@super-protocol/sdk-js 3.16.4 → 3.17.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/RIGenerator.d.ts +3 -2
- package/dist/cjs/RIGenerator.js +7 -6
- package/dist/cjs/TIIGenerator.d.ts +2 -2
- package/dist/cjs/TIIGenerator.js +32 -4
- package/dist/cjs/TeeInputGeneratorBase.d.ts +3 -3
- package/dist/cjs/TeeInputGeneratorBase.js +5 -5
- package/dist/cjs/certificates/serializer.d.ts +5 -3
- package/dist/cjs/certificates/serializer.js +26 -11
- package/dist/cjs/certificates/types.d.ts +1 -1
- package/dist/cjs/connectors/BaseConnector.d.ts +3 -3
- package/dist/cjs/connectors/BaseConnector.js +1 -1
- package/dist/cjs/connectors/BlockchainConnector.js +3 -3
- package/dist/cjs/connectors/BlockchainEventsListener.d.ts +2 -2
- package/dist/cjs/connectors/BlockchainEventsListener.js +3 -2
- package/dist/cjs/constants.d.ts +1 -3
- package/dist/cjs/constants.js +3 -7
- package/dist/cjs/contracts/abi.d.ts +1067 -1137
- package/dist/cjs/contracts/abi.js +1408 -1500
- package/dist/cjs/crypto/Crypto.d.ts +10 -13
- package/dist/cjs/crypto/Crypto.js +14 -17
- package/dist/cjs/crypto/nodejs/AES.d.ts +1 -1
- package/dist/cjs/crypto/nodejs/AES.js +2 -2
- package/dist/cjs/crypto/nodejs/ARIA.d.ts +1 -1
- package/dist/cjs/crypto/nodejs/ARIA.js +2 -2
- package/dist/cjs/errors/index.d.ts +1 -0
- package/dist/cjs/errors/index.js +4 -2
- package/dist/cjs/errors/insufficient-funds.error.d.ts +19 -0
- package/dist/cjs/errors/insufficient-funds.error.js +57 -0
- package/dist/cjs/index.d.ts +3 -6
- package/dist/cjs/index.js +6 -9
- package/dist/cjs/models/Offer.d.ts +16 -1
- package/dist/cjs/models/Offer.js +59 -9
- package/dist/cjs/models/Order.d.ts +1 -1
- package/dist/cjs/models/Order.js +11 -15
- package/dist/cjs/models/Provider.d.ts +0 -1
- package/dist/cjs/models/Provider.js +1 -7
- package/dist/cjs/models/TCB.d.ts +1 -28
- package/dist/cjs/models/TCB.js +1 -61
- package/dist/cjs/models/TeeOffer.d.ts +3 -18
- package/dist/cjs/models/TeeOffer.js +20 -106
- package/dist/cjs/providers/storage/S3StorageProvider.js +5 -5
- package/dist/cjs/providers/storage/StorageKeyValueAdapter.d.ts +1 -1
- package/dist/cjs/providers/storage/StorageKeyValueAdapter.js +7 -7
- package/dist/cjs/providers/storage/fs-storage-provider.js +35 -15
- package/dist/cjs/providers/storage/parseStorageCredentials.d.ts +1 -2
- package/dist/cjs/staticModels/Consensus.d.ts +5 -16
- package/dist/cjs/staticModels/Consensus.js +17 -86
- package/dist/cjs/staticModels/Offers.d.ts +4 -1
- package/dist/cjs/staticModels/Offers.js +9 -8
- package/dist/cjs/staticModels/OffersCommon.d.ts +3 -1
- package/dist/cjs/staticModels/OffersCommon.js +6 -2
- package/dist/cjs/staticModels/Orders.js +12 -11
- package/dist/cjs/staticModels/ProviderRewards.js +2 -2
- package/dist/cjs/staticModels/StaticModel.js +5 -5
- package/dist/cjs/staticModels/SuperproToken.d.ts +7 -7
- package/dist/cjs/staticModels/SuperproToken.js +3 -3
- package/dist/cjs/staticModels/TeeOffers.d.ts +1 -7
- package/dist/cjs/staticModels/TeeOffers.js +11 -20
- package/dist/cjs/store.d.ts +0 -1
- package/dist/cjs/store.js +1 -2
- package/dist/cjs/tee/TeeBlockVerifier.d.ts +1 -2
- package/dist/cjs/tee/TeeBlockVerifier.js +17 -24
- package/dist/cjs/tee/TeeCertificateService.d.ts +1 -1
- package/dist/cjs/tee/TeeCertificateService.js +6 -10
- package/dist/cjs/tee/statuses.d.ts +0 -7
- package/dist/cjs/tee/statuses.js +2 -10
- package/dist/cjs/types/Consensus.d.ts +10 -31
- package/dist/cjs/types/Consensus.js +2 -10
- package/dist/cjs/types/Offer.d.ts +5 -0
- package/dist/cjs/types/Order.d.ts +26 -21
- package/dist/cjs/types/Order.js +24 -17
- package/dist/cjs/types/index.d.ts +0 -1
- package/dist/cjs/types/index.js +1 -2
- package/dist/cjs/utils/CryptoKeysTransformer.js +5 -5
- package/dist/cjs/utils/TxManager.js +21 -5
- package/dist/cjs/utils/helper.d.ts +2 -8
- package/dist/cjs/utils/helper.js +6 -75
- package/dist/cjs/utils/helpers/OrderArgsHelper.d.ts +2 -2
- package/dist/cjs/utils/helpers/OrderArgsHelper.js +5 -5
- package/dist/cjs/utils/helpers/index.d.ts +1 -0
- package/dist/cjs/utils/helpers/index.js +2 -1
- package/dist/cjs/utils/helpers/streamToBuffer.d.ts +4 -0
- package/dist/cjs/utils/helpers/streamToBuffer.js +13 -0
- package/dist/cjs/utils/order/versify.js +1 -7
- package/dist/cjs/utils/rent-calculator/rent-calculator.js +2 -3
- package/dist/cjs/utils/rent-calculator/types.d.ts +0 -1
- package/dist/cjs/utils/tcb.d.ts +2 -0
- package/dist/cjs/utils/tcb.js +13 -0
- package/dist/cjs/utils/types.d.ts +0 -5
- package/dist/mjs/RIGenerator.d.ts +3 -2
- package/dist/mjs/RIGenerator.js +8 -7
- package/dist/mjs/TIIGenerator.d.ts +2 -2
- package/dist/mjs/TIIGenerator.js +32 -4
- package/dist/mjs/TeeInputGeneratorBase.d.ts +3 -3
- package/dist/mjs/TeeInputGeneratorBase.js +5 -5
- package/dist/mjs/certificates/serializer.d.ts +5 -3
- package/dist/mjs/certificates/serializer.js +26 -11
- package/dist/mjs/certificates/types.d.ts +1 -1
- package/dist/mjs/connectors/BaseConnector.d.ts +3 -3
- package/dist/mjs/connectors/BaseConnector.js +1 -1
- package/dist/mjs/connectors/BlockchainConnector.js +3 -3
- package/dist/mjs/connectors/BlockchainEventsListener.d.ts +2 -2
- package/dist/mjs/connectors/BlockchainEventsListener.js +3 -2
- package/dist/mjs/constants.d.ts +1 -3
- package/dist/mjs/constants.js +2 -6
- package/dist/mjs/contracts/abi.d.ts +1067 -1137
- package/dist/mjs/contracts/abi.js +1406 -1498
- package/dist/mjs/crypto/Crypto.d.ts +10 -13
- package/dist/mjs/crypto/Crypto.js +14 -17
- package/dist/mjs/crypto/nodejs/AES.d.ts +1 -1
- package/dist/mjs/crypto/nodejs/AES.js +2 -2
- package/dist/mjs/crypto/nodejs/ARIA.d.ts +1 -1
- package/dist/mjs/crypto/nodejs/ARIA.js +2 -2
- package/dist/mjs/errors/index.d.ts +1 -0
- package/dist/mjs/errors/index.js +2 -1
- package/dist/mjs/errors/insufficient-funds.error.d.ts +19 -0
- package/dist/mjs/errors/insufficient-funds.error.js +53 -0
- package/dist/mjs/index.d.ts +3 -6
- package/dist/mjs/index.js +4 -7
- package/dist/mjs/models/Offer.d.ts +16 -1
- package/dist/mjs/models/Offer.js +53 -3
- package/dist/mjs/models/Order.d.ts +1 -1
- package/dist/mjs/models/Order.js +11 -15
- package/dist/mjs/models/Provider.d.ts +0 -1
- package/dist/mjs/models/Provider.js +1 -7
- package/dist/mjs/models/TCB.d.ts +1 -28
- package/dist/mjs/models/TCB.js +2 -62
- package/dist/mjs/models/TeeOffer.d.ts +3 -18
- package/dist/mjs/models/TeeOffer.js +13 -99
- package/dist/mjs/providers/storage/S3StorageProvider.js +5 -5
- package/dist/mjs/providers/storage/StorageKeyValueAdapter.d.ts +1 -1
- package/dist/mjs/providers/storage/StorageKeyValueAdapter.js +7 -7
- package/dist/mjs/providers/storage/fs-storage-provider.js +35 -15
- package/dist/mjs/providers/storage/parseStorageCredentials.d.ts +1 -2
- package/dist/mjs/staticModels/Consensus.d.ts +5 -16
- package/dist/mjs/staticModels/Consensus.js +18 -87
- package/dist/mjs/staticModels/Offers.d.ts +4 -1
- package/dist/mjs/staticModels/Offers.js +9 -8
- package/dist/mjs/staticModels/OffersCommon.d.ts +3 -1
- package/dist/mjs/staticModels/OffersCommon.js +6 -2
- package/dist/mjs/staticModels/Orders.js +12 -11
- package/dist/mjs/staticModels/ProviderRewards.js +3 -3
- package/dist/mjs/staticModels/StaticModel.js +5 -5
- package/dist/mjs/staticModels/SuperproToken.d.ts +7 -7
- package/dist/mjs/staticModels/SuperproToken.js +3 -3
- package/dist/mjs/staticModels/TeeOffers.d.ts +1 -7
- package/dist/mjs/staticModels/TeeOffers.js +12 -21
- package/dist/mjs/store.d.ts +0 -1
- package/dist/mjs/store.js +2 -3
- package/dist/mjs/tee/TeeBlockVerifier.d.ts +1 -2
- package/dist/mjs/tee/TeeBlockVerifier.js +17 -24
- package/dist/mjs/tee/TeeCertificateService.d.ts +1 -1
- package/dist/mjs/tee/TeeCertificateService.js +7 -11
- package/dist/mjs/tee/statuses.d.ts +0 -7
- package/dist/mjs/tee/statuses.js +1 -9
- package/dist/mjs/types/Consensus.d.ts +10 -31
- package/dist/mjs/types/Consensus.js +1 -9
- package/dist/mjs/types/Offer.d.ts +5 -0
- package/dist/mjs/types/Order.d.ts +26 -21
- package/dist/mjs/types/Order.js +21 -17
- package/dist/mjs/types/index.d.ts +0 -1
- package/dist/mjs/types/index.js +1 -2
- package/dist/mjs/utils/CryptoKeysTransformer.js +5 -5
- package/dist/mjs/utils/TxManager.js +21 -5
- package/dist/mjs/utils/helper.d.ts +2 -8
- package/dist/mjs/utils/helper.js +5 -68
- package/dist/mjs/utils/helpers/OrderArgsHelper.d.ts +2 -2
- package/dist/mjs/utils/helpers/OrderArgsHelper.js +5 -5
- package/dist/mjs/utils/helpers/index.d.ts +1 -0
- package/dist/mjs/utils/helpers/index.js +2 -1
- package/dist/mjs/utils/helpers/streamToBuffer.d.ts +4 -0
- package/dist/mjs/utils/helpers/streamToBuffer.js +9 -0
- package/dist/mjs/utils/order/versify.js +1 -7
- package/dist/mjs/utils/rent-calculator/rent-calculator.js +2 -3
- package/dist/mjs/utils/rent-calculator/types.d.ts +0 -1
- package/dist/mjs/utils/tcb.d.ts +2 -0
- package/dist/mjs/utils/tcb.js +9 -0
- package/dist/mjs/utils/types.d.ts +0 -5
- package/package.json +8 -9
- package/dist/cjs/contracts/Campaign.d.ts +0 -1198
- package/dist/cjs/contracts/Campaign.js +0 -1554
- package/dist/cjs/contracts/adminCertificateHelperAbi.d.ts +0 -316
- package/dist/cjs/contracts/adminCertificateHelperAbi.js +0 -410
- package/dist/cjs/proto/TeeDeviceInfo.d.ts +0 -292
- package/dist/cjs/proto/TeeDeviceInfo.js +0 -491
- package/dist/cjs/staticModels/AdminCertificateHelper.d.ts +0 -24
- package/dist/cjs/staticModels/AdminCertificateHelper.js +0 -99
- package/dist/cjs/staticModels/Campaign.d.ts +0 -62
- package/dist/cjs/staticModels/Campaign.js +0 -318
- package/dist/cjs/tee/QuoteValidator.d.ts +0 -46
- package/dist/cjs/tee/QuoteValidator.js +0 -456
- package/dist/cjs/tee/TcbSerializer.d.ts +0 -20
- package/dist/cjs/tee/TcbSerializer.js +0 -27
- package/dist/cjs/types/Campaign.d.ts +0 -55
- package/dist/cjs/types/Campaign.js +0 -17
- package/dist/cjs/utils/admin-service.d.ts +0 -13
- package/dist/cjs/utils/admin-service.js +0 -73
- package/dist/mjs/contracts/Campaign.d.ts +0 -1198
- package/dist/mjs/contracts/Campaign.js +0 -1551
- package/dist/mjs/contracts/adminCertificateHelperAbi.d.ts +0 -316
- package/dist/mjs/contracts/adminCertificateHelperAbi.js +0 -407
- package/dist/mjs/proto/TeeDeviceInfo.d.ts +0 -292
- package/dist/mjs/proto/TeeDeviceInfo.js +0 -485
- package/dist/mjs/staticModels/AdminCertificateHelper.d.ts +0 -24
- package/dist/mjs/staticModels/AdminCertificateHelper.js +0 -92
- package/dist/mjs/staticModels/Campaign.d.ts +0 -62
- package/dist/mjs/staticModels/Campaign.js +0 -313
- package/dist/mjs/tee/QuoteValidator.d.ts +0 -46
- package/dist/mjs/tee/QuoteValidator.js +0 -449
- package/dist/mjs/tee/TcbSerializer.d.ts +0 -20
- package/dist/mjs/tee/TcbSerializer.js +0 -23
- package/dist/mjs/types/Campaign.d.ts +0 -55
- package/dist/mjs/types/Campaign.js +0 -14
- package/dist/mjs/utils/admin-service.d.ts +0 -13
- package/dist/mjs/utils/admin-service.js +0 -66
|
@@ -1,449 +0,0 @@
|
|
|
1
|
-
import axios from 'axios';
|
|
2
|
-
import elliptic from 'elliptic';
|
|
3
|
-
import forge from 'node-forge';
|
|
4
|
-
import { Certificate } from '@fidm/x509';
|
|
5
|
-
import { formatter } from 'js-encoding-utils';
|
|
6
|
-
import { CertificateRevocationList } from 'pkijs';
|
|
7
|
-
import { fromBER } from 'asn1js';
|
|
8
|
-
import _ from 'lodash';
|
|
9
|
-
import { TeeSgxParser, TeeTdxParser, TeeParser } from './QuoteParser.js';
|
|
10
|
-
import { QuoteType, } from './types.js';
|
|
11
|
-
import rootLogger from '../logger.js';
|
|
12
|
-
import { TeeQuoteValidatorError } from './errors.js';
|
|
13
|
-
import { QEIdentityStatuses, TCBStatuses, QuoteValidationStatuses } from './statuses.js';
|
|
14
|
-
import { Encoding, HashAlgorithm } from '@super-protocol/dto-js';
|
|
15
|
-
import Crypto from '../crypto/index.js';
|
|
16
|
-
import { TeeSignatureVerifier } from './TeeSignatureVerifier.js';
|
|
17
|
-
import { ChallengeType } from '@super-protocol/pki-common';
|
|
18
|
-
const { ec } = elliptic;
|
|
19
|
-
const { util, asn1 } = forge;
|
|
20
|
-
const INTEL_BASE_SGX_URL = 'https://api.trustedservices.intel.com';
|
|
21
|
-
const INTEL_SGX_ROOT_CA_URL = 'https://certificates.trustedservices.intel.com/IntelSGXRootCA.der';
|
|
22
|
-
const SGX_OID = '1.2.840.113741.1.13.1';
|
|
23
|
-
const FMSPC_OID = `${SGX_OID}.4`;
|
|
24
|
-
const PCEID_OID = `${SGX_OID}.3`;
|
|
25
|
-
const TCB_OID = `${SGX_OID}.2`;
|
|
26
|
-
const PCESVN_OID = `${TCB_OID}.17`;
|
|
27
|
-
const INTEL_ROOT_PUB_KEY = new Uint8Array([
|
|
28
|
-
4, 11, 169, 196, 192, 192, 200, 97, 147, 163, 254, 35, 214, 176, 44, 218, 16, 168, 187, 212, 232,
|
|
29
|
-
142, 72, 180, 69, 133, 97, 163, 110, 112, 85, 37, 245, 103, 145, 142, 46, 220, 136, 228, 13, 134,
|
|
30
|
-
11, 208, 204, 78, 226, 106, 172, 201, 136, 229, 5, 169, 83, 85, 140, 69, 63, 107, 9, 4, 174, 115,
|
|
31
|
-
148,
|
|
32
|
-
]);
|
|
33
|
-
export class QuoteValidator {
|
|
34
|
-
isDefault;
|
|
35
|
-
baseUrl;
|
|
36
|
-
teeSgxParser;
|
|
37
|
-
teeTdxParser;
|
|
38
|
-
logger;
|
|
39
|
-
constructor(baseUrl) {
|
|
40
|
-
this.isDefault = baseUrl === INTEL_BASE_SGX_URL;
|
|
41
|
-
this.baseUrl = `${baseUrl}/sgx/certification/v4`;
|
|
42
|
-
this.teeSgxParser = new TeeSgxParser();
|
|
43
|
-
this.teeTdxParser = new TeeTdxParser();
|
|
44
|
-
this.logger = rootLogger.child({ className: QuoteValidator.name });
|
|
45
|
-
}
|
|
46
|
-
static getSignature(mrEnclave, challengeType, options) {
|
|
47
|
-
return TeeSignatureVerifier.getSignature(mrEnclave, challengeType, options);
|
|
48
|
-
}
|
|
49
|
-
static async checkSignature(quote, options = { getMrEnclaveSignature: TeeSignatureVerifier.getSignature }) {
|
|
50
|
-
const { type: quoteType } = TeeSgxParser.determineQuoteType(quote);
|
|
51
|
-
switch (quoteType) {
|
|
52
|
-
case QuoteType.SGX: {
|
|
53
|
-
const parser = new TeeSgxParser();
|
|
54
|
-
const parsedQuote = parser.parseQuote(quote);
|
|
55
|
-
const report = parser.parseReport(parsedQuote.report);
|
|
56
|
-
TeeSignatureVerifier.validateSignatureSgx(report.mrSigner);
|
|
57
|
-
break;
|
|
58
|
-
}
|
|
59
|
-
case QuoteType.TDX: {
|
|
60
|
-
const mrEnclave = TeeParser.getMrEnclave(quote);
|
|
61
|
-
await TeeSignatureVerifier.validateSignature(mrEnclave, ChallengeType.TDX, options);
|
|
62
|
-
break;
|
|
63
|
-
}
|
|
64
|
-
}
|
|
65
|
-
}
|
|
66
|
-
splitChain(chain) {
|
|
67
|
-
const begin = '-----BEGIN CERTIFICATE-----';
|
|
68
|
-
const end = '-----END CERTIFICATE-----';
|
|
69
|
-
return chain
|
|
70
|
-
.split(begin)
|
|
71
|
-
.filter(Boolean)
|
|
72
|
-
.map((cert) => begin.concat(cert.slice(0, cert.indexOf(end)), end));
|
|
73
|
-
}
|
|
74
|
-
findSequenceByOID(hexValue, targetOID) {
|
|
75
|
-
const buffer = util.hexToBytes(hexValue);
|
|
76
|
-
const asn1Data = asn1.fromDer(buffer);
|
|
77
|
-
return this.searchForSequence(asn1Data, targetOID);
|
|
78
|
-
}
|
|
79
|
-
searchForSequence(asn1Data, targetOID) {
|
|
80
|
-
if (asn1Data.type === asn1.Type.SEQUENCE) {
|
|
81
|
-
for (const child of asn1Data.value) {
|
|
82
|
-
if (child.type === asn1.Type.OID) {
|
|
83
|
-
const oid = asn1.derToOid(child.value);
|
|
84
|
-
if (oid === targetOID) {
|
|
85
|
-
return asn1Data;
|
|
86
|
-
}
|
|
87
|
-
}
|
|
88
|
-
}
|
|
89
|
-
}
|
|
90
|
-
if (Array.isArray(asn1Data.value)) {
|
|
91
|
-
for (const child of asn1Data.value) {
|
|
92
|
-
const result = this.searchForSequence(child, targetOID);
|
|
93
|
-
if (result) {
|
|
94
|
-
return result;
|
|
95
|
-
}
|
|
96
|
-
}
|
|
97
|
-
}
|
|
98
|
-
return null;
|
|
99
|
-
}
|
|
100
|
-
verifyDataBySignature(data, signature, key) {
|
|
101
|
-
const ellipticEc = new ec('p256');
|
|
102
|
-
return ellipticEc.verify(data, {
|
|
103
|
-
r: signature.subarray(0, 32),
|
|
104
|
-
s: signature.subarray(32),
|
|
105
|
-
}, ellipticEc.keyFromPublic(key, 'hex'));
|
|
106
|
-
}
|
|
107
|
-
checkValidDate(from, to) {
|
|
108
|
-
const now = Date.now();
|
|
109
|
-
return from < now && now < to;
|
|
110
|
-
}
|
|
111
|
-
checkChainForIssuers(pckCert, platformCert, rootCert) {
|
|
112
|
-
return (_.isEqual(pckCert.issuer, platformCert.subject) &&
|
|
113
|
-
_.isEqual(platformCert.issuer, rootCert.subject));
|
|
114
|
-
}
|
|
115
|
-
getCrl(crlData) {
|
|
116
|
-
const crlDer = crlData.startsWith('-----')
|
|
117
|
-
? formatter.pemToBin(crlData)
|
|
118
|
-
: Buffer.from(crlData, 'hex');
|
|
119
|
-
const crlAsn = fromBER(crlDer);
|
|
120
|
-
return new CertificateRevocationList({ schema: crlAsn.result });
|
|
121
|
-
}
|
|
122
|
-
checkCertificatesInCrl(crl, certIds) {
|
|
123
|
-
if (!crl.thisUpdate || !crl.nextUpdate) {
|
|
124
|
-
throw new TeeQuoteValidatorError('Certificate revocation list has no update date field');
|
|
125
|
-
}
|
|
126
|
-
if (!this.checkValidDate(crl.thisUpdate.value.valueOf(), crl.nextUpdate.value.valueOf())) {
|
|
127
|
-
throw new TeeQuoteValidatorError('Certificate revocation list has invalid update date');
|
|
128
|
-
}
|
|
129
|
-
if (crl.revokedCertificates) {
|
|
130
|
-
const isAnyRevoked = crl.revokedCertificates.find((revoked) => certIds.includes(Buffer.from(revoked.userCertificate.valueBlock.valueHexView).toString('hex')));
|
|
131
|
-
if (isAnyRevoked) {
|
|
132
|
-
throw new TeeQuoteValidatorError('Certificate in revokation list');
|
|
133
|
-
}
|
|
134
|
-
}
|
|
135
|
-
}
|
|
136
|
-
async getCertificates(quote) {
|
|
137
|
-
const platformCrlResult = await axios.get(`${this.baseUrl}/pckcrl?ca=platform&encoding=pem`);
|
|
138
|
-
const platformChain = decodeURIComponent(platformCrlResult.headers['sgx-pck-crl-issuer-chain']);
|
|
139
|
-
const [platformFetchedPem, rootFetchedPem] = this.splitChain(platformChain); // [platform, root]
|
|
140
|
-
const platformFetchedCert = Certificate.fromPEM(Buffer.from(platformFetchedPem));
|
|
141
|
-
const rootFetchedCert = Certificate.fromPEM(Buffer.from(rootFetchedPem));
|
|
142
|
-
if (!this.checkValidDate(platformFetchedCert.validFrom.valueOf(), platformFetchedCert.validTo.valueOf())) {
|
|
143
|
-
throw new TeeQuoteValidatorError('Platform certificate validation date is not valid');
|
|
144
|
-
}
|
|
145
|
-
if (!this.checkValidDate(rootFetchedCert.validFrom.valueOf(), rootFetchedCert.validTo.valueOf())) {
|
|
146
|
-
throw new TeeQuoteValidatorError('Root certificate validation date is not valid');
|
|
147
|
-
}
|
|
148
|
-
if (!_.isEqual(rootFetchedCert.issuer, rootFetchedCert.subject)) {
|
|
149
|
-
throw new TeeQuoteValidatorError('Root certificate is not self-signed');
|
|
150
|
-
}
|
|
151
|
-
if (Buffer.compare(rootFetchedCert.publicKey.keyRaw, INTEL_ROOT_PUB_KEY) !== 0) {
|
|
152
|
-
throw new TeeQuoteValidatorError('Wrong Intel root certificate public key');
|
|
153
|
-
}
|
|
154
|
-
const pckCert = Certificate.fromPEM(Buffer.from(quote.certificates.device.pem));
|
|
155
|
-
const certType = quote.qeCertificationDataType;
|
|
156
|
-
if (!this.checkValidDate(pckCert.validFrom.valueOf(), pckCert.validTo.valueOf())) {
|
|
157
|
-
throw new TeeQuoteValidatorError('PCK certificate validation date is not valid');
|
|
158
|
-
}
|
|
159
|
-
if (certType !== 5) {
|
|
160
|
-
throw new TeeQuoteValidatorError(`Unsupported certification data type: ${certType}`);
|
|
161
|
-
}
|
|
162
|
-
if (rootFetchedPem !== quote.certificates.root.pem) {
|
|
163
|
-
throw new TeeQuoteValidatorError("Invalid SGX root certificate in quote's certificate chain");
|
|
164
|
-
}
|
|
165
|
-
if (!this.checkChainForIssuers(pckCert, platformFetchedCert, rootFetchedCert)) {
|
|
166
|
-
throw new TeeQuoteValidatorError('Invalid issuers in certificates chain');
|
|
167
|
-
}
|
|
168
|
-
const certIds = [
|
|
169
|
-
rootFetchedCert.serialNumber,
|
|
170
|
-
platformFetchedCert.serialNumber,
|
|
171
|
-
pckCert.serialNumber,
|
|
172
|
-
];
|
|
173
|
-
const caCrlUrl = this.isDefault
|
|
174
|
-
? INTEL_SGX_ROOT_CA_URL
|
|
175
|
-
: `${this.baseUrl}/crl?uri=${INTEL_SGX_ROOT_CA_URL}`;
|
|
176
|
-
const intelCrlDer = await axios.get(caCrlUrl, {
|
|
177
|
-
responseType: 'arraybuffer',
|
|
178
|
-
});
|
|
179
|
-
const intelCrlAsn = fromBER(Buffer.from(intelCrlDer.data));
|
|
180
|
-
this.checkCertificatesInCrl(new CertificateRevocationList({ schema: intelCrlAsn.result }), certIds);
|
|
181
|
-
const platformCrl = this.getCrl(platformCrlResult.data);
|
|
182
|
-
this.checkCertificatesInCrl(platformCrl, certIds);
|
|
183
|
-
return { pckCert, rootCertPem: rootFetchedPem };
|
|
184
|
-
}
|
|
185
|
-
async verifyQeReportSignature(quote, pckPublicKey) {
|
|
186
|
-
const signature = Buffer.from(quote.qeReportSignature);
|
|
187
|
-
const reportHash = await this.getSha256Hash(Buffer.from(quote.qeReport));
|
|
188
|
-
return this.verifyDataBySignature(reportHash, signature, pckPublicKey);
|
|
189
|
-
}
|
|
190
|
-
async verifyQeReportData(quote, report) {
|
|
191
|
-
const qeAuthData = quote.qeAuthenticationData;
|
|
192
|
-
const attestationKey = quote.ecdsaAttestationKey;
|
|
193
|
-
const qeReportDataHash = report.dataHash;
|
|
194
|
-
const calculatedHash = await this.getSha256Hash(Buffer.concat([attestationKey, qeAuthData]));
|
|
195
|
-
const result = Buffer.compare(qeReportDataHash, calculatedHash);
|
|
196
|
-
return result === 0;
|
|
197
|
-
}
|
|
198
|
-
async verifyEnclaveReportSignature(quote) {
|
|
199
|
-
const key = Buffer.from(quote.ecdsaAttestationKey);
|
|
200
|
-
const headerBuffer = Buffer.from(quote.rawHeader);
|
|
201
|
-
const reportBuffer = quote.quoteType === QuoteType.SGX
|
|
202
|
-
? Buffer.from(quote.report)
|
|
203
|
-
: Buffer.from(quote.tdQuoteBody);
|
|
204
|
-
const expected = quote.quoteType === QuoteType.SGX
|
|
205
|
-
? Buffer.from(quote.isvEnclaveReportSignature)
|
|
206
|
-
: Buffer.from(quote.quoteSignature);
|
|
207
|
-
const calculatedHash = await this.getSha256Hash(Buffer.concat([headerBuffer, reportBuffer]));
|
|
208
|
-
const ellipticEc = new ec('p256');
|
|
209
|
-
return ellipticEc.verify(calculatedHash, {
|
|
210
|
-
r: expected.subarray(0, 32),
|
|
211
|
-
s: expected.subarray(32),
|
|
212
|
-
}, Buffer.concat([Buffer.from([4]), key]));
|
|
213
|
-
}
|
|
214
|
-
async validateQuoteStructure(quote, report, pckPublicKey) {
|
|
215
|
-
if (!(await this.verifyQeReportSignature(quote, pckPublicKey))) {
|
|
216
|
-
throw new TeeQuoteValidatorError('Wrong QE report signature');
|
|
217
|
-
}
|
|
218
|
-
if (!(await this.verifyQeReportData(quote, report))) {
|
|
219
|
-
throw new TeeQuoteValidatorError('Wrong QE report data');
|
|
220
|
-
}
|
|
221
|
-
if (!(await this.verifyEnclaveReportSignature(quote))) {
|
|
222
|
-
throw new TeeQuoteValidatorError('Wrong enclave report signature');
|
|
223
|
-
}
|
|
224
|
-
}
|
|
225
|
-
getSgxExtensionData(pckCert) {
|
|
226
|
-
const sgxExtensionData = pckCert.extensions.find((item) => item.oid === SGX_OID);
|
|
227
|
-
if (!sgxExtensionData) {
|
|
228
|
-
throw new TeeQuoteValidatorError('SGX data not found in PCK certificate');
|
|
229
|
-
}
|
|
230
|
-
return sgxExtensionData;
|
|
231
|
-
}
|
|
232
|
-
getDataFromExtension(sgxExtensionData, targetOid, targetType) {
|
|
233
|
-
const rawData = this.findSequenceByOID(sgxExtensionData.value.toString('hex'), targetOid);
|
|
234
|
-
if (!rawData) {
|
|
235
|
-
throw new TeeQuoteValidatorError(`OID ${targetOid} not found in PCK certificate's SGX data`);
|
|
236
|
-
}
|
|
237
|
-
const data = rawData.value.filter((asnElement) => asnElement.type === targetType);
|
|
238
|
-
if (!data.length) {
|
|
239
|
-
throw new TeeQuoteValidatorError(`Data on OID ${targetOid} of type ${targetType} not found`);
|
|
240
|
-
}
|
|
241
|
-
const result = util.bytesToHex(data[0].value);
|
|
242
|
-
return targetType === asn1.Type.OCTETSTRING ? result : parseInt(result, 16).toString();
|
|
243
|
-
}
|
|
244
|
-
async getTcbInfo(fmspc, rootCertPem, quoteType) {
|
|
245
|
-
let tcbUrl = `${this.baseUrl}/tcb?fmspc=${fmspc}`;
|
|
246
|
-
if (quoteType === QuoteType.TDX) {
|
|
247
|
-
tcbUrl = tcbUrl.replace('sgx/certification', 'tdx/certification');
|
|
248
|
-
}
|
|
249
|
-
const tcbData = await axios.get(tcbUrl);
|
|
250
|
-
const tcbInfoHeader = 'tcb-info-issuer-chain';
|
|
251
|
-
const tcbInfoChain = this.splitChain(decodeURIComponent(tcbData.headers[tcbInfoHeader])); // [tcb, root]
|
|
252
|
-
if (tcbInfoChain[1] !== rootCertPem) {
|
|
253
|
-
throw new TeeQuoteValidatorError('Invalid SGX root certificate in TCB chain');
|
|
254
|
-
}
|
|
255
|
-
const tcbCert = Certificate.fromPEM(Buffer.from(tcbInfoChain[0]));
|
|
256
|
-
const key = tcbCert.publicKey.keyRaw;
|
|
257
|
-
const signature = Buffer.from(tcbData.data.signature, 'hex');
|
|
258
|
-
const calculatedhash = await this.getSha256Hash(Buffer.from(JSON.stringify(tcbData.data.tcbInfo)));
|
|
259
|
-
const result = this.verifyDataBySignature(calculatedhash, signature, key);
|
|
260
|
-
if (!result) {
|
|
261
|
-
throw new TeeQuoteValidatorError('TCB info signature is not valid');
|
|
262
|
-
}
|
|
263
|
-
if (tcbData.data.tcbInfo.nextUpdate.valueOf() > Date.now()) {
|
|
264
|
-
throw new TeeQuoteValidatorError('TCB next update date is out of date');
|
|
265
|
-
}
|
|
266
|
-
return tcbData.data;
|
|
267
|
-
}
|
|
268
|
-
async getQEIdentity(rootCertPem, quoteType) {
|
|
269
|
-
let qeIdentityUrl = `${this.baseUrl}/qe/identity`;
|
|
270
|
-
if (quoteType === QuoteType.TDX) {
|
|
271
|
-
qeIdentityUrl = qeIdentityUrl.replace('sgx/certification', 'tdx/certification');
|
|
272
|
-
}
|
|
273
|
-
const qeIdentityData = await axios.get(qeIdentityUrl);
|
|
274
|
-
const qeIdentityHeader = 'sgx-enclave-identity-issuer-chain';
|
|
275
|
-
const qeIdentityChain = this.splitChain(decodeURIComponent(qeIdentityData.headers[qeIdentityHeader])); // [qeIdentity, root]
|
|
276
|
-
if (qeIdentityChain[1] !== rootCertPem) {
|
|
277
|
-
throw new TeeQuoteValidatorError('Invalid SGX root certificate in enclave identity chain');
|
|
278
|
-
}
|
|
279
|
-
const qeIdentityCert = Certificate.fromPEM(Buffer.from(qeIdentityChain[0]));
|
|
280
|
-
const key = qeIdentityCert.publicKey.keyRaw;
|
|
281
|
-
const signature = Buffer.from(qeIdentityData.data.signature, 'hex');
|
|
282
|
-
const calculatedhash = await this.getSha256Hash(Buffer.from(JSON.stringify(qeIdentityData.data.enclaveIdentity)));
|
|
283
|
-
const result = this.verifyDataBySignature(calculatedhash, signature, key);
|
|
284
|
-
if (!result) {
|
|
285
|
-
throw new TeeQuoteValidatorError('Enclave identity signature is not valid');
|
|
286
|
-
}
|
|
287
|
-
if (qeIdentityData.data.enclaveIdentity.nextUpdate.valueOf() > Date.now()) {
|
|
288
|
-
throw new TeeQuoteValidatorError('Enclave identity next update date is out of date');
|
|
289
|
-
}
|
|
290
|
-
return qeIdentityData.data;
|
|
291
|
-
}
|
|
292
|
-
getQEIdentityStatus(report, qeIdentity) {
|
|
293
|
-
const mrSigner = report.mrSigner.toString('hex');
|
|
294
|
-
if (mrSigner.toUpperCase() !== qeIdentity.enclaveIdentity.mrsigner) {
|
|
295
|
-
throw new TeeQuoteValidatorError('Wrong MR signer in QE report');
|
|
296
|
-
}
|
|
297
|
-
if (report.isvProdId !== qeIdentity.enclaveIdentity.isvprodid) {
|
|
298
|
-
throw new TeeQuoteValidatorError('Wrong ISV PROD ID in QE report');
|
|
299
|
-
}
|
|
300
|
-
const tcbLevel = qeIdentity.enclaveIdentity.tcbLevels.find((tcbLevel) => tcbLevel.tcb.isvsvn <= report.isvSvn);
|
|
301
|
-
const status = tcbLevel?.tcbStatus;
|
|
302
|
-
if (status) {
|
|
303
|
-
this.logger.info(`Enclave identity status is ${tcbLevel?.tcbStatus}`);
|
|
304
|
-
return status;
|
|
305
|
-
}
|
|
306
|
-
return QEIdentityStatuses.OutOfDate;
|
|
307
|
-
}
|
|
308
|
-
getTcbStatus(fmspc, pceId, tcbData, sgxExtensionData) {
|
|
309
|
-
if (fmspc.toUpperCase() !== tcbData.tcbInfo.fmspc.toUpperCase()) {
|
|
310
|
-
throw new TeeQuoteValidatorError('Wrong FMSPC in PCK certificate');
|
|
311
|
-
}
|
|
312
|
-
if (pceId !== tcbData.tcbInfo.pceId) {
|
|
313
|
-
throw new TeeQuoteValidatorError('Wrong PCEID in PCK certificate');
|
|
314
|
-
}
|
|
315
|
-
const pceSvn = this.getDataFromExtension(sgxExtensionData, PCESVN_OID, asn1.Type.INTEGER);
|
|
316
|
-
const sgxComponents = [...Array(16).keys()].map((i) => this.getDataFromExtension(sgxExtensionData, `${TCB_OID}.${i + 1}`, asn1.Type.INTEGER));
|
|
317
|
-
const tcbLevel = tcbData.tcbInfo.tcbLevels.find((tcbLevel) => tcbLevel.tcb.pcesvn <= Number(pceSvn) &&
|
|
318
|
-
tcbLevel.tcb.sgxtcbcomponents.every((el, index) => el.svn <= Number(sgxComponents[index])));
|
|
319
|
-
const status = tcbLevel?.tcbStatus;
|
|
320
|
-
if (status) {
|
|
321
|
-
this.logger.info(`TCB status is ${tcbLevel?.tcbStatus}`);
|
|
322
|
-
return status;
|
|
323
|
-
}
|
|
324
|
-
return TCBStatuses.OutOfDate;
|
|
325
|
-
}
|
|
326
|
-
getQuoteValidationStatus(qeIdentityStatus, tcbStatus) {
|
|
327
|
-
if (qeIdentityStatus === QEIdentityStatuses.OutOfDate) {
|
|
328
|
-
if (tcbStatus === TCBStatuses.UpToDate || tcbStatus === TCBStatuses.SWHardeningNeeded) {
|
|
329
|
-
return QuoteValidationStatuses.SecurityPatchNeeded;
|
|
330
|
-
}
|
|
331
|
-
if (tcbStatus === TCBStatuses.OutOfDateConfigurationNeeded ||
|
|
332
|
-
tcbStatus === TCBStatuses.ConfigurationAndSWHardeningNeeded) {
|
|
333
|
-
return QuoteValidationStatuses.SoftwareUpdateNeeded;
|
|
334
|
-
}
|
|
335
|
-
}
|
|
336
|
-
if (qeIdentityStatus === QEIdentityStatuses.Revoked || tcbStatus === TCBStatuses.Revoked) {
|
|
337
|
-
throw new TeeQuoteValidatorError('QE identity or TCB revoked');
|
|
338
|
-
}
|
|
339
|
-
if (tcbStatus === TCBStatuses.UpToDate) {
|
|
340
|
-
return QuoteValidationStatuses.UpToDate;
|
|
341
|
-
}
|
|
342
|
-
if (tcbStatus === TCBStatuses.OutOfDate) {
|
|
343
|
-
return QuoteValidationStatuses.SecurityPatchNeeded;
|
|
344
|
-
}
|
|
345
|
-
if (tcbStatus === TCBStatuses.ConfigurationNeeded) {
|
|
346
|
-
return QuoteValidationStatuses.ConfigurationNeeded;
|
|
347
|
-
}
|
|
348
|
-
return QuoteValidationStatuses.SoftwareUpdateNeeded;
|
|
349
|
-
}
|
|
350
|
-
getQuoteValidationStatusDescription(status) {
|
|
351
|
-
switch (status) {
|
|
352
|
-
case QuoteValidationStatuses.UpToDate:
|
|
353
|
-
return 'The Quote verification passed and is at the latest TCB level.';
|
|
354
|
-
case QuoteValidationStatuses.ConfigurationNeeded:
|
|
355
|
-
return `The SGX platform firmware and SW are at the latest security patching level
|
|
356
|
-
but there are platform hardware configurations may expose the enclave to vulnerabilities.`;
|
|
357
|
-
case QuoteValidationStatuses.SecurityPatchNeeded:
|
|
358
|
-
return `The SGX platform firmware and SW are not at the latest security patching level.
|
|
359
|
-
The platform needs to be patched with firmware and/or software patches.`;
|
|
360
|
-
case QuoteValidationStatuses.SoftwareUpdateNeeded:
|
|
361
|
-
return `The SGX platform firmware and SW are at the latest security patching level but there are
|
|
362
|
-
certain vulnerabilities that can only be mitigated with software mitigations implemented by the enclave.`;
|
|
363
|
-
default:
|
|
364
|
-
return 'Quote verification failed.';
|
|
365
|
-
}
|
|
366
|
-
}
|
|
367
|
-
async checkQuote(quote, dataBlob) {
|
|
368
|
-
const logger = this.logger.child({ method: this.checkQuote.name });
|
|
369
|
-
const quoteBuffer = Buffer.from(quote);
|
|
370
|
-
const quoteStatus = await this.validate(quoteBuffer);
|
|
371
|
-
if (quoteStatus.quoteValidationStatus !== QuoteValidationStatuses.UpToDate) {
|
|
372
|
-
if (quoteStatus.quoteValidationStatus === QuoteValidationStatuses.Error) {
|
|
373
|
-
throw new Error('Quote is invalid');
|
|
374
|
-
}
|
|
375
|
-
else {
|
|
376
|
-
logger.warn(quoteStatus, 'Quote validation status is not UpToDate');
|
|
377
|
-
}
|
|
378
|
-
}
|
|
379
|
-
const userDataCheckResult = await this.isQuoteHasUserData(quoteBuffer, Buffer.from(dataBlob));
|
|
380
|
-
if (!userDataCheckResult) {
|
|
381
|
-
throw new Error('Quote has invalid user data');
|
|
382
|
-
}
|
|
383
|
-
}
|
|
384
|
-
async checkSignature(quoteBuffer) {
|
|
385
|
-
await QuoteValidator.checkSignature(quoteBuffer);
|
|
386
|
-
}
|
|
387
|
-
async validate(quoteBuffer) {
|
|
388
|
-
try {
|
|
389
|
-
const quoteType = TeeParser.determineQuoteType(quoteBuffer);
|
|
390
|
-
const quote = quoteType.type === QuoteType.SGX
|
|
391
|
-
? this.teeSgxParser.parseQuote(quoteBuffer)
|
|
392
|
-
: this.teeTdxParser.parseQuote(quoteBuffer);
|
|
393
|
-
const report = this.teeSgxParser.parseReport(quote.qeReport);
|
|
394
|
-
const { pckCert, rootCertPem } = await this.getCertificates(quote);
|
|
395
|
-
await this.validateQuoteStructure(quote, report, pckCert.publicKey.keyRaw);
|
|
396
|
-
this.logger.info('Quote structure validated successfully');
|
|
397
|
-
const sgxExtensionData = this.getSgxExtensionData(pckCert);
|
|
398
|
-
const fmspc = this.getDataFromExtension(sgxExtensionData, FMSPC_OID, asn1.Type.OCTETSTRING);
|
|
399
|
-
const pceId = this.getDataFromExtension(sgxExtensionData, PCEID_OID, asn1.Type.OCTETSTRING);
|
|
400
|
-
const tcbData = await this.getTcbInfo(fmspc, rootCertPem, quoteType.type);
|
|
401
|
-
const qeIdentity = await this.getQEIdentity(rootCertPem, quoteType.type);
|
|
402
|
-
const qeIdentityStatus = this.getQEIdentityStatus(report, qeIdentity);
|
|
403
|
-
const tcbStatus = this.getTcbStatus(fmspc, pceId, tcbData, sgxExtensionData); // TODO method 'validate' isn't only for tcb - extract this from quote validator
|
|
404
|
-
const quoteValidationStatus = this.getQuoteValidationStatus(qeIdentityStatus, tcbStatus);
|
|
405
|
-
this.logger.info(`Quote validation status is ${quoteValidationStatus}`);
|
|
406
|
-
return {
|
|
407
|
-
quoteValidationStatus,
|
|
408
|
-
description: this.getQuoteValidationStatusDescription(quoteValidationStatus),
|
|
409
|
-
};
|
|
410
|
-
}
|
|
411
|
-
catch (error) {
|
|
412
|
-
this.logger.error(`Validation error: ${error}`);
|
|
413
|
-
return {
|
|
414
|
-
quoteValidationStatus: QuoteValidationStatuses.Error,
|
|
415
|
-
description: this.getQuoteValidationStatusDescription(QuoteValidationStatuses.Error),
|
|
416
|
-
error,
|
|
417
|
-
};
|
|
418
|
-
}
|
|
419
|
-
}
|
|
420
|
-
async isQuoteHasUserData(quoteBuffer, userDataBuffer) {
|
|
421
|
-
const quoteType = TeeParser.determineQuoteType(quoteBuffer);
|
|
422
|
-
const quote = quoteType.type === QuoteType.SGX
|
|
423
|
-
? this.teeSgxParser.parseQuote(quoteBuffer)
|
|
424
|
-
: this.teeTdxParser.parseQuote(quoteBuffer);
|
|
425
|
-
let slicedQuoteData;
|
|
426
|
-
const userDataHash = await this.getSha256Hash(userDataBuffer);
|
|
427
|
-
if (quoteType.type === QuoteType.SGX) {
|
|
428
|
-
slicedQuoteData = this.teeSgxParser
|
|
429
|
-
.parseReport(quote.report)
|
|
430
|
-
.userData.slice(0, userDataHash.length);
|
|
431
|
-
}
|
|
432
|
-
else {
|
|
433
|
-
slicedQuoteData = this.teeTdxParser
|
|
434
|
-
.parseBody(quote.tdQuoteBody)
|
|
435
|
-
.reportData.slice(0, userDataHash.length);
|
|
436
|
-
}
|
|
437
|
-
const compareResult = Buffer.compare(slicedQuoteData, userDataHash);
|
|
438
|
-
return compareResult === 0;
|
|
439
|
-
}
|
|
440
|
-
async getSha256Hash(data) {
|
|
441
|
-
const hashInfo = {
|
|
442
|
-
algo: HashAlgorithm.SHA256,
|
|
443
|
-
encoding: Encoding.base64,
|
|
444
|
-
};
|
|
445
|
-
const hashData = await Crypto.createHash(data, hashInfo);
|
|
446
|
-
return Buffer.from(hashData.hash, hashData.encoding);
|
|
447
|
-
}
|
|
448
|
-
}
|
|
449
|
-
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"QuoteValidator.js","sourceRoot":"","sources":["../../../src/tee/QuoteValidator.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,OAAO,CAAC;AAC1B,OAAO,QAAQ,MAAM,UAAU,CAAC;AAChC,OAAO,KAAK,MAAM,YAAY,CAAC;AAC/B,OAAO,EAAE,WAAW,EAAa,MAAM,YAAY,CAAC;AACpD,OAAO,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AAC9C,OAAO,EAAE,yBAAyB,EAAE,MAAM,OAAO,CAAC;AAClD,OAAO,EAAE,OAAO,EAAE,MAAM,QAAQ,CAAC;AACjC,OAAO,CAAC,MAAM,QAAQ,CAAC;AACvB,OAAO,EAAE,YAAY,EAAE,YAAY,EAAE,SAAS,EAAE,MAAM,kBAAkB,CAAC;AACzE,OAAO,EAGL,SAAS,GAIV,MAAM,YAAY,CAAC;AACpB,OAAO,UAAU,MAAM,cAAc,CAAC;AAEtC,OAAO,EAAE,sBAAsB,EAAE,MAAM,aAAa,CAAC;AACrD,OAAO,EAAE,kBAAkB,EAAE,WAAW,EAAE,uBAAuB,EAAE,MAAM,eAAe,CAAC;AACzF,OAAO,EAAE,QAAQ,EAAE,aAAa,EAAE,MAAM,wBAAwB,CAAC;AACjE,OAAO,MAAM,MAAM,oBAAoB,CAAC;AACxC,OAAO,EAAyB,oBAAoB,EAAE,MAAM,2BAA2B,CAAC;AACxF,OAAO,EAAE,aAAa,EAAE,MAAM,4BAA4B,CAAC;AAE3D,MAAM,EAAE,EAAE,EAAE,GAAG,QAAQ,CAAC;AACxB,MAAM,EAAE,IAAI,EAAE,IAAI,EAAE,GAAG,KAAK,CAAC;AAE7B,MAAM,kBAAkB,GAAG,uCAAuC,CAAC;AACnE,MAAM,qBAAqB,GAAG,mEAAmE,CAAC;AAClG,MAAM,OAAO,GAAG,uBAAuB,CAAC;AACxC,MAAM,SAAS,GAAG,GAAG,OAAO,IAAI,CAAC;AACjC,MAAM,SAAS,GAAG,GAAG,OAAO,IAAI,CAAC;AACjC,MAAM,OAAO,GAAG,GAAG,OAAO,IAAI,CAAC;AAC/B,MAAM,UAAU,GAAG,GAAG,OAAO,KAAK,CAAC;AACnC,MAAM,kBAAkB,GAAG,IAAI,UAAU,CAAC;IACxC,CAAC,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG;IAChG,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG;IAChG,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,CAAC,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,EAAE,EAAE,EAAE,EAAE,GAAG,EAAE,CAAC,EAAE,CAAC,EAAE,GAAG,EAAE,GAAG;IAChG,GAAG;CACJ,CAAC,CAAC;AAQH,MAAM,OAAO,cAAc;IACR,SAAS,CAAU;IACnB,OAAO,CAAS;IAChB,YAAY,CAAe;IAC3B,YAAY,CAAe;IACpC,MAAM,CAAoB;IAElC,YAAY,OAAe;QACzB,IAAI,CAAC,SAAS,GAAG,OAAO,KAAK,kBAAkB,CAAC;QAChD,IAAI,CAAC,OAAO,GAAG,GAAG,OAAO,uBAAuB,CAAC;QACjD,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,EAAE,CAAC;QACvC,IAAI,CAAC,YAAY,GAAG,IAAI,YAAY,EAAE,CAAC;QACvC,IAAI,CAAC,MAAM,GAAG,UAAU,CAAC,KAAK,CAAC,EAAE,SAAS,EAAE,cAAc,CAAC,IAAI,EAAE,CAAC,CAAC;IACrE,CAAC;IAED,MAAM,CAAC,YAAY,CACjB,SAAiB,EACjB,aAA4B,EAC5B,OAA6B;QAE7B,OAAO,oBAAoB,CAAC,YAAY,CAAC,SAAS,EAAE,aAAa,EAAE,OAAO,CAAC,CAAC;IAC9E,CAAC;IAED,MAAM,CAAC,KAAK,CAAC,cAAc,CACzB,KAAa,EACb,UAAiC,EAAE,qBAAqB,EAAE,oBAAoB,CAAC,YAAY,EAAE;QAE7F,MAAM,EAAE,IAAI,EAAE,SAAS,EAAE,GAAG,YAAY,CAAC,kBAAkB,CAAC,KAAK,CAAC,CAAC;QAEnE,QAAQ,SAAS,EAAE,CAAC;YAClB,KAAK,SAAS,CAAC,GAAG,CAAC,CAAC,CAAC;gBACnB,MAAM,MAAM,GAAG,IAAI,YAAY,EAAE,CAAC;gBAClC,MAAM,WAAW,GAAG,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;gBAC7C,MAAM,MAAM,GAAG,MAAM,CAAC,WAAW,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;gBACtD,oBAAoB,CAAC,oBAAoB,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;gBAC3D,MAAM;YACR,CAAC;YACD,KAAK,SAAS,CAAC,GAAG,CAAC,CAAC,CAAC;gBACnB,MAAM,SAAS,GAAG,SAAS,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;gBAChD,MAAM,oBAAoB,CAAC,iBAAiB,CAAC,SAAS,EAAE,aAAa,CAAC,GAAG,EAAE,OAAO,CAAC,CAAC;gBACpF,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;IAEO,UAAU,CAAC,KAAa;QAC9B,MAAM,KAAK,GAAG,6BAA6B,CAAC;QAC5C,MAAM,GAAG,GAAG,2BAA2B,CAAC;QAExC,OAAO,KAAK;aACT,KAAK,CAAC,KAAK,CAAC;aACZ,MAAM,CAAC,OAAO,CAAC;aACf,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC;IACxE,CAAC;IAEO,iBAAiB,CAAC,QAAgB,EAAE,SAAiB;QAC3D,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;QACzC,MAAM,QAAQ,GAAG,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,CAAC;QAEtC,OAAO,IAAI,CAAC,iBAAiB,CAAC,QAAQ,EAAE,SAAS,CAAC,CAAC;IACrD,CAAC;IAEO,iBAAiB,CAAC,QAAyB,EAAE,SAAiB;QACpE,IAAI,QAAQ,CAAC,IAAI,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,CAAC;YACzC,KAAK,MAAM,KAAK,IAAI,QAAQ,CAAC,KAA0B,EAAE,CAAC;gBACxD,IAAI,KAAK,CAAC,IAAI,KAAK,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;oBACjC,MAAM,GAAG,GAAG,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,KAAe,CAAC,CAAC;oBACjD,IAAI,GAAG,KAAK,SAAS,EAAE,CAAC;wBACtB,OAAO,QAAQ,CAAC;oBAClB,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,IAAI,KAAK,CAAC,OAAO,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;YAClC,KAAK,MAAM,KAAK,IAAI,QAAQ,CAAC,KAAK,EAAE,CAAC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;gBACxD,IAAI,MAAM,EAAE,CAAC;oBACX,OAAO,MAAM,CAAC;gBAChB,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAEO,qBAAqB,CAAC,IAAY,EAAE,SAAiB,EAAE,GAAW;QACxE,MAAM,UAAU,GAAG,IAAI,EAAE,CAAC,MAAM,CAAC,CAAC;QAElC,OAAO,UAAU,CAAC,MAAM,CACtB,IAAI,EACJ;YACE,CAAC,EAAE,SAAS,CAAC,QAAQ,CAAC,CAAC,EAAE,EAAE,CAAC;YAC5B,CAAC,EAAE,SAAS,CAAC,QAAQ,CAAC,EAAE,CAAC;SAC1B,EACD,UAAU,CAAC,aAAa,CAAC,GAAG,EAAE,KAAK,CAAC,CACrC,CAAC;IACJ,CAAC;IAEO,cAAc,CAAC,IAAY,EAAE,EAAU;QAC7C,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACvB,OAAO,IAAI,GAAG,GAAG,IAAI,GAAG,GAAG,EAAE,CAAC;IAChC,CAAC;IAEO,oBAAoB,CAC1B,OAAoB,EACpB,YAAyB,EACzB,QAAqB;QAErB,OAAO,CACL,CAAC,CAAC,OAAO,CAAC,OAAO,CAAC,MAAM,EAAE,YAAY,CAAC,OAAO,CAAC;YAC/C,CAAC,CAAC,OAAO,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,OAAO,CAAC,CACjD,CAAC;IACJ,CAAC;IAEO,MAAM,CAAC,OAAe;QAC5B,MAAM,MAAM,GAAG,OAAO,CAAC,UAAU,CAAC,OAAO,CAAC;YACxC,CAAC,CAAC,SAAS,CAAC,QAAQ,CAAC,OAAO,CAAC;YAC7B,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,KAAK,CAAC,CAAC;QAChC,MAAM,MAAM,GAAG,OAAO,CAAC,MAAoB,CAAC,CAAC;QAE7C,OAAO,IAAI,yBAAyB,CAAC,EAAE,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;IAClE,CAAC;IAEO,sBAAsB,CAAC,GAA8B,EAAE,OAAiB;QAC9E,IAAI,CAAC,GAAG,CAAC,UAAU,IAAI,CAAC,GAAG,CAAC,UAAU,EAAE,CAAC;YACvC,MAAM,IAAI,sBAAsB,CAAC,sDAAsD,CAAC,CAAC;QAC3F,CAAC;QACD,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,GAAG,CAAC,UAAU,CAAC,KAAK,CAAC,OAAO,EAAE,EAAE,GAAG,CAAC,UAAU,CAAC,KAAK,CAAC,OAAO,EAAE,CAAC,EAAE,CAAC;YACzF,MAAM,IAAI,sBAAsB,CAAC,qDAAqD,CAAC,CAAC;QAC1F,CAAC;QACD,IAAI,GAAG,CAAC,mBAAmB,EAAE,CAAC;YAC5B,MAAM,YAAY,GAAG,GAAG,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,OAAO,EAAE,EAAE,CAC5D,OAAO,CAAC,QAAQ,CACd,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,eAAe,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,CAC7E,CACF,CAAC;YACF,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,IAAI,sBAAsB,CAAC,gCAAgC,CAAC,CAAC;YACrE,CAAC;QACH,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,eAAe,CAC3B,KAAmB;QAEnB,MAAM,iBAAiB,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,GAAG,IAAI,CAAC,OAAO,kCAAkC,CAAC,CAAC;QAC7F,MAAM,aAAa,GAAG,kBAAkB,CAAC,iBAAiB,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;QAChG,MAAM,CAAC,kBAAkB,EAAE,cAAc,CAAC,GAAG,IAAI,CAAC,UAAU,CAAC,aAAa,CAAC,CAAC,CAAC,mBAAmB;QAChG,MAAM,mBAAmB,GAAG,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC;QACjF,MAAM,eAAe,GAAG,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC;QAEzE,IACE,CAAC,IAAI,CAAC,cAAc,CAClB,mBAAmB,CAAC,SAAS,CAAC,OAAO,EAAE,EACvC,mBAAmB,CAAC,OAAO,CAAC,OAAO,EAAE,CACtC,EACD,CAAC;YACD,MAAM,IAAI,sBAAsB,CAAC,mDAAmD,CAAC,CAAC;QACxF,CAAC;QACD,IACE,CAAC,IAAI,CAAC,cAAc,CAAC,eAAe,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,eAAe,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,EAC5F,CAAC;YACD,MAAM,IAAI,sBAAsB,CAAC,+CAA+C,CAAC,CAAC;QACpF,CAAC;QACD,IAAI,CAAC,CAAC,CAAC,OAAO,CAAC,eAAe,CAAC,MAAM,EAAE,eAAe,CAAC,OAAO,CAAC,EAAE,CAAC;YAChE,MAAM,IAAI,sBAAsB,CAAC,qCAAqC,CAAC,CAAC;QAC1E,CAAC;QACD,IAAI,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,SAAS,CAAC,MAAM,EAAE,kBAAkB,CAAC,KAAK,CAAC,EAAE,CAAC;YAC/E,MAAM,IAAI,sBAAsB,CAAC,yCAAyC,CAAC,CAAC;QAC9E,CAAC;QAED,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,MAAM,CAAC,GAAG,CAAC,CAAC,CAAC;QAChF,MAAM,QAAQ,GAAG,KAAK,CAAC,uBAAuB,CAAC;QAE/C,IAAI,CAAC,IAAI,CAAC,cAAc,CAAC,OAAO,CAAC,SAAS,CAAC,OAAO,EAAE,EAAE,OAAO,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,EAAE,CAAC;YACjF,MAAM,IAAI,sBAAsB,CAAC,8CAA8C,CAAC,CAAC;QACnF,CAAC;QACD,IAAI,QAAQ,KAAK,CAAC,EAAE,CAAC;YACnB,MAAM,IAAI,sBAAsB,CAAC,wCAAwC,QAAQ,EAAE,CAAC,CAAC;QACvF,CAAC;QACD,IAAI,cAAc,KAAK,KAAK,CAAC,YAAY,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC;YACnD,MAAM,IAAI,sBAAsB,CAAC,2DAA2D,CAAC,CAAC;QAChG,CAAC;QAED,IAAI,CAAC,IAAI,CAAC,oBAAoB,CAAC,OAAO,EAAE,mBAAmB,EAAE,eAAe,CAAC,EAAE,CAAC;YAC9E,MAAM,IAAI,sBAAsB,CAAC,uCAAuC,CAAC,CAAC;QAC5E,CAAC;QAED,MAAM,OAAO,GAAG;YACd,eAAe,CAAC,YAAY;YAC5B,mBAAmB,CAAC,YAAY;YAChC,OAAO,CAAC,YAAY;SACrB,CAAC;QAEF,MAAM,QAAQ,GAAG,IAAI,CAAC,SAAS;YAC7B,CAAC,CAAC,qBAAqB;YACvB,CAAC,CAAC,GAAG,IAAI,CAAC,OAAO,YAAY,qBAAqB,EAAE,CAAC;QACvD,MAAM,WAAW,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,QAAQ,EAAE;YAC5C,YAAY,EAAE,aAAa;SAC5B,CAAC,CAAC;QACH,MAAM,WAAW,GAAG,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,IAAI,CAAC,CAAC,CAAC;QAC3D,IAAI,CAAC,sBAAsB,CACzB,IAAI,yBAAyB,CAAC,EAAE,MAAM,EAAE,WAAW,CAAC,MAAM,EAAE,CAAC,EAC7D,OAAO,CACR,CAAC;QAEF,MAAM,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC,iBAAiB,CAAC,IAAI,CAAC,CAAC;QACxD,IAAI,CAAC,sBAAsB,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAElD,OAAO,EAAE,OAAO,EAAE,WAAW,EAAE,cAAc,EAAE,CAAC;IAClD,CAAC;IAEO,KAAK,CAAC,uBAAuB,CACnC,KAAmB,EACnB,YAAoB;QAEpB,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC;QACvD,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC;QAEzE,OAAO,IAAI,CAAC,qBAAqB,CAAC,UAAU,EAAE,SAAS,EAAE,YAAY,CAAC,CAAC;IACzE,CAAC;IAEO,KAAK,CAAC,kBAAkB,CAC9B,KAAmB,EACnB,MAA4B;QAE5B,MAAM,UAAU,GAAG,KAAK,CAAC,oBAAoB,CAAC;QAC9C,MAAM,cAAc,GAAG,KAAK,CAAC,mBAAmB,CAAC;QACjD,MAAM,gBAAgB,GAAG,MAAM,CAAC,QAAQ,CAAC;QACzC,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC,CAAC,CAAC;QAC7F,MAAM,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,gBAAgB,EAAE,cAAc,CAAC,CAAC;QAEhE,OAAO,MAAM,KAAK,CAAC,CAAC;IACtB,CAAC;IAEO,KAAK,CAAC,4BAA4B,CAAC,KAAmB;QAC5D,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC;QACnD,MAAM,YAAY,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QAClD,MAAM,YAAY,GAChB,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC,GAAG;YAC/B,CAAC,CAAC,MAAM,CAAC,IAAI,CAAE,KAA6B,CAAC,MAAM,CAAC;YACpD,CAAC,CAAC,MAAM,CAAC,IAAI,CAAE,KAA6B,CAAC,WAAW,CAAC,CAAC;QAC9D,MAAM,QAAQ,GACZ,KAAK,CAAC,SAAS,KAAK,SAAS,CAAC,GAAG;YAC/B,CAAC,CAAC,MAAM,CAAC,IAAI,CAAE,KAA6B,CAAC,yBAAyB,CAAC;YACvE,CAAC,CAAC,MAAM,CAAC,IAAI,CAAE,KAA6B,CAAC,cAAc,CAAC,CAAC;QAEjE,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,YAAY,EAAE,YAAY,CAAC,CAAC,CAAC,CAAC;QAE7F,MAAM,UAAU,GAAG,IAAI,EAAE,CAAC,MAAM,CAAC,CAAC;QAElC,OAAO,UAAU,CAAC,MAAM,CACtB,cAAc,EACd;YACE,CAAC,EAAE,QAAQ,CAAC,QAAQ,CAAC,CAAC,EAAE,EAAE,CAAC;YAC3B,CAAC,EAAE,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;SACzB,EACD,MAAM,CAAC,MAAM,CAAC,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC,CACvC,CAAC;IACJ,CAAC;IAEO,KAAK,CAAC,sBAAsB,CAClC,KAAmB,EACnB,MAA4B,EAC5B,YAAoB;QAEpB,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE,YAAY,CAAC,CAAC,EAAE,CAAC;YAC/D,MAAM,IAAI,sBAAsB,CAAC,2BAA2B,CAAC,CAAC;QAChE,CAAC;QACD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC,EAAE,CAAC;YACpD,MAAM,IAAI,sBAAsB,CAAC,sBAAsB,CAAC,CAAC;QAC3D,CAAC;QACD,IAAI,CAAC,CAAC,MAAM,IAAI,CAAC,4BAA4B,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC;YACtD,MAAM,IAAI,sBAAsB,CAAC,gCAAgC,CAAC,CAAC;QACrE,CAAC;IACH,CAAC;IAEO,mBAAmB,CAAC,OAAoB;QAC9C,MAAM,gBAAgB,GAAG,OAAO,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,IAAI,CAAC,GAAG,KAAK,OAAO,CAAC,CAAC;QACjF,IAAI,CAAC,gBAAgB,EAAE,CAAC;YACtB,MAAM,IAAI,sBAAsB,CAAC,uCAAuC,CAAC,CAAC;QAC5E,CAAC;QAED,OAAO,gBAAgB,CAAC;IAC1B,CAAC;IAEO,oBAAoB,CAC1B,gBAA2B,EAC3B,SAAiB,EACjB,UAA2B;QAE3B,MAAM,OAAO,GAAG,IAAI,CAAC,iBAAiB,CAAC,gBAAgB,CAAC,KAAK,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,SAAS,CAAC,CAAC;QAC1F,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,MAAM,IAAI,sBAAsB,CAAC,OAAO,SAAS,0CAA0C,CAAC,CAAC;QAC/F,CAAC;QACD,MAAM,IAAI,GAAI,OAAO,CAAC,KAA2B,CAAC,MAAM,CACtD,CAAC,UAAU,EAAE,EAAE,CAAC,UAAU,CAAC,IAAI,KAAK,UAAU,CAC/C,CAAC;QACF,IAAI,CAAC,IAAI,CAAC,MAAM,EAAE,CAAC;YACjB,MAAM,IAAI,sBAAsB,CAAC,eAAe,SAAS,YAAY,UAAU,YAAY,CAAC,CAAC;QAC/F,CAAC;QACD,MAAM,MAAM,GAAG,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAe,CAAC,CAAC;QAExD,OAAO,UAAU,KAAK,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,QAAQ,EAAE,CAAC;IACzF,CAAC;IAEO,KAAK,CAAC,UAAU,CACtB,KAAa,EACb,WAAmB,EACnB,SAAoB;QAEpB,IAAI,MAAM,GAAG,GAAG,IAAI,CAAC,OAAO,cAAc,KAAK,EAAE,CAAC;QAClD,IAAI,SAAS,KAAK,SAAS,CAAC,GAAG,EAAE,CAAC;YAChC,MAAM,GAAG,MAAM,CAAC,OAAO,CAAC,mBAAmB,EAAE,mBAAmB,CAAC,CAAC;QACpE,CAAC;QACD,MAAM,OAAO,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,MAAM,CAAC,CAAC;QACxC,MAAM,aAAa,GAAG,uBAAuB,CAAC;QAC9C,MAAM,YAAY,GAAG,IAAI,CAAC,UAAU,CAAC,kBAAkB,CAAC,OAAO,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,cAAc;QACxG,IAAI,YAAY,CAAC,CAAC,CAAC,KAAK,WAAW,EAAE,CAAC;YACpC,MAAM,IAAI,sBAAsB,CAAC,2CAA2C,CAAC,CAAC;QAChF,CAAC;QAED,MAAM,OAAO,GAAG,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAClE,MAAM,GAAG,GAAG,OAAO,CAAC,SAAS,CAAC,MAAM,CAAC;QACrC,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;QAC7D,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,aAAa,CAC7C,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAClD,CAAC;QAEF,MAAM,MAAM,GAAG,IAAI,CAAC,qBAAqB,CAAC,cAAc,EAAE,SAAS,EAAE,GAAG,CAAC,CAAC;QAC1E,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,sBAAsB,CAAC,iCAAiC,CAAC,CAAC;QACtE,CAAC;QAED,IAAI,OAAO,CAAC,IAAI,CAAC,OAAO,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,EAAE,CAAC;YAC3D,MAAM,IAAI,sBAAsB,CAAC,qCAAqC,CAAC,CAAC;QAC1E,CAAC;QAED,OAAO,OAAO,CAAC,IAAgB,CAAC;IAClC,CAAC;IAEO,KAAK,CAAC,aAAa,CAAC,WAAmB,EAAE,SAAoB;QACnE,IAAI,aAAa,GAAG,GAAG,IAAI,CAAC,OAAO,cAAc,CAAC;QAClD,IAAI,SAAS,KAAK,SAAS,CAAC,GAAG,EAAE,CAAC;YAChC,aAAa,GAAG,aAAa,CAAC,OAAO,CAAC,mBAAmB,EAAE,mBAAmB,CAAC,CAAC;QAClF,CAAC;QACD,MAAM,cAAc,GAAG,MAAM,KAAK,CAAC,GAAG,CAAC,aAAa,CAAC,CAAC;QACtD,MAAM,gBAAgB,GAAG,mCAAmC,CAAC;QAC7D,MAAM,eAAe,GAAG,IAAI,CAAC,UAAU,CACrC,kBAAkB,CAAC,cAAc,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAC7D,CAAC,CAAC,qBAAqB;QACxB,IAAI,eAAe,CAAC,CAAC,CAAC,KAAK,WAAW,EAAE,CAAC;YACvC,MAAM,IAAI,sBAAsB,CAAC,wDAAwD,CAAC,CAAC;QAC7F,CAAC;QAED,MAAM,cAAc,GAAG,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC;QAC5E,MAAM,GAAG,GAAG,cAAc,CAAC,SAAS,CAAC,MAAM,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,SAAS,EAAE,KAAK,CAAC,CAAC;QACpE,MAAM,cAAc,GAAG,MAAM,IAAI,CAAC,aAAa,CAC7C,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,cAAc,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CACjE,CAAC;QAEF,MAAM,MAAM,GAAG,IAAI,CAAC,qBAAqB,CAAC,cAAc,EAAE,SAAS,EAAE,GAAG,CAAC,CAAC;QAC1E,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,sBAAsB,CAAC,yCAAyC,CAAC,CAAC;QAC9E,CAAC;QAED,IAAI,cAAc,CAAC,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,OAAO,EAAE,GAAG,IAAI,CAAC,GAAG,EAAE,EAAE,CAAC;YAC1E,MAAM,IAAI,sBAAsB,CAAC,kDAAkD,CAAC,CAAC;QACvF,CAAC;QAED,OAAO,cAAc,CAAC,IAAmB,CAAC;IAC5C,CAAC;IAEO,mBAAmB,CACzB,MAA4B,EAC5B,UAAuB;QAEvB,MAAM,QAAQ,GAAG,MAAM,CAAC,QAAQ,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;QACjD,IAAI,QAAQ,CAAC,WAAW,EAAE,KAAK,UAAU,CAAC,eAAe,CAAC,QAAQ,EAAE,CAAC;YACnE,MAAM,IAAI,sBAAsB,CAAC,8BAA8B,CAAC,CAAC;QACnE,CAAC;QACD,IAAI,MAAM,CAAC,SAAS,KAAK,UAAU,CAAC,eAAe,CAAC,SAAS,EAAE,CAAC;YAC9D,MAAM,IAAI,sBAAsB,CAAC,gCAAgC,CAAC,CAAC;QACrE,CAAC;QACD,MAAM,QAAQ,GAAG,UAAU,CAAC,eAAe,CAAC,SAAS,CAAC,IAAI,CACxD,CAAC,QAAQ,EAAE,EAAE,CAAC,QAAQ,CAAC,GAAG,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,CACnD,CAAC;QAEF,MAAM,MAAM,GAAG,QAAQ,EAAE,SAA+B,CAAC;QACzD,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,QAAQ,EAAE,SAAS,EAAE,CAAC,CAAC;YACtE,OAAO,MAAM,CAAC;QAChB,CAAC;QACD,OAAO,kBAAkB,CAAC,SAAS,CAAC;IACtC,CAAC;IAEO,YAAY,CAClB,KAAa,EACb,KAAa,EACb,OAAiB,EACjB,gBAA2B;QAE3B,IAAI,KAAK,CAAC,WAAW,EAAE,KAAK,OAAO,CAAC,OAAO,CAAC,KAAK,CAAC,WAAW,EAAE,EAAE,CAAC;YAChE,MAAM,IAAI,sBAAsB,CAAC,gCAAgC,CAAC,CAAC;QACrE,CAAC;QACD,IAAI,KAAK,KAAK,OAAO,CAAC,OAAO,CAAC,KAAK,EAAE,CAAC;YACpC,MAAM,IAAI,sBAAsB,CAAC,gCAAgC,CAAC,CAAC;QACrE,CAAC;QAED,MAAM,MAAM,GAAG,IAAI,CAAC,oBAAoB,CAAC,gBAAgB,EAAE,UAAU,EAAE,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC;QAC1F,MAAM,aAAa,GAAG,CAAC,GAAG,KAAK,CAAC,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE,CACpD,IAAI,CAAC,oBAAoB,CAAC,gBAAgB,EAAE,GAAG,OAAO,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,CACtF,CAAC;QACF,MAAM,QAAQ,GAAG,OAAO,CAAC,OAAO,CAAC,SAAS,CAAC,IAAI,CAC7C,CAAC,QAAQ,EAAE,EAAE,CACX,QAAQ,CAAC,GAAG,CAAC,MAAM,IAAI,MAAM,CAAC,MAAM,CAAC;YACrC,QAAQ,CAAC,GAAG,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC,EAAE,EAAE,KAAK,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,IAAI,MAAM,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC,CAC7F,CAAC;QAEF,MAAM,MAAM,GAAG,QAAQ,EAAE,SAAwB,CAAC;QAClD,IAAI,MAAM,EAAE,CAAC;YACX,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,iBAAiB,QAAQ,EAAE,SAAS,EAAE,CAAC,CAAC;YACzD,OAAO,MAAM,CAAC;QAChB,CAAC;QACD,OAAO,WAAW,CAAC,SAAS,CAAC;IAC/B,CAAC;IAEO,wBAAwB,CAC9B,gBAAoC,EACpC,SAAsB;QAEtB,IAAI,gBAAgB,KAAK,kBAAkB,CAAC,SAAS,EAAE,CAAC;YACtD,IAAI,SAAS,KAAK,WAAW,CAAC,QAAQ,IAAI,SAAS,KAAK,WAAW,CAAC,iBAAiB,EAAE,CAAC;gBACtF,OAAO,uBAAuB,CAAC,mBAAmB,CAAC;YACrD,CAAC;YACD,IACE,SAAS,KAAK,WAAW,CAAC,4BAA4B;gBACtD,SAAS,KAAK,WAAW,CAAC,iCAAiC,EAC3D,CAAC;gBACD,OAAO,uBAAuB,CAAC,oBAAoB,CAAC;YACtD,CAAC;QACH,CAAC;QACD,IAAI,gBAAgB,KAAK,kBAAkB,CAAC,OAAO,IAAI,SAAS,KAAK,WAAW,CAAC,OAAO,EAAE,CAAC;YACzF,MAAM,IAAI,sBAAsB,CAAC,4BAA4B,CAAC,CAAC;QACjE,CAAC;QACD,IAAI,SAAS,KAAK,WAAW,CAAC,QAAQ,EAAE,CAAC;YACvC,OAAO,uBAAuB,CAAC,QAAQ,CAAC;QAC1C,CAAC;QACD,IAAI,SAAS,KAAK,WAAW,CAAC,SAAS,EAAE,CAAC;YACxC,OAAO,uBAAuB,CAAC,mBAAmB,CAAC;QACrD,CAAC;QACD,IAAI,SAAS,KAAK,WAAW,CAAC,mBAAmB,EAAE,CAAC;YAClD,OAAO,uBAAuB,CAAC,mBAAmB,CAAC;QACrD,CAAC;QACD,OAAO,uBAAuB,CAAC,oBAAoB,CAAC;IACtD,CAAC;IAEO,mCAAmC,CAAC,MAA+B;QACzE,QAAQ,MAAM,EAAE,CAAC;YACf,KAAK,uBAAuB,CAAC,QAAQ;gBACnC,OAAO,+DAA+D,CAAC;YACzE,KAAK,uBAAuB,CAAC,mBAAmB;gBAC9C,OAAO;8GAC+F,CAAC;YACzG,KAAK,uBAAuB,CAAC,mBAAmB;gBAC9C,OAAO;4FAC6E,CAAC;YACvF,KAAK,uBAAuB,CAAC,oBAAoB;gBAC/C,OAAO;6HAC8G,CAAC;YACxH;gBACE,OAAO,4BAA4B,CAAC;QACxC,CAAC;IACH,CAAC;IAED,KAAK,CAAC,UAAU,CAAC,KAAiB,EAAE,QAAoB;QACtD,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,MAAM,EAAE,IAAI,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC,CAAC;QAEnE,MAAM,WAAW,GAAG,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QACvC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,WAAW,CAAC,qBAAqB,KAAK,uBAAuB,CAAC,QAAQ,EAAE,CAAC;YAC3E,IAAI,WAAW,CAAC,qBAAqB,KAAK,uBAAuB,CAAC,KAAK,EAAE,CAAC;gBACxE,MAAM,IAAI,KAAK,CAAC,kBAAkB,CAAC,CAAC;YACtC,CAAC;iBAAM,CAAC;gBACN,MAAM,CAAC,IAAI,CAAC,WAAW,EAAE,yCAAyC,CAAC,CAAC;YACtE,CAAC;QACH,CAAC;QAED,MAAM,mBAAmB,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC;QAC9F,IAAI,CAAC,mBAAmB,EAAE,CAAC;YACzB,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;QACjD,CAAC;IACH,CAAC;IAED,KAAK,CAAC,cAAc,CAAC,WAAmB;QACtC,MAAM,cAAc,CAAC,cAAc,CAAC,WAAW,CAAC,CAAC;IACnD,CAAC;IAED,KAAK,CAAC,QAAQ,CAAC,WAAmB;QAChC,IAAI,CAAC;YACH,MAAM,SAAS,GAAG,SAAS,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC;YAC5D,MAAM,KAAK,GACT,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,GAAG;gBAC9B,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,WAAW,CAAC;gBAC3C,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;YAChD,MAAM,MAAM,GAAG,IAAI,CAAC,YAAY,CAAC,WAAW,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC;YAE7D,MAAM,EAAE,OAAO,EAAE,WAAW,EAAE,GAAG,MAAM,IAAI,CAAC,eAAe,CAAC,KAAK,CAAC,CAAC;YAEnE,MAAM,IAAI,CAAC,sBAAsB,CAAC,KAAK,EAAE,MAAM,EAAE,OAAO,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC;YAC3E,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wCAAwC,CAAC,CAAC;YAE3D,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;YAC3D,MAAM,KAAK,GAAG,IAAI,CAAC,oBAAoB,CAAC,gBAAgB,EAAE,SAAS,EAAE,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAC5F,MAAM,KAAK,GAAG,IAAI,CAAC,oBAAoB,CAAC,gBAAgB,EAAE,SAAS,EAAE,IAAI,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;YAE5F,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,UAAU,CAAC,KAAK,EAAE,WAAW,EAAE,SAAS,CAAC,IAAI,CAAC,CAAC;YAC1E,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,WAAW,EAAE,SAAS,CAAC,IAAI,CAAC,CAAC;YAEzE,MAAM,gBAAgB,GAAG,IAAI,CAAC,mBAAmB,CAAC,MAAM,EAAE,UAAU,CAAC,CAAC;YACtE,MAAM,SAAS,GAAG,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,KAAK,EAAE,OAAO,EAAE,gBAAgB,CAAC,CAAC,CAAC,gFAAgF;YAE9J,MAAM,qBAAqB,GAAG,IAAI,CAAC,wBAAwB,CAAC,gBAAgB,EAAE,SAAS,CAAC,CAAC;YACzF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,8BAA8B,qBAAqB,EAAE,CAAC,CAAC;YAExE,OAAO;gBACL,qBAAqB;gBACrB,WAAW,EAAE,IAAI,CAAC,mCAAmC,CAAC,qBAAqB,CAAC;aAC7E,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,qBAAqB,KAAK,EAAE,CAAC,CAAC;YAEhD,OAAO;gBACL,qBAAqB,EAAE,uBAAuB,CAAC,KAAK;gBACpD,WAAW,EAAE,IAAI,CAAC,mCAAmC,CAAC,uBAAuB,CAAC,KAAK,CAAC;gBACpF,KAAK;aACN,CAAC;QACJ,CAAC;IACH,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAAC,WAAmB,EAAE,cAAsB;QACzE,MAAM,SAAS,GAAG,SAAS,CAAC,kBAAkB,CAAC,WAAW,CAAC,CAAC;QAC5D,MAAM,KAAK,GACT,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,GAAG;YAC9B,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,WAAW,CAAC;YAC3C,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,UAAU,CAAC,WAAW,CAAC,CAAC;QAEhD,IAAI,eAAoC,CAAC;QACzC,MAAM,YAAY,GAAG,MAAM,IAAI,CAAC,aAAa,CAAC,cAAc,CAAC,CAAC;QAC9D,IAAI,SAAS,CAAC,IAAI,KAAK,SAAS,CAAC,GAAG,EAAE,CAAC;YACrC,eAAe,GAAG,IAAI,CAAC,YAAY;iBAChC,WAAW,CAAE,KAA6B,CAAC,MAAM,CAAC;iBAClD,QAAQ,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,MAAM,CAAC,CAAC;QAC5C,CAAC;aAAM,CAAC;YACN,eAAe,GAAG,IAAI,CAAC,YAAY;iBAChC,SAAS,CAAE,KAA6B,CAAC,WAAW,CAAC;iBACrD,UAAU,CAAC,KAAK,CAAC,CAAC,EAAE,YAAY,CAAC,MAAM,CAAC,CAAC;QAC9C,CAAC;QAED,MAAM,aAAa,GAAG,MAAM,CAAC,OAAO,CAAC,eAAe,EAAE,YAAY,CAAC,CAAC;QAEpE,OAAO,aAAa,KAAK,CAAC,CAAC;IAC7B,CAAC;IAEO,KAAK,CAAC,aAAa,CAAC,IAAY;QACtC,MAAM,QAAQ,GAAG;YACf,IAAI,EAAE,aAAa,CAAC,MAAM;YAC1B,QAAQ,EAAE,QAAQ,CAAC,MAAM;SAC1B,CAAC;QACF,MAAM,QAAQ,GAAG,MAAM,MAAM,CAAC,UAAU,CAAC,IAAI,EAAE,QAAQ,CAAC,CAAC;QACzD,OAAO,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,EAAE,QAAQ,CAAC,QAAQ,CAAC,CAAC;IACvD,CAAC;CACF"}
|
|
@@ -1,20 +0,0 @@
|
|
|
1
|
-
import { TcbVerifiedStatus, ConsensusBenchmark } from '@super-protocol/dto-js';
|
|
2
|
-
import { BlockchainId } from '../types/index.js';
|
|
3
|
-
export type TcbData = {
|
|
4
|
-
checkingTcbId: string;
|
|
5
|
-
pubKey: string;
|
|
6
|
-
checkingTcbIds: BlockchainId[];
|
|
7
|
-
checkingTcbMarks: TcbVerifiedStatus[];
|
|
8
|
-
deviceId: string;
|
|
9
|
-
benchmark: ConsensusBenchmark;
|
|
10
|
-
properties: string;
|
|
11
|
-
};
|
|
12
|
-
export type VersionedTcbData = {
|
|
13
|
-
v: number;
|
|
14
|
-
[key: string]: unknown;
|
|
15
|
-
};
|
|
16
|
-
export declare class TcbDataSerializer {
|
|
17
|
-
private static readonly VERSION;
|
|
18
|
-
static serialize(data: TcbData): Uint8Array;
|
|
19
|
-
static deserialize(buffer: Uint8Array): TcbData;
|
|
20
|
-
}
|
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
import { decode, encode } from '@msgpack/msgpack';
|
|
2
|
-
export class TcbDataSerializer {
|
|
3
|
-
static VERSION = 1; // Current version of the data structure
|
|
4
|
-
static serialize(data) {
|
|
5
|
-
const serializedData = {
|
|
6
|
-
v: TcbDataSerializer.VERSION,
|
|
7
|
-
quote: data,
|
|
8
|
-
};
|
|
9
|
-
return encode(serializedData, { sortKeys: true });
|
|
10
|
-
}
|
|
11
|
-
static deserialize(buffer) {
|
|
12
|
-
const { v, ...rest } = decode(buffer);
|
|
13
|
-
switch (v) {
|
|
14
|
-
case 1: {
|
|
15
|
-
return rest;
|
|
16
|
-
}
|
|
17
|
-
// Future versions can be handled here with additional cases
|
|
18
|
-
default:
|
|
19
|
-
throw new Error(`Unsupported version: ${v}`);
|
|
20
|
-
}
|
|
21
|
-
}
|
|
22
|
-
}
|
|
23
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,55 +0,0 @@
|
|
|
1
|
-
import { TokenAmount } from './Web3.js';
|
|
2
|
-
export declare enum Status {
|
|
3
|
-
InQueue = 0,
|
|
4
|
-
Deployed = 1,
|
|
5
|
-
NotDeployed = 2,
|
|
6
|
-
Revoked = 3
|
|
7
|
-
}
|
|
8
|
-
export declare enum MigrationNetwork {
|
|
9
|
-
Ethereum = 0,
|
|
10
|
-
BSC = 1,
|
|
11
|
-
Polygon = 2
|
|
12
|
-
}
|
|
13
|
-
export type ParticipantInfo = {
|
|
14
|
-
isRewardClaimed: boolean;
|
|
15
|
-
totalTransactions: number;
|
|
16
|
-
migrationsIndexes: number[];
|
|
17
|
-
};
|
|
18
|
-
export type ParticipantInfoViewed = {
|
|
19
|
-
participant: string;
|
|
20
|
-
rank: number;
|
|
21
|
-
score: number;
|
|
22
|
-
reward: TokenAmount;
|
|
23
|
-
};
|
|
24
|
-
export type TotalParticipantInfo = {
|
|
25
|
-
storedInfo: ParticipantInfo;
|
|
26
|
-
viewedInfo: ParticipantInfoViewed;
|
|
27
|
-
};
|
|
28
|
-
export type Migration = {
|
|
29
|
-
participant: string;
|
|
30
|
-
score: number;
|
|
31
|
-
firstSourceMigration: boolean;
|
|
32
|
-
sourceNetwork: MigrationNetwork;
|
|
33
|
-
status: Status;
|
|
34
|
-
statusChecks: number;
|
|
35
|
-
submittedTimestamp: number;
|
|
36
|
-
sourceAddress: string;
|
|
37
|
-
destinationAddress: string;
|
|
38
|
-
sourceUrl: string;
|
|
39
|
-
destinationUrl: string;
|
|
40
|
-
calculatedTransactionsBlockNumber: number;
|
|
41
|
-
transactions: number;
|
|
42
|
-
};
|
|
43
|
-
export type MigrationWithIndex = {
|
|
44
|
-
migration: Migration;
|
|
45
|
-
index: number;
|
|
46
|
-
};
|
|
47
|
-
export type ParticipantScore = {
|
|
48
|
-
participant: string;
|
|
49
|
-
score: number;
|
|
50
|
-
};
|
|
51
|
-
export type UpdateTxsArgs = {
|
|
52
|
-
migrationIndex: number;
|
|
53
|
-
transactions: number;
|
|
54
|
-
calculatedTransactionsBlockNumber: number;
|
|
55
|
-
};
|
|
@@ -1,14 +0,0 @@
|
|
|
1
|
-
export var Status;
|
|
2
|
-
(function (Status) {
|
|
3
|
-
Status[Status["InQueue"] = 0] = "InQueue";
|
|
4
|
-
Status[Status["Deployed"] = 1] = "Deployed";
|
|
5
|
-
Status[Status["NotDeployed"] = 2] = "NotDeployed";
|
|
6
|
-
Status[Status["Revoked"] = 3] = "Revoked";
|
|
7
|
-
})(Status || (Status = {}));
|
|
8
|
-
export var MigrationNetwork;
|
|
9
|
-
(function (MigrationNetwork) {
|
|
10
|
-
MigrationNetwork[MigrationNetwork["Ethereum"] = 0] = "Ethereum";
|
|
11
|
-
MigrationNetwork[MigrationNetwork["BSC"] = 1] = "BSC";
|
|
12
|
-
MigrationNetwork[MigrationNetwork["Polygon"] = 2] = "Polygon";
|
|
13
|
-
})(MigrationNetwork || (MigrationNetwork = {}));
|
|
14
|
-
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1,13 +0,0 @@
|
|
|
1
|
-
import { RegisterAdminParams } from './types.js';
|
|
2
|
-
import { BlockchainCert } from '../certificates/index.js';
|
|
3
|
-
export declare class AdminService {
|
|
4
|
-
private readonly logger;
|
|
5
|
-
constructor(adminCertificateContractAddress: string);
|
|
6
|
-
registerAdmin(params: RegisterAdminParams): Promise<void>;
|
|
7
|
-
isAdmin(caller: string): Promise<boolean>;
|
|
8
|
-
getAdminData(): Promise<{
|
|
9
|
-
admin: string;
|
|
10
|
-
rootCertId: number;
|
|
11
|
-
certsChain: BlockchainCert[];
|
|
12
|
-
}>;
|
|
13
|
-
}
|