+ return {
1611
+ ...value,
1612
+ addressTableLookups: value.addressTableLookups ?? []
1613
+ };
1614
+ }
1615
+ ).serialize(compiledMessage);
536
1616
  }
537
1617
  }
538
- async function assertVerificationCapabilityIsAvailable() {
539
- assertIsSecureContext();
540
- if (typeof globalThis.crypto === "undefined" || typeof globalThis.crypto.subtle?.verify !== "function") {
541
- throw new Error("No signature verification implementation could be found");
542
- }
1618
+ function getPreludeStructSerializerTuple() {
1619
+ return [
1620
+ ["version", getTransactionVersionCodec()],
1621
+ ["header", getMessageHeaderCodec()],
1622
+ [
1623
+ "staticAccounts",
1624
+ array(getBase58EncodedAddressCodec(), {
1625
+ description: "A compact-array of static account addresses belonging to this transaction" ,
1626
+ size: shortU16()
1627
+ })
1628
+ ],
1629
+ [
1630
+ "lifetimeToken",
1631
+ string({
1632
+ description: "A 32-byte token that specifies the lifetime of this transaction (eg. a recent blockhash, or a durable nonce)" ,
1633
+ encoding: base58,
1634
+ size: 32
1635
+ })
1636
+ ],
1637
+ [
1638
+ "instructions",
1639
+ array(getInstructionCodec(), {
1640
+ description: "A compact-array of instructions belonging to this transaction" ,
1641
+ size: shortU16()
1642
+ })
1643
+ ]
1644
+ ];
543
1645
  }
544
- async function generateKeyPair() {
545
- await assertKeyGenerationIsAvailable();
546
- const keyPair = await crypto.subtle.generateKey(
547
- /* algorithm */
548
- "Ed25519",
549
- // Native implementation status: https://github.com/WICG/webcrypto-secure-curves/issues/20
550
- /* extractable */
551
- false,
552
- // Prevents the bytes of the private key from being visible to JS.
553
- /* allowed uses */
554
- ["sign", "verify"]
555
- );
556
- return keyPair;
1646
+ function getAddressTableLookupsSerializer() {
1647
+ return array(getAddressTableLookupCodec(), {
1648
+ ...{ description: "A compact array of address table lookups belonging to this transaction" } ,
1649
+ size: shortU16()
1650
+ });
557
1651
  }
558
- async function getBase58EncodedAddressFromPublicKey(publicKey) {
559
- await assertKeyExporterIsAvailable();
560
- if (publicKey.type !== "public" || publicKey.algorithm.name !== "Ed25519") {
561
- throw new Error("The `CryptoKey` must be an `Ed25519` public key");
1652
+ function getCompiledMessageEncoder() {
1653
+ return {
1654
+ ...BASE_CONFIG2,
1655
+ deserialize: getUnimplementedDecoder("CompiledMessage"),
1656
+ serialize: serialize2
1657
+ };
1658
+ }
1659
+ async function getCompiledMessageSignature(message, secretKey) {
1660
+ const wireMessageBytes = getCompiledMessageEncoder().serialize(message);
1661
+ const signature = await signBytes(secretKey, wireMessageBytes);
1662
+ return signature;
1663
+ }
1664
+ async function signTransaction(keyPair, transaction) {
1665
+ const compiledMessage = compileMessage(transaction);
1666
+ const [signerPublicKey, signature] = await Promise.all([
1667
+ getAddressFromPublicKey(keyPair.publicKey),
1668
+ getCompiledMessageSignature(compiledMessage, keyPair.privateKey)
1669
+ ]);
1670
+ const nextSignatures = {
1671
+ ..."signatures" in transaction ? transaction.signatures : null,
1672
+ ...{ [signerPublicKey]: signature }
1673
+ };
1674
+ const out = {
1675
+ ...transaction,
1676
+ signatures: nextSignatures
1677
+ };
1678
+ Object.freeze(out);
1679
+ return out;
1680
+ }
1681
+ function getCompiledTransaction(transaction) {
1682
+ const compiledMessage = compileMessage(transaction);
1683
+ let signatures;
1684
+ if ("signatures" in transaction) {
1685
+ signatures = [];
1686
+ for (let ii = 0; ii < compiledMessage.header.numSignerAccounts; ii++) {
1687
+ signatures[ii] = transaction.signatures[compiledMessage.staticAccounts[ii]] ?? new Uint8Array(Array(64).fill(0));
1688
+ }
1689
+ } else {
1690
+ signatures = Array(compiledMessage.header.numSignerAccounts).fill(new Uint8Array(Array(64).fill(0)));
562
1691
  }
563
- const publicKeyBytes = await crypto.subtle.exportKey("raw", publicKey);
564
- const [base58EncodedAddress] = getBase58EncodedAddressCodec().deserialize(new Uint8Array(publicKeyBytes));
565
- return base58EncodedAddress;
1692
+ return {
1693
+ compiledMessage,
1694
+ signatures
1695
+ };
566
1696
  }
567
- async function signBytes(key, data) {
568
- await assertSigningCapabilityIsAvailable();
569
- const signedData = await crypto.subtle.sign("Ed25519", key, data);
570
- return new Uint8Array(signedData);
1697
+ var BASE_CONFIG3 = {
1698
+ description: "The wire format of a Solana transaction" ,
1699
+ fixedSize: null,
1700
+ maxSize: null
1701
+ };
1702
+ function serialize3(transaction) {
1703
+ const compiledTransaction = getCompiledTransaction(transaction);
1704
+ return struct([
1705
+ [
1706
+ "signatures",
1707
+ array(bytes({ size: 64 }), {
1708
+ ...{ description: "A compact array of 64-byte, base-64 encoded Ed25519 signatures" } ,
1709
+ size: shortU16()
1710
+ })
1711
+ ],
1712
+ ["compiledMessage", getCompiledMessageEncoder()]
1713
+ ]).serialize(compiledTransaction);
571
1714
  }
572
- async function verifySignature(key, signature, data) {
573
- await assertVerificationCapabilityIsAvailable();
574
- return await crypto.subtle.verify("Ed25519", key, signature, data);
1715
+ function getTransactionEncoder() {
1716
+ return {
1717
+ ...BASE_CONFIG3,
1718
+ deserialize: getUnimplementedDecoder("CompiledMessage"),
1719
+ serialize: serialize3
1720
+ };
1721
+ }
1722
+ function getBase64EncodedWireTransaction(transaction) {
1723
+ const wireTransactionBytes = getTransactionEncoder().serialize(transaction);
1724
+ {
1725
+ return btoa(String.fromCharCode(...wireTransactionBytes));
1726
+ }
575
1727
  }
576
1728
 
577
1729
  // src/rpc.ts
@@ -605,85 +1757,246 @@ this.globalThis.solanaWeb3 = (function (exports) {
605
1757
  return visitNode(params, [], onIntegerOverflow);
606
1758
  }
607
1759
  var KEYPATH_WILDCARD = {};
608
- var ALLOWED_NUMERIC_KEYPATHS = {
609
- getAccountInfo: [
610
- // parsed AddressTableLookup account
611
- ["value", "data", "parsed", "info", "lastExtendedSlotStartIndex"],
612
- // parsed Config account
613
- ["value", "data", "parsed", "info", "slashPenalty"],
614
- ["value", "data", "parsed", "info", "warmupCooldownRate"],
615
- // parsed Token/Token22 token account
616
- ["value", "data", "parsed", "info", "tokenAmount", "decimals"],
617
- ["value", "data", "parsed", "info", "tokenAmount", "uiAmount"],
618
- ["value", "data", "parsed", "info", "rentExemptReserve", "decimals"],
619
- ["value", "data", "parsed", "info", "delegatedAmount", "decimals"],
620
- [
621
- "value",
622
- "data",
623
- "parsed",
624
- "info",
625
- "extensions",
626
- KEYPATH_WILDCARD,
627
- "state",
628
- "olderTransferFee",
629
- "transferFeeBasisPoints"
630
- ],
631
- [
632
- "value",
633
- "data",
634
- "parsed",
635
- "info",
636
- "extensions",
637
- KEYPATH_WILDCARD,
638
- "state",
639
- "newerTransferFee",
640
- "transferFeeBasisPoints"
641
- ],
642
- ["value", "data", "parsed", "info", "extensions", KEYPATH_WILDCARD, "state", "preUpdateAverageRate"],
643
- ["value", "data", "parsed", "info", "extensions", KEYPATH_WILDCARD, "state", "currentRate"],
644
- // parsed Token/Token22 mint account
645
- ["value", "data", "parsed", "info", "decimals"],
646
- // parsed Token/Token22 multisig account
647
- ["value", "data", "parsed", "info", "numRequiredSigners"],
648
- ["value", "data", "parsed", "info", "numValidSigners"],
649
- // parsed Stake account
650
- ["value", "data", "parsed", "info", "stake", "delegation", "warmupCooldownRate"],
651
- // parsed Sysvar rent account
652
- ["value", "data", "parsed", "info", "exemptionThreshold"],
653
- ["value", "data", "parsed", "info", "burnPercent"],
654
- // parsed Vote account
655
- ["value", "data", "parsed", "info", "commission"],
656
- ["value", "data", "parsed", "info", "votes", KEYPATH_WILDCARD, "confirmationCount"]
657
- ],
658
- getBlockTime: [[]],
659
- getInflationReward: [[KEYPATH_WILDCARD, "commission"]],
660
- getRecentPerformanceSamples: [[KEYPATH_WILDCARD, "samplePeriodSecs"]],
661
- getTokenLargestAccounts: [
662
- ["value", KEYPATH_WILDCARD, "decimals"],
663
- ["value", KEYPATH_WILDCARD, "uiAmount"]
664
- ],
665
- getTransaction: [
666
- ["meta", "preTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
667
- ["meta", "preTokenBalances", KEYPATH_WILDCARD, "uiTokenAmount", "decimals"],
668
- ["meta", "postTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
669
- ["meta", "postTokenBalances", KEYPATH_WILDCARD, "uiTokenAmount", "decimals"],
670
- ["meta", "rewards", KEYPATH_WILDCARD, "commission"],
671
- ["meta", "innerInstructions", KEYPATH_WILDCARD, "index"],
672
- ["meta", "innerInstructions", KEYPATH_WILDCARD, "instructions", KEYPATH_WILDCARD, "programIdIndex"],
673
- ["meta", "innerInstructions", KEYPATH_WILDCARD, "instructions", KEYPATH_WILDCARD, "accounts", KEYPATH_WILDCARD],
674
- ["transaction", "message", "addressTableLookups", KEYPATH_WILDCARD, "writableIndexes", KEYPATH_WILDCARD],
675
- ["transaction", "message", "addressTableLookups", KEYPATH_WILDCARD, "readonlyIndexes", KEYPATH_WILDCARD],
676
- ["transaction", "message", "instructions", KEYPATH_WILDCARD, "programIdIndex"],
677
- ["transaction", "message", "instructions", KEYPATH_WILDCARD, "accounts", KEYPATH_WILDCARD],
678
- ["transaction", "message", "header", "numReadonlySignedAccounts"],
679
- ["transaction", "message", "header", "numReadonlyUnsignedAccounts"],
680
- ["transaction", "message", "header", "numRequiredSignatures"]
681
- ],
682
- getVoteAccounts: [
683
- ["current", KEYPATH_WILDCARD, "commission"],
684
- ["delinquent", KEYPATH_WILDCARD, "commission"]
685
- ]
686
- };
1760
+ var memoizedNotificationKeypaths;
1761
+ var memoizedResponseKeypaths;
1762
+ function getAllowedNumericKeypathsForNotification() {
1763
+ if (!memoizedNotificationKeypaths) {
1764
+ memoizedNotificationKeypaths = {};
1765
+ }
1766
+ return memoizedNotificationKeypaths;
1767
+ }
1768
+ function getAllowedNumericKeypathsForResponse() {
1769
+ if (!memoizedResponseKeypaths) {
1770
+ const jsonParsedTokenAccountsConfigs = [
1771
+ // parsed Token/Token22 token account
1772
+ ["data", "parsed", "info", "tokenAmount", "decimals"],
1773
+ ["data", "parsed", "info", "tokenAmount", "uiAmount"],
1774
+ ["data", "parsed", "info", "rentExemptReserve", "decimals"],
1775
+ ["data", "parsed", "info", "rentExemptReserve", "uiAmount"],
1776
+ ["data", "parsed", "info", "delegatedAmount", "decimals"],
1777
+ ["data", "parsed", "info", "delegatedAmount", "uiAmount"],
1778
+ [
1779
+ "data",
1780
+ "parsed",
1781
+ "info",
1782
+ "extensions",
1783
+ KEYPATH_WILDCARD,
1784
+ "state",
1785
+ "olderTransferFee",
1786
+ "transferFeeBasisPoints"
1787
+ ],
1788
+ [
1789
+ "data",
1790
+ "parsed",
1791
+ "info",
1792
+ "extensions",
1793
+ KEYPATH_WILDCARD,
1794
+ "state",
1795
+ "newerTransferFee",
1796
+ "transferFeeBasisPoints"
1797
+ ],
1798
+ ["data", "parsed", "info", "extensions", KEYPATH_WILDCARD, "state", "preUpdateAverageRate"],
1799
+ ["data", "parsed", "info", "extensions", KEYPATH_WILDCARD, "state", "currentRate"]
1800
+ ];
1801
+ const jsonParsedAccountsConfigs = [
1802
+ ...jsonParsedTokenAccountsConfigs,
1803
+ // parsed AddressTableLookup account
1804
+ ["data", "parsed", "info", "lastExtendedSlotStartIndex"],
1805
+ // parsed Config account
1806
+ ["data", "parsed", "info", "slashPenalty"],
1807
+ ["data", "parsed", "info", "warmupCooldownRate"],
1808
+ // parsed Token/Token22 mint account
1809
+ ["data", "parsed", "info", "decimals"],
1810
+ // parsed Token/Token22 multisig account
1811
+ ["data", "parsed", "info", "numRequiredSigners"],
1812
+ ["data", "parsed", "info", "numValidSigners"],
1813
+ // parsed Stake account
1814
+ ["data", "parsed", "info", "stake", "delegation", "warmupCooldownRate"],
1815
+ // parsed Sysvar rent account
1816
+ ["data", "parsed", "info", "exemptionThreshold"],
1817
+ ["data", "parsed", "info", "burnPercent"],
1818
+ // parsed Vote account
1819
+ ["data", "parsed", "info", "commission"],
1820
+ ["data", "parsed", "info", "votes", KEYPATH_WILDCARD, "confirmationCount"]
1821
+ ];
1822
+ memoizedResponseKeypaths = {
1823
+ getAccountInfo: jsonParsedAccountsConfigs.map((c) => ["value", ...c]),
1824
+ getBlock: [
1825
+ ["blockTime"],
1826
+ ["transactions", KEYPATH_WILDCARD, "meta", "preTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
1827
+ [
1828
+ "transactions",
1829
+ KEYPATH_WILDCARD,
1830
+ "meta",
1831
+ "preTokenBalances",
1832
+ KEYPATH_WILDCARD,
1833
+ "uiTokenAmount",
1834
+ "decimals"
1835
+ ],
1836
+ ["transactions", KEYPATH_WILDCARD, "meta", "postTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
1837
+ [
1838
+ "transactions",
1839
+ KEYPATH_WILDCARD,
1840
+ "meta",
1841
+ "postTokenBalances",
1842
+ KEYPATH_WILDCARD,
1843
+ "uiTokenAmount",
1844
+ "decimals"
1845
+ ],
1846
+ ["transactions", KEYPATH_WILDCARD, "meta", "rewards", KEYPATH_WILDCARD, "commission"],
1847
+ ["transactions", KEYPATH_WILDCARD, "meta", "innerInstructions", KEYPATH_WILDCARD, "index"],
1848
+ [
1849
+ "transactions",
1850
+ KEYPATH_WILDCARD,
1851
+ "meta",
1852
+ "innerInstructions",
1853
+ KEYPATH_WILDCARD,
1854
+ "instructions",
1855
+ KEYPATH_WILDCARD,
1856
+ "programIdIndex"
1857
+ ],
1858
+ [
1859
+ "transactions",
1860
+ KEYPATH_WILDCARD,
1861
+ "meta",
1862
+ "innerInstructions",
1863
+ KEYPATH_WILDCARD,
1864
+ "instructions",
1865
+ KEYPATH_WILDCARD,
1866
+ "accounts",
1867
+ KEYPATH_WILDCARD
1868
+ ],
1869
+ [
1870
+ "transactions",
1871
+ KEYPATH_WILDCARD,
1872
+ "transaction",
1873
+ "message",
1874
+ "addressTableLookups",
1875
+ KEYPATH_WILDCARD,
1876
+ "writableIndexes",
1877
+ KEYPATH_WILDCARD
1878
+ ],
1879
+ [
1880
+ "transactions",
1881
+ KEYPATH_WILDCARD,
1882
+ "transaction",
1883
+ "message",
1884
+ "addressTableLookups",
1885
+ KEYPATH_WILDCARD,
1886
+ "readonlyIndexes",
1887
+ KEYPATH_WILDCARD
1888
+ ],
1889
+ [
1890
+ "transactions",
1891
+ KEYPATH_WILDCARD,
1892
+ "transaction",
1893
+ "message",
1894
+ "instructions",
1895
+ KEYPATH_WILDCARD,
1896
+ "programIdIndex"
1897
+ ],
1898
+ [
1899
+ "transactions",
1900
+ KEYPATH_WILDCARD,
1901
+ "transaction",
1902
+ "message",
1903
+ "instructions",
1904
+ KEYPATH_WILDCARD,
1905
+ "accounts",
1906
+ KEYPATH_WILDCARD
1907
+ ],
1908
+ ["transactions", KEYPATH_WILDCARD, "transaction", "message", "header", "numReadonlySignedAccounts"],
1909
+ ["transactions", KEYPATH_WILDCARD, "transaction", "message", "header", "numReadonlyUnsignedAccounts"],
1910
+ ["transactions", KEYPATH_WILDCARD, "transaction", "message", "header", "numRequiredSignatures"],
1911
+ ["rewards", KEYPATH_WILDCARD, "commission"]
1912
+ ],
1913
+ getBlockTime: [[]],
1914
+ getClusterNodes: [
1915
+ [KEYPATH_WILDCARD, "featureSet"],
1916
+ [KEYPATH_WILDCARD, "shredVersion"]
1917
+ ],
1918
+ getInflationGovernor: [["initial"], ["foundation"], ["foundationTerm"], ["taper"], ["terminal"]],
1919
+ getInflationRate: [["foundation"], ["total"], ["validator"]],
1920
+ getInflationReward: [[KEYPATH_WILDCARD, "commission"]],
1921
+ getMultipleAccounts: jsonParsedAccountsConfigs.map((c) => ["value", KEYPATH_WILDCARD, ...c]),
1922
+ getProgramAccounts: jsonParsedAccountsConfigs.flatMap((c) => [
1923
+ ["value", KEYPATH_WILDCARD, "account", ...c],
1924
+ [KEYPATH_WILDCARD, "account", ...c]
1925
+ ]),
1926
+ getRecentPerformanceSamples: [[KEYPATH_WILDCARD, "samplePeriodSecs"]],
1927
+ getTokenAccountBalance: [
1928
+ ["value", "decimals"],
1929
+ ["value", "uiAmount"]
1930
+ ],
1931
+ getTokenAccountsByDelegate: jsonParsedTokenAccountsConfigs.map((c) => [
1932
+ "value",
1933
+ KEYPATH_WILDCARD,
1934
+ "account",
1935
+ ...c
1936
+ ]),
1937
+ getTokenAccountsByOwner: jsonParsedTokenAccountsConfigs.map((c) => [
1938
+ "value",
1939
+ KEYPATH_WILDCARD,
1940
+ "account",
1941
+ ...c
1942
+ ]),
1943
+ getTokenLargestAccounts: [
1944
+ ["value", KEYPATH_WILDCARD, "decimals"],
1945
+ ["value", KEYPATH_WILDCARD, "uiAmount"]
1946
+ ],
1947
+ getTokenSupply: [
1948
+ ["value", "decimals"],
1949
+ ["value", "uiAmount"]
1950
+ ],
1951
+ getTransaction: [
1952
+ ["meta", "preTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
1953
+ ["meta", "preTokenBalances", KEYPATH_WILDCARD, "uiTokenAmount", "decimals"],
1954
+ ["meta", "postTokenBalances", KEYPATH_WILDCARD, "accountIndex"],
1955
+ ["meta", "postTokenBalances", KEYPATH_WILDCARD, "uiTokenAmount", "decimals"],
1956
+ ["meta", "rewards", KEYPATH_WILDCARD, "commission"],
1957
+ ["meta", "innerInstructions", KEYPATH_WILDCARD, "index"],
1958
+ ["meta", "innerInstructions", KEYPATH_WILDCARD, "instructions", KEYPATH_WILDCARD, "programIdIndex"],
1959
+ [
1960
+ "meta",
1961
+ "innerInstructions",
1962
+ KEYPATH_WILDCARD,
1963
+ "instructions",
1964
+ KEYPATH_WILDCARD,
1965
+ "accounts",
1966
+ KEYPATH_WILDCARD
1967
+ ],
1968
+ [
1969
+ "transaction",
1970
+ "message",
1971
+ "addressTableLookups",
1972
+ KEYPATH_WILDCARD,
1973
+ "writableIndexes",
1974
+ KEYPATH_WILDCARD
1975
+ ],
1976
+ [
1977
+ "transaction",
1978
+ "message",
1979
+ "addressTableLookups",
1980
+ KEYPATH_WILDCARD,
1981
+ "readonlyIndexes",
1982
+ KEYPATH_WILDCARD
1983
+ ],
1984
+ ["transaction", "message", "instructions", KEYPATH_WILDCARD, "programIdIndex"],
1985
+ ["transaction", "message", "instructions", KEYPATH_WILDCARD, "accounts", KEYPATH_WILDCARD],
1986
+ ["transaction", "message", "header", "numReadonlySignedAccounts"],
1987
+ ["transaction", "message", "header", "numReadonlyUnsignedAccounts"],
1988
+ ["transaction", "message", "header", "numRequiredSignatures"]
1989
+ ],
1990
+ getVersion: [["feature-set"]],
1991
+ getVoteAccounts: [
1992
+ ["current", KEYPATH_WILDCARD, "commission"],
1993
+ ["delinquent", KEYPATH_WILDCARD, "commission"]
1994
+ ],
1995
+ simulateTransaction: jsonParsedAccountsConfigs.map((c) => ["value", "accounts", KEYPATH_WILDCARD, ...c])
1996
+ };
1997
+ }
1998
+ return memoizedResponseKeypaths;
1999
+ }
687
2000
  function getNextAllowedKeypaths(keyPaths, property) {
688
2001
  return keyPaths.filter((keyPath) => keyPath[0] === KEYPATH_WILDCARD && typeof property === "number" || keyPath[0] === property).map((keyPath) => keyPath.slice(1));
689
2002
  }
@@ -710,7 +2023,11 @@ this.globalThis.solanaWeb3 = (function (exports) {
710
2023
  }
711
2024
  }
712
2025
  function patchResponseForSolanaLabsRpc(rawResponse, methodName) {
713
- const allowedKeypaths = methodName ? ALLOWED_NUMERIC_KEYPATHS[methodName] : void 0;
2026
+ const allowedKeypaths = methodName ? getAllowedNumericKeypathsForResponse()[methodName] : void 0;
2027
+ return visitNode2(rawResponse, allowedKeypaths ?? []);
2028
+ }
2029
+ function patchResponseForSolanaLabsRpcSubscriptions(rawResponse, methodName) {
2030
+ const allowedKeypaths = methodName ? getAllowedNumericKeypathsForNotification()[methodName] : void 0;
714
2031
  return visitNode2(rawResponse, allowedKeypaths ?? []);
715
2032
  }
716
2033
  function createSolanaRpcApi(config) {
@@ -739,6 +2056,33 @@ this.globalThis.solanaWeb3 = (function (exports) {
739
2056
  }
740
2057
  });
741
2058
  }
2059
+ function createSolanaRpcSubscriptionsApi(config) {
2060
+ return new Proxy({}, {
2061
+ defineProperty() {
2062
+ return false;
2063
+ },
2064
+ deleteProperty() {
2065
+ return false;
2066
+ },
2067
+ get(...args) {
2068
+ const [_, p] = args;
2069
+ const notificationName = p.toString();
2070
+ return function(...rawParams) {
2071
+ const handleIntegerOverflow = config?.onIntegerOverflow;
2072
+ const params = patchParamsForSolanaLabsRpc(
2073
+ rawParams,
2074
+ handleIntegerOverflow ? (keyPath, value) => handleIntegerOverflow(notificationName, keyPath, value) : void 0
2075
+ );
2076
+ return {
2077
+ params,
2078
+ responseProcessor: (rawResponse) => patchResponseForSolanaLabsRpcSubscriptions(rawResponse, notificationName),
2079
+ subscribeMethodName: notificationName.replace(/Notifications$/, "Subscribe"),
2080
+ unsubscribeMethodName: notificationName.replace(/Notifications$/, "Unsubscribe")
2081
+ };
2082
+ };
2083
+ }
2084
+ });
2085
+ }
742
2086
 
743
2087
  // ../rpc-transport/dist/index.browser.js
744
2088
  init_env_shim();
@@ -805,6 +2149,99 @@ this.globalThis.solanaWeb3 = (function (exports) {
805
2149
  function createJsonRpc(rpcConfig) {
806
2150
  return makeProxy(rpcConfig);
807
2151
  }
2152
+ function registerIterableFatal(iterable, catchFn) {
2153
+ (async () => {
2154
+ try {
2155
+ for await (const _ of iterable)
2156
+ ;
2157
+ } catch (e3) {
2158
+ catchFn(e3);
2159
+ }
2160
+ })();
2161
+ }
2162
+ function createPendingRpcSubscription(rpcConfig, { params, subscribeMethodName, unsubscribeMethodName, responseProcessor }) {
2163
+ return {
2164
+ async subscribe(options) {
2165
+ options?.abortSignal?.throwIfAborted();
2166
+ let subscriptionId;
2167
+ function handleCleanup() {
2168
+ if (subscriptionId !== void 0) {
2169
+ const payload = createJsonRpcMessage(unsubscribeMethodName, [subscriptionId]);
2170
+ connection.send_DO_NOT_USE_OR_YOU_WILL_BE_FIRED(payload).finally(() => {
2171
+ connectionAbortController.abort();
2172
+ });
2173
+ } else {
2174
+ connectionAbortController.abort();
2175
+ }
2176
+ }
2177
+ options?.abortSignal?.addEventListener("abort", handleCleanup);
2178
+ const connectionAbortController = new AbortController();
2179
+ const subscribeMessage = createJsonRpcMessage(subscribeMethodName, params);
2180
+ const connection = await rpcConfig.transport({
2181
+ payload: subscribeMessage,
2182
+ signal: connectionAbortController.signal
2183
+ });
2184
+ function handleConnectionFatal() {
2185
+ options?.abortSignal?.removeEventListener("abort", handleCleanup);
2186
+ }
2187
+ registerIterableFatal(connection, handleConnectionFatal);
2188
+ for await (const message of connection) {
2189
+ if ("id" in message && message.id === subscribeMessage.id) {
2190
+ if ("error" in message) {
2191
+ throw new SolanaJsonRpcError(message.error);
2192
+ } else {
2193
+ subscriptionId = message.result;
2194
+ break;
2195
+ }
2196
+ }
2197
+ }
2198
+ if (subscriptionId == null) {
2199
+ throw new Error("Failed to obtain a subscription id from the server");
2200
+ }
2201
+ return {
2202
+ async *[Symbol.asyncIterator]() {
2203
+ for await (const message of connection) {
2204
+ if (!("params" in message) || message.params.subscription !== subscriptionId) {
2205
+ continue;
2206
+ }
2207
+ const notification = message.params.result;
2208
+ yield responseProcessor ? responseProcessor(notification) : notification;
2209
+ }
2210
+ }
2211
+ };
2212
+ }
2213
+ };
2214
+ }
2215
+ function makeProxy2(rpcConfig) {
2216
+ return new Proxy(rpcConfig.api, {
2217
+ defineProperty() {
2218
+ return false;
2219
+ },
2220
+ deleteProperty() {
2221
+ return false;
2222
+ },
2223
+ get(target, p, receiver) {
2224
+ return function(...rawParams) {
2225
+ const methodName = p.toString();
2226
+ const createRpcSubscription = Reflect.get(target, methodName, receiver);
2227
+ if (p.toString().endsWith("Notifications") === false && !createRpcSubscription) {
2228
+ throw new Error(
2229
+ "Either the notification name must end in 'Notifications' or the API must supply a subscription creator function to map between the notification name and the subscribe/unsubscribe method names."
2230
+ );
2231
+ }
2232
+ const newRequest = createRpcSubscription ? createRpcSubscription(...rawParams) : {
2233
+ params: rawParams,
2234
+ subscribeMethodName: methodName.replace(/Notifications$/, "Subscribe"),
2235
+ unsubscribeMethodName: methodName.replace(/Notifications$/, "Unsubscribe")
2236
+ };
2237
+ return createPendingRpcSubscription(rpcConfig, newRequest);
2238
+ };
2239
+ }
2240
+ });
2241
+ }
2242
+ function createJsonSubscriptionRpc(rpcConfig) {
2243
+ return makeProxy2(rpcConfig);
2244
+ }
808
2245
  var e = globalThis.fetch;
809
2246
  var SolanaHttpError = class extends Error {
810
2247
  constructor(details) {
@@ -903,6 +2340,166 @@ this.globalThis.solanaWeb3 = (function (exports) {
903
2340
  return await response.json();
904
2341
  };
905
2342
  }
2343
+ var e2 = globalThis.WebSocket;
2344
+ async function createWebSocketConnection({
2345
+ sendBufferHighWatermark,
2346
+ signal,
2347
+ url
2348
+ }) {
2349
+ return new Promise((resolve, reject) => {
2350
+ signal.addEventListener("abort", handleAbort, { once: true });
2351
+ const iteratorState = /* @__PURE__ */ new Map();
2352
+ function handleAbort() {
2353
+ if (webSocket.readyState !== e2.CLOSED && webSocket.readyState !== e2.CLOSING) {
2354
+ webSocket.close(1e3);
2355
+ }
2356
+ }
2357
+ function handleClose(ev) {
2358
+ bufferDrainWatcher?.onCancel();
2359
+ signal.removeEventListener("abort", handleAbort);
2360
+ webSocket.removeEventListener("close", handleClose);
2361
+ webSocket.removeEventListener("error", handleError);
2362
+ webSocket.removeEventListener("open", handleOpen);
2363
+ webSocket.removeEventListener("message", handleMessage);
2364
+ iteratorState.forEach((state, iteratorKey) => {
2365
+ if (state.__hasPolled) {
2366
+ const { onError } = state;
2367
+ iteratorState.delete(iteratorKey);
2368
+ onError(ev);
2369
+ } else {
2370
+ iteratorState.delete(iteratorKey);
2371
+ }
2372
+ });
2373
+ }
2374
+ function handleError(ev) {
2375
+ if (!hasConnected) {
2376
+ reject(
2377
+ // TODO: Coded error
2378
+ new Error("WebSocket failed to connect", { cause: ev })
2379
+ );
2380
+ }
2381
+ }
2382
+ let hasConnected = false;
2383
+ let bufferDrainWatcher;
2384
+ function handleOpen() {
2385
+ hasConnected = true;
2386
+ resolve({
2387
+ async send(payload) {
2388
+ const message = JSON.stringify(payload);
2389
+ if (!bufferDrainWatcher && webSocket.readyState === e2.OPEN && webSocket.bufferedAmount > sendBufferHighWatermark) {
2390
+ let onCancel;
2391
+ const promise = new Promise((resolve2, reject2) => {
2392
+ const intervalId = setInterval(() => {
2393
+ if (webSocket.readyState !== e2.OPEN || !(webSocket.bufferedAmount > sendBufferHighWatermark)) {
2394
+ clearInterval(intervalId);
2395
+ bufferDrainWatcher = void 0;
2396
+ resolve2();
2397
+ }
2398
+ }, 16);
2399
+ onCancel = () => {
2400
+ bufferDrainWatcher = void 0;
2401
+ clearInterval(intervalId);
2402
+ reject2(
2403
+ // TODO: Coded error
2404
+ new Error("WebSocket was closed before payload could be sent")
2405
+ );
2406
+ };
2407
+ });
2408
+ bufferDrainWatcher = {
2409
+ // eslint-disable-next-line @typescript-eslint/ban-ts-comment
2410
+ // @ts-ignore
2411
+ onCancel,
2412
+ promise
2413
+ };
2414
+ }
2415
+ if (bufferDrainWatcher) {
2416
+ await bufferDrainWatcher.promise;
2417
+ }
2418
+ webSocket.send(message);
2419
+ },
2420
+ async *[Symbol.asyncIterator]() {
2421
+ const iteratorKey = Symbol();
2422
+ iteratorState.set(iteratorKey, { __hasPolled: false, queuedMessages: [] });
2423
+ try {
2424
+ while (true) {
2425
+ const state = iteratorState.get(iteratorKey);
2426
+ if (!state) {
2427
+ throw new Error("Invariant: WebSocket message iterator is missing state storage");
2428
+ }
2429
+ if (state.__hasPolled) {
2430
+ throw new Error(
2431
+ "Invariant: WebSocket message iterator state is corrupt; iterated without first resolving existing message promise"
2432
+ );
2433
+ }
2434
+ const queuedMessages = state.queuedMessages;
2435
+ if (queuedMessages.length) {
2436
+ state.queuedMessages = [];
2437
+ yield* queuedMessages;
2438
+ } else {
2439
+ try {
2440
+ yield await new Promise((onMessage, onError) => {
2441
+ iteratorState.set(iteratorKey, {
2442
+ __hasPolled: true,
2443
+ onError,
2444
+ onMessage
2445
+ });
2446
+ });
2447
+ } catch (e3) {
2448
+ if (e3 !== null && typeof e3 === "object" && "type" in e3 && e3.type === "close" && "wasClean" in e3 && e3.wasClean) {
2449
+ return;
2450
+ } else {
2451
+ throw new Error("WebSocket connection closed", { cause: e3 });
2452
+ }
2453
+ }
2454
+ }
2455
+ }
2456
+ } finally {
2457
+ iteratorState.delete(iteratorKey);
2458
+ }
2459
+ }
2460
+ });
2461
+ }
2462
+ function handleMessage({ data }) {
2463
+ const message = JSON.parse(data);
2464
+ iteratorState.forEach((state, iteratorKey) => {
2465
+ if (state.__hasPolled) {
2466
+ const { onMessage } = state;
2467
+ iteratorState.set(iteratorKey, { __hasPolled: false, queuedMessages: [] });
2468
+ onMessage(message);
2469
+ } else {
2470
+ state.queuedMessages.push(message);
2471
+ }
2472
+ });
2473
+ }
2474
+ const webSocket = new e2(url);
2475
+ webSocket.addEventListener("close", handleClose);
2476
+ webSocket.addEventListener("error", handleError);
2477
+ webSocket.addEventListener("open", handleOpen);
2478
+ webSocket.addEventListener("message", handleMessage);
2479
+ });
2480
+ }
2481
+ function createWebSocketTransport({ sendBufferHighWatermark, url }) {
2482
+ if (/^wss?:/i.test(url) === false) {
2483
+ const protocolMatch = url.match(/^([^:]+):/);
2484
+ throw new DOMException(
2485
+ protocolMatch ? `Failed to construct 'WebSocket': The URL's scheme must be either 'ws' or 'wss'. '${protocolMatch[1]}:' is not allowed.` : `Failed to construct 'WebSocket': The URL '${url}' is invalid.`
2486
+ );
2487
+ }
2488
+ return async function sendWebSocketMessage({ payload, signal }) {
2489
+ signal?.throwIfAborted();
2490
+ const connection = await createWebSocketConnection({
2491
+ sendBufferHighWatermark,
2492
+ signal,
2493
+ url
2494
+ });
2495
+ signal?.throwIfAborted();
2496
+ await connection.send(payload);
2497
+ return {
2498
+ [Symbol.asyncIterator]: connection[Symbol.asyncIterator].bind(connection),
2499
+ send_DO_NOT_USE_OR_YOU_WILL_BE_FIRED: connection.send.bind(connection)
2500
+ };
2501
+ };
2502
+ }
906
2503
 
907
2504
  // src/rpc-default-config.ts
908
2505
  init_env_shim();
@@ -951,6 +2548,12 @@ this.globalThis.solanaWeb3 = (function (exports) {
951
2548
  api: createSolanaRpcApi(DEFAULT_RPC_CONFIG)
952
2549
  });
953
2550
  }
2551
+ function createSolanaRpcSubscriptions(config) {
2552
+ return createJsonSubscriptionRpc({
2553
+ ...config,
2554
+ api: createSolanaRpcSubscriptionsApi(DEFAULT_RPC_CONFIG)
2555
+ });
2556
+ }
954
2557
 
955
2558
  // src/rpc-transport.ts
956
2559
  init_env_shim();
@@ -987,14 +2590,14 @@ this.globalThis.solanaWeb3 = (function (exports) {
987
2590
  if (signal) {
988
2591
  const responsePromise = coalescedRequest.responsePromise;
989
2592
  return await new Promise((resolve, reject) => {
990
- const handleAbort = (e2) => {
2593
+ const handleAbort = (e3) => {
991
2594
  signal.removeEventListener("abort", handleAbort);
992
2595
  coalescedRequest.numConsumers -= 1;
993
2596
  if (coalescedRequest.numConsumers === 0) {
994
2597
  const abortController = coalescedRequest.abortController;
995
2598
  abortController.abort();
996
2599
  }
997
- const abortError = new DOMException(e2.target.reason, "AbortError");
2600
+ const abortError = new DOMException(e3.target.reason, "AbortError");
998
2601
  reject(abortError);
999
2602
  };
1000
2603
  signal.addEventListener("abort", handleAbort);
@@ -1044,20 +2647,92 @@ this.globalThis.solanaWeb3 = (function (exports) {
1044
2647
  );
1045
2648
  }
1046
2649
 
2650
+ // src/rpc-websocket-transport.ts
2651
+ init_env_shim();
2652
+
2653
+ // src/rpc-websocket-autopinger.ts
2654
+ init_env_shim();
2655
+ var PING_PAYLOAD = {
2656
+ jsonrpc: "2.0",
2657
+ method: "ping"
2658
+ };
2659
+ function getWebSocketTransportWithAutoping({ intervalMs, transport }) {
2660
+ const pingableConnections = /* @__PURE__ */ new Map();
2661
+ return async (...args) => {
2662
+ const connection = await transport(...args);
2663
+ let intervalId;
2664
+ function restartPingTimer() {
2665
+ clearInterval(intervalId);
2666
+ intervalId = setInterval(() => {
2667
+ connection.send_DO_NOT_USE_OR_YOU_WILL_BE_FIRED(PING_PAYLOAD);
2668
+ }, intervalMs);
2669
+ }
2670
+ if (pingableConnections.has(connection) === false) {
2671
+ pingableConnections.set(connection, {
2672
+ [Symbol.asyncIterator]: connection[Symbol.asyncIterator].bind(connection),
2673
+ send_DO_NOT_USE_OR_YOU_WILL_BE_FIRED: (...args2) => {
2674
+ restartPingTimer();
2675
+ return connection.send_DO_NOT_USE_OR_YOU_WILL_BE_FIRED(...args2);
2676
+ }
2677
+ });
2678
+ (async () => {
2679
+ try {
2680
+ for await (const _ of connection) {
2681
+ restartPingTimer();
2682
+ }
2683
+ } catch {
2684
+ } finally {
2685
+ pingableConnections.delete(connection);
2686
+ clearInterval(intervalId);
2687
+ }
2688
+ })();
2689
+ restartPingTimer();
2690
+ }
2691
+ return pingableConnections.get(connection);
2692
+ };
2693
+ }
2694
+
2695
+ // src/rpc-websocket-transport.ts
2696
+ function createDefaultRpcSubscriptionsTransport(config) {
2697
+ const { intervalMs, ...rest } = config;
2698
+ return getWebSocketTransportWithAutoping({
2699
+ intervalMs: intervalMs ?? 5e3,
2700
+ transport: createWebSocketTransport({
2701
+ ...rest,
2702
+ sendBufferHighWatermark: config.sendBufferHighWatermark ?? // Let 128KB of data into the WebSocket buffer before buffering it in the app.
2703
+ 131072
2704
+ })
2705
+ });
2706
+ }
2707
+
1047
2708
  exports.AccountRole = AccountRole;
2709
+ exports.appendTransactionInstruction = appendTransactionInstruction;
1048
2710
  exports.assertIsBase58EncodedAddress = assertIsBase58EncodedAddress;
2711
+ exports.assertIsBlockhash = assertIsBlockhash;
2712
+ exports.assertIsDurableNonceTransaction = assertIsDurableNonceTransaction;
2713
+ exports.createAddressWithSeed = createAddressWithSeed;
2714
+ exports.createDefaultRpcSubscriptionsTransport = createDefaultRpcSubscriptionsTransport;
1049
2715
  exports.createDefaultRpcTransport = createDefaultRpcTransport;
1050
2716
  exports.createSolanaRpc = createSolanaRpc;
2717
+ exports.createSolanaRpcSubscriptions = createSolanaRpcSubscriptions;
2718
+ exports.createTransaction = createTransaction;
1051
2719
  exports.downgradeRoleToNonSigner = downgradeRoleToNonSigner;
1052
2720
  exports.downgradeRoleToReadonly = downgradeRoleToReadonly;
1053
2721
  exports.generateKeyPair = generateKeyPair;
2722
+ exports.getAddressFromPublicKey = getAddressFromPublicKey;
1054
2723
  exports.getBase58EncodedAddressCodec = getBase58EncodedAddressCodec;
1055
2724
  exports.getBase58EncodedAddressComparator = getBase58EncodedAddressComparator;
1056
- exports.getBase58EncodedAddressFromPublicKey = getBase58EncodedAddressFromPublicKey;
2725
+ exports.getBase64EncodedWireTransaction = getBase64EncodedWireTransaction;
2726
+ exports.getProgramDerivedAddress = getProgramDerivedAddress;
1057
2727
  exports.isSignerRole = isSignerRole;
1058
2728
  exports.isWritableRole = isWritableRole;
1059
2729
  exports.mergeRoles = mergeRoles;
2730
+ exports.prependTransactionInstruction = prependTransactionInstruction;
2731
+ exports.setTransactionFeePayer = setTransactionFeePayer;
2732
+ exports.setTransactionLifetimeUsingBlockhash = setTransactionLifetimeUsingBlockhash;
2733
+ exports.setTransactionLifetimeUsingDurableNonce = setTransactionLifetimeUsingDurableNonce;
1060
2734
  exports.signBytes = signBytes;
2735
+ exports.signTransaction = signTransaction;
1061
2736
  exports.upgradeRoleToSigner = upgradeRoleToSigner;
1062
2737
  exports.upgradeRoleToWritable = upgradeRoleToWritable;
1063
2738
  exports.verifySignature = verifySignature;