@umbra-privacy/sdk 2.1.1 → 4.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{chunk-GP26R377.js → chunk-AUNYA6JP.js} +2 -2
- package/dist/chunk-AUNYA6JP.js.map +1 -0
- package/dist/{chunk-BL6WXLPV.cjs → chunk-KCHHJKQN.cjs} +2 -2
- package/dist/chunk-KCHHJKQN.cjs.map +1 -0
- package/dist/{chunk-KMRROOME.js → chunk-YA66JLHI.js} +9 -4
- package/dist/chunk-YA66JLHI.js.map +1 -0
- package/dist/{chunk-3LS5P32X.cjs → chunk-YFUGKMNS.cjs} +9 -4
- package/dist/chunk-YFUGKMNS.cjs.map +1 -0
- package/dist/{client-Cb53GYes.d.cts → client-Baxe29tj.d.cts} +128 -51
- package/dist/{client-CJ5S6Qln.d.ts → client-Cqv_5hHQ.d.ts} +128 -51
- package/dist/constants/index.cjs +1 -1
- package/dist/constants/index.js +1 -1
- package/dist/crypto/index.cjs +142 -142
- package/dist/crypto/index.d.cts +1 -1
- package/dist/crypto/index.d.ts +1 -1
- package/dist/crypto/index.js +1 -1
- package/dist/errors/index.cjs +28 -28
- package/dist/errors/index.d.cts +1 -1
- package/dist/errors/index.d.ts +1 -1
- package/dist/errors/index.js +1 -1
- package/dist/{errors-DAIrstEL.d.cts → errors-BqAlwXfh.d.cts} +3 -5
- package/dist/{errors-DPNMfyh0.d.ts → errors-Crx4Jf9K.d.ts} +3 -5
- package/dist/{index-B5wNTNZr.d.cts → index-BRLHQNe9.d.cts} +27 -12
- package/dist/{index-Cd76ZBHA.d.ts → index-gpTrCX61.d.ts} +27 -12
- package/dist/index.cjs +817 -1072
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +25 -276
- package/dist/index.d.ts +25 -276
- package/dist/index.js +322 -573
- package/dist/index.js.map +1 -1
- package/dist/indexer-NHZDFABY.js +311 -0
- package/dist/indexer-NHZDFABY.js.map +1 -0
- package/dist/indexer-XOUBVRNU.cjs +316 -0
- package/dist/indexer-XOUBVRNU.cjs.map +1 -0
- package/dist/interfaces/index.d.cts +2 -2
- package/dist/interfaces/index.d.ts +2 -2
- package/dist/solana/index.d.cts +2 -2
- package/dist/solana/index.d.ts +2 -2
- package/dist/{transaction-forwarder-Dme9whAc.d.ts → transaction-forwarder-Cv3OlsaZ.d.ts} +1 -1
- package/dist/{transaction-forwarder-0GZRKXIr.d.cts → transaction-forwarder-DH07CEkG.d.cts} +1 -1
- package/package.json +3 -3
- package/dist/chunk-3LS5P32X.cjs.map +0 -1
- package/dist/chunk-BL6WXLPV.cjs.map +0 -1
- package/dist/chunk-GP26R377.js.map +0 -1
- package/dist/chunk-KMRROOME.js.map +0 -1
package/dist/index.cjs
CHANGED
|
@@ -2,11 +2,11 @@
|
|
|
2
2
|
|
|
3
3
|
var chunkNKVMSABR_cjs = require('./chunk-NKVMSABR.cjs');
|
|
4
4
|
var chunk43JEHY7D_cjs = require('./chunk-43JEHY7D.cjs');
|
|
5
|
-
var
|
|
5
|
+
var chunkYFUGKMNS_cjs = require('./chunk-YFUGKMNS.cjs');
|
|
6
6
|
var chunkZY3TSHMJ_cjs = require('./chunk-ZY3TSHMJ.cjs');
|
|
7
7
|
var chunkUEI7SYH6_cjs = require('./chunk-UEI7SYH6.cjs');
|
|
8
8
|
require('./chunk-TQQZGNOI.cjs');
|
|
9
|
-
var
|
|
9
|
+
var chunkKCHHJKQN_cjs = require('./chunk-KCHHJKQN.cjs');
|
|
10
10
|
var chunkYEZBTYCP_cjs = require('./chunk-YEZBTYCP.cjs');
|
|
11
11
|
var chunkY55PYKXH_cjs = require('./chunk-Y55PYKXH.cjs');
|
|
12
12
|
require('./chunk-DMPMQ74B.cjs');
|
|
@@ -21,11 +21,60 @@ var chunkPK6SKIKE_cjs = require('./chunk-PK6SKIKE.cjs');
|
|
|
21
21
|
var sha3Addons_js = require('@noble/hashes/sha3-addons.js');
|
|
22
22
|
var kit = require('@solana/kit');
|
|
23
23
|
var arciumCodama = require('@umbra-privacy/arcium-codama');
|
|
24
|
-
var indexerReadServiceClient = require('@umbra-privacy/indexer-read-service-client');
|
|
25
24
|
var ed25519_js = require('@noble/curves/ed25519.js');
|
|
26
25
|
var sha3_js = require('@noble/hashes/sha3.js');
|
|
27
26
|
var umbraCodama = require('@umbra-privacy/umbra-codama');
|
|
28
27
|
|
|
28
|
+
// src/umbra/constants.ts
|
|
29
|
+
var UMBRA_MESSAGE_TO_SIGN = `
|
|
30
|
+
Umbra Protocol – User Consent & Acknowledgement
|
|
31
|
+
|
|
32
|
+
Please read carefully before continuing. Umbra is a non-custodial, open-source protocol. Umbra does not hold, control, manage, or access your digital assets, private keys, viewing keys, transactions, or personal data. All interactions with the Umbra protocol occur through autonomous smart contracts and wallet-signed transactions executed directly on the blockchain.
|
|
33
|
+
|
|
34
|
+
By using the Umbra protocol, you acknowledge and agree that:
|
|
35
|
+
|
|
36
|
+
1. You are solely responsible for managing your wallet, private keys, privacy settings, viewing key disclosures, and any transactions or interactions you authorize.
|
|
37
|
+
2.Blockchain transactions are generally irreversible, and smart contracts may contain bugs, vulnerabilities, or unintended behavior.
|
|
38
|
+
3. Errors, misuse, misconfiguration, third-party tools, relayers, or loss of keys may result in permanent and unrecoverable loss of assets or privacy.
|
|
39
|
+
4. Privacy features are designed to enhance confidentiality but do not guarantee absolute or unconditional anonymity.
|
|
40
|
+
5. Transactions may involve independent relayers or third-party infrastructure that Umbra does not operate, control, or supervise.
|
|
41
|
+
6. By clicking "I Agree", you confirm that you have read, understood, and accepted all applicable terms, policies, risk disclosures, notices, and other documentation governing your access to and use of the Umbra protocol, as published or made available by Umbra from time to time.
|
|
42
|
+
You acknowledge that such documentation may be updated or modified, and that continued access to or use of the Umbra Protocol constitutes acceptance of the then-current versions. If you do not agree, do not proceed and discontinue use of the Umbra protocol.
|
|
43
|
+
`;
|
|
44
|
+
var FEE_OFFSETS = {
|
|
45
|
+
/**
|
|
46
|
+
* Offset used in `FeeVault` PDA derivation for the unified protocol fees pool.
|
|
47
|
+
*
|
|
48
|
+
* @remarks
|
|
49
|
+
* Passed as the final seed to `findProtocolFeeVaultPda` and
|
|
50
|
+
* `findRelayerFeeVaultPda`. Currently `0n`.
|
|
51
|
+
*
|
|
52
|
+
* @readonly
|
|
53
|
+
*/
|
|
54
|
+
PROTOCOL_FEES_POOL: 0n,
|
|
55
|
+
/**
|
|
56
|
+
* Offset used in `FeeSchedule` PDA derivation.
|
|
57
|
+
*
|
|
58
|
+
* @remarks
|
|
59
|
+
* Passed as the final seed to `findFeeSchedulePda`. Currently `0n`.
|
|
60
|
+
*
|
|
61
|
+
* @readonly
|
|
62
|
+
*/
|
|
63
|
+
PROTOCOL_FEES_CONFIG: 0n,
|
|
64
|
+
/**
|
|
65
|
+
* Offset used in relayer fee configuration PDA derivation.
|
|
66
|
+
*
|
|
67
|
+
* @remarks
|
|
68
|
+
* Passed as the offset seed when looking up the relayer's fee configuration account.
|
|
69
|
+
* Currently `0n`.
|
|
70
|
+
*
|
|
71
|
+
* @readonly
|
|
72
|
+
*/
|
|
73
|
+
RELAYER_FEES_CONFIG: 0n
|
|
74
|
+
};
|
|
75
|
+
var BPS_DIVISOR = 16384n;
|
|
76
|
+
|
|
77
|
+
// src/common/storage.ts
|
|
29
78
|
function getDefaultMasterSeedStorage() {
|
|
30
79
|
let cachedSeed = null;
|
|
31
80
|
return {
|
|
@@ -46,8 +95,7 @@ var MASTER_SEED_DOMAIN = new TextEncoder().encode("Umbra Privacy - MasterSeedGen
|
|
|
46
95
|
var SEED_PERSONALIZATION = new TextEncoder().encode("umbra/1.0.0|kmac256/1.0.0|kdf/1.0.0|seed");
|
|
47
96
|
function getDefaultMasterSeedGenerator(signer) {
|
|
48
97
|
return async () => {
|
|
49
|
-
const
|
|
50
|
-
const messageBytes = new TextEncoder().encode(message);
|
|
98
|
+
const messageBytes = new TextEncoder().encode(UMBRA_MESSAGE_TO_SIGN);
|
|
51
99
|
const signature = await signer.signMessage(messageBytes);
|
|
52
100
|
const seed = sha3Addons_js.kmac256(
|
|
53
101
|
MASTER_SEED_DOMAIN,
|
|
@@ -93,7 +141,10 @@ function notificationValueToEncodedAccount(address, value) {
|
|
|
93
141
|
chunkPK6SKIKE_cjs.__name(notificationValueToEncodedAccount, "notificationValueToEncodedAccount");
|
|
94
142
|
function checkAborted(signal) {
|
|
95
143
|
if (signal?.aborted) {
|
|
96
|
-
throw new
|
|
144
|
+
throw new chunkKCHHJKQN_cjs.ComputationMonitorError(
|
|
145
|
+
"timeout",
|
|
146
|
+
"Computation monitoring cancelled via AbortSignal"
|
|
147
|
+
);
|
|
97
148
|
}
|
|
98
149
|
}
|
|
99
150
|
chunkPK6SKIKE_cjs.__name(checkAborted, "checkAborted");
|
|
@@ -118,15 +169,15 @@ async function retrieveCallbackTransactionSignature(rpc, computationAddress) {
|
|
|
118
169
|
return sig;
|
|
119
170
|
}
|
|
120
171
|
}
|
|
121
|
-
throw new
|
|
172
|
+
throw new chunkKCHHJKQN_cjs.ComputationMonitorError(
|
|
122
173
|
"signature-retrieval",
|
|
123
174
|
`No successful callback transaction found (checked ${String(DEFAULT_SIGNATURE_RETRIEVAL_LIMIT)} signatures)`
|
|
124
175
|
);
|
|
125
176
|
} catch (error) {
|
|
126
|
-
if (error instanceof
|
|
177
|
+
if (error instanceof chunkKCHHJKQN_cjs.ComputationMonitorError) {
|
|
127
178
|
throw error;
|
|
128
179
|
}
|
|
129
|
-
throw new
|
|
180
|
+
throw new chunkKCHHJKQN_cjs.ComputationMonitorError(
|
|
130
181
|
"signature-retrieval",
|
|
131
182
|
"Failed to retrieve callback transaction signature",
|
|
132
183
|
error instanceof Error ? error : void 0
|
|
@@ -155,6 +206,13 @@ function buildPrunedResult(startTime, queuedSlot, currentSlot, onProgress) {
|
|
|
155
206
|
};
|
|
156
207
|
}
|
|
157
208
|
chunkPK6SKIKE_cjs.__name(buildPrunedResult, "buildPrunedResult");
|
|
209
|
+
function buildTimedOutResult(startTime) {
|
|
210
|
+
return {
|
|
211
|
+
status: "timed-out",
|
|
212
|
+
elapsedMs: Date.now() - startTime
|
|
213
|
+
};
|
|
214
|
+
}
|
|
215
|
+
chunkPK6SKIKE_cjs.__name(buildTimedOutResult, "buildTimedOutResult");
|
|
158
216
|
function getWebsocketComputationMonitor(config, deps) {
|
|
159
217
|
const { rpcUrl, rpcSubscriptionsUrl } = config;
|
|
160
218
|
const {
|
|
@@ -163,7 +221,7 @@ function getWebsocketComputationMonitor(config, deps) {
|
|
|
163
221
|
} = deps ?? {};
|
|
164
222
|
const rpc = createRpc(rpcUrl);
|
|
165
223
|
const rpcSubscriptions = createRpcSubscriptions(rpcSubscriptionsUrl);
|
|
166
|
-
async function
|
|
224
|
+
async function prepareMonitor(computationAddress, options) {
|
|
167
225
|
const {
|
|
168
226
|
maxSlotWindow = DEFAULT_MAX_SLOT_WINDOW,
|
|
169
227
|
safetyTimeoutMs = DEFAULT_SAFETY_TIMEOUT_MS,
|
|
@@ -172,126 +230,128 @@ function getWebsocketComputationMonitor(config, deps) {
|
|
|
172
230
|
commitment = "confirmed",
|
|
173
231
|
signal: externalSignal
|
|
174
232
|
} = options ?? {};
|
|
175
|
-
const startTime = Date.now();
|
|
176
|
-
let queuedSlot = null;
|
|
177
|
-
try {
|
|
178
|
-
const currentAccount = await kit.fetchEncodedAccount(rpc, computationAddress, { commitment });
|
|
179
|
-
if (currentAccount.exists) {
|
|
180
|
-
const decoded = arciumCodama.decodeComputationAccount(currentAccount);
|
|
181
|
-
queuedSlot = decoded.data.slot;
|
|
182
|
-
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
183
|
-
return buildFinalizedResult(
|
|
184
|
-
rpc,
|
|
185
|
-
computationAddress,
|
|
186
|
-
startTime,
|
|
187
|
-
queuedSlot,
|
|
188
|
-
shouldRetrieveSignature,
|
|
189
|
-
onProgress
|
|
190
|
-
);
|
|
191
|
-
}
|
|
192
|
-
onProgress?.({ type: "queued", queuedSlot });
|
|
193
|
-
const currentSlot = await fetchCurrentSlot(rpc, commitment);
|
|
194
|
-
if (isSlotWindowExceeded(queuedSlot, currentSlot, maxSlotWindow)) {
|
|
195
|
-
return buildPrunedResult(startTime, queuedSlot, currentSlot, onProgress);
|
|
196
|
-
}
|
|
197
|
-
}
|
|
198
|
-
} catch (error) {
|
|
199
|
-
if (error instanceof chunkBL6WXLPV_cjs.ComputationMonitorError) {
|
|
200
|
-
throw error;
|
|
201
|
-
}
|
|
202
|
-
}
|
|
203
|
-
checkAborted(externalSignal);
|
|
204
233
|
const abortController = new AbortController();
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
if (queuedSlot !== null) {
|
|
211
|
-
const capturedQueuedSlot = queuedSlot;
|
|
212
|
-
slotCheckIntervalId = setInterval(async () => {
|
|
213
|
-
try {
|
|
214
|
-
const currentSlot = await fetchCurrentSlot(rpc, commitment);
|
|
215
|
-
if (isSlotWindowExceeded(capturedQueuedSlot, currentSlot, maxSlotWindow)) {
|
|
216
|
-
pruneDetected = buildPrunedResult(startTime, capturedQueuedSlot, currentSlot, onProgress);
|
|
217
|
-
abortController.abort();
|
|
218
|
-
}
|
|
219
|
-
} catch {
|
|
220
|
-
}
|
|
221
|
-
}, 5e3);
|
|
234
|
+
let cleaned = false;
|
|
235
|
+
function cleanup() {
|
|
236
|
+
if (cleaned) return;
|
|
237
|
+
cleaned = true;
|
|
238
|
+
abortController.abort();
|
|
222
239
|
}
|
|
240
|
+
chunkPK6SKIKE_cjs.__name(cleanup, "cleanup");
|
|
241
|
+
let notifications;
|
|
223
242
|
try {
|
|
224
|
-
|
|
225
|
-
|
|
226
|
-
|
|
227
|
-
|
|
228
|
-
|
|
229
|
-
|
|
230
|
-
|
|
231
|
-
|
|
232
|
-
|
|
233
|
-
|
|
234
|
-
|
|
235
|
-
|
|
236
|
-
|
|
237
|
-
|
|
238
|
-
|
|
243
|
+
notifications = await rpcSubscriptions.accountNotifications(computationAddress, { encoding: "base64", commitment }).subscribe({ abortSignal: abortController.signal });
|
|
244
|
+
} catch (error) {
|
|
245
|
+
cleanup();
|
|
246
|
+
throw new chunkKCHHJKQN_cjs.ComputationMonitorError(
|
|
247
|
+
"subscription",
|
|
248
|
+
"Failed to establish WebSocket subscription",
|
|
249
|
+
error instanceof Error ? error : void 0
|
|
250
|
+
);
|
|
251
|
+
}
|
|
252
|
+
async function awaitComputation() {
|
|
253
|
+
const startTime = Date.now();
|
|
254
|
+
let queuedSlot = null;
|
|
255
|
+
let receivedFirstNotification = false;
|
|
256
|
+
checkAborted(externalSignal);
|
|
257
|
+
const safetyTimeoutId = setTimeout(() => abortController.abort(), safetyTimeoutMs);
|
|
258
|
+
const onExternalAbort = /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(() => abortController.abort(), "onExternalAbort");
|
|
259
|
+
externalSignal?.addEventListener("abort", onExternalAbort, { once: true });
|
|
260
|
+
let slotCheckIntervalId = null;
|
|
261
|
+
let pruneDetected = null;
|
|
262
|
+
try {
|
|
263
|
+
for await (const notification of notifications) {
|
|
264
|
+
try {
|
|
265
|
+
const encodedAccount = notificationValueToEncodedAccount(
|
|
239
266
|
computationAddress,
|
|
240
|
-
|
|
241
|
-
queuedSlot,
|
|
242
|
-
shouldRetrieveSignature,
|
|
243
|
-
onProgress
|
|
267
|
+
notification.value
|
|
244
268
|
);
|
|
269
|
+
const decoded = arciumCodama.decodeComputationAccount(encodedAccount);
|
|
270
|
+
if (!receivedFirstNotification) {
|
|
271
|
+
receivedFirstNotification = true;
|
|
272
|
+
queuedSlot = decoded.data.slot;
|
|
273
|
+
const capturedQueuedSlot = queuedSlot;
|
|
274
|
+
slotCheckIntervalId = setInterval(async () => {
|
|
275
|
+
try {
|
|
276
|
+
const currentSlot = await fetchCurrentSlot(rpc, commitment);
|
|
277
|
+
if (isSlotWindowExceeded(capturedQueuedSlot, currentSlot, maxSlotWindow)) {
|
|
278
|
+
pruneDetected = buildPrunedResult(
|
|
279
|
+
startTime,
|
|
280
|
+
capturedQueuedSlot,
|
|
281
|
+
currentSlot,
|
|
282
|
+
onProgress
|
|
283
|
+
);
|
|
284
|
+
abortController.abort();
|
|
285
|
+
}
|
|
286
|
+
} catch {
|
|
287
|
+
}
|
|
288
|
+
}, 5e3);
|
|
289
|
+
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
290
|
+
return buildFinalizedResult(
|
|
291
|
+
rpc,
|
|
292
|
+
computationAddress,
|
|
293
|
+
startTime,
|
|
294
|
+
queuedSlot,
|
|
295
|
+
shouldRetrieveSignature,
|
|
296
|
+
onProgress
|
|
297
|
+
);
|
|
298
|
+
}
|
|
299
|
+
continue;
|
|
300
|
+
}
|
|
301
|
+
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
302
|
+
return buildFinalizedResult(
|
|
303
|
+
rpc,
|
|
304
|
+
computationAddress,
|
|
305
|
+
startTime,
|
|
306
|
+
queuedSlot,
|
|
307
|
+
shouldRetrieveSignature,
|
|
308
|
+
onProgress
|
|
309
|
+
);
|
|
310
|
+
}
|
|
311
|
+
} catch {
|
|
312
|
+
continue;
|
|
245
313
|
}
|
|
246
|
-
} catch {
|
|
247
|
-
continue;
|
|
248
314
|
}
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
|
|
252
|
-
|
|
253
|
-
|
|
254
|
-
|
|
255
|
-
|
|
256
|
-
|
|
257
|
-
|
|
258
|
-
|
|
259
|
-
|
|
260
|
-
|
|
261
|
-
|
|
262
|
-
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
`Safety timeout: computation monitoring exceeded ${String(safetyTimeoutMs)}ms`
|
|
315
|
+
if (pruneDetected) {
|
|
316
|
+
return pruneDetected;
|
|
317
|
+
}
|
|
318
|
+
return buildTimedOutResult(startTime);
|
|
319
|
+
} catch (error) {
|
|
320
|
+
if (error instanceof chunkKCHHJKQN_cjs.ComputationMonitorError) {
|
|
321
|
+
throw error;
|
|
322
|
+
}
|
|
323
|
+
if (pruneDetected) {
|
|
324
|
+
return pruneDetected;
|
|
325
|
+
}
|
|
326
|
+
if (abortController.signal.aborted) {
|
|
327
|
+
return buildTimedOutResult(startTime);
|
|
328
|
+
}
|
|
329
|
+
throw new chunkKCHHJKQN_cjs.ComputationMonitorError(
|
|
330
|
+
"subscription",
|
|
331
|
+
"WebSocket subscription failed",
|
|
332
|
+
error instanceof Error ? error : void 0
|
|
268
333
|
);
|
|
334
|
+
} finally {
|
|
335
|
+
clearTimeout(safetyTimeoutId);
|
|
336
|
+
if (slotCheckIntervalId !== null) {
|
|
337
|
+
clearInterval(slotCheckIntervalId);
|
|
338
|
+
}
|
|
339
|
+
externalSignal?.removeEventListener("abort", onExternalAbort);
|
|
340
|
+
cleanup();
|
|
269
341
|
}
|
|
270
|
-
throw new chunkBL6WXLPV_cjs.ComputationMonitorError(
|
|
271
|
-
"subscription",
|
|
272
|
-
"WebSocket subscription failed",
|
|
273
|
-
error instanceof Error ? error : void 0
|
|
274
|
-
);
|
|
275
|
-
} finally {
|
|
276
|
-
clearTimeout(safetyTimeoutId);
|
|
277
|
-
if (slotCheckIntervalId !== null) {
|
|
278
|
-
clearInterval(slotCheckIntervalId);
|
|
279
|
-
}
|
|
280
|
-
externalSignal?.removeEventListener("abort", onExternalAbort);
|
|
281
|
-
abortController.abort();
|
|
282
342
|
}
|
|
343
|
+
chunkPK6SKIKE_cjs.__name(awaitComputation, "awaitComputation");
|
|
344
|
+
return { awaitComputation, cleanup };
|
|
283
345
|
}
|
|
284
|
-
chunkPK6SKIKE_cjs.__name(
|
|
285
|
-
return {
|
|
286
|
-
awaitComputation: monitorComputation
|
|
287
|
-
};
|
|
346
|
+
chunkPK6SKIKE_cjs.__name(prepareMonitor, "prepareMonitor");
|
|
347
|
+
return { prepareMonitor };
|
|
288
348
|
}
|
|
289
349
|
chunkPK6SKIKE_cjs.__name(getWebsocketComputationMonitor, "getWebsocketComputationMonitor");
|
|
290
350
|
function getPollingComputationMonitor(config, deps) {
|
|
291
351
|
const { rpcUrl } = config;
|
|
292
352
|
const { createRpc = kit.createSolanaRpc } = deps ?? {};
|
|
293
353
|
const rpc = createRpc(rpcUrl);
|
|
294
|
-
async function
|
|
354
|
+
async function prepareMonitor(computationAddress, options) {
|
|
295
355
|
const {
|
|
296
356
|
maxSlotWindow = DEFAULT_MAX_SLOT_WINDOW,
|
|
297
357
|
safetyTimeoutMs = DEFAULT_SAFETY_TIMEOUT_MS,
|
|
@@ -301,360 +361,77 @@ function getPollingComputationMonitor(config, deps) {
|
|
|
301
361
|
commitment = "confirmed",
|
|
302
362
|
signal: externalSignal
|
|
303
363
|
} = options ?? {};
|
|
304
|
-
|
|
305
|
-
|
|
306
|
-
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
310
|
-
|
|
311
|
-
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
if (
|
|
315
|
-
|
|
316
|
-
continue;
|
|
317
|
-
}
|
|
318
|
-
const decoded = arciumCodama.decodeComputationAccount(maybeAccount);
|
|
319
|
-
if (queuedSlot === null) {
|
|
320
|
-
queuedSlot = decoded.data.slot;
|
|
321
|
-
}
|
|
322
|
-
if (!queuedEventFired && decoded.data.status === arciumCodama.ComputationStatus.Queued) {
|
|
323
|
-
onProgress?.({ type: "queued", queuedSlot });
|
|
324
|
-
queuedEventFired = true;
|
|
325
|
-
}
|
|
326
|
-
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
327
|
-
return buildFinalizedResult(
|
|
328
|
-
rpc,
|
|
329
|
-
computationAddress,
|
|
330
|
-
startTime,
|
|
331
|
-
queuedSlot,
|
|
332
|
-
shouldRetrieveSignature,
|
|
333
|
-
onProgress
|
|
334
|
-
);
|
|
335
|
-
}
|
|
336
|
-
if (isSlotWindowExceeded(queuedSlot, currentSlot, maxSlotWindow)) {
|
|
337
|
-
return buildPrunedResult(startTime, queuedSlot, currentSlot, onProgress);
|
|
364
|
+
let aborted = false;
|
|
365
|
+
function cleanup() {
|
|
366
|
+
aborted = true;
|
|
367
|
+
}
|
|
368
|
+
chunkPK6SKIKE_cjs.__name(cleanup, "cleanup");
|
|
369
|
+
async function awaitComputation() {
|
|
370
|
+
const startTime = Date.now();
|
|
371
|
+
let queuedSlot = null;
|
|
372
|
+
let receivedFirstDecode = false;
|
|
373
|
+
while (Date.now() - startTime < safetyTimeoutMs) {
|
|
374
|
+
if (aborted) {
|
|
375
|
+
return buildTimedOutResult(startTime);
|
|
338
376
|
}
|
|
339
|
-
|
|
340
|
-
|
|
341
|
-
|
|
377
|
+
checkAborted(externalSignal);
|
|
378
|
+
try {
|
|
379
|
+
const [maybeAccount, currentSlot] = await Promise.all([
|
|
380
|
+
kit.fetchEncodedAccount(rpc, computationAddress, { commitment }),
|
|
381
|
+
fetchCurrentSlot(rpc, commitment)
|
|
382
|
+
]);
|
|
383
|
+
if (!maybeAccount.exists) {
|
|
384
|
+
await chunkENVYYEM4_cjs.sleep(pollingIntervalMs);
|
|
385
|
+
continue;
|
|
386
|
+
}
|
|
387
|
+
const decoded = arciumCodama.decodeComputationAccount(maybeAccount);
|
|
388
|
+
if (queuedSlot === null) {
|
|
389
|
+
queuedSlot = decoded.data.slot;
|
|
390
|
+
}
|
|
391
|
+
if (!receivedFirstDecode) {
|
|
392
|
+
receivedFirstDecode = true;
|
|
393
|
+
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
394
|
+
return buildFinalizedResult(
|
|
395
|
+
rpc,
|
|
396
|
+
computationAddress,
|
|
397
|
+
startTime,
|
|
398
|
+
queuedSlot,
|
|
399
|
+
shouldRetrieveSignature,
|
|
400
|
+
onProgress
|
|
401
|
+
);
|
|
402
|
+
}
|
|
403
|
+
await chunkENVYYEM4_cjs.sleep(pollingIntervalMs);
|
|
404
|
+
continue;
|
|
405
|
+
}
|
|
406
|
+
if (decoded.data.status === arciumCodama.ComputationStatus.Finalized) {
|
|
407
|
+
return buildFinalizedResult(
|
|
408
|
+
rpc,
|
|
409
|
+
computationAddress,
|
|
410
|
+
startTime,
|
|
411
|
+
queuedSlot,
|
|
412
|
+
shouldRetrieveSignature,
|
|
413
|
+
onProgress
|
|
414
|
+
);
|
|
415
|
+
}
|
|
416
|
+
if (isSlotWindowExceeded(queuedSlot, currentSlot, maxSlotWindow)) {
|
|
417
|
+
return buildPrunedResult(startTime, queuedSlot, currentSlot, onProgress);
|
|
418
|
+
}
|
|
419
|
+
} catch (error) {
|
|
420
|
+
if (error instanceof chunkKCHHJKQN_cjs.ComputationMonitorError) {
|
|
421
|
+
throw error;
|
|
422
|
+
}
|
|
342
423
|
}
|
|
424
|
+
await chunkENVYYEM4_cjs.sleep(pollingIntervalMs);
|
|
343
425
|
}
|
|
344
|
-
|
|
426
|
+
return buildTimedOutResult(startTime);
|
|
345
427
|
}
|
|
346
|
-
|
|
347
|
-
|
|
348
|
-
`Safety timeout: computation monitoring exceeded ${String(safetyTimeoutMs)}ms`
|
|
349
|
-
);
|
|
428
|
+
chunkPK6SKIKE_cjs.__name(awaitComputation, "awaitComputation");
|
|
429
|
+
return { awaitComputation, cleanup };
|
|
350
430
|
}
|
|
351
|
-
chunkPK6SKIKE_cjs.__name(
|
|
352
|
-
return {
|
|
353
|
-
awaitComputation: monitorComputation
|
|
354
|
-
};
|
|
431
|
+
chunkPK6SKIKE_cjs.__name(prepareMonitor, "prepareMonitor");
|
|
432
|
+
return { prepareMonitor };
|
|
355
433
|
}
|
|
356
434
|
chunkPK6SKIKE_cjs.__name(getPollingComputationMonitor, "getPollingComputationMonitor");
|
|
357
|
-
var DEFAULT_UTXO_LIMIT = 1000n;
|
|
358
|
-
var MAX_UTXO_LIMIT = 5000n;
|
|
359
|
-
var IndexerError = class _IndexerError extends Error {
|
|
360
|
-
static {
|
|
361
|
-
chunkPK6SKIKE_cjs.__name(this, "IndexerError");
|
|
362
|
-
}
|
|
363
|
-
/**
|
|
364
|
-
* The indexer operation that failed.
|
|
365
|
-
*
|
|
366
|
-
* @remarks
|
|
367
|
-
* This is a short camelCase label identifying which high-level operation
|
|
368
|
-
* triggered the error (e.g. `"fetchMerkleProof"`, `"fetchUtxoData"`,
|
|
369
|
-
* `"base64Conversion"`).
|
|
370
|
-
*
|
|
371
|
-
* @readonly
|
|
372
|
-
*/
|
|
373
|
-
operation;
|
|
374
|
-
/**
|
|
375
|
-
* HTTP status code if available.
|
|
376
|
-
*
|
|
377
|
-
* @remarks
|
|
378
|
-
* Present when the server responded with an HTTP error (4xx or 5xx).
|
|
379
|
-
* `undefined` for transport-level failures such as network timeouts or
|
|
380
|
-
* DNS resolution failures.
|
|
381
|
-
*
|
|
382
|
-
* @readonly
|
|
383
|
-
*/
|
|
384
|
-
statusCode;
|
|
385
|
-
/**
|
|
386
|
-
* Creates a new IndexerError.
|
|
387
|
-
*
|
|
388
|
-
* @param operation - The operation that failed (e.g. `"fetchMerkleProof"`)
|
|
389
|
-
* @param message - Descriptive error message for display to users or logs
|
|
390
|
-
* @param statusCode - Optional HTTP status code (undefined for network failures)
|
|
391
|
-
* @param cause - Optional underlying error that triggered this one
|
|
392
|
-
*/
|
|
393
|
-
constructor(operation, message, statusCode, cause) {
|
|
394
|
-
super(`Indexer operation '${operation}' failed: ${message}`);
|
|
395
|
-
this.name = "IndexerError";
|
|
396
|
-
this.operation = operation;
|
|
397
|
-
this.statusCode = statusCode;
|
|
398
|
-
this.cause = cause;
|
|
399
|
-
if (Error.captureStackTrace !== void 0) {
|
|
400
|
-
Error.captureStackTrace(this, _IndexerError);
|
|
401
|
-
}
|
|
402
|
-
}
|
|
403
|
-
};
|
|
404
|
-
function base64ToBytes(base64) {
|
|
405
|
-
if (typeof Buffer !== "undefined") {
|
|
406
|
-
return Buffer.from(base64, "base64");
|
|
407
|
-
}
|
|
408
|
-
const binaryString = atob(base64);
|
|
409
|
-
const bytes = new Uint8Array(binaryString.length);
|
|
410
|
-
for (let index = 0; index < binaryString.length; index++) {
|
|
411
|
-
bytes[index] = binaryString.codePointAt(index) ?? 0;
|
|
412
|
-
}
|
|
413
|
-
return bytes;
|
|
414
|
-
}
|
|
415
|
-
chunkPK6SKIKE_cjs.__name(base64ToBytes, "base64ToBytes");
|
|
416
|
-
function base64ToU256LeBytes(base64) {
|
|
417
|
-
const bytes = base64ToBytes(base64);
|
|
418
|
-
if (bytes.length !== 32) {
|
|
419
|
-
throw new IndexerError(
|
|
420
|
-
"base64Conversion",
|
|
421
|
-
`Invalid byte length: expected 32 bytes, got ${String(bytes.length)}`
|
|
422
|
-
);
|
|
423
|
-
}
|
|
424
|
-
chunkLTCKPTZC_cjs.assertU256LeBytes(bytes);
|
|
425
|
-
return bytes;
|
|
426
|
-
}
|
|
427
|
-
chunkPK6SKIKE_cjs.__name(base64ToU256LeBytes, "base64ToU256LeBytes");
|
|
428
|
-
function base64ToX25519PublicKey(base64) {
|
|
429
|
-
const bytes = base64ToBytes(base64);
|
|
430
|
-
if (bytes.length !== 32) {
|
|
431
|
-
throw new IndexerError(
|
|
432
|
-
"base64Conversion",
|
|
433
|
-
`Invalid X25519 public key length: expected 32 bytes, got ${String(bytes.length)}`
|
|
434
|
-
);
|
|
435
|
-
}
|
|
436
|
-
return bytes;
|
|
437
|
-
}
|
|
438
|
-
chunkPK6SKIKE_cjs.__name(base64ToX25519PublicKey, "base64ToX25519PublicKey");
|
|
439
|
-
function base64ToAesCiphertext(base64) {
|
|
440
|
-
return base64ToBytes(base64);
|
|
441
|
-
}
|
|
442
|
-
chunkPK6SKIKE_cjs.__name(base64ToAesCiphertext, "base64ToAesCiphertext");
|
|
443
|
-
function splitAddressBase64(base64) {
|
|
444
|
-
const bytes = base64ToBytes(base64);
|
|
445
|
-
if (bytes.length !== 32) {
|
|
446
|
-
throw new IndexerError(
|
|
447
|
-
"addressSplit",
|
|
448
|
-
`Invalid address length: expected 32 bytes, got ${String(bytes.length)}`
|
|
449
|
-
);
|
|
450
|
-
}
|
|
451
|
-
const lowBytes = bytes.slice(0, 16);
|
|
452
|
-
const highBytes = bytes.slice(16, 32);
|
|
453
|
-
chunkLTCKPTZC_cjs.assertU128LeBytes(lowBytes);
|
|
454
|
-
chunkLTCKPTZC_cjs.assertU128LeBytes(highBytes);
|
|
455
|
-
return {
|
|
456
|
-
low: chunk5GUSMQ74_cjs.decodeU128LeBytesToU128(lowBytes),
|
|
457
|
-
high: chunk5GUSMQ74_cjs.decodeU128LeBytesToU128(highBytes)
|
|
458
|
-
};
|
|
459
|
-
}
|
|
460
|
-
chunkPK6SKIKE_cjs.__name(splitAddressBase64, "splitAddressBase64");
|
|
461
|
-
function getMerkleProofFetcher(args, deps) {
|
|
462
|
-
const { apiEndpoint } = args;
|
|
463
|
-
const client = new indexerReadServiceClient.ReadServiceClient({ endpoint: apiEndpoint, fetch: deps?.fetch });
|
|
464
|
-
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function fetchMerkleProof(treeIndex, insertionIndices) {
|
|
465
|
-
if (insertionIndices.length === 0) {
|
|
466
|
-
return /* @__PURE__ */ new Map();
|
|
467
|
-
}
|
|
468
|
-
if (treeIndex < 0n) {
|
|
469
|
-
throw new IndexerError(
|
|
470
|
-
"fetchMerkleProof",
|
|
471
|
-
`Invalid tree index: ${String(treeIndex)}. Must be non-negative.`
|
|
472
|
-
);
|
|
473
|
-
}
|
|
474
|
-
const results = /* @__PURE__ */ new Map();
|
|
475
|
-
const fetchPromises = insertionIndices.map(async (insertionIndex) => {
|
|
476
|
-
if (insertionIndex < 0n) {
|
|
477
|
-
throw new IndexerError(
|
|
478
|
-
"fetchMerkleProof",
|
|
479
|
-
`Invalid insertion index: ${String(insertionIndex)}. Must be non-negative.`
|
|
480
|
-
);
|
|
481
|
-
}
|
|
482
|
-
let data;
|
|
483
|
-
try {
|
|
484
|
-
data = await client.getProof(treeIndex, insertionIndex);
|
|
485
|
-
} catch (error) {
|
|
486
|
-
throw new IndexerError(
|
|
487
|
-
"fetchMerkleProof",
|
|
488
|
-
`Failed to fetch proof for leaf ${String(insertionIndex)}: ${error instanceof Error ? error.message : String(error)}`,
|
|
489
|
-
void 0,
|
|
490
|
-
error instanceof Error ? error : void 0
|
|
491
|
-
);
|
|
492
|
-
}
|
|
493
|
-
const merkleRoot = base64ToU256LeBytes(data.root);
|
|
494
|
-
const merklePath = data.proof.map((hash) => base64ToU256LeBytes(hash));
|
|
495
|
-
const leaf = base64ToU256LeBytes(data.leaf);
|
|
496
|
-
return {
|
|
497
|
-
insertionIndex,
|
|
498
|
-
data: {
|
|
499
|
-
merkleRoot,
|
|
500
|
-
treeIndex: data.tree_index,
|
|
501
|
-
insertionIndex: data.insertion_index,
|
|
502
|
-
merklePath,
|
|
503
|
-
leaf
|
|
504
|
-
}
|
|
505
|
-
};
|
|
506
|
-
});
|
|
507
|
-
const proofResults = await Promise.all(fetchPromises);
|
|
508
|
-
for (const { insertionIndex, data } of proofResults) {
|
|
509
|
-
results.set(insertionIndex, data);
|
|
510
|
-
}
|
|
511
|
-
return results;
|
|
512
|
-
}, "fetchMerkleProof");
|
|
513
|
-
}
|
|
514
|
-
chunkPK6SKIKE_cjs.__name(getMerkleProofFetcher, "getMerkleProofFetcher");
|
|
515
|
-
function getBatchMerkleProofFetcher(args, deps) {
|
|
516
|
-
const { apiEndpoint } = args;
|
|
517
|
-
const client = new indexerReadServiceClient.ReadServiceClient({ endpoint: apiEndpoint, fetch: deps?.fetch });
|
|
518
|
-
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function fetchBatchMerkleProof(treeIndex, insertionIndices) {
|
|
519
|
-
if (insertionIndices.length === 0) {
|
|
520
|
-
return { root: new Uint8Array(32), proofs: /* @__PURE__ */ new Map() };
|
|
521
|
-
}
|
|
522
|
-
if (treeIndex < 0n) {
|
|
523
|
-
throw new IndexerError(
|
|
524
|
-
"fetchBatchMerkleProof",
|
|
525
|
-
`Invalid tree index: ${String(treeIndex)}. Must be non-negative.`
|
|
526
|
-
);
|
|
527
|
-
}
|
|
528
|
-
for (const idx of insertionIndices) {
|
|
529
|
-
if (idx < 0n) {
|
|
530
|
-
throw new IndexerError(
|
|
531
|
-
"fetchBatchMerkleProof",
|
|
532
|
-
`Invalid insertion index: ${String(idx)}. Must be non-negative.`
|
|
533
|
-
);
|
|
534
|
-
}
|
|
535
|
-
}
|
|
536
|
-
let data;
|
|
537
|
-
try {
|
|
538
|
-
data = await client.getBatchProof(
|
|
539
|
-
treeIndex,
|
|
540
|
-
insertionIndices.map((idx) => BigInt(idx))
|
|
541
|
-
);
|
|
542
|
-
} catch (error) {
|
|
543
|
-
throw new IndexerError(
|
|
544
|
-
"fetchBatchMerkleProof",
|
|
545
|
-
`Failed to fetch batch proofs: ${error instanceof Error ? error.message : String(error)}`,
|
|
546
|
-
void 0,
|
|
547
|
-
error instanceof Error ? error : void 0
|
|
548
|
-
);
|
|
549
|
-
}
|
|
550
|
-
const root = base64ToU256LeBytes(data.root);
|
|
551
|
-
const proofs = /* @__PURE__ */ new Map();
|
|
552
|
-
for (const entry of data.proofs) {
|
|
553
|
-
proofs.set(entry.insertion_index, {
|
|
554
|
-
merklePath: entry.proof.map((hash) => base64ToU256LeBytes(hash)),
|
|
555
|
-
leaf: base64ToU256LeBytes(entry.leaf)
|
|
556
|
-
});
|
|
557
|
-
}
|
|
558
|
-
return { root, proofs };
|
|
559
|
-
}, "fetchBatchMerkleProof");
|
|
560
|
-
}
|
|
561
|
-
chunkPK6SKIKE_cjs.__name(getBatchMerkleProofFetcher, "getBatchMerkleProofFetcher");
|
|
562
|
-
function getUtxoDataFetcher(args, deps) {
|
|
563
|
-
const { apiEndpoint } = args;
|
|
564
|
-
const client = new indexerReadServiceClient.ReadServiceClient({ endpoint: apiEndpoint, fetch: deps?.fetch });
|
|
565
|
-
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function fetchUtxoData(startIndex, endIndex, limit) {
|
|
566
|
-
if (startIndex < 0n) {
|
|
567
|
-
throw new IndexerError(
|
|
568
|
-
"fetchUtxoData",
|
|
569
|
-
`Invalid start index: ${String(startIndex)}. Must be non-negative.`
|
|
570
|
-
);
|
|
571
|
-
}
|
|
572
|
-
if (endIndex !== void 0 && endIndex < startIndex) {
|
|
573
|
-
throw new IndexerError(
|
|
574
|
-
"fetchUtxoData",
|
|
575
|
-
`Invalid end index: ${String(endIndex)}. Must be >= start index (${String(startIndex)}).`
|
|
576
|
-
);
|
|
577
|
-
}
|
|
578
|
-
const effectiveLimit = limit ?? DEFAULT_UTXO_LIMIT;
|
|
579
|
-
if (effectiveLimit < 1n || effectiveLimit > MAX_UTXO_LIMIT) {
|
|
580
|
-
throw new IndexerError(
|
|
581
|
-
"fetchUtxoData",
|
|
582
|
-
`Invalid limit: ${String(effectiveLimit)}. Must be between 1 and ${String(MAX_UTXO_LIMIT)}.`
|
|
583
|
-
);
|
|
584
|
-
}
|
|
585
|
-
let response;
|
|
586
|
-
try {
|
|
587
|
-
response = await client.getUtxoData({
|
|
588
|
-
start: startIndex,
|
|
589
|
-
end: endIndex,
|
|
590
|
-
limit: effectiveLimit
|
|
591
|
-
});
|
|
592
|
-
} catch (error) {
|
|
593
|
-
throw new IndexerError(
|
|
594
|
-
"fetchUtxoData",
|
|
595
|
-
`Network error: ${error instanceof Error ? error.message : String(error)}`,
|
|
596
|
-
void 0,
|
|
597
|
-
error instanceof Error ? error : void 0
|
|
598
|
-
);
|
|
599
|
-
}
|
|
600
|
-
const items = /* @__PURE__ */ new Map();
|
|
601
|
-
for (const item of response.items) {
|
|
602
|
-
try {
|
|
603
|
-
const senderAddress = splitAddressBase64(item.h1_sender_address);
|
|
604
|
-
const mintAddress = splitAddressBase64(item.h1_mint_address);
|
|
605
|
-
const timestamp = {
|
|
606
|
-
year: item.h1_year,
|
|
607
|
-
month: item.h1_month,
|
|
608
|
-
day: item.h1_day,
|
|
609
|
-
hour: item.h1_hour,
|
|
610
|
-
minute: item.h1_minute,
|
|
611
|
-
second: item.h1_second
|
|
612
|
-
};
|
|
613
|
-
const h1Components = {
|
|
614
|
-
version: BigInt(item.h1_version),
|
|
615
|
-
commitmentIndex: BigInt(item.h1_commitment_index),
|
|
616
|
-
senderAddressLow: senderAddress.low,
|
|
617
|
-
senderAddressHigh: senderAddress.high,
|
|
618
|
-
relayerFixedSolFees: item.h1_relayer_fixed_sol_fees,
|
|
619
|
-
mintAddressLow: mintAddress.low,
|
|
620
|
-
mintAddressHigh: mintAddress.high,
|
|
621
|
-
timestamp,
|
|
622
|
-
poolVolumeSpl: item.h1_pool_volume_spl,
|
|
623
|
-
poolVolumeSol: item.h1_pool_volume_sol
|
|
624
|
-
};
|
|
625
|
-
const utxoItem = {
|
|
626
|
-
absoluteIndex: item.absolute_index,
|
|
627
|
-
treeIndex: item.tree_index,
|
|
628
|
-
insertionIndex: item.insertion_index,
|
|
629
|
-
finalCommitment: base64ToU256LeBytes(item.final_commitment),
|
|
630
|
-
h1Components,
|
|
631
|
-
h1Hash: base64ToU256LeBytes(item.h1_hash),
|
|
632
|
-
h2Hash: base64ToU256LeBytes(item.h2_hash),
|
|
633
|
-
aesEncryptedData: base64ToAesCiphertext(item.aes_encrypted_data),
|
|
634
|
-
depositorX25519PublicKey: base64ToX25519PublicKey(item.depositor_x25519_public_key),
|
|
635
|
-
timestamp: item.timestamp,
|
|
636
|
-
slot: item.slot,
|
|
637
|
-
eventType: item.event_type
|
|
638
|
-
};
|
|
639
|
-
items.set(item.insertion_index, utxoItem);
|
|
640
|
-
} catch (error) {
|
|
641
|
-
throw new IndexerError(
|
|
642
|
-
"fetchUtxoData",
|
|
643
|
-
`Failed to parse UTXO data for index ${String(item.absolute_index)}: ${error instanceof Error ? error.message : String(error)}`,
|
|
644
|
-
void 0,
|
|
645
|
-
error instanceof Error ? error : void 0
|
|
646
|
-
);
|
|
647
|
-
}
|
|
648
|
-
}
|
|
649
|
-
return {
|
|
650
|
-
items,
|
|
651
|
-
hasMore: response.has_more,
|
|
652
|
-
nextCursor: response.next_cursor ?? void 0,
|
|
653
|
-
totalCount: response.total_count
|
|
654
|
-
};
|
|
655
|
-
}, "fetchUtxoData");
|
|
656
|
-
}
|
|
657
|
-
chunkPK6SKIKE_cjs.__name(getUtxoDataFetcher, "getUtxoDataFetcher");
|
|
658
435
|
|
|
659
436
|
// src/umbra/client.ts
|
|
660
437
|
var notImplementedGenerator = /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async () => {
|
|
@@ -698,15 +475,15 @@ async function getUmbraClient(args, deps) {
|
|
|
698
475
|
rpcUrl,
|
|
699
476
|
rpcSubscriptionsUrl
|
|
700
477
|
});
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
apiEndpoint: indexerApiEndpoint
|
|
709
|
-
}
|
|
478
|
+
let fetchMerkleProof;
|
|
479
|
+
let fetchBatchMerkleProof;
|
|
480
|
+
let fetchUtxoData;
|
|
481
|
+
if (indexerApiEndpoint !== void 0 && indexerApiEndpoint !== "") {
|
|
482
|
+
const { getMerkleProofFetcher, getBatchMerkleProofFetcher, getUtxoDataFetcher } = await import('./indexer-XOUBVRNU.cjs');
|
|
483
|
+
fetchMerkleProof = getMerkleProofFetcher({ apiEndpoint: indexerApiEndpoint });
|
|
484
|
+
fetchBatchMerkleProof = getBatchMerkleProofFetcher({ apiEndpoint: indexerApiEndpoint });
|
|
485
|
+
fetchUtxoData = getUtxoDataFetcher({ apiEndpoint: indexerApiEndpoint });
|
|
486
|
+
}
|
|
710
487
|
const defaultMasterSeedStorage = getDefaultMasterSeedStorage();
|
|
711
488
|
const defaultMasterSeedGenerator = getDefaultMasterSeedGenerator(signer);
|
|
712
489
|
const masterSeedLoad = deps?.masterSeedStorage?.load ?? defaultMasterSeedStorage.load;
|
|
@@ -803,59 +580,11 @@ async function getUmbraClient(args, deps) {
|
|
|
803
580
|
}
|
|
804
581
|
chunkPK6SKIKE_cjs.__name(getUmbraClient, "getUmbraClient");
|
|
805
582
|
|
|
806
|
-
// src/umbra/constants.ts
|
|
807
|
-
var UMBRA_MESSAGE_TO_SIGN = `Umbra Protocol – User Consent & Acknowledgement
|
|
808
|
-
|
|
809
|
-
Please read carefully before continuing. Umbra is a non-custodial, open-source protocol. Umbra does not hold, control, manage, or access your digital assets, private keys, viewing keys, transactions, or personal data. All interactions with the Umbra protocol occur through autonomous smart contracts and wallet-signed transactions executed directly on the blockchain.
|
|
810
|
-
|
|
811
|
-
By using the Umbra protocol, you acknowledge and agree that:
|
|
812
|
-
|
|
813
|
-
1. You are solely responsible for managing your wallet, private keys, privacy settings, viewing key disclosures, and any transactions or interactions you authorize.
|
|
814
|
-
2. Blockchain transactions are generally irreversible, and smart contracts may contain bugs, vulnerabilities, or unintended behavior.
|
|
815
|
-
3. Errors, misuse, misconfiguration, third-party tools, relayers, or loss of keys may result in permanent and unrecoverable loss of assets or privacy.
|
|
816
|
-
4. Privacy features are designed to enhance confidentiality but do not guarantee absolute or unconditional anonymity.
|
|
817
|
-
5. Transactions may involve independent relayers or third-party infrastructure that Umbra does not operate, control, or supervise.
|
|
818
|
-
6. By clicking "I Agree", you confirm that you have read, understood, and accepted all applicable terms, policies, risk disclosures, notices, and other documentation governing your access to and use of the Umbra protocol, as published or made available by Umbra from time to time.
|
|
819
|
-
|
|
820
|
-
You acknowledge that such documentation may be updated or modified, and that continued access to or use of the Umbra Protocol constitutes acceptance of the then-current versions. If you do not agree, do not proceed and discontinue use of the Umbra protocol.`;
|
|
821
|
-
var FEE_OFFSETS = {
|
|
822
|
-
/**
|
|
823
|
-
* Offset used in `FeeVault` PDA derivation for the unified protocol fees pool.
|
|
824
|
-
*
|
|
825
|
-
* @remarks
|
|
826
|
-
* Passed as the final seed to `findProtocolFeeVaultPda` and
|
|
827
|
-
* `findRelayerFeeVaultPda`. Currently `0n`.
|
|
828
|
-
*
|
|
829
|
-
* @readonly
|
|
830
|
-
*/
|
|
831
|
-
PROTOCOL_FEES_POOL: 0n,
|
|
832
|
-
/**
|
|
833
|
-
* Offset used in `FeeSchedule` PDA derivation.
|
|
834
|
-
*
|
|
835
|
-
* @remarks
|
|
836
|
-
* Passed as the final seed to `findFeeSchedulePda`. Currently `0n`.
|
|
837
|
-
*
|
|
838
|
-
* @readonly
|
|
839
|
-
*/
|
|
840
|
-
PROTOCOL_FEES_CONFIG: 0n,
|
|
841
|
-
/**
|
|
842
|
-
* Offset used in relayer fee configuration PDA derivation.
|
|
843
|
-
*
|
|
844
|
-
* @remarks
|
|
845
|
-
* Passed as the offset seed when looking up the relayer's fee configuration account.
|
|
846
|
-
* Currently `0n`.
|
|
847
|
-
*
|
|
848
|
-
* @readonly
|
|
849
|
-
*/
|
|
850
|
-
RELAYER_FEES_CONFIG: 0n
|
|
851
|
-
};
|
|
852
|
-
var BPS_DIVISOR = 16384n;
|
|
853
|
-
|
|
854
583
|
// src/umbra/fee-provider.ts
|
|
855
584
|
var TREE_DEPTH = 4;
|
|
856
585
|
var MAX_LEAVES = 1 << TREE_DEPTH;
|
|
857
586
|
async function computeLeafHash(slab) {
|
|
858
|
-
const aggregator =
|
|
587
|
+
const aggregator = chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
859
588
|
return await aggregator([
|
|
860
589
|
slab.amountLowerBound,
|
|
861
590
|
slab.amountUpperBound,
|
|
@@ -870,7 +599,7 @@ async function buildFullTree(slabs) {
|
|
|
870
599
|
`Too many fee slabs: ${String(slabs.length)} (max ${String(MAX_LEAVES)})`
|
|
871
600
|
);
|
|
872
601
|
}
|
|
873
|
-
const hasher =
|
|
602
|
+
const hasher = chunkYFUGKMNS_cjs.getPoseidonHasher();
|
|
874
603
|
const leafHashes = Array.from({ length: MAX_LEAVES }, () => 0n);
|
|
875
604
|
for (const [index, slab] of slabs.entries()) {
|
|
876
605
|
leafHashes[index] = await computeLeafHash(slab);
|
|
@@ -1106,7 +835,7 @@ function enrichWithMerkleProof(scannedUtxos, batchProof) {
|
|
|
1106
835
|
return scannedUtxos.map((utxo) => {
|
|
1107
836
|
const proofEntry = batchProof.proofs.get(utxo.insertionIndex);
|
|
1108
837
|
if (proofEntry === void 0) {
|
|
1109
|
-
throw new
|
|
838
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1110
839
|
"proof-enrichment",
|
|
1111
840
|
`Missing proof for insertion index ${String(utxo.insertionIndex)}`
|
|
1112
841
|
);
|
|
@@ -1138,32 +867,32 @@ chunkPK6SKIKE_cjs.__name(enrichWithMerkleProof, "enrichWithMerkleProof");
|
|
|
1138
867
|
function getClaimableUtxoScannerFunction(args, deps) {
|
|
1139
868
|
const { client } = args;
|
|
1140
869
|
if (client.fetchUtxoData === void 0) {
|
|
1141
|
-
throw new
|
|
870
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1142
871
|
"initialization",
|
|
1143
872
|
"Client must have fetchUtxoData configured for UTXO discovery. Provide indexerApiEndpoint when creating the client."
|
|
1144
873
|
);
|
|
1145
874
|
}
|
|
1146
875
|
const fetchUtxoData = deps?.fetchUtxoData ?? client.fetchUtxoData;
|
|
1147
|
-
const aesDecryptor = deps?.aesDecryptor ??
|
|
876
|
+
const aesDecryptor = deps?.aesDecryptor ?? chunkYFUGKMNS_cjs.getAesDecryptor();
|
|
1148
877
|
const x25519GetSharedSecret = deps?.x25519GetSharedSecret ?? ((privateKey, publicKey) => ed25519_js.x25519.getSharedSecret(privateKey, publicKey));
|
|
1149
|
-
const mvkX25519KeypairDeriver =
|
|
878
|
+
const mvkX25519KeypairDeriver = chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({
|
|
1150
879
|
client
|
|
1151
880
|
});
|
|
1152
881
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function fetchClaimableUtxos(treeIndex, startInsertionIndex, endInsertionIndex) {
|
|
1153
882
|
if (treeIndex < 0n) {
|
|
1154
|
-
throw new
|
|
883
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1155
884
|
"validation",
|
|
1156
885
|
`Invalid tree index: ${String(treeIndex)}. Must be non-negative.`
|
|
1157
886
|
);
|
|
1158
887
|
}
|
|
1159
888
|
if (startInsertionIndex < 0n) {
|
|
1160
|
-
throw new
|
|
889
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1161
890
|
"validation",
|
|
1162
891
|
`Invalid start insertion index: ${String(startInsertionIndex)}. Must be non-negative.`
|
|
1163
892
|
);
|
|
1164
893
|
}
|
|
1165
894
|
if (endInsertionIndex !== void 0 && endInsertionIndex < startInsertionIndex) {
|
|
1166
|
-
throw new
|
|
895
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1167
896
|
"validation",
|
|
1168
897
|
`Invalid end insertion index: ${String(endInsertionIndex)}. Must be >= start index.`
|
|
1169
898
|
);
|
|
@@ -1174,8 +903,8 @@ function getClaimableUtxoScannerFunction(args, deps) {
|
|
|
1174
903
|
clientX25519PrivateKey = keypairResult.x25519Keypair.privateKey;
|
|
1175
904
|
chunkLTCKPTZC_cjs.assertX25519PrivateKey(clientX25519PrivateKey);
|
|
1176
905
|
} catch (error) {
|
|
1177
|
-
if (error instanceof
|
|
1178
|
-
throw new
|
|
906
|
+
if (error instanceof chunkKCHHJKQN_cjs.FetchUtxosError) throw error;
|
|
907
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1179
908
|
"key-derivation",
|
|
1180
909
|
`Failed to derive X25519 private key: ${error instanceof Error ? error.message : String(error)}`,
|
|
1181
910
|
error instanceof Error ? error : void 0
|
|
@@ -1193,8 +922,8 @@ function getClaimableUtxoScannerFunction(args, deps) {
|
|
|
1193
922
|
try {
|
|
1194
923
|
result = await fetchUtxoData(cursor, absoluteEndIndex, DEFAULT_PAGINATION_LIMIT);
|
|
1195
924
|
} catch (error) {
|
|
1196
|
-
if (error instanceof
|
|
1197
|
-
throw new
|
|
925
|
+
if (error instanceof chunkKCHHJKQN_cjs.FetchUtxosError) throw error;
|
|
926
|
+
throw new chunkKCHHJKQN_cjs.FetchUtxosError(
|
|
1198
927
|
"indexer-fetch",
|
|
1199
928
|
`Failed to fetch UTXO data from indexer: ${error instanceof Error ? error.message : String(error)}`,
|
|
1200
929
|
error instanceof Error ? error : void 0
|
|
@@ -1501,10 +1230,10 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1501
1230
|
depositModifiedGenerationIndexBytes[index2] = Number(indexValue & 0xffn);
|
|
1502
1231
|
indexValue >>= 8n;
|
|
1503
1232
|
}
|
|
1504
|
-
const nullifier =
|
|
1233
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(
|
|
1505
1234
|
depositModifiedGenerationIndexBytes
|
|
1506
1235
|
);
|
|
1507
|
-
const randomSecret =
|
|
1236
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(
|
|
1508
1237
|
depositModifiedGenerationIndexBytes
|
|
1509
1238
|
);
|
|
1510
1239
|
perLeafNullifiers.push(nullifier);
|
|
@@ -1681,7 +1410,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1681
1410
|
const blindingFactorOffset = chunk5GUSMQ74_cjs.decodeU256BeBytesToU256(
|
|
1682
1411
|
blindingFactorOffsetBytes
|
|
1683
1412
|
);
|
|
1684
|
-
const blindingFactor =
|
|
1413
|
+
const blindingFactor = chunkYFUGKMNS_cjs.deriveKeystreamBlindingFactor(blindingFactorOffset);
|
|
1685
1414
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(
|
|
1686
1415
|
blindingFactor,
|
|
1687
1416
|
`linkerKeystreamBlindingFactor[${String(leafIndex)}][${String(keyIndex)}]`
|
|
@@ -1761,7 +1490,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1761
1490
|
}
|
|
1762
1491
|
const nullifierHashesAggregatedHash = await poseidonAggregator(nullifierHashes);
|
|
1763
1492
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifierHashesAggregatedHash, "nullifierHashesAggregatedHash");
|
|
1764
|
-
const rcEncryptor =
|
|
1493
|
+
const rcEncryptor = chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey(clientX25519PrivateKey, {
|
|
1765
1494
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
1766
1495
|
});
|
|
1767
1496
|
const randomFactorBytes = sha3Addons_js.kmac256(
|
|
@@ -1829,7 +1558,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1829
1558
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedMvkHigh, "rcEncryptedMvkHigh");
|
|
1830
1559
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorLow, "rcEncryptedRandomFactorLow");
|
|
1831
1560
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorHigh, "rcEncryptedRandomFactorHigh");
|
|
1832
|
-
const rcKeyGenerator =
|
|
1561
|
+
const rcKeyGenerator = chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(clientX25519PrivateKey, {
|
|
1833
1562
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
1834
1563
|
});
|
|
1835
1564
|
const rcCounters = [
|
|
@@ -1896,7 +1625,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1896
1625
|
rescueEncryptionCommitmentBlindingFactorOffsetBytes
|
|
1897
1626
|
);
|
|
1898
1627
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(blindingFactorForRescueCommitment, "blindingFactorForRescueCommitment");
|
|
1899
|
-
const rescueEncryptionCommitmentGenerator =
|
|
1628
|
+
const rescueEncryptionCommitmentGenerator = chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
1900
1629
|
const getRcKey = /* @__PURE__ */ chunkPK6SKIKE_cjs.__name((counter) => {
|
|
1901
1630
|
const key = rcKeys.get(counter);
|
|
1902
1631
|
if (key === void 0) {
|
|
@@ -1967,7 +1696,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1967
1696
|
const fiatShamirChallenge = fiatShamirChallengeGenerator(fiatShamirInputBytes);
|
|
1968
1697
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(fiatShamirChallenge, "fiatShamirChallenge");
|
|
1969
1698
|
const fiatShamirChallengeLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(fiatShamirChallenge);
|
|
1970
|
-
const modulePow =
|
|
1699
|
+
const modulePow = chunkYFUGKMNS_cjs.getModuloPowCurve25519Function();
|
|
1971
1700
|
const challengeSquared = modulePow(fiatShamirChallenge, 2n);
|
|
1972
1701
|
const challengeCubed = modulePow(fiatShamirChallenge, 3n);
|
|
1973
1702
|
const challengeToFourth = modulePow(fiatShamirChallenge, 4n);
|
|
@@ -2050,7 +1779,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
2050
1779
|
inverseForKeysForRandomFactorHighLimbs,
|
|
2051
1780
|
"inverseForKeysForRandomFactorHighLimbs"
|
|
2052
1781
|
);
|
|
2053
|
-
const polynomialEvaluator =
|
|
1782
|
+
const polynomialEvaluator = chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
2054
1783
|
const polynomialEvaluationResultScalar = polynomialEvaluator(
|
|
2055
1784
|
[
|
|
2056
1785
|
chunkZY3TSHMJ_cjs.createCurve25519FieldElement(finalAmount),
|
|
@@ -2498,19 +2227,19 @@ function getReceiverClaimableUtxoToEncryptedBalanceClaimerFunction(args, deps) {
|
|
|
2498
2227
|
const pollingIntervalMs = deps.pollingIntervalMs ?? 3e3;
|
|
2499
2228
|
const timeoutMs = deps.timeoutMs ?? 12e4;
|
|
2500
2229
|
const onProgress = deps.onProgress;
|
|
2501
|
-
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ??
|
|
2502
|
-
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
2503
|
-
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ??
|
|
2504
|
-
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ??
|
|
2505
|
-
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ??
|
|
2506
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
2507
|
-
const poseidonHasher = deps.crypto?.poseidonHasher ??
|
|
2508
|
-
const poseidonAggregator = deps.crypto?.poseidonAggregator ??
|
|
2509
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
2510
|
-
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ??
|
|
2511
|
-
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ??
|
|
2512
|
-
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ??
|
|
2513
|
-
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ??
|
|
2230
|
+
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
2231
|
+
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
2232
|
+
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
2233
|
+
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
2234
|
+
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver({ client });
|
|
2235
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
2236
|
+
const poseidonHasher = deps.crypto?.poseidonHasher ?? chunkYFUGKMNS_cjs.getPoseidonHasher();
|
|
2237
|
+
const poseidonAggregator = deps.crypto?.poseidonAggregator ?? chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
2238
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
2239
|
+
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
2240
|
+
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ?? chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
2241
|
+
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
2242
|
+
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ?? chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
2514
2243
|
const generateRandomU2562 = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
2515
2244
|
const generateRandomU1282 = deps.random?.generateRandomU128 ?? chunkZY3TSHMJ_cjs.generateRandomU128;
|
|
2516
2245
|
return async (utxos, optionalData, microLamportsPerAcu) => {
|
|
@@ -2601,16 +2330,16 @@ function getReceiverClaimableUtxoToEncryptedBalanceClaimerFunction(args, deps) {
|
|
|
2601
2330
|
batches: resultsByBatch
|
|
2602
2331
|
};
|
|
2603
2332
|
} catch (error) {
|
|
2604
|
-
if (error instanceof
|
|
2333
|
+
if (error instanceof chunkKCHHJKQN_cjs.ClaimUtxoError) {
|
|
2605
2334
|
throw error;
|
|
2606
2335
|
}
|
|
2607
2336
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
2608
|
-
throw new
|
|
2337
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("zk-proof-generation", error.message, error);
|
|
2609
2338
|
}
|
|
2610
|
-
if (error instanceof
|
|
2611
|
-
throw new
|
|
2339
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
2340
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("initialization", error.message, error);
|
|
2612
2341
|
}
|
|
2613
|
-
throw new
|
|
2342
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError(
|
|
2614
2343
|
"transaction-send",
|
|
2615
2344
|
error instanceof Error ? error.message : String(error),
|
|
2616
2345
|
error instanceof Error ? error : void 0
|
|
@@ -2814,7 +2543,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
2814
2543
|
depositModifiedGenerationIndexBytes[index] = Number(indexValueForExpansion & 0xffn);
|
|
2815
2544
|
indexValueForExpansion >>= 8n;
|
|
2816
2545
|
}
|
|
2817
|
-
const expandedModifiedGenerationIndex =
|
|
2546
|
+
const expandedModifiedGenerationIndex = chunkYFUGKMNS_cjs.expandModifiedGenerationIndex(
|
|
2818
2547
|
depositModifiedGenerationIndexBytes
|
|
2819
2548
|
);
|
|
2820
2549
|
let ephemeralOffset = 0n;
|
|
@@ -2886,10 +2615,10 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
2886
2615
|
depositModifiedGenerationIndexBytes2[index2] = Number(indexValue & 0xffn);
|
|
2887
2616
|
indexValue >>= 8n;
|
|
2888
2617
|
}
|
|
2889
|
-
const nullifier =
|
|
2618
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(
|
|
2890
2619
|
depositModifiedGenerationIndexBytes2
|
|
2891
2620
|
);
|
|
2892
|
-
const randomSecret =
|
|
2621
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(
|
|
2893
2622
|
depositModifiedGenerationIndexBytes2
|
|
2894
2623
|
);
|
|
2895
2624
|
perLeafNullifiers.push(nullifier);
|
|
@@ -3066,7 +2795,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3066
2795
|
const blindingFactorOffset = chunk5GUSMQ74_cjs.decodeU256BeBytesToU256(
|
|
3067
2796
|
blindingFactorOffsetBytes
|
|
3068
2797
|
);
|
|
3069
|
-
const blindingFactor =
|
|
2798
|
+
const blindingFactor = chunkYFUGKMNS_cjs.deriveKeystreamBlindingFactor(blindingFactorOffset);
|
|
3070
2799
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(
|
|
3071
2800
|
blindingFactor,
|
|
3072
2801
|
`linkerKeystreamBlindingFactor[${String(leafIndex)}][${String(keyIndex)}]`
|
|
@@ -3145,7 +2874,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3145
2874
|
}
|
|
3146
2875
|
const nullifierHashesAggregatedHash = await poseidonAggregator(nullifierHashes);
|
|
3147
2876
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifierHashesAggregatedHash, "nullifierHashesAggregatedHash");
|
|
3148
|
-
const rcEncryptor =
|
|
2877
|
+
const rcEncryptor = chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey(clientX25519PrivateKey, {
|
|
3149
2878
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
3150
2879
|
});
|
|
3151
2880
|
const randomFactorBytes = sha3Addons_js.kmac256(
|
|
@@ -3213,7 +2942,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3213
2942
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedMvkHigh, "rcEncryptedMvkHigh");
|
|
3214
2943
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorLow, "rcEncryptedRandomFactorLow");
|
|
3215
2944
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorHigh, "rcEncryptedRandomFactorHigh");
|
|
3216
|
-
const rcKeyGenerator =
|
|
2945
|
+
const rcKeyGenerator = chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(clientX25519PrivateKey, {
|
|
3217
2946
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
3218
2947
|
});
|
|
3219
2948
|
const rcCounters = [
|
|
@@ -3280,7 +3009,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3280
3009
|
rescueEncryptionCommitmentBlindingFactorOffsetBytes
|
|
3281
3010
|
);
|
|
3282
3011
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(blindingFactorForRescueCommitment, "blindingFactorForRescueCommitment");
|
|
3283
|
-
const rescueEncryptionCommitmentGenerator =
|
|
3012
|
+
const rescueEncryptionCommitmentGenerator = chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
3284
3013
|
const rcEncryptionCommitment = await rescueEncryptionCommitmentGenerator(
|
|
3285
3014
|
[
|
|
3286
3015
|
rcEncryptedFinalAmount,
|
|
@@ -3340,7 +3069,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3340
3069
|
const fiatShamirChallenge = fiatShamirChallengeGenerator(fiatShamirInputBytes);
|
|
3341
3070
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(fiatShamirChallenge, "fiatShamirChallenge");
|
|
3342
3071
|
const fiatShamirChallengeLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(fiatShamirChallenge);
|
|
3343
|
-
const modulePow =
|
|
3072
|
+
const modulePow = chunkYFUGKMNS_cjs.getModuloPowCurve25519Function();
|
|
3344
3073
|
const challengeSquared = modulePow(fiatShamirChallenge, 2n);
|
|
3345
3074
|
const challengeCubed = modulePow(fiatShamirChallenge, 3n);
|
|
3346
3075
|
const challengeToFourth = modulePow(fiatShamirChallenge, 4n);
|
|
@@ -3427,7 +3156,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3427
3156
|
inverseForKeysForRandomFactorHighLimbs,
|
|
3428
3157
|
"inverseForKeysForRandomFactorHighLimbs"
|
|
3429
3158
|
);
|
|
3430
|
-
const polynomialEvaluator =
|
|
3159
|
+
const polynomialEvaluator = chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
3431
3160
|
const polynomialEvaluationResultScalar = polynomialEvaluator(
|
|
3432
3161
|
[
|
|
3433
3162
|
chunkZY3TSHMJ_cjs.createCurve25519FieldElement(finalAmount),
|
|
@@ -3849,22 +3578,22 @@ function getSelfClaimableUtxoToEncryptedBalanceClaimerFunction(args, deps) {
|
|
|
3849
3578
|
const pollingIntervalMs = deps.pollingIntervalMs ?? 3e3;
|
|
3850
3579
|
const timeoutMs = deps.timeoutMs ?? 12e4;
|
|
3851
3580
|
const onProgress = deps.onProgress;
|
|
3852
|
-
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ??
|
|
3853
|
-
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ??
|
|
3581
|
+
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyDeriver({ client });
|
|
3582
|
+
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver({
|
|
3854
3583
|
client
|
|
3855
3584
|
});
|
|
3856
|
-
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ??
|
|
3857
|
-
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ??
|
|
3585
|
+
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyDeriver({ client });
|
|
3586
|
+
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver({
|
|
3858
3587
|
client
|
|
3859
3588
|
});
|
|
3860
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
3861
|
-
const poseidonHasher = deps.crypto?.poseidonHasher ??
|
|
3862
|
-
const poseidonAggregator = deps.crypto?.poseidonAggregator ??
|
|
3863
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
3864
|
-
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ??
|
|
3865
|
-
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ??
|
|
3866
|
-
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ??
|
|
3867
|
-
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ??
|
|
3589
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
3590
|
+
const poseidonHasher = deps.crypto?.poseidonHasher ?? chunkYFUGKMNS_cjs.getPoseidonHasher();
|
|
3591
|
+
const poseidonAggregator = deps.crypto?.poseidonAggregator ?? chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
3592
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
3593
|
+
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
3594
|
+
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ?? chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
3595
|
+
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
3596
|
+
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ?? chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
3868
3597
|
const generateRandomU2562 = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
3869
3598
|
const generateRandomU1282 = deps.random?.generateRandomU128 ?? chunkZY3TSHMJ_cjs.generateRandomU128;
|
|
3870
3599
|
return async (utxos, optionalData, microLamportsPerAcu) => {
|
|
@@ -3954,16 +3683,16 @@ function getSelfClaimableUtxoToEncryptedBalanceClaimerFunction(args, deps) {
|
|
|
3954
3683
|
batches: resultsByBatch
|
|
3955
3684
|
};
|
|
3956
3685
|
} catch (error) {
|
|
3957
|
-
if (error instanceof
|
|
3686
|
+
if (error instanceof chunkKCHHJKQN_cjs.ClaimUtxoError) {
|
|
3958
3687
|
throw error;
|
|
3959
3688
|
}
|
|
3960
3689
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
3961
|
-
throw new
|
|
3690
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("zk-proof-generation", error.message, error);
|
|
3962
3691
|
}
|
|
3963
|
-
if (error instanceof
|
|
3964
|
-
throw new
|
|
3692
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
3693
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("initialization", error.message, error);
|
|
3965
3694
|
}
|
|
3966
|
-
throw new
|
|
3695
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError(
|
|
3967
3696
|
"transaction-send",
|
|
3968
3697
|
error instanceof Error ? error.message : String(error),
|
|
3969
3698
|
error instanceof Error ? error : void 0
|
|
@@ -4166,7 +3895,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4166
3895
|
depositModifiedGenerationIndexBytes[index] = Number(indexValueForExpansion & 0xffn);
|
|
4167
3896
|
indexValueForExpansion >>= 8n;
|
|
4168
3897
|
}
|
|
4169
|
-
const expandedModifiedGenerationIndex =
|
|
3898
|
+
const expandedModifiedGenerationIndex = chunkYFUGKMNS_cjs.expandModifiedGenerationIndex(
|
|
4170
3899
|
depositModifiedGenerationIndexBytes
|
|
4171
3900
|
);
|
|
4172
3901
|
let ephemeralOffset = 0n;
|
|
@@ -4238,10 +3967,10 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4238
3967
|
depositModifiedGenerationIndexBytes2[index2] = Number(indexValue & 0xffn);
|
|
4239
3968
|
indexValue >>= 8n;
|
|
4240
3969
|
}
|
|
4241
|
-
const nullifier =
|
|
3970
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(
|
|
4242
3971
|
depositModifiedGenerationIndexBytes2
|
|
4243
3972
|
);
|
|
4244
|
-
const randomSecret =
|
|
3973
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(
|
|
4245
3974
|
depositModifiedGenerationIndexBytes2
|
|
4246
3975
|
);
|
|
4247
3976
|
perLeafNullifiers.push(nullifier);
|
|
@@ -4362,7 +4091,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4362
4091
|
const blindingFactorOffset = chunk5GUSMQ74_cjs.decodeU256BeBytesToU256(
|
|
4363
4092
|
blindingFactorOffsetBytes
|
|
4364
4093
|
);
|
|
4365
|
-
const blindingFactor =
|
|
4094
|
+
const blindingFactor = chunkYFUGKMNS_cjs.deriveKeystreamBlindingFactor(blindingFactorOffset);
|
|
4366
4095
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(
|
|
4367
4096
|
blindingFactor,
|
|
4368
4097
|
`linkerKeystreamBlindingFactor[${String(leafIndex)}][${String(keyIndex)}]`
|
|
@@ -4441,7 +4170,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4441
4170
|
}
|
|
4442
4171
|
const nullifierHashesAggregatedHash = await poseidonAggregator(nullifierHashes);
|
|
4443
4172
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifierHashesAggregatedHash, "nullifierHashesAggregatedHash");
|
|
4444
|
-
const rcEncryptor =
|
|
4173
|
+
const rcEncryptor = chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey(clientX25519PrivateKey, {
|
|
4445
4174
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
4446
4175
|
});
|
|
4447
4176
|
const randomFactorBytes = sha3Addons_js.kmac256(
|
|
@@ -4504,7 +4233,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4504
4233
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedMvkHigh, "rcEncryptedMvkHigh");
|
|
4505
4234
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorLow, "rcEncryptedRandomFactorLow");
|
|
4506
4235
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(rcEncryptedRandomFactorHigh, "rcEncryptedRandomFactorHigh");
|
|
4507
|
-
const rcKeyGenerator =
|
|
4236
|
+
const rcKeyGenerator = chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(clientX25519PrivateKey, {
|
|
4508
4237
|
umbraX25519PublicKey: networkConfig.mxePubkey
|
|
4509
4238
|
});
|
|
4510
4239
|
const rcCounters = [
|
|
@@ -4552,7 +4281,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4552
4281
|
rescueEncryptionCommitmentBlindingFactorOffsetBytes
|
|
4553
4282
|
);
|
|
4554
4283
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(blindingFactorForRescueCommitment, "blindingFactorForRescueCommitment");
|
|
4555
|
-
const rescueEncryptionCommitmentGenerator =
|
|
4284
|
+
const rescueEncryptionCommitmentGenerator = chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
4556
4285
|
const rcEncryptionCommitment = await rescueEncryptionCommitmentGenerator(
|
|
4557
4286
|
[
|
|
4558
4287
|
rcEncryptedMvkLow,
|
|
@@ -4603,7 +4332,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4603
4332
|
const fiatShamirChallenge = fiatShamirChallengeGenerator(fiatShamirInputBytes);
|
|
4604
4333
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(fiatShamirChallenge, "fiatShamirChallenge");
|
|
4605
4334
|
const fiatShamirChallengeLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(fiatShamirChallenge);
|
|
4606
|
-
const modulePow =
|
|
4335
|
+
const modulePow = chunkYFUGKMNS_cjs.getModuloPowCurve25519Function();
|
|
4607
4336
|
const challengeSquared = modulePow(fiatShamirChallenge, 2n);
|
|
4608
4337
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(challengeSquared, "challengeSquared");
|
|
4609
4338
|
const challengeSquaredLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeSquared);
|
|
@@ -4653,7 +4382,7 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4653
4382
|
inverseForKeysForRandomFactorHighLimbs,
|
|
4654
4383
|
"inverseForKeysForRandomFactorHighLimbs"
|
|
4655
4384
|
);
|
|
4656
|
-
const polynomialEvaluator =
|
|
4385
|
+
const polynomialEvaluator = chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
4657
4386
|
const polynomialEvaluationResultScalar = polynomialEvaluator(
|
|
4658
4387
|
[ephemeralMvkLow, ephemeralMvkHigh, randomFactorForPolynomialCommitment],
|
|
4659
4388
|
fiatShamirChallenge
|
|
@@ -4994,21 +4723,21 @@ function getSelfClaimableUtxoToPublicBalanceClaimerFunction(args, deps) {
|
|
|
4994
4723
|
const pollingIntervalMs = deps.pollingIntervalMs ?? 3e3;
|
|
4995
4724
|
const timeoutMs = deps.timeoutMs ?? 12e4;
|
|
4996
4725
|
const onProgress = deps.onProgress;
|
|
4997
|
-
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ??
|
|
4998
|
-
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ??
|
|
4726
|
+
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyDeriver({ client });
|
|
4727
|
+
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver({
|
|
4999
4728
|
client
|
|
5000
4729
|
});
|
|
5001
|
-
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ??
|
|
5002
|
-
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ??
|
|
4730
|
+
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyDeriver({ client });
|
|
4731
|
+
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver({
|
|
5003
4732
|
client
|
|
5004
4733
|
});
|
|
5005
|
-
const poseidonHasher = deps.crypto?.poseidonHasher ??
|
|
5006
|
-
const poseidonAggregator = deps.crypto?.poseidonAggregator ??
|
|
5007
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
5008
|
-
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ??
|
|
5009
|
-
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ??
|
|
5010
|
-
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ??
|
|
5011
|
-
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ??
|
|
4734
|
+
const poseidonHasher = deps.crypto?.poseidonHasher ?? chunkYFUGKMNS_cjs.getPoseidonHasher();
|
|
4735
|
+
const poseidonAggregator = deps.crypto?.poseidonAggregator ?? chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
4736
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
4737
|
+
const poseidonKeystreamGeneratorFunction = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
4738
|
+
const userCommitmentGeneratorFunction = deps.crypto?.userCommitmentGenerator ?? chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
4739
|
+
const keystreamCommitmentGeneratorFunction = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
4740
|
+
const fiatShamirChallengeGeneratorFunction = deps.crypto?.fiatShamirChallengeGenerator ?? chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
5012
4741
|
const generateRandomU2562 = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
5013
4742
|
const generateRandomU1282 = deps.random?.generateRandomU128 ?? chunkZY3TSHMJ_cjs.generateRandomU128;
|
|
5014
4743
|
const protocolFeeProviderFn = deps.fees?.protocolFeeProvider ?? getHardcodedClaimUtxoProtocolFeeProvider();
|
|
@@ -5020,7 +4749,7 @@ function getSelfClaimableUtxoToPublicBalanceClaimerFunction(args, deps) {
|
|
|
5020
4749
|
}
|
|
5021
4750
|
const masterSeedBytes = await client.masterSeed.getMasterSeed();
|
|
5022
4751
|
const generationIndex = providedGenerationIndex ?? generateRandomU2562();
|
|
5023
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
4752
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
5024
4753
|
const keypairResult = await mvkX25519KeypairDeriver();
|
|
5025
4754
|
const clientX25519PrivateKey = keypairResult.x25519Keypair.privateKey;
|
|
5026
4755
|
const clientX25519PublicKey = keypairResult.x25519Keypair.publicKey;
|
|
@@ -5103,16 +4832,16 @@ function getSelfClaimableUtxoToPublicBalanceClaimerFunction(args, deps) {
|
|
|
5103
4832
|
batches: resultsByBatch
|
|
5104
4833
|
};
|
|
5105
4834
|
} catch (error) {
|
|
5106
|
-
if (error instanceof
|
|
4835
|
+
if (error instanceof chunkKCHHJKQN_cjs.ClaimUtxoError) {
|
|
5107
4836
|
throw error;
|
|
5108
4837
|
}
|
|
5109
4838
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
5110
|
-
throw new
|
|
4839
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("zk-proof-generation", error.message, error);
|
|
5111
4840
|
}
|
|
5112
|
-
if (error instanceof
|
|
5113
|
-
throw new
|
|
4841
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
4842
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError("initialization", error.message, error);
|
|
5114
4843
|
}
|
|
5115
|
-
throw new
|
|
4844
|
+
throw new chunkKCHHJKQN_cjs.ClaimUtxoError(
|
|
5116
4845
|
"transaction-send",
|
|
5117
4846
|
error instanceof Error ? error.message : String(error),
|
|
5118
4847
|
error instanceof Error ? error : void 0
|
|
@@ -5127,7 +4856,7 @@ function getComplianceGrantIssuerFunction(args, deps) {
|
|
|
5127
4856
|
const { signer } = client;
|
|
5128
4857
|
const getLatestBlockhash = deps?.rpc?.blockhashProvider ?? client.blockhashProvider;
|
|
5129
4858
|
const transactionForwarder = deps?.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
5130
|
-
const masterViewingKeyX25519KeypairDeriver = deps?.keys?.masterViewingKeyX25519KeypairDeriver ??
|
|
4859
|
+
const masterViewingKeyX25519KeypairDeriver = deps?.keys?.masterViewingKeyX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getMasterViewingKeyX25519KeypairDeriver({ client });
|
|
5131
4860
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function createUserGrantedComplianceGrant(receiver, granterX25519, receiverX25519, nonce, optionalData, callbacks) {
|
|
5132
4861
|
const userAddress = signer.address;
|
|
5133
4862
|
const programId = client.networkConfig.programId;
|
|
@@ -5171,7 +4900,7 @@ function getComplianceGrantRevokerFunction(args, deps) {
|
|
|
5171
4900
|
const { signer } = client;
|
|
5172
4901
|
const getLatestBlockhash = deps?.rpc?.blockhashProvider ?? client.blockhashProvider;
|
|
5173
4902
|
const transactionForwarder = deps?.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
5174
|
-
const masterViewingKeyX25519KeypairDeriver = deps?.keys?.masterViewingKeyX25519KeypairDeriver ??
|
|
4903
|
+
const masterViewingKeyX25519KeypairDeriver = deps?.keys?.masterViewingKeyX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getMasterViewingKeyX25519KeypairDeriver({ client });
|
|
5175
4904
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function deleteUserGrantedComplianceGrant(receiver, granterX25519, receiverX25519, nonce, optionalData, callbacks) {
|
|
5176
4905
|
const userAddress = signer.address;
|
|
5177
4906
|
const programId = client.networkConfig.programId;
|
|
@@ -5670,19 +5399,19 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
|
|
|
5670
5399
|
}
|
|
5671
5400
|
return { converted, skipped };
|
|
5672
5401
|
} catch (error) {
|
|
5673
|
-
if (error instanceof
|
|
5402
|
+
if (error instanceof chunkKCHHJKQN_cjs.ConversionError) {
|
|
5674
5403
|
throw error;
|
|
5675
5404
|
}
|
|
5676
|
-
if (error instanceof
|
|
5677
|
-
throw new
|
|
5405
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
5406
|
+
throw new chunkKCHHJKQN_cjs.ConversionError("transaction-sign", error.message, error);
|
|
5678
5407
|
}
|
|
5679
|
-
if (error instanceof
|
|
5680
|
-
throw new
|
|
5408
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
5409
|
+
throw new chunkKCHHJKQN_cjs.ConversionError("transaction-send", error.message, error);
|
|
5681
5410
|
}
|
|
5682
|
-
if (error instanceof
|
|
5683
|
-
throw new
|
|
5411
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
5412
|
+
throw new chunkKCHHJKQN_cjs.ConversionError("account-fetch", error.message, error);
|
|
5684
5413
|
}
|
|
5685
|
-
throw new
|
|
5414
|
+
throw new chunkKCHHJKQN_cjs.ConversionError(
|
|
5686
5415
|
"transaction-send",
|
|
5687
5416
|
error instanceof Error ? error.message : String(error),
|
|
5688
5417
|
error instanceof Error ? error : void 0
|
|
@@ -5707,7 +5436,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
|
|
|
5707
5436
|
const accountInfoProvider = deps?.rpc?.accountInfoProvider ?? client.accountInfoProvider;
|
|
5708
5437
|
const getLatestBlockhash = deps?.rpc?.blockhashProvider ?? client.blockhashProvider;
|
|
5709
5438
|
const transactionForwarder = deps?.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
5710
|
-
const mintX25519KeypairDeriver = deps?.keys?.mintX25519KeypairDeriver ??
|
|
5439
|
+
const mintX25519KeypairDeriver = deps?.keys?.mintX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getMintX25519KeypairDeriver({ client });
|
|
5711
5440
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function rotateMintX25519EncryptionKey(mint, optionalData, callbacks, microLamportsPerAcu, options) {
|
|
5712
5441
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5713
5442
|
const userAddress = signer.address;
|
|
@@ -5846,71 +5575,85 @@ async function signTransactionMessage(signer, transactionMessage) {
|
|
|
5846
5575
|
chunkPK6SKIKE_cjs.__name(signTransactionMessage, "signTransactionMessage");
|
|
5847
5576
|
async function forwardAndMonitor(config, signedTransaction, callbacks, awaitCallback) {
|
|
5848
5577
|
const { transactionForwarder, computationMonitor } = config;
|
|
5849
|
-
|
|
5850
|
-
|
|
5851
|
-
|
|
5852
|
-
|
|
5853
|
-
|
|
5854
|
-
|
|
5855
|
-
|
|
5856
|
-
|
|
5857
|
-
|
|
5858
|
-
|
|
5859
|
-
|
|
5860
|
-
|
|
5861
|
-
|
|
5862
|
-
|
|
5578
|
+
const txSignature = kit.getSignatureFromTransaction(
|
|
5579
|
+
signedTransaction
|
|
5580
|
+
);
|
|
5581
|
+
let prepared;
|
|
5582
|
+
if (awaitCallback !== void 0) {
|
|
5583
|
+
if (computationMonitor === void 0) {
|
|
5584
|
+
throw new Error(
|
|
5585
|
+
"awaitCallback was provided but no computationMonitor is configured on the client. Pass a computationMonitor when creating the Umbra client, or omit awaitCallback to use fire-and-forget mode."
|
|
5586
|
+
);
|
|
5587
|
+
}
|
|
5588
|
+
const baseMonitorOptions = {
|
|
5589
|
+
maxSlotWindow: awaitCallback.maxSlotWindow,
|
|
5590
|
+
safetyTimeoutMs: awaitCallback.safetyTimeoutMs,
|
|
5591
|
+
onProgress: awaitCallback.onProgress,
|
|
5592
|
+
commitment: awaitCallback.computationMonitorCommitment ?? "confirmed",
|
|
5593
|
+
retrieveCallbackSignature: awaitCallback.retrieveCallbackSignature ?? false
|
|
5594
|
+
};
|
|
5595
|
+
prepared = await computationMonitor.prepareMonitor(
|
|
5596
|
+
awaitCallback.computationAccountAddress,
|
|
5597
|
+
baseMonitorOptions
|
|
5863
5598
|
);
|
|
5864
5599
|
}
|
|
5865
|
-
|
|
5866
|
-
|
|
5867
|
-
|
|
5868
|
-
|
|
5869
|
-
|
|
5870
|
-
|
|
5871
|
-
|
|
5872
|
-
|
|
5873
|
-
|
|
5874
|
-
|
|
5875
|
-
|
|
5876
|
-
|
|
5877
|
-
|
|
5878
|
-
|
|
5879
|
-
|
|
5880
|
-
|
|
5881
|
-
|
|
5882
|
-
|
|
5883
|
-
|
|
5884
|
-
|
|
5885
|
-
|
|
5886
|
-
|
|
5887
|
-
|
|
5888
|
-
|
|
5889
|
-
|
|
5890
|
-
|
|
5891
|
-
|
|
5892
|
-
|
|
5893
|
-
|
|
5894
|
-
|
|
5895
|
-
|
|
5896
|
-
|
|
5897
|
-
|
|
5898
|
-
|
|
5899
|
-
)
|
|
5900
|
-
|
|
5901
|
-
|
|
5902
|
-
} catch (error) {
|
|
5903
|
-
rentClaimError = error instanceof Error ? error.message : String(error);
|
|
5600
|
+
try {
|
|
5601
|
+
if (callbacks?.pre !== void 0) {
|
|
5602
|
+
await callbacks.pre(signedTransaction);
|
|
5603
|
+
}
|
|
5604
|
+
await transactionForwarder.forwardSequentially([signedTransaction]);
|
|
5605
|
+
if (callbacks?.post !== void 0) {
|
|
5606
|
+
await callbacks.post(signedTransaction, txSignature);
|
|
5607
|
+
}
|
|
5608
|
+
if (prepared === void 0 || awaitCallback === void 0) {
|
|
5609
|
+
return { signature: txSignature, signedTransaction };
|
|
5610
|
+
}
|
|
5611
|
+
const callbackResult = await prepared.awaitComputation();
|
|
5612
|
+
let rentClaimSignature;
|
|
5613
|
+
let rentClaimError;
|
|
5614
|
+
if (awaitCallback.reclaimComputationRent !== false) {
|
|
5615
|
+
if (awaitCallback.computationOffset === void 0 || awaitCallback.clusterOffset === void 0) {
|
|
5616
|
+
rentClaimError = "Rent reclaim skipped: computationOffset or clusterOffset was not provided by the service";
|
|
5617
|
+
} else {
|
|
5618
|
+
try {
|
|
5619
|
+
const noopSigner = kit.createNoopSigner(config.signer.address);
|
|
5620
|
+
const rentClaimIx = arciumCodama.getClaimComputationRentInstruction({
|
|
5621
|
+
signer: noopSigner,
|
|
5622
|
+
comp: awaitCallback.computationAccountAddress,
|
|
5623
|
+
compOffset: awaitCallback.computationOffset,
|
|
5624
|
+
clusterOffset: awaitCallback.clusterOffset
|
|
5625
|
+
});
|
|
5626
|
+
const rentClaimBlockhash = await config.getLatestBlockhash({
|
|
5627
|
+
commitment: awaitCallback.rentReclaimBlockhashCommitment ?? "confirmed"
|
|
5628
|
+
});
|
|
5629
|
+
const rentClaimTxMsg = buildTransactionMessage(config.signer, rentClaimBlockhash, [
|
|
5630
|
+
rentClaimIx
|
|
5631
|
+
]);
|
|
5632
|
+
const rentClaimTx = await signTransactionMessage(config.signer, rentClaimTxMsg);
|
|
5633
|
+
rentClaimSignature = await config.transactionForwarder.fireAndForget(rentClaimTx);
|
|
5634
|
+
} catch (error) {
|
|
5635
|
+
rentClaimError = error instanceof Error ? error.message : String(error);
|
|
5636
|
+
}
|
|
5904
5637
|
}
|
|
5905
5638
|
}
|
|
5639
|
+
return {
|
|
5640
|
+
signature: txSignature,
|
|
5641
|
+
signedTransaction,
|
|
5642
|
+
callbackResult,
|
|
5643
|
+
rentClaimSignature,
|
|
5644
|
+
rentClaimError
|
|
5645
|
+
};
|
|
5646
|
+
} finally {
|
|
5647
|
+
prepared?.cleanup();
|
|
5906
5648
|
}
|
|
5907
|
-
return { signature: txSignature, signedTransaction, callbackResult, rentClaimSignature, rentClaimError };
|
|
5908
5649
|
}
|
|
5909
5650
|
chunkPK6SKIKE_cjs.__name(forwardAndMonitor, "forwardAndMonitor");
|
|
5910
5651
|
async function executeComputationTransaction(config, options, awaitCallback) {
|
|
5911
5652
|
const { signer, getLatestBlockhash } = config;
|
|
5912
5653
|
const { instruction, preInstructions, altEntry, callbacks, blockhashCommitment } = options;
|
|
5913
|
-
const latestBlockhash = await getLatestBlockhash({
|
|
5654
|
+
const latestBlockhash = await getLatestBlockhash({
|
|
5655
|
+
commitment: blockhashCommitment ?? "confirmed"
|
|
5656
|
+
});
|
|
5914
5657
|
const allInstructions = preInstructions === void 0 ? [instruction] : [...preInstructions, instruction];
|
|
5915
5658
|
const transactionMessage = buildTransactionMessage(
|
|
5916
5659
|
signer,
|
|
@@ -5967,6 +5710,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
5967
5710
|
if ("callbackResult" in result) {
|
|
5968
5711
|
return {
|
|
5969
5712
|
queueSignature: result.signature,
|
|
5713
|
+
callbackStatus: result.callbackResult.status,
|
|
5970
5714
|
callbackSignature: "callbackSignature" in result.callbackResult ? result.callbackResult.callbackSignature : void 0,
|
|
5971
5715
|
callbackElapsedMs: result.callbackResult.elapsedMs,
|
|
5972
5716
|
rentClaimSignature: result.rentClaimSignature,
|
|
@@ -5975,10 +5719,10 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
5975
5719
|
}
|
|
5976
5720
|
return { queueSignature: result.signature };
|
|
5977
5721
|
} catch (error) {
|
|
5978
|
-
if (error instanceof
|
|
5722
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedDepositError) {
|
|
5979
5723
|
throw error;
|
|
5980
5724
|
}
|
|
5981
|
-
throw new
|
|
5725
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
5982
5726
|
"transaction-send",
|
|
5983
5727
|
`Transaction execution failed: ${error instanceof Error ? error.message : String(error)}`,
|
|
5984
5728
|
error instanceof Error ? error : void 0
|
|
@@ -5993,27 +5737,27 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
5993
5737
|
const optionalData = options?.optionalData ?? new Uint8Array(32);
|
|
5994
5738
|
try {
|
|
5995
5739
|
if (destinationAddress.trim().length === 0) {
|
|
5996
|
-
throw new
|
|
5740
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
5997
5741
|
"validation",
|
|
5998
5742
|
"Invalid destinationAddress: must be a non-empty string"
|
|
5999
5743
|
);
|
|
6000
5744
|
}
|
|
6001
5745
|
if (mint.trim().length === 0) {
|
|
6002
|
-
throw new
|
|
5746
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError("validation", "Invalid mint: must be a non-empty string");
|
|
6003
5747
|
}
|
|
6004
5748
|
chunkLTCKPTZC_cjs.assertU64(transferAmount);
|
|
6005
5749
|
if (transferAmount <= 0n) {
|
|
6006
|
-
throw new
|
|
5750
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6007
5751
|
"validation",
|
|
6008
5752
|
"Invalid transferAmount: must be greater than zero"
|
|
6009
5753
|
);
|
|
6010
5754
|
}
|
|
6011
5755
|
chunkLTCKPTZC_cjs.assertOptionalData32(optionalData, "optionalData");
|
|
6012
5756
|
} catch (error) {
|
|
6013
|
-
if (error instanceof
|
|
5757
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedDepositError) {
|
|
6014
5758
|
throw error;
|
|
6015
5759
|
}
|
|
6016
|
-
throw new
|
|
5760
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6017
5761
|
"validation",
|
|
6018
5762
|
error instanceof Error ? error.message : String(error),
|
|
6019
5763
|
error instanceof Error ? error : void 0
|
|
@@ -6025,7 +5769,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6025
5769
|
const mintAccountMap = await accountInfoProvider([mint], { commitment: accountInfoCommitment });
|
|
6026
5770
|
const mintAccount = mintAccountMap.get(mint);
|
|
6027
5771
|
if (mintAccount?.exists !== true) {
|
|
6028
|
-
throw new
|
|
5772
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError("mint-fetch", `Mint account not found: ${mint}`);
|
|
6029
5773
|
}
|
|
6030
5774
|
mintOwner = mintAccount.programAddress;
|
|
6031
5775
|
if (mintOwner === chunk43JEHY7D_cjs.TOKEN_2022_PROGRAM_ID) {
|
|
@@ -6038,7 +5782,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6038
5782
|
const transferFee = chunkZY3TSHMJ_cjs.calculateTransferFee(feeConfig, epochInfo.epoch, transferAmount);
|
|
6039
5783
|
const calculatedDepositAmount = transferAmount - transferFee;
|
|
6040
5784
|
if (calculatedDepositAmount <= 0n) {
|
|
6041
|
-
throw new
|
|
5785
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6042
5786
|
"fee-calculation",
|
|
6043
5787
|
`Transfer fee (${String(transferFee)}) exceeds or equals transfer amount (${String(transferAmount)}). Deposit amount must be greater than zero.`
|
|
6044
5788
|
);
|
|
@@ -6049,16 +5793,16 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6049
5793
|
} else if (mintOwner === chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID) {
|
|
6050
5794
|
depositAmount = transferAmount;
|
|
6051
5795
|
} else {
|
|
6052
|
-
throw new
|
|
5796
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6053
5797
|
"mint-fetch",
|
|
6054
5798
|
`Unknown token program: ${mintOwner}. Expected SPL Token (${chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID}) or Token-2022 (${chunk43JEHY7D_cjs.TOKEN_2022_PROGRAM_ID})`
|
|
6055
5799
|
);
|
|
6056
5800
|
}
|
|
6057
5801
|
} catch (error) {
|
|
6058
|
-
if (error instanceof
|
|
5802
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedDepositError) {
|
|
6059
5803
|
throw error;
|
|
6060
5804
|
}
|
|
6061
|
-
throw new
|
|
5805
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6062
5806
|
"mint-fetch",
|
|
6063
5807
|
`Failed to fetch mint account: ${error instanceof Error ? error.message : String(error)}`,
|
|
6064
5808
|
error instanceof Error ? error : void 0
|
|
@@ -6072,7 +5816,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6072
5816
|
chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(destinationAddress, client.networkConfig.programId)
|
|
6073
5817
|
]);
|
|
6074
5818
|
} catch (error) {
|
|
6075
|
-
throw new
|
|
5819
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6076
5820
|
"pda-derivation",
|
|
6077
5821
|
`Failed to derive PDA addresses: ${error instanceof Error ? error.message : String(error)}`,
|
|
6078
5822
|
error instanceof Error ? error : void 0
|
|
@@ -6090,13 +5834,13 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6090
5834
|
const encodedUserAccount = accountMap.get(encryptedUserAccountPda);
|
|
6091
5835
|
const encodedTokenAccount = accountMap.get(encryptedTokenAccountPda);
|
|
6092
5836
|
if (encodedUserAccount === void 0) {
|
|
6093
|
-
throw new
|
|
5837
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6094
5838
|
"account-fetch",
|
|
6095
5839
|
`Failed to fetch account info for user PDA: ${encryptedUserAccountPda}`
|
|
6096
5840
|
);
|
|
6097
5841
|
}
|
|
6098
5842
|
if (encodedTokenAccount === void 0) {
|
|
6099
|
-
throw new
|
|
5843
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6100
5844
|
"account-fetch",
|
|
6101
5845
|
`Failed to fetch account info for token PDA: ${encryptedTokenAccountPda}`
|
|
6102
5846
|
);
|
|
@@ -6107,10 +5851,10 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6107
5851
|
accountMap.get(client.networkConfig.mxeAccountAddress)
|
|
6108
5852
|
);
|
|
6109
5853
|
} catch (error) {
|
|
6110
|
-
if (error instanceof
|
|
5854
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedDepositError) {
|
|
6111
5855
|
throw error;
|
|
6112
5856
|
}
|
|
6113
|
-
throw new
|
|
5857
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6114
5858
|
"account-fetch",
|
|
6115
5859
|
`Failed to fetch accounts: ${error instanceof Error ? error.message : String(error)}`,
|
|
6116
5860
|
error instanceof Error ? error : void 0
|
|
@@ -6186,7 +5930,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6186
5930
|
}
|
|
6187
5931
|
} else {
|
|
6188
5932
|
if (tokenExists && isBalanceInitialised && isSharedMode) {
|
|
6189
|
-
throw new
|
|
5933
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6190
5934
|
"validation",
|
|
6191
5935
|
"Invalid state: Token account is in Shared mode but user has no X25519 key registered"
|
|
6192
5936
|
);
|
|
@@ -6294,17 +6038,17 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6294
6038
|
break;
|
|
6295
6039
|
}
|
|
6296
6040
|
default: {
|
|
6297
|
-
throw new
|
|
6041
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6298
6042
|
"instruction-build",
|
|
6299
6043
|
`Unknown instruction variant: ${String(instructionVariant)}`
|
|
6300
6044
|
);
|
|
6301
6045
|
}
|
|
6302
6046
|
}
|
|
6303
6047
|
} catch (error) {
|
|
6304
|
-
if (error instanceof
|
|
6048
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedDepositError) {
|
|
6305
6049
|
throw error;
|
|
6306
6050
|
}
|
|
6307
|
-
throw new
|
|
6051
|
+
throw new chunkKCHHJKQN_cjs.EncryptedDepositError(
|
|
6308
6052
|
"instruction-build",
|
|
6309
6053
|
`Failed to build instruction: ${error instanceof Error ? error.message : String(error)}`,
|
|
6310
6054
|
error instanceof Error ? error : void 0
|
|
@@ -6376,32 +6120,32 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6376
6120
|
const factoryCloseProofAccountCallbacks = deps.hooks?.closeProofAccount;
|
|
6377
6121
|
const factoryCreateProofAccountCallbacks = deps.hooks?.createProofAccount;
|
|
6378
6122
|
const factoryCreateUtxoCallbacks = deps.hooks?.createUtxo;
|
|
6379
|
-
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ??
|
|
6380
|
-
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
6381
|
-
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ??
|
|
6382
|
-
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ??
|
|
6383
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
6384
|
-
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ??
|
|
6385
|
-
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ??
|
|
6386
|
-
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ??
|
|
6123
|
+
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
6124
|
+
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
6125
|
+
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
6126
|
+
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
6127
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
6128
|
+
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver({ client });
|
|
6129
|
+
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyDeriver({ client });
|
|
6130
|
+
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver({
|
|
6387
6131
|
client
|
|
6388
6132
|
});
|
|
6389
|
-
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ??
|
|
6390
|
-
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ??
|
|
6133
|
+
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyDeriver({ client });
|
|
6134
|
+
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver({
|
|
6391
6135
|
client
|
|
6392
6136
|
});
|
|
6393
|
-
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ??
|
|
6394
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
6395
|
-
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ??
|
|
6396
|
-
const h2Generator = deps.crypto?.h2Generator ??
|
|
6397
|
-
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ??
|
|
6398
|
-
const userCommitmentGenerator =
|
|
6399
|
-
const rescueEncryptionCommitmentGenerator =
|
|
6400
|
-
const poseidonAggregator =
|
|
6401
|
-
const fiatShamirChallengeGenerator =
|
|
6402
|
-
const challengePowersFunction =
|
|
6403
|
-
const polynomialEvaluator =
|
|
6404
|
-
const aesEncryptor = deps.crypto?.aesEncryptor ??
|
|
6137
|
+
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamBlindingFactorDeriver({ client });
|
|
6138
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
6139
|
+
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
6140
|
+
const h2Generator = deps.crypto?.h2Generator ?? chunkYFUGKMNS_cjs.getUtxoCommitmentHashGenerator();
|
|
6141
|
+
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
6142
|
+
const userCommitmentGenerator = chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
6143
|
+
const rescueEncryptionCommitmentGenerator = chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
6144
|
+
const poseidonAggregator = chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
6145
|
+
const fiatShamirChallengeGenerator = chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
6146
|
+
const challengePowersFunction = chunkYFUGKMNS_cjs.getChallengePowersFunction();
|
|
6147
|
+
const polynomialEvaluator = chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
6148
|
+
const aesEncryptor = deps.crypto?.aesEncryptor ?? chunkYFUGKMNS_cjs.getAesEncryptor();
|
|
6405
6149
|
const generateRandomU256Function = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
6406
6150
|
const generateComputationOffsetFunction = deps.random?.generateComputationOffset ?? chunkZY3TSHMJ_cjs.generateComputationOffset;
|
|
6407
6151
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function createSelfClaimableUtxo(args2, options) {
|
|
@@ -6429,12 +6173,12 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6429
6173
|
masterSeed,
|
|
6430
6174
|
{ dkLen: 16, personalization: generationIndexBytes }
|
|
6431
6175
|
);
|
|
6432
|
-
const expandedModifiedGenerationIndex =
|
|
6176
|
+
const expandedModifiedGenerationIndex = chunkYFUGKMNS_cjs.expandModifiedGenerationIndex(modifiedGenerationIndex);
|
|
6433
6177
|
let expandedModifiedGenerationIndexU256 = 0n;
|
|
6434
6178
|
for (let index = 0; index < 32; index++) {
|
|
6435
6179
|
expandedModifiedGenerationIndexU256 |= BigInt(expandedModifiedGenerationIndex[index]) << BigInt(index * 8);
|
|
6436
6180
|
}
|
|
6437
|
-
const proofAccountOffsetBytes =
|
|
6181
|
+
const proofAccountOffsetBytes = chunkYFUGKMNS_cjs.deriveProofAccountOffsetFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
6438
6182
|
let proofAccountOffset = 0n;
|
|
6439
6183
|
for (let index = 0; index < 16; index++) {
|
|
6440
6184
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
@@ -6500,9 +6244,9 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6500
6244
|
);
|
|
6501
6245
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(senderUserCommitment);
|
|
6502
6246
|
const ephemeralOffset = expandedModifiedGenerationIndexU256;
|
|
6503
|
-
const randomSecret =
|
|
6247
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
6504
6248
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(randomSecret);
|
|
6505
|
-
const nullifier =
|
|
6249
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
6506
6250
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifier);
|
|
6507
6251
|
const ephemeralMasterViewingKey = await ephemeralUtxoMvkGenerator(ephemeralOffset);
|
|
6508
6252
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(ephemeralMasterViewingKey);
|
|
@@ -6593,10 +6337,10 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6593
6337
|
const clientX25519PrivateKey = keypairResult.x25519Keypair.privateKey;
|
|
6594
6338
|
chunkLTCKPTZC_cjs.assertX25519PrivateKey(clientX25519PrivateKey);
|
|
6595
6339
|
const clientX25519PublicKey = keypairResult.x25519Keypair.publicKey;
|
|
6596
|
-
const rcEncryptor =
|
|
6340
|
+
const rcEncryptor = chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey(clientX25519PrivateKey, {
|
|
6597
6341
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
6598
6342
|
});
|
|
6599
|
-
const randomFactorForPolynomialCommitment =
|
|
6343
|
+
const randomFactorForPolynomialCommitment = chunkYFUGKMNS_cjs.deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex(
|
|
6600
6344
|
modifiedGenerationIndex
|
|
6601
6345
|
);
|
|
6602
6346
|
chunkLTCKPTZC_cjs.assertU256(randomFactorForPolynomialCommitment);
|
|
@@ -6632,7 +6376,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6632
6376
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedProtocolFees);
|
|
6633
6377
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedRandomFactorLow);
|
|
6634
6378
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedRandomFactorHigh);
|
|
6635
|
-
const rcKeyGenerator =
|
|
6379
|
+
const rcKeyGenerator = chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(clientX25519PrivateKey, {
|
|
6636
6380
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
6637
6381
|
});
|
|
6638
6382
|
const rcEncryptionKeys = await rcKeyGenerator(
|
|
@@ -6685,7 +6429,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6685
6429
|
const rcEncryptionKeyForRandomFactorHighAsLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(
|
|
6686
6430
|
toU256(rcEncryptionKeyForRandomFactorHigh)
|
|
6687
6431
|
);
|
|
6688
|
-
const rescueEncryptionCommitmentBlindingFactor =
|
|
6432
|
+
const rescueEncryptionCommitmentBlindingFactor = chunkYFUGKMNS_cjs.deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex(
|
|
6689
6433
|
modifiedGenerationIndex
|
|
6690
6434
|
);
|
|
6691
6435
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(rescueEncryptionCommitmentBlindingFactor);
|
|
@@ -7067,7 +6811,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7067
6811
|
try {
|
|
7068
6812
|
latestBlockhashData = await getLatestBlockhash();
|
|
7069
6813
|
} catch (error) {
|
|
7070
|
-
throw new
|
|
6814
|
+
throw new chunkKCHHJKQN_cjs.RpcError(
|
|
7071
6815
|
`Failed to fetch latest blockhash: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
7072
6816
|
{ cause: error }
|
|
7073
6817
|
);
|
|
@@ -7083,7 +6827,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7083
6827
|
const transaction = kit.compileTransaction(transactionMessage);
|
|
7084
6828
|
const signedTransaction = await client.signer.signTransaction(transaction);
|
|
7085
6829
|
if (!isSignedTransaction(signedTransaction)) {
|
|
7086
|
-
throw new
|
|
6830
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(`${instructionName}: Transaction was not properly signed`);
|
|
7087
6831
|
}
|
|
7088
6832
|
const result2 = await forwardAndMonitor(
|
|
7089
6833
|
executorConfig,
|
|
@@ -7098,6 +6842,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7098
6842
|
return {
|
|
7099
6843
|
signedTransaction: result2.signedTransaction,
|
|
7100
6844
|
signature: result2.signature,
|
|
6845
|
+
callbackStatus: callbackResult?.status,
|
|
7101
6846
|
callbackSignature,
|
|
7102
6847
|
callbackElapsedMs: callbackResult?.elapsedMs,
|
|
7103
6848
|
rentClaimSignature,
|
|
@@ -7276,6 +7021,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7276
7021
|
closeProofAccountSignature: closeResult?.signature,
|
|
7277
7022
|
createProofAccountSignature: proofAccountResult.signature,
|
|
7278
7023
|
queueSignature: utxoResult.signature,
|
|
7024
|
+
callbackStatus: utxoResult.callbackStatus,
|
|
7279
7025
|
callbackSignature: utxoResult.callbackSignature,
|
|
7280
7026
|
callbackElapsedMs: utxoResult.callbackElapsedMs,
|
|
7281
7027
|
rentClaimSignature: utxoResult.rentClaimSignature,
|
|
@@ -7283,22 +7029,22 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7283
7029
|
};
|
|
7284
7030
|
return result;
|
|
7285
7031
|
} catch (error) {
|
|
7286
|
-
if (error instanceof
|
|
7032
|
+
if (error instanceof chunkKCHHJKQN_cjs.CreateUtxoError) {
|
|
7287
7033
|
throw error;
|
|
7288
7034
|
}
|
|
7289
|
-
if (error instanceof
|
|
7290
|
-
throw new
|
|
7035
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
7036
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-sign", error.message, error);
|
|
7291
7037
|
}
|
|
7292
7038
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
7293
|
-
throw new
|
|
7039
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("zk-proof-generation", error.message, error);
|
|
7294
7040
|
}
|
|
7295
|
-
if (error instanceof
|
|
7296
|
-
throw new
|
|
7041
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
7042
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-send", error.message, error);
|
|
7297
7043
|
}
|
|
7298
|
-
if (error instanceof
|
|
7299
|
-
throw new
|
|
7044
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
7045
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("account-fetch", error.message, error);
|
|
7300
7046
|
}
|
|
7301
|
-
throw new
|
|
7047
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError(
|
|
7302
7048
|
"transaction-send",
|
|
7303
7049
|
error instanceof Error ? error.message : String(error),
|
|
7304
7050
|
error instanceof Error ? error : void 0
|
|
@@ -7364,24 +7110,24 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7364
7110
|
const factoryCloseProofAccountCallbacks = deps.hooks?.closeProofAccount;
|
|
7365
7111
|
const factoryCreateProofAccountCallbacks = deps.hooks?.createProofAccount;
|
|
7366
7112
|
const factoryCreateUtxoCallbacks = deps.hooks?.createUtxo;
|
|
7367
|
-
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ??
|
|
7368
|
-
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
7369
|
-
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ??
|
|
7370
|
-
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ??
|
|
7371
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
7372
|
-
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ??
|
|
7373
|
-
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ??
|
|
7374
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
7375
|
-
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ??
|
|
7376
|
-
const h2Generator = deps.crypto?.h2Generator ??
|
|
7377
|
-
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ??
|
|
7378
|
-
const userCommitmentGenerator =
|
|
7379
|
-
const rescueEncryptionCommitmentGenerator =
|
|
7380
|
-
const poseidonAggregator =
|
|
7381
|
-
const fiatShamirChallengeGenerator =
|
|
7382
|
-
const challengePowersFunction =
|
|
7383
|
-
const polynomialEvaluator =
|
|
7384
|
-
const aesEncryptor = deps.crypto?.aesEncryptor ??
|
|
7113
|
+
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
7114
|
+
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
7115
|
+
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
7116
|
+
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
7117
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
7118
|
+
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver({ client });
|
|
7119
|
+
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamBlindingFactorDeriver({ client });
|
|
7120
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
7121
|
+
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
7122
|
+
const h2Generator = deps.crypto?.h2Generator ?? chunkYFUGKMNS_cjs.getUtxoCommitmentHashGenerator();
|
|
7123
|
+
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
7124
|
+
const userCommitmentGenerator = chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
7125
|
+
const rescueEncryptionCommitmentGenerator = chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
7126
|
+
const poseidonAggregator = chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
7127
|
+
const fiatShamirChallengeGenerator = chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
7128
|
+
const challengePowersFunction = chunkYFUGKMNS_cjs.getChallengePowersFunction();
|
|
7129
|
+
const polynomialEvaluator = chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
7130
|
+
const aesEncryptor = deps.crypto?.aesEncryptor ?? chunkYFUGKMNS_cjs.getAesEncryptor();
|
|
7385
7131
|
const generateRandomU256Function = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
7386
7132
|
const generateComputationOffsetFunction = deps.random?.generateComputationOffset ?? chunkZY3TSHMJ_cjs.generateComputationOffset;
|
|
7387
7133
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function createReceiverClaimableUtxo(args2, options) {
|
|
@@ -7405,12 +7151,12 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7405
7151
|
masterSeed,
|
|
7406
7152
|
{ dkLen: 16, personalization: generationIndexBytes }
|
|
7407
7153
|
);
|
|
7408
|
-
const expandedModifiedGenerationIndex =
|
|
7154
|
+
const expandedModifiedGenerationIndex = chunkYFUGKMNS_cjs.expandModifiedGenerationIndex(modifiedGenerationIndex);
|
|
7409
7155
|
let _expandedModifiedGenerationIndexU256 = 0n;
|
|
7410
7156
|
for (let index = 0; index < 32; index++) {
|
|
7411
7157
|
_expandedModifiedGenerationIndexU256 |= BigInt(expandedModifiedGenerationIndex[index]) << BigInt(index * 8);
|
|
7412
7158
|
}
|
|
7413
|
-
const proofAccountOffsetBytes =
|
|
7159
|
+
const proofAccountOffsetBytes = chunkYFUGKMNS_cjs.deriveProofAccountOffsetFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
7414
7160
|
let proofAccountOffset = 0n;
|
|
7415
7161
|
for (let index = 0; index < 16; index++) {
|
|
7416
7162
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
@@ -7504,9 +7250,9 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7504
7250
|
senderPrivateKeyBlindingFactor
|
|
7505
7251
|
);
|
|
7506
7252
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(senderUserCommitment);
|
|
7507
|
-
const randomSecret =
|
|
7253
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
7508
7254
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(randomSecret);
|
|
7509
|
-
const nullifier =
|
|
7255
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
7510
7256
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifier);
|
|
7511
7257
|
const unlockingUserCommitment = receiverUserCommitment;
|
|
7512
7258
|
const h2Hash = await h2Generator.generateH2({
|
|
@@ -7583,10 +7329,10 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7583
7329
|
const clientX25519PrivateKey = keypairResult.x25519Keypair.privateKey;
|
|
7584
7330
|
chunkLTCKPTZC_cjs.assertX25519PrivateKey(clientX25519PrivateKey);
|
|
7585
7331
|
const clientX25519PublicKey = keypairResult.x25519Keypair.publicKey;
|
|
7586
|
-
const rcEncryptor =
|
|
7332
|
+
const rcEncryptor = chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey(clientX25519PrivateKey, {
|
|
7587
7333
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
7588
7334
|
});
|
|
7589
|
-
const randomFactorForPolynomialCommitment =
|
|
7335
|
+
const randomFactorForPolynomialCommitment = chunkYFUGKMNS_cjs.deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex(
|
|
7590
7336
|
modifiedGenerationIndex
|
|
7591
7337
|
);
|
|
7592
7338
|
chunkLTCKPTZC_cjs.assertU256(randomFactorForPolynomialCommitment);
|
|
@@ -7622,7 +7368,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7622
7368
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedProtocolFees);
|
|
7623
7369
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedRandomFactorLow);
|
|
7624
7370
|
chunkLTCKPTZC_cjs.assertRcCiphertext(rcEncryptedRandomFactorHigh);
|
|
7625
|
-
const rcKeyGenerator =
|
|
7371
|
+
const rcKeyGenerator = chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(clientX25519PrivateKey, {
|
|
7626
7372
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
7627
7373
|
});
|
|
7628
7374
|
const rcEncryptionKeys = await rcKeyGenerator(
|
|
@@ -7675,7 +7421,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7675
7421
|
const rcEncryptionKeyForRandomFactorHighAsLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(
|
|
7676
7422
|
toU2562(rcEncryptionKeyForRandomFactorHigh)
|
|
7677
7423
|
);
|
|
7678
|
-
const rescueEncryptionCommitmentBlindingFactor =
|
|
7424
|
+
const rescueEncryptionCommitmentBlindingFactor = chunkYFUGKMNS_cjs.deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex(
|
|
7679
7425
|
modifiedGenerationIndex
|
|
7680
7426
|
);
|
|
7681
7427
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(rescueEncryptionCommitmentBlindingFactor);
|
|
@@ -8057,7 +7803,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8057
7803
|
try {
|
|
8058
7804
|
latestBlockhashData = await getLatestBlockhash();
|
|
8059
7805
|
} catch (error) {
|
|
8060
|
-
throw new
|
|
7806
|
+
throw new chunkKCHHJKQN_cjs.RpcError(
|
|
8061
7807
|
`Failed to fetch latest blockhash: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
8062
7808
|
{ cause: error }
|
|
8063
7809
|
);
|
|
@@ -8073,7 +7819,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8073
7819
|
const transaction = kit.compileTransaction(transactionMessage);
|
|
8074
7820
|
const signedTransaction = await client.signer.signTransaction(transaction);
|
|
8075
7821
|
if (!isSignedTransaction2(signedTransaction)) {
|
|
8076
|
-
throw new
|
|
7822
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(`${instructionName}: Transaction was not properly signed`);
|
|
8077
7823
|
}
|
|
8078
7824
|
const result2 = await forwardAndMonitor(
|
|
8079
7825
|
executorConfig,
|
|
@@ -8088,6 +7834,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8088
7834
|
return {
|
|
8089
7835
|
signedTransaction: result2.signedTransaction,
|
|
8090
7836
|
signature: result2.signature,
|
|
7837
|
+
callbackStatus: callbackResult?.status,
|
|
8091
7838
|
callbackSignature,
|
|
8092
7839
|
callbackElapsedMs: callbackResult?.elapsedMs,
|
|
8093
7840
|
rentClaimSignature,
|
|
@@ -8262,6 +8009,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8262
8009
|
closeProofAccountSignature: closeResult?.signature,
|
|
8263
8010
|
createProofAccountSignature: proofAccountResult.signature,
|
|
8264
8011
|
queueSignature: utxoResult.signature,
|
|
8012
|
+
callbackStatus: utxoResult.callbackStatus,
|
|
8265
8013
|
callbackSignature: utxoResult.callbackSignature,
|
|
8266
8014
|
callbackElapsedMs: utxoResult.callbackElapsedMs,
|
|
8267
8015
|
rentClaimSignature: utxoResult.rentClaimSignature,
|
|
@@ -8269,22 +8017,22 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8269
8017
|
};
|
|
8270
8018
|
return result;
|
|
8271
8019
|
} catch (error) {
|
|
8272
|
-
if (error instanceof
|
|
8020
|
+
if (error instanceof chunkKCHHJKQN_cjs.CreateUtxoError) {
|
|
8273
8021
|
throw error;
|
|
8274
8022
|
}
|
|
8275
|
-
if (error instanceof
|
|
8276
|
-
throw new
|
|
8023
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
8024
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-sign", error.message, error);
|
|
8277
8025
|
}
|
|
8278
8026
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
8279
|
-
throw new
|
|
8027
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("zk-proof-generation", error.message, error);
|
|
8280
8028
|
}
|
|
8281
|
-
if (error instanceof
|
|
8282
|
-
throw new
|
|
8029
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
8030
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-send", error.message, error);
|
|
8283
8031
|
}
|
|
8284
|
-
if (error instanceof
|
|
8285
|
-
throw new
|
|
8032
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
8033
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("account-fetch", error.message, error);
|
|
8286
8034
|
}
|
|
8287
|
-
throw new
|
|
8035
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError(
|
|
8288
8036
|
"transaction-send",
|
|
8289
8037
|
error instanceof Error ? error.message : String(error),
|
|
8290
8038
|
error instanceof Error ? error : void 0
|
|
@@ -8318,24 +8066,24 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8318
8066
|
const transactionForwarder = deps.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
8319
8067
|
const factoryCreateUtxoCallbacks = deps.hooks?.createUtxo;
|
|
8320
8068
|
const getEpochInfo = deps.rpc?.epochInfo ?? client.epochInfoProvider;
|
|
8321
|
-
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ??
|
|
8322
|
-
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
8323
|
-
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ??
|
|
8324
|
-
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ??
|
|
8325
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
8326
|
-
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ??
|
|
8327
|
-
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ??
|
|
8328
|
-
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ??
|
|
8329
|
-
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ??
|
|
8330
|
-
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ??
|
|
8331
|
-
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ??
|
|
8332
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
8333
|
-
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ??
|
|
8334
|
-
const h2Generator = deps.crypto?.h2Generator ??
|
|
8335
|
-
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ??
|
|
8336
|
-
const userCommitmentGenerator =
|
|
8337
|
-
const poseidonAggregator =
|
|
8338
|
-
const aesEncryptor = deps.crypto?.aesEncryptor ??
|
|
8069
|
+
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
8070
|
+
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
8071
|
+
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
8072
|
+
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
8073
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
8074
|
+
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver({ client });
|
|
8075
|
+
const ephemeralUtxoMvkGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyDeriver({ client });
|
|
8076
|
+
const ephemeralUtxoMvkBlindingFactorGenerator = deps.keys?.ephemeralUtxoMasterViewingKeyBlindingFactorDeriver ?? chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver({ client });
|
|
8077
|
+
const ephemeralUtxoPoseidonKeyGenerator = deps.keys?.ephemeralUtxoPoseidonKeyGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyDeriver({ client });
|
|
8078
|
+
const ephemeralUtxoPoseidonKeyBlindingFactorGenerator = deps.keys?.ephemeralUtxoPoseidonKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver({ client });
|
|
8079
|
+
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamBlindingFactorDeriver({ client });
|
|
8080
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
8081
|
+
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
8082
|
+
const h2Generator = deps.crypto?.h2Generator ?? chunkYFUGKMNS_cjs.getUtxoCommitmentHashGenerator();
|
|
8083
|
+
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
8084
|
+
const userCommitmentGenerator = chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
8085
|
+
const poseidonAggregator = chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
8086
|
+
const aesEncryptor = deps.crypto?.aesEncryptor ?? chunkYFUGKMNS_cjs.getAesEncryptor();
|
|
8339
8087
|
const generateRandomU256Function = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
8340
8088
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function createSelfClaimableUtxoFromPublicBalance(args2, options) {
|
|
8341
8089
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
@@ -8358,12 +8106,12 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8358
8106
|
masterSeed,
|
|
8359
8107
|
{ dkLen: 16, personalization: generationIndexBytes }
|
|
8360
8108
|
);
|
|
8361
|
-
const proofAccountOffsetBytes =
|
|
8109
|
+
const proofAccountOffsetBytes = chunkYFUGKMNS_cjs.deriveProofAccountOffsetFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
8362
8110
|
let proofAccountOffset = 0n;
|
|
8363
8111
|
for (let index = 0; index < 16; index++) {
|
|
8364
8112
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
8365
8113
|
}
|
|
8366
|
-
const expandedModifiedGenerationIndex =
|
|
8114
|
+
const expandedModifiedGenerationIndex = chunkYFUGKMNS_cjs.expandModifiedGenerationIndex(modifiedGenerationIndex);
|
|
8367
8115
|
let expandedModifiedGenerationIndexU256 = 0n;
|
|
8368
8116
|
for (let index = 0; index < 32; index++) {
|
|
8369
8117
|
expandedModifiedGenerationIndexU256 |= BigInt(expandedModifiedGenerationIndex[index]) << BigInt(index * 8);
|
|
@@ -8376,7 +8124,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8376
8124
|
], { commitment: accountInfoCommitment });
|
|
8377
8125
|
const mintAccount = mintAccountMap.get(mint);
|
|
8378
8126
|
if (mintAccount?.exists !== true) {
|
|
8379
|
-
throw new
|
|
8127
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(`Mint account not found: ${mint}`);
|
|
8380
8128
|
}
|
|
8381
8129
|
const clusterOffset = chunkZY3TSHMJ_cjs.extractClusterOffsetFromMxeAccount(
|
|
8382
8130
|
mintAccountMap.get(client.networkConfig.mxeAccountAddress)
|
|
@@ -8392,7 +8140,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8392
8140
|
const transferFee = chunkZY3TSHMJ_cjs.calculateTransferFee(feeConfig, epochInfo.epoch, amount);
|
|
8393
8141
|
actualReceived = amount - transferFee;
|
|
8394
8142
|
if (actualReceived <= 0n) {
|
|
8395
|
-
throw new
|
|
8143
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8396
8144
|
`Transfer fee (${String(transferFee)}) exceeds or equals transfer amount (${String(amount)}).`
|
|
8397
8145
|
);
|
|
8398
8146
|
}
|
|
@@ -8402,7 +8150,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8402
8150
|
actualReceived = amount;
|
|
8403
8151
|
mintTokenProgram = chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID;
|
|
8404
8152
|
} else {
|
|
8405
|
-
throw new
|
|
8153
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8406
8154
|
`Unknown token program: ${mintOwner}. Expected SPL Token or Token-2022.`
|
|
8407
8155
|
);
|
|
8408
8156
|
}
|
|
@@ -8415,7 +8163,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8415
8163
|
const totalProtocolFees = baseFeesInSpl + commissionFee;
|
|
8416
8164
|
const netDepositAmount = actualReceived - totalProtocolFees;
|
|
8417
8165
|
if (netDepositAmount <= 0n) {
|
|
8418
|
-
throw new
|
|
8166
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8419
8167
|
`Net deposit amount is zero or negative after fees. Transfer amount: ${String(amount)}, actual received: ${String(actualReceived)}, protocol fees: ${String(totalProtocolFees)}.`
|
|
8420
8168
|
);
|
|
8421
8169
|
}
|
|
@@ -8469,9 +8217,9 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8469
8217
|
);
|
|
8470
8218
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(senderUserCommitment);
|
|
8471
8219
|
const ephemeralOffset = expandedModifiedGenerationIndexU256;
|
|
8472
|
-
const randomSecret =
|
|
8220
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
8473
8221
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(randomSecret);
|
|
8474
|
-
const nullifier =
|
|
8222
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
8475
8223
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifier);
|
|
8476
8224
|
const ephemeralMasterViewingKey = await ephemeralUtxoMvkGenerator(ephemeralOffset);
|
|
8477
8225
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(ephemeralMasterViewingKey);
|
|
@@ -8668,7 +8416,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8668
8416
|
try {
|
|
8669
8417
|
latestBlockhashData = await getLatestBlockhash();
|
|
8670
8418
|
} catch (error) {
|
|
8671
|
-
throw new
|
|
8419
|
+
throw new chunkKCHHJKQN_cjs.RpcError(
|
|
8672
8420
|
`Failed to fetch latest blockhash: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
8673
8421
|
{ cause: error }
|
|
8674
8422
|
);
|
|
@@ -8691,7 +8439,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8691
8439
|
const transaction = kit.compileTransaction(transactionMessage);
|
|
8692
8440
|
const signed = await client.signer.signTransaction(transaction);
|
|
8693
8441
|
if (!isSignedTransaction3(signed)) {
|
|
8694
|
-
throw new
|
|
8442
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8695
8443
|
`${instructionName}: Transaction was not properly signed`
|
|
8696
8444
|
);
|
|
8697
8445
|
}
|
|
@@ -8699,7 +8447,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8699
8447
|
try {
|
|
8700
8448
|
await transactionForwarder.forwardSequentially([signed]);
|
|
8701
8449
|
} catch (error) {
|
|
8702
|
-
throw new
|
|
8450
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8703
8451
|
`${instructionName}: Failed to send transaction: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
8704
8452
|
{ cause: error }
|
|
8705
8453
|
);
|
|
@@ -8797,22 +8545,22 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8797
8545
|
createUtxoSignature: depositResult.signature
|
|
8798
8546
|
};
|
|
8799
8547
|
} catch (error) {
|
|
8800
|
-
if (error instanceof
|
|
8548
|
+
if (error instanceof chunkKCHHJKQN_cjs.CreateUtxoError) {
|
|
8801
8549
|
throw error;
|
|
8802
8550
|
}
|
|
8803
|
-
if (error instanceof
|
|
8804
|
-
throw new
|
|
8551
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
8552
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-sign", error.message, error);
|
|
8805
8553
|
}
|
|
8806
8554
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
8807
|
-
throw new
|
|
8555
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("zk-proof-generation", error.message, error);
|
|
8808
8556
|
}
|
|
8809
|
-
if (error instanceof
|
|
8810
|
-
throw new
|
|
8557
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
8558
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-send", error.message, error);
|
|
8811
8559
|
}
|
|
8812
|
-
if (error instanceof
|
|
8813
|
-
throw new
|
|
8560
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
8561
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("account-fetch", error.message, error);
|
|
8814
8562
|
}
|
|
8815
|
-
throw new
|
|
8563
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError(
|
|
8816
8564
|
"transaction-send",
|
|
8817
8565
|
error instanceof Error ? error.message : String(error),
|
|
8818
8566
|
error instanceof Error ? error : void 0
|
|
@@ -8846,20 +8594,20 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8846
8594
|
const transactionForwarder = deps.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
8847
8595
|
const factoryCreateUtxoCallbacks = deps.hooks?.createUtxo;
|
|
8848
8596
|
const getEpochInfo = deps.rpc?.epochInfo ?? client.epochInfoProvider;
|
|
8849
|
-
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ??
|
|
8850
|
-
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
8851
|
-
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ??
|
|
8852
|
-
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ??
|
|
8853
|
-
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ??
|
|
8854
|
-
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ??
|
|
8855
|
-
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ??
|
|
8856
|
-
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ??
|
|
8857
|
-
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ??
|
|
8858
|
-
const h2Generator = deps.crypto?.h2Generator ??
|
|
8859
|
-
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ??
|
|
8860
|
-
const userCommitmentGenerator =
|
|
8861
|
-
const poseidonAggregator =
|
|
8862
|
-
const aesEncryptor = deps.crypto?.aesEncryptor ??
|
|
8597
|
+
const masterViewingKeyGenerator = deps.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
8598
|
+
const masterViewingKeyBlindingFactorGenerator = deps.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
8599
|
+
const poseidonPrivateKeyGenerator = deps.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
8600
|
+
const poseidonBlindingFactorGenerator = deps.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
8601
|
+
const mvkX25519KeypairDeriver = deps.keys?.mvkX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
8602
|
+
const secondViewingKeyGenerator = deps.keys?.secondViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver({ client });
|
|
8603
|
+
const poseidonKeystreamBlindingFactorGenerator = deps.keys?.poseidonKeystreamBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamBlindingFactorDeriver({ client });
|
|
8604
|
+
const poseidonEncryptor = deps.crypto?.poseidonEncryptor ?? chunkYFUGKMNS_cjs.getPoseidonEncryptor();
|
|
8605
|
+
const poseidonKeystreamGenerator = deps.crypto?.poseidonKeystreamGenerator ?? chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator();
|
|
8606
|
+
const h2Generator = deps.crypto?.h2Generator ?? chunkYFUGKMNS_cjs.getUtxoCommitmentHashGenerator();
|
|
8607
|
+
const keystreamCommitmentGenerator = deps.crypto?.keystreamCommitmentGenerator ?? chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator();
|
|
8608
|
+
const userCommitmentGenerator = chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
8609
|
+
const poseidonAggregator = chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
8610
|
+
const aesEncryptor = deps.crypto?.aesEncryptor ?? chunkYFUGKMNS_cjs.getAesEncryptor();
|
|
8863
8611
|
const generateRandomU256Function = deps.random?.generateRandomU256 ?? chunkZY3TSHMJ_cjs.generateRandomU256;
|
|
8864
8612
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function createReceiverClaimableUtxoFromPublicBalance(args2, options) {
|
|
8865
8613
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
@@ -8882,7 +8630,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8882
8630
|
masterSeed,
|
|
8883
8631
|
{ dkLen: 16, personalization: generationIndexBytes }
|
|
8884
8632
|
);
|
|
8885
|
-
const proofAccountOffsetBytes =
|
|
8633
|
+
const proofAccountOffsetBytes = chunkYFUGKMNS_cjs.deriveProofAccountOffsetFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
8886
8634
|
let proofAccountOffset = 0n;
|
|
8887
8635
|
for (let index = 0; index < 16; index++) {
|
|
8888
8636
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
@@ -8923,7 +8671,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8923
8671
|
const mintAccountMap = await accountInfoProvider([mint], { commitment: accountInfoCommitment });
|
|
8924
8672
|
const mintAccount = mintAccountMap.get(mint);
|
|
8925
8673
|
if (mintAccount?.exists !== true) {
|
|
8926
|
-
throw new
|
|
8674
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(`Mint account not found: ${mint}`);
|
|
8927
8675
|
}
|
|
8928
8676
|
const mintOwner = mintAccount.programAddress;
|
|
8929
8677
|
if (mintOwner === chunk43JEHY7D_cjs.TOKEN_2022_PROGRAM_ID) {
|
|
@@ -8936,7 +8684,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8936
8684
|
const transferFee = chunkZY3TSHMJ_cjs.calculateTransferFee(feeConfig, epochInfo.epoch, amount);
|
|
8937
8685
|
actualReceived = amount - transferFee;
|
|
8938
8686
|
if (actualReceived <= 0n) {
|
|
8939
|
-
throw new
|
|
8687
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8940
8688
|
`Transfer fee (${String(transferFee)}) exceeds or equals transfer amount (${String(amount)}).`
|
|
8941
8689
|
);
|
|
8942
8690
|
}
|
|
@@ -8946,7 +8694,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8946
8694
|
actualReceived = amount;
|
|
8947
8695
|
mintTokenProgram = chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID;
|
|
8948
8696
|
} else {
|
|
8949
|
-
throw new
|
|
8697
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8950
8698
|
`Unknown token program: ${mintOwner}. Expected SPL Token or Token-2022.`
|
|
8951
8699
|
);
|
|
8952
8700
|
}
|
|
@@ -8959,7 +8707,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8959
8707
|
const totalProtocolFees = baseFeesInSpl + commissionFee;
|
|
8960
8708
|
const netDepositAmount = actualReceived - totalProtocolFees;
|
|
8961
8709
|
if (netDepositAmount <= 0n) {
|
|
8962
|
-
throw new
|
|
8710
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
8963
8711
|
`Net deposit amount is zero or negative after fees. Transfer amount: ${String(amount)}, actual received: ${String(actualReceived)}, protocol fees: ${String(totalProtocolFees)}.`
|
|
8964
8712
|
);
|
|
8965
8713
|
}
|
|
@@ -9012,9 +8760,9 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9012
8760
|
senderPrivateKeyBlindingFactor
|
|
9013
8761
|
);
|
|
9014
8762
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(senderUserCommitment);
|
|
9015
|
-
const randomSecret =
|
|
8763
|
+
const randomSecret = chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
9016
8764
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(randomSecret);
|
|
9017
|
-
const nullifier =
|
|
8765
|
+
const nullifier = chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex(modifiedGenerationIndex);
|
|
9018
8766
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(nullifier);
|
|
9019
8767
|
const h2Hash = await h2Generator.generateH2({
|
|
9020
8768
|
amount: toBn254FieldElement4(netDepositAmount),
|
|
@@ -9198,7 +8946,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9198
8946
|
try {
|
|
9199
8947
|
latestBlockhashData = await getLatestBlockhash();
|
|
9200
8948
|
} catch (error) {
|
|
9201
|
-
throw new
|
|
8949
|
+
throw new chunkKCHHJKQN_cjs.RpcError(
|
|
9202
8950
|
`Failed to fetch latest blockhash: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
9203
8951
|
{ cause: error }
|
|
9204
8952
|
);
|
|
@@ -9221,7 +8969,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9221
8969
|
const transaction = kit.compileTransaction(transactionMessage);
|
|
9222
8970
|
const signed = await client.signer.signTransaction(transaction);
|
|
9223
8971
|
if (!isSignedTransaction4(signed)) {
|
|
9224
|
-
throw new
|
|
8972
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
9225
8973
|
`${instructionName}: Transaction was not properly signed`
|
|
9226
8974
|
);
|
|
9227
8975
|
}
|
|
@@ -9229,7 +8977,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9229
8977
|
try {
|
|
9230
8978
|
await transactionForwarder.forwardSequentially([signed]);
|
|
9231
8979
|
} catch (error) {
|
|
9232
|
-
throw new
|
|
8980
|
+
throw new chunkKCHHJKQN_cjs.TransactionError(
|
|
9233
8981
|
`${instructionName}: Failed to send transaction: ${error instanceof Error ? error.message : "Unknown error"}`,
|
|
9234
8982
|
{ cause: error }
|
|
9235
8983
|
);
|
|
@@ -9323,22 +9071,22 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9323
9071
|
createUtxoSignature: depositResult.signature
|
|
9324
9072
|
};
|
|
9325
9073
|
} catch (error) {
|
|
9326
|
-
if (error instanceof
|
|
9074
|
+
if (error instanceof chunkKCHHJKQN_cjs.CreateUtxoError) {
|
|
9327
9075
|
throw error;
|
|
9328
9076
|
}
|
|
9329
|
-
if (error instanceof
|
|
9330
|
-
throw new
|
|
9077
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
9078
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-sign", error.message, error);
|
|
9331
9079
|
}
|
|
9332
9080
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
9333
|
-
throw new
|
|
9081
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("zk-proof-generation", error.message, error);
|
|
9334
9082
|
}
|
|
9335
|
-
if (error instanceof
|
|
9336
|
-
throw new
|
|
9083
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
9084
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("transaction-send", error.message, error);
|
|
9337
9085
|
}
|
|
9338
|
-
if (error instanceof
|
|
9339
|
-
throw new
|
|
9086
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
9087
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError("account-fetch", error.message, error);
|
|
9340
9088
|
}
|
|
9341
|
-
throw new
|
|
9089
|
+
throw new chunkKCHHJKQN_cjs.CreateUtxoError(
|
|
9342
9090
|
"transaction-send",
|
|
9343
9091
|
error instanceof Error ? error.message : String(error),
|
|
9344
9092
|
error instanceof Error ? error : void 0
|
|
@@ -9379,7 +9127,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9379
9127
|
const { client } = args;
|
|
9380
9128
|
const userAddress = client.signer.address;
|
|
9381
9129
|
const accountInfoProvider = deps?.accountInfoProvider ?? client.accountInfoProvider;
|
|
9382
|
-
const tokenX25519KeypairDeriver =
|
|
9130
|
+
const tokenX25519KeypairDeriver = chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({
|
|
9383
9131
|
client
|
|
9384
9132
|
});
|
|
9385
9133
|
let cachedDecryptor = null;
|
|
@@ -9392,14 +9140,14 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9392
9140
|
try {
|
|
9393
9141
|
keypairResult = await tokenX25519KeypairDeriver();
|
|
9394
9142
|
} catch (error) {
|
|
9395
|
-
throw new
|
|
9143
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9396
9144
|
"key-derivation",
|
|
9397
9145
|
`Failed to derive X25519 keypair: ${error instanceof Error ? error.message : String(error)}`,
|
|
9398
9146
|
error instanceof Error ? error : void 0
|
|
9399
9147
|
);
|
|
9400
9148
|
}
|
|
9401
9149
|
const x25519PrivateKey = keypairResult.x25519Keypair.privateKey;
|
|
9402
|
-
cachedDecryptor =
|
|
9150
|
+
cachedDecryptor = chunkYFUGKMNS_cjs.getRescueDecryptorFromPrivateKey(x25519PrivateKey, {
|
|
9403
9151
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
9404
9152
|
});
|
|
9405
9153
|
}
|
|
@@ -9425,7 +9173,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9425
9173
|
}))
|
|
9426
9174
|
);
|
|
9427
9175
|
} catch (error) {
|
|
9428
|
-
throw new
|
|
9176
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9429
9177
|
"pda-derivation",
|
|
9430
9178
|
`Failed to derive token account PDAs: ${error instanceof Error ? error.message : String(error)}`,
|
|
9431
9179
|
error instanceof Error ? error : void 0
|
|
@@ -9441,7 +9189,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9441
9189
|
try {
|
|
9442
9190
|
accountMap = await accountInfoProvider(pdas);
|
|
9443
9191
|
} catch (error) {
|
|
9444
|
-
throw new
|
|
9192
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9445
9193
|
"account-fetch",
|
|
9446
9194
|
`Failed to fetch token account data: ${error instanceof Error ? error.message : String(error)}`,
|
|
9447
9195
|
error instanceof Error ? error : void 0
|
|
@@ -9459,7 +9207,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9459
9207
|
maybeAccount
|
|
9460
9208
|
);
|
|
9461
9209
|
} catch (error) {
|
|
9462
|
-
throw new
|
|
9210
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9463
9211
|
"account-decode",
|
|
9464
9212
|
`Failed to decode token account data for mint ${mint}: ${error instanceof Error ? error.message : String(error)}`,
|
|
9465
9213
|
error instanceof Error ? error : void 0
|
|
@@ -9481,7 +9229,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9481
9229
|
try {
|
|
9482
9230
|
plaintexts = await rcDecryptor([balanceCiphertext], nonce);
|
|
9483
9231
|
} catch (error) {
|
|
9484
|
-
throw new
|
|
9232
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9485
9233
|
"decryption",
|
|
9486
9234
|
`Failed to decrypt balance for mint ${mint}: ${error instanceof Error ? error.message : String(error)}`,
|
|
9487
9235
|
error instanceof Error ? error : void 0
|
|
@@ -9547,7 +9295,7 @@ function getUserAccountQuerierFunction(args, deps) {
|
|
|
9547
9295
|
try {
|
|
9548
9296
|
userAccountPda = await chunkUEI7SYH6_cjs.findEncryptedUserAccountPda(userAddress, umbraProgram);
|
|
9549
9297
|
} catch (error) {
|
|
9550
|
-
throw new
|
|
9298
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9551
9299
|
"pda-derivation",
|
|
9552
9300
|
`Failed to derive user account PDA: ${error instanceof Error ? error.message : String(error)}`,
|
|
9553
9301
|
error instanceof Error ? error : void 0
|
|
@@ -9557,7 +9305,7 @@ function getUserAccountQuerierFunction(args, deps) {
|
|
|
9557
9305
|
try {
|
|
9558
9306
|
accountMap = await accountInfoProvider([userAccountPda], { commitment: accountInfoCommitment });
|
|
9559
9307
|
} catch (error) {
|
|
9560
|
-
throw new
|
|
9308
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9561
9309
|
"account-fetch",
|
|
9562
9310
|
`Failed to fetch user account data: ${error instanceof Error ? error.message : String(error)}`,
|
|
9563
9311
|
error instanceof Error ? error : void 0
|
|
@@ -9574,7 +9322,7 @@ function getUserAccountQuerierFunction(args, deps) {
|
|
|
9574
9322
|
);
|
|
9575
9323
|
sdkAccount = convertToSdkTypes(decodedAccount.data);
|
|
9576
9324
|
} catch (error) {
|
|
9577
|
-
throw new
|
|
9325
|
+
throw new chunkKCHHJKQN_cjs.QueryError(
|
|
9578
9326
|
"account-decode",
|
|
9579
9327
|
`Failed to decode user account data: ${error instanceof Error ? error.message : String(error)}`,
|
|
9580
9328
|
error instanceof Error ? error : void 0
|
|
@@ -9593,7 +9341,7 @@ function getStagedSolRecovererFunction(args, deps) {
|
|
|
9593
9341
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function claimStagedSolFromPool(mint, amount, destination, optionalData, callbacks) {
|
|
9594
9342
|
const userAddress = signer.address;
|
|
9595
9343
|
if (amount === 0n) {
|
|
9596
|
-
throw new
|
|
9344
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("amount must be greater than zero");
|
|
9597
9345
|
}
|
|
9598
9346
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
9599
9347
|
const instruction = await umbraCodama.getClaimStagedSolFromPoolInstructionAsync({
|
|
@@ -9632,7 +9380,7 @@ function getStagedSplRecovererFunction(args, deps) {
|
|
|
9632
9380
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function claimStagedSplFromPool(mint, amount, destinationAta, optionalData, callbacks) {
|
|
9633
9381
|
const userAddress = signer.address;
|
|
9634
9382
|
if (amount === 0n) {
|
|
9635
|
-
throw new
|
|
9383
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("amount must be greater than zero");
|
|
9636
9384
|
}
|
|
9637
9385
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
9638
9386
|
const instruction = await umbraCodama.getClaimStagedSplFromPoolInstructionAsync({
|
|
@@ -9670,28 +9418,28 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
9670
9418
|
const accountInfoProvider = deps?.rpc?.accountInfoProvider ?? client.accountInfoProvider;
|
|
9671
9419
|
const getLatestBlockhash = deps?.rpc?.blockhashProvider ?? client.blockhashProvider;
|
|
9672
9420
|
const transactionForwarder = deps?.rpc?.transactionForwarder ?? client.transactionForwarder;
|
|
9673
|
-
const userAccountX25519KeypairDeriver = deps?.keys?.userAccountX25519KeypairDeriver ??
|
|
9674
|
-
const masterViewingKeyEncryptingX25519KeypairDeriver = deps?.keys?.masterViewingKeyEncryptingX25519KeypairDeriver ??
|
|
9675
|
-
const masterViewingKeyGenerator = deps?.keys?.masterViewingKeyGenerator ??
|
|
9676
|
-
const masterViewingKeyBlindingFactorGenerator = deps?.keys?.masterViewingKeyBlindingFactorGenerator ??
|
|
9677
|
-
const poseidonPrivateKeyGenerator = deps?.keys?.poseidonPrivateKeyGenerator ??
|
|
9678
|
-
const poseidonBlindingFactorGenerator = deps?.keys?.poseidonBlindingFactorGenerator ??
|
|
9679
|
-
const rescueCommitmentBlindingFactorGenerator = deps?.crypto?.rescueCommitmentBlindingFactorGenerator ??
|
|
9421
|
+
const userAccountX25519KeypairDeriver = deps?.keys?.userAccountX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver({ client });
|
|
9422
|
+
const masterViewingKeyEncryptingX25519KeypairDeriver = deps?.keys?.masterViewingKeyEncryptingX25519KeypairDeriver ?? chunkYFUGKMNS_cjs.getMasterViewingKeyX25519KeypairDeriver({ client });
|
|
9423
|
+
const masterViewingKeyGenerator = deps?.keys?.masterViewingKeyGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver({ client });
|
|
9424
|
+
const masterViewingKeyBlindingFactorGenerator = deps?.keys?.masterViewingKeyBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver({ client });
|
|
9425
|
+
const poseidonPrivateKeyGenerator = deps?.keys?.poseidonPrivateKeyGenerator ?? chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver({ client });
|
|
9426
|
+
const poseidonBlindingFactorGenerator = deps?.keys?.poseidonBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver({ client });
|
|
9427
|
+
const rescueCommitmentBlindingFactorGenerator = deps?.crypto?.rescueCommitmentBlindingFactorGenerator ?? chunkYFUGKMNS_cjs.getRescueCommitmentBlindingFactorDeriver({
|
|
9680
9428
|
client
|
|
9681
9429
|
});
|
|
9682
|
-
const randomFactorGenerator = deps?.crypto?.randomFactorGenerator ??
|
|
9683
|
-
const getRcKeyGenerator = deps?.crypto?.getRcKeyGenerator ?? ((pk) =>
|
|
9430
|
+
const randomFactorGenerator = deps?.crypto?.randomFactorGenerator ?? chunkYFUGKMNS_cjs.getPolynomialCommitmentFactorDeriver({ client });
|
|
9431
|
+
const getRcKeyGenerator = deps?.crypto?.getRcKeyGenerator ?? ((pk) => chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey(pk, {
|
|
9684
9432
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
9685
9433
|
}));
|
|
9686
|
-
const getRcEncryptor = deps?.crypto?.getRcEncryptor ?? ((pk) =>
|
|
9434
|
+
const getRcEncryptor = deps?.crypto?.getRcEncryptor ?? ((pk) => chunkYFUGKMNS_cjs.getRescueEncryptorWithNonceFromPrivateKey(pk, {
|
|
9687
9435
|
umbraX25519PublicKey: client.networkConfig.mxePubkey
|
|
9688
9436
|
}));
|
|
9689
|
-
const rescueCommitmentGenerator = deps?.crypto?.rescueCommitmentGenerator ??
|
|
9690
|
-
const userCommitmentGenerator = deps?.crypto?.userCommitmentGenerator ??
|
|
9691
|
-
const fiatShamirChallengeGenerator = deps?.crypto?.fiatShamirChallengeGenerator ??
|
|
9692
|
-
const challengePowersFunction = deps?.crypto?.challengePowersFunction ??
|
|
9693
|
-
const polynomialEvaluator = deps?.crypto?.polynomialEvaluator ??
|
|
9694
|
-
const poseidonAggregator = deps?.crypto?.poseidonAggregator ??
|
|
9437
|
+
const rescueCommitmentGenerator = deps?.crypto?.rescueCommitmentGenerator ?? chunkYFUGKMNS_cjs.getRescueCommitmentGenerator();
|
|
9438
|
+
const userCommitmentGenerator = deps?.crypto?.userCommitmentGenerator ?? chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction();
|
|
9439
|
+
const fiatShamirChallengeGenerator = deps?.crypto?.fiatShamirChallengeGenerator ?? chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction();
|
|
9440
|
+
const challengePowersFunction = deps?.crypto?.challengePowersFunction ?? chunkYFUGKMNS_cjs.getChallengePowersFunction();
|
|
9441
|
+
const polynomialEvaluator = deps?.crypto?.polynomialEvaluator ?? chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction();
|
|
9442
|
+
const poseidonAggregator = deps?.crypto?.poseidonAggregator ?? chunkYFUGKMNS_cjs.getPoseidonAggregator();
|
|
9695
9443
|
const bn254ModuleInverter = deps?.crypto?.bn254ModInverter ?? chunkY55PYKXH_cjs.getBn254ModularInverter();
|
|
9696
9444
|
const computeLimbwiseSumInverse = deps?.crypto?.computeLimbwiseSumInverse ?? chunkY55PYKXH_cjs.computeBn254LimbwiseSumInverse;
|
|
9697
9445
|
const zkProver = deps?.zkProver;
|
|
@@ -10259,25 +10007,25 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
10259
10007
|
}
|
|
10260
10008
|
return signatures;
|
|
10261
10009
|
} catch (error) {
|
|
10262
|
-
if (error instanceof
|
|
10010
|
+
if (error instanceof chunkKCHHJKQN_cjs.RegistrationError) {
|
|
10263
10011
|
throw error;
|
|
10264
10012
|
}
|
|
10265
|
-
if (error instanceof
|
|
10266
|
-
throw new
|
|
10013
|
+
if (error instanceof chunkKCHHJKQN_cjs.MasterSeedSigningRejectedError) {
|
|
10014
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError("master-seed-derivation", error.message, error);
|
|
10267
10015
|
}
|
|
10268
|
-
if (error instanceof
|
|
10269
|
-
throw new
|
|
10016
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionSigningError) {
|
|
10017
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError("transaction-sign", error.message, error);
|
|
10270
10018
|
}
|
|
10271
10019
|
if (error instanceof chunkFSK2ICMB_cjs.CryptographyError) {
|
|
10272
|
-
throw new
|
|
10020
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError("zk-proof-generation", error.message, error);
|
|
10273
10021
|
}
|
|
10274
|
-
if (error instanceof
|
|
10275
|
-
throw new
|
|
10022
|
+
if (error instanceof chunkKCHHJKQN_cjs.TransactionError) {
|
|
10023
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError("transaction-send", error.message, error);
|
|
10276
10024
|
}
|
|
10277
|
-
if (error instanceof
|
|
10278
|
-
throw new
|
|
10025
|
+
if (error instanceof chunkKCHHJKQN_cjs.RpcError) {
|
|
10026
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError("account-fetch", error.message, error);
|
|
10279
10027
|
}
|
|
10280
|
-
throw new
|
|
10028
|
+
throw new chunkKCHHJKQN_cjs.RegistrationError(
|
|
10281
10029
|
"transaction-send",
|
|
10282
10030
|
error instanceof Error ? error.message : String(error),
|
|
10283
10031
|
error instanceof Error ? error : void 0
|
|
@@ -10307,10 +10055,10 @@ function getUserEntropySeedRotatorFunction(args, deps) {
|
|
|
10307
10055
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function updateRandomGenerationSeed(newSeed, optionalData, callbacks) {
|
|
10308
10056
|
const userAddress = signer.address;
|
|
10309
10057
|
if (newSeed.length !== 32) {
|
|
10310
|
-
throw new
|
|
10058
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("newSeed must be exactly 32 bytes");
|
|
10311
10059
|
}
|
|
10312
10060
|
if (newSeed.every((b) => b === 0)) {
|
|
10313
|
-
throw new
|
|
10061
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("newSeed must not be all zeros");
|
|
10314
10062
|
}
|
|
10315
10063
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
10316
10064
|
const instruction = await umbraCodama.getUpdateRandomGenerationSeedInstructionAsync({
|
|
@@ -10347,10 +10095,10 @@ function getTokenEntropySeedRotatorFunction(args, deps) {
|
|
|
10347
10095
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function updateTokenAccountRandomGenerationSeed(mint, newSeed, optionalData, callbacks) {
|
|
10348
10096
|
const userAddress = signer.address;
|
|
10349
10097
|
if (newSeed.length !== 32) {
|
|
10350
|
-
throw new
|
|
10098
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("newSeed must be exactly 32 bytes");
|
|
10351
10099
|
}
|
|
10352
10100
|
if (newSeed.every((b) => b === 0)) {
|
|
10353
|
-
throw new
|
|
10101
|
+
throw new chunkKCHHJKQN_cjs.TransactionError("newSeed must not be all zeros");
|
|
10354
10102
|
}
|
|
10355
10103
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
10356
10104
|
const instruction = await umbraCodama.getUpdateTokenAccountRandomGenerationSeedInstructionAsync({
|
|
@@ -10381,22 +10129,22 @@ function getTokenEntropySeedRotatorFunction(args, deps) {
|
|
|
10381
10129
|
chunkPK6SKIKE_cjs.__name(getTokenEntropySeedRotatorFunction, "getTokenEntropySeedRotatorFunction");
|
|
10382
10130
|
function assertValidClient(client) {
|
|
10383
10131
|
if (client === void 0 || client === null) {
|
|
10384
|
-
throw new
|
|
10132
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("initialization", "client is required");
|
|
10385
10133
|
}
|
|
10386
10134
|
}
|
|
10387
10135
|
chunkPK6SKIKE_cjs.__name(assertValidClient, "assertValidClient");
|
|
10388
10136
|
function assertValidSigner(signer) {
|
|
10389
10137
|
if (signer === void 0 || signer === null) {
|
|
10390
|
-
throw new
|
|
10138
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("initialization", "client.signer is required");
|
|
10391
10139
|
}
|
|
10392
10140
|
if (typeof signer.address !== "string" || signer.address.trim().length === 0) {
|
|
10393
|
-
throw new
|
|
10141
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10394
10142
|
"initialization",
|
|
10395
10143
|
"client.signer.address must be a non-empty string"
|
|
10396
10144
|
);
|
|
10397
10145
|
}
|
|
10398
10146
|
if (typeof signer.signTransaction !== "function") {
|
|
10399
|
-
throw new
|
|
10147
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10400
10148
|
"initialization",
|
|
10401
10149
|
"client.signer.signTransaction must be a function"
|
|
10402
10150
|
);
|
|
@@ -10405,16 +10153,16 @@ function assertValidSigner(signer) {
|
|
|
10405
10153
|
chunkPK6SKIKE_cjs.__name(assertValidSigner, "assertValidSigner");
|
|
10406
10154
|
function assertValidBlockhashProvider(provider) {
|
|
10407
10155
|
if (typeof provider !== "function") {
|
|
10408
|
-
throw new
|
|
10156
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("initialization", "getLatestBlockhash must be a function");
|
|
10409
10157
|
}
|
|
10410
10158
|
}
|
|
10411
10159
|
chunkPK6SKIKE_cjs.__name(assertValidBlockhashProvider, "assertValidBlockhashProvider");
|
|
10412
10160
|
function assertValidTransactionForwarder(forwarder) {
|
|
10413
10161
|
if (forwarder === void 0 || forwarder === null) {
|
|
10414
|
-
throw new
|
|
10162
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("initialization", "transactionForwarder is required");
|
|
10415
10163
|
}
|
|
10416
10164
|
if (typeof forwarder.forwardSequentially !== "function") {
|
|
10417
|
-
throw new
|
|
10165
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10418
10166
|
"initialization",
|
|
10419
10167
|
"transactionForwarder.forwardSequentially must be a function"
|
|
10420
10168
|
);
|
|
@@ -10423,7 +10171,7 @@ function assertValidTransactionForwarder(forwarder) {
|
|
|
10423
10171
|
chunkPK6SKIKE_cjs.__name(assertValidTransactionForwarder, "assertValidTransactionForwarder");
|
|
10424
10172
|
function assertValidAddress(address, name) {
|
|
10425
10173
|
if (typeof address !== "string" || address.trim().length === 0) {
|
|
10426
|
-
throw new
|
|
10174
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("validation", `Invalid ${name}: must be a non-empty string`);
|
|
10427
10175
|
}
|
|
10428
10176
|
}
|
|
10429
10177
|
chunkPK6SKIKE_cjs.__name(assertValidAddress, "assertValidAddress");
|
|
@@ -10439,7 +10187,7 @@ function assertValidArciumAccounts(accounts) {
|
|
|
10439
10187
|
for (const accountName of requiredAccounts) {
|
|
10440
10188
|
const account = accounts[accountName];
|
|
10441
10189
|
if (typeof account !== "string" || account.trim().length === 0) {
|
|
10442
|
-
throw new
|
|
10190
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10443
10191
|
"pda-derivation",
|
|
10444
10192
|
`Failed to derive ${accountName}: account address is invalid`
|
|
10445
10193
|
);
|
|
@@ -10480,6 +10228,7 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10480
10228
|
if ("callbackResult" in result) {
|
|
10481
10229
|
return {
|
|
10482
10230
|
queueSignature: result.signature,
|
|
10231
|
+
callbackStatus: result.callbackResult.status,
|
|
10483
10232
|
callbackSignature: "callbackSignature" in result.callbackResult ? result.callbackResult.callbackSignature : void 0,
|
|
10484
10233
|
callbackElapsedMs: result.callbackResult.elapsedMs,
|
|
10485
10234
|
rentClaimSignature: result.rentClaimSignature,
|
|
@@ -10488,10 +10237,10 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10488
10237
|
}
|
|
10489
10238
|
return { queueSignature: result.signature };
|
|
10490
10239
|
} catch (error) {
|
|
10491
|
-
if (error instanceof
|
|
10240
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedWithdrawalError) {
|
|
10492
10241
|
throw error;
|
|
10493
10242
|
}
|
|
10494
|
-
throw new
|
|
10243
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10495
10244
|
"transaction-send",
|
|
10496
10245
|
`Transaction execution failed: ${error instanceof Error ? error.message : String(error)}`,
|
|
10497
10246
|
error instanceof Error ? error : void 0
|
|
@@ -10508,17 +10257,17 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10508
10257
|
assertValidAddress(mint, "mint");
|
|
10509
10258
|
chunkLTCKPTZC_cjs.assertU64(withdrawalAmount);
|
|
10510
10259
|
if (withdrawalAmount <= 0n) {
|
|
10511
|
-
throw new
|
|
10260
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10512
10261
|
"validation",
|
|
10513
10262
|
"Invalid withdrawalAmount: must be greater than zero"
|
|
10514
10263
|
);
|
|
10515
10264
|
}
|
|
10516
10265
|
chunkLTCKPTZC_cjs.assertOptionalData32(optionalData, "optionalData");
|
|
10517
10266
|
} catch (error) {
|
|
10518
|
-
if (error instanceof
|
|
10267
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedWithdrawalError) {
|
|
10519
10268
|
throw error;
|
|
10520
10269
|
}
|
|
10521
|
-
throw new
|
|
10270
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10522
10271
|
"validation",
|
|
10523
10272
|
error instanceof Error ? error.message : String(error),
|
|
10524
10273
|
error instanceof Error ? error : void 0
|
|
@@ -10530,11 +10279,11 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10530
10279
|
const mintAccountMap = await accountInfoProvider([mint, client.networkConfig.mxeAccountAddress], { commitment: accountInfoCommitment });
|
|
10531
10280
|
const mintAccount = mintAccountMap.get(mint);
|
|
10532
10281
|
if (mintAccount?.exists !== true) {
|
|
10533
|
-
throw new
|
|
10282
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError("mint-fetch", `Mint account not found: ${mint}`);
|
|
10534
10283
|
}
|
|
10535
10284
|
const mintOwner = mintAccount.programAddress;
|
|
10536
10285
|
if (mintOwner !== chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID && mintOwner !== chunk43JEHY7D_cjs.TOKEN_2022_PROGRAM_ID) {
|
|
10537
|
-
throw new
|
|
10286
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10538
10287
|
"mint-fetch",
|
|
10539
10288
|
`Unknown token program: ${mintOwner}. Expected SPL Token (${chunk43JEHY7D_cjs.SPL_TOKEN_PROGRAM_ID}) or Token-2022 (${chunk43JEHY7D_cjs.TOKEN_2022_PROGRAM_ID})`
|
|
10540
10289
|
);
|
|
@@ -10544,10 +10293,10 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10544
10293
|
mintAccountMap.get(client.networkConfig.mxeAccountAddress)
|
|
10545
10294
|
);
|
|
10546
10295
|
} catch (error) {
|
|
10547
|
-
if (error instanceof
|
|
10296
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedWithdrawalError) {
|
|
10548
10297
|
throw error;
|
|
10549
10298
|
}
|
|
10550
|
-
throw new
|
|
10299
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10551
10300
|
"mint-fetch",
|
|
10552
10301
|
`Failed to fetch mint account: ${error instanceof Error ? error.message : String(error)}`,
|
|
10553
10302
|
error instanceof Error ? error : void 0
|
|
@@ -10564,7 +10313,7 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10564
10313
|
"withdraw_from_shared_balance_into_public_balance_v11"
|
|
10565
10314
|
);
|
|
10566
10315
|
} catch (error) {
|
|
10567
|
-
throw new
|
|
10316
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10568
10317
|
"pda-derivation",
|
|
10569
10318
|
`Failed to get Arcium account addresses: ${error instanceof Error ? error.message : String(error)}`,
|
|
10570
10319
|
error instanceof Error ? error : void 0
|
|
@@ -10612,17 +10361,17 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10612
10361
|
...feeSlabResultToInstructionFields(protocolFeeConfig)
|
|
10613
10362
|
}, { programAddress: client.networkConfig.programId });
|
|
10614
10363
|
} catch (error) {
|
|
10615
|
-
if (error instanceof
|
|
10364
|
+
if (error instanceof chunkKCHHJKQN_cjs.EncryptedWithdrawalError) {
|
|
10616
10365
|
throw error;
|
|
10617
10366
|
}
|
|
10618
|
-
throw new
|
|
10367
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10619
10368
|
"instruction-build",
|
|
10620
10369
|
`Failed to build withdrawal instruction: ${error instanceof Error ? error.message : String(error)}`,
|
|
10621
10370
|
error instanceof Error ? error : void 0
|
|
10622
10371
|
);
|
|
10623
10372
|
}
|
|
10624
10373
|
if (instruction === void 0 || instruction === null) {
|
|
10625
|
-
throw new
|
|
10374
|
+
throw new chunkKCHHJKQN_cjs.EncryptedWithdrawalError(
|
|
10626
10375
|
"instruction-build",
|
|
10627
10376
|
"getWithdrawFromSharedBalanceIntoPublicBalanceV11InstructionAsync returned null or undefined"
|
|
10628
10377
|
);
|
|
@@ -10654,639 +10403,639 @@ Object.defineProperty(exports, "pollClaimUntilTerminal", {
|
|
|
10654
10403
|
});
|
|
10655
10404
|
Object.defineProperty(exports, "AES_AUTH_TAG_LENGTH", {
|
|
10656
10405
|
enumerable: true,
|
|
10657
|
-
get: function () { return
|
|
10406
|
+
get: function () { return chunkYFUGKMNS_cjs.AES_AUTH_TAG_LENGTH; }
|
|
10658
10407
|
});
|
|
10659
10408
|
Object.defineProperty(exports, "AES_IV_LENGTH", {
|
|
10660
10409
|
enumerable: true,
|
|
10661
|
-
get: function () { return
|
|
10410
|
+
get: function () { return chunkYFUGKMNS_cjs.AES_IV_LENGTH; }
|
|
10662
10411
|
});
|
|
10663
10412
|
Object.defineProperty(exports, "AES_KEY_LENGTH", {
|
|
10664
10413
|
enumerable: true,
|
|
10665
|
-
get: function () { return
|
|
10414
|
+
get: function () { return chunkYFUGKMNS_cjs.AES_KEY_LENGTH; }
|
|
10666
10415
|
});
|
|
10667
10416
|
Object.defineProperty(exports, "AES_METADATA_OVERHEAD", {
|
|
10668
10417
|
enumerable: true,
|
|
10669
|
-
get: function () { return
|
|
10418
|
+
get: function () { return chunkYFUGKMNS_cjs.AES_METADATA_OVERHEAD; }
|
|
10670
10419
|
});
|
|
10671
10420
|
Object.defineProperty(exports, "ALPHA", {
|
|
10672
10421
|
enumerable: true,
|
|
10673
|
-
get: function () { return
|
|
10422
|
+
get: function () { return chunkYFUGKMNS_cjs.ALPHA; }
|
|
10674
10423
|
});
|
|
10675
10424
|
Object.defineProperty(exports, "ALPHA_INVERSE", {
|
|
10676
10425
|
enumerable: true,
|
|
10677
|
-
get: function () { return
|
|
10426
|
+
get: function () { return chunkYFUGKMNS_cjs.ALPHA_INVERSE; }
|
|
10678
10427
|
});
|
|
10679
10428
|
Object.defineProperty(exports, "BASE85_LIMB_MAX", {
|
|
10680
10429
|
enumerable: true,
|
|
10681
|
-
get: function () { return
|
|
10430
|
+
get: function () { return chunkYFUGKMNS_cjs.BASE85_LIMB_MAX; }
|
|
10682
10431
|
});
|
|
10683
10432
|
Object.defineProperty(exports, "BLOCK_SIZE", {
|
|
10684
10433
|
enumerable: true,
|
|
10685
|
-
get: function () { return
|
|
10434
|
+
get: function () { return chunkYFUGKMNS_cjs.BLOCK_SIZE; }
|
|
10686
10435
|
});
|
|
10687
10436
|
Object.defineProperty(exports, "CIPHER_ROUND_COUNT", {
|
|
10688
10437
|
enumerable: true,
|
|
10689
|
-
get: function () { return
|
|
10438
|
+
get: function () { return chunkYFUGKMNS_cjs.CIPHER_ROUND_COUNT; }
|
|
10690
10439
|
});
|
|
10691
10440
|
Object.defineProperty(exports, "FIELD_ELEMENT_BYTE_LENGTH", {
|
|
10692
10441
|
enumerable: true,
|
|
10693
|
-
get: function () { return
|
|
10442
|
+
get: function () { return chunkYFUGKMNS_cjs.FIELD_ELEMENT_BYTE_LENGTH; }
|
|
10694
10443
|
});
|
|
10695
10444
|
Object.defineProperty(exports, "FIELD_PRIME", {
|
|
10696
10445
|
enumerable: true,
|
|
10697
|
-
get: function () { return
|
|
10446
|
+
get: function () { return chunkYFUGKMNS_cjs.FIELD_PRIME; }
|
|
10698
10447
|
});
|
|
10699
10448
|
Object.defineProperty(exports, "GROTH16_G1_BYTE_LENGTH", {
|
|
10700
10449
|
enumerable: true,
|
|
10701
|
-
get: function () { return
|
|
10450
|
+
get: function () { return chunkYFUGKMNS_cjs.GROTH16_G1_BYTE_LENGTH; }
|
|
10702
10451
|
});
|
|
10703
10452
|
Object.defineProperty(exports, "GROTH16_G2_BYTE_LENGTH", {
|
|
10704
10453
|
enumerable: true,
|
|
10705
|
-
get: function () { return
|
|
10454
|
+
get: function () { return chunkYFUGKMNS_cjs.GROTH16_G2_BYTE_LENGTH; }
|
|
10706
10455
|
});
|
|
10707
10456
|
Object.defineProperty(exports, "HASH_CAPACITY", {
|
|
10708
10457
|
enumerable: true,
|
|
10709
|
-
get: function () { return
|
|
10458
|
+
get: function () { return chunkYFUGKMNS_cjs.HASH_CAPACITY; }
|
|
10710
10459
|
});
|
|
10711
10460
|
Object.defineProperty(exports, "HASH_DIGEST_LENGTH", {
|
|
10712
10461
|
enumerable: true,
|
|
10713
|
-
get: function () { return
|
|
10462
|
+
get: function () { return chunkYFUGKMNS_cjs.HASH_DIGEST_LENGTH; }
|
|
10714
10463
|
});
|
|
10715
10464
|
Object.defineProperty(exports, "HASH_RATE", {
|
|
10716
10465
|
enumerable: true,
|
|
10717
|
-
get: function () { return
|
|
10466
|
+
get: function () { return chunkYFUGKMNS_cjs.HASH_RATE; }
|
|
10718
10467
|
});
|
|
10719
10468
|
Object.defineProperty(exports, "HASH_ROUND_COUNT", {
|
|
10720
10469
|
enumerable: true,
|
|
10721
|
-
get: function () { return
|
|
10470
|
+
get: function () { return chunkYFUGKMNS_cjs.HASH_ROUND_COUNT; }
|
|
10722
10471
|
});
|
|
10723
10472
|
Object.defineProperty(exports, "HASH_STATE_SIZE", {
|
|
10724
10473
|
enumerable: true,
|
|
10725
|
-
get: function () { return
|
|
10474
|
+
get: function () { return chunkYFUGKMNS_cjs.HASH_STATE_SIZE; }
|
|
10726
10475
|
});
|
|
10727
10476
|
Object.defineProperty(exports, "MASTER_VIEWING_KEY_MAX", {
|
|
10728
10477
|
enumerable: true,
|
|
10729
|
-
get: function () { return
|
|
10478
|
+
get: function () { return chunkYFUGKMNS_cjs.MASTER_VIEWING_KEY_MAX; }
|
|
10730
10479
|
});
|
|
10731
10480
|
Object.defineProperty(exports, "MAX_AGGREGATOR_INPUTS", {
|
|
10732
10481
|
enumerable: true,
|
|
10733
|
-
get: function () { return
|
|
10482
|
+
get: function () { return chunkYFUGKMNS_cjs.MAX_AGGREGATOR_INPUTS; }
|
|
10734
10483
|
});
|
|
10735
10484
|
Object.defineProperty(exports, "MAX_POSEIDON_INPUTS", {
|
|
10736
10485
|
enumerable: true,
|
|
10737
|
-
get: function () { return
|
|
10486
|
+
get: function () { return chunkYFUGKMNS_cjs.MAX_POSEIDON_INPUTS; }
|
|
10738
10487
|
});
|
|
10739
10488
|
Object.defineProperty(exports, "MAX_PRF_SEEDS", {
|
|
10740
10489
|
enumerable: true,
|
|
10741
|
-
get: function () { return
|
|
10490
|
+
get: function () { return chunkYFUGKMNS_cjs.MAX_PRF_SEEDS; }
|
|
10742
10491
|
});
|
|
10743
10492
|
Object.defineProperty(exports, "NONCE_BYTES", {
|
|
10744
10493
|
enumerable: true,
|
|
10745
|
-
get: function () { return
|
|
10494
|
+
get: function () { return chunkYFUGKMNS_cjs.NONCE_BYTES; }
|
|
10746
10495
|
});
|
|
10747
10496
|
Object.defineProperty(exports, "OPTIONAL_DATA_BYTE_LENGTH", {
|
|
10748
10497
|
enumerable: true,
|
|
10749
|
-
get: function () { return
|
|
10498
|
+
get: function () { return chunkYFUGKMNS_cjs.OPTIONAL_DATA_BYTE_LENGTH; }
|
|
10750
10499
|
});
|
|
10751
10500
|
Object.defineProperty(exports, "PRECOMPUTED_FIELD_INVERSES", {
|
|
10752
10501
|
enumerable: true,
|
|
10753
|
-
get: function () { return
|
|
10502
|
+
get: function () { return chunkYFUGKMNS_cjs.PRECOMPUTED_FIELD_INVERSES; }
|
|
10754
10503
|
});
|
|
10755
10504
|
Object.defineProperty(exports, "REDUCTION_CONST", {
|
|
10756
10505
|
enumerable: true,
|
|
10757
|
-
get: function () { return
|
|
10506
|
+
get: function () { return chunkYFUGKMNS_cjs.REDUCTION_CONST; }
|
|
10758
10507
|
});
|
|
10759
10508
|
Object.defineProperty(exports, "SAMPLE_BUFFER_BYTE_LENGTH", {
|
|
10760
10509
|
enumerable: true,
|
|
10761
|
-
get: function () { return
|
|
10510
|
+
get: function () { return chunkYFUGKMNS_cjs.SAMPLE_BUFFER_BYTE_LENGTH; }
|
|
10762
10511
|
});
|
|
10763
10512
|
Object.defineProperty(exports, "SECRET_BYTES", {
|
|
10764
10513
|
enumerable: true,
|
|
10765
|
-
get: function () { return
|
|
10514
|
+
get: function () { return chunkYFUGKMNS_cjs.SECRET_BYTES; }
|
|
10766
10515
|
});
|
|
10767
10516
|
Object.defineProperty(exports, "SHAKE256_CIPHER_SEED", {
|
|
10768
10517
|
enumerable: true,
|
|
10769
|
-
get: function () { return
|
|
10518
|
+
get: function () { return chunkYFUGKMNS_cjs.SHAKE256_CIPHER_SEED; }
|
|
10770
10519
|
});
|
|
10771
10520
|
Object.defineProperty(exports, "X25519_BYTE_LENGTH", {
|
|
10772
10521
|
enumerable: true,
|
|
10773
|
-
get: function () { return
|
|
10522
|
+
get: function () { return chunkYFUGKMNS_cjs.X25519_BYTE_LENGTH; }
|
|
10774
10523
|
});
|
|
10775
10524
|
Object.defineProperty(exports, "ZK_PROOF_BYTE_LENGTH", {
|
|
10776
10525
|
enumerable: true,
|
|
10777
|
-
get: function () { return
|
|
10526
|
+
get: function () { return chunkYFUGKMNS_cjs.ZK_PROOF_BYTE_LENGTH; }
|
|
10778
10527
|
});
|
|
10779
10528
|
Object.defineProperty(exports, "assertAesCiphertextWithMetadata", {
|
|
10780
10529
|
enumerable: true,
|
|
10781
|
-
get: function () { return
|
|
10530
|
+
get: function () { return chunkYFUGKMNS_cjs.assertAesCiphertextWithMetadata; }
|
|
10782
10531
|
});
|
|
10783
10532
|
Object.defineProperty(exports, "assertAesKey", {
|
|
10784
10533
|
enumerable: true,
|
|
10785
|
-
get: function () { return
|
|
10534
|
+
get: function () { return chunkYFUGKMNS_cjs.assertAesKey; }
|
|
10786
10535
|
});
|
|
10787
10536
|
Object.defineProperty(exports, "assertAesPlaintext", {
|
|
10788
10537
|
enumerable: true,
|
|
10789
|
-
get: function () { return
|
|
10538
|
+
get: function () { return chunkYFUGKMNS_cjs.assertAesPlaintext; }
|
|
10790
10539
|
});
|
|
10791
10540
|
Object.defineProperty(exports, "assertBase85Limb", {
|
|
10792
10541
|
enumerable: true,
|
|
10793
|
-
get: function () { return
|
|
10542
|
+
get: function () { return chunkYFUGKMNS_cjs.assertBase85Limb; }
|
|
10794
10543
|
});
|
|
10795
10544
|
Object.defineProperty(exports, "assertCurve25519KeypairResult", {
|
|
10796
10545
|
enumerable: true,
|
|
10797
|
-
get: function () { return
|
|
10546
|
+
get: function () { return chunkYFUGKMNS_cjs.assertCurve25519KeypairResult; }
|
|
10798
10547
|
});
|
|
10799
10548
|
Object.defineProperty(exports, "assertDailyViewingKey", {
|
|
10800
10549
|
enumerable: true,
|
|
10801
|
-
get: function () { return
|
|
10550
|
+
get: function () { return chunkYFUGKMNS_cjs.assertDailyViewingKey; }
|
|
10802
10551
|
});
|
|
10803
10552
|
Object.defineProperty(exports, "assertEd25519Keypair", {
|
|
10804
10553
|
enumerable: true,
|
|
10805
|
-
get: function () { return
|
|
10554
|
+
get: function () { return chunkYFUGKMNS_cjs.assertEd25519Keypair; }
|
|
10806
10555
|
});
|
|
10807
10556
|
Object.defineProperty(exports, "assertGenerationSeed", {
|
|
10808
10557
|
enumerable: true,
|
|
10809
|
-
get: function () { return
|
|
10558
|
+
get: function () { return chunkYFUGKMNS_cjs.assertGenerationSeed; }
|
|
10810
10559
|
});
|
|
10811
10560
|
Object.defineProperty(exports, "assertGroth16ProofA", {
|
|
10812
10561
|
enumerable: true,
|
|
10813
|
-
get: function () { return
|
|
10562
|
+
get: function () { return chunkYFUGKMNS_cjs.assertGroth16ProofA; }
|
|
10814
10563
|
});
|
|
10815
10564
|
Object.defineProperty(exports, "assertGroth16ProofB", {
|
|
10816
10565
|
enumerable: true,
|
|
10817
|
-
get: function () { return
|
|
10566
|
+
get: function () { return chunkYFUGKMNS_cjs.assertGroth16ProofB; }
|
|
10818
10567
|
});
|
|
10819
10568
|
Object.defineProperty(exports, "assertGroth16ProofC", {
|
|
10820
10569
|
enumerable: true,
|
|
10821
|
-
get: function () { return
|
|
10570
|
+
get: function () { return chunkYFUGKMNS_cjs.assertGroth16ProofC; }
|
|
10822
10571
|
});
|
|
10823
10572
|
Object.defineProperty(exports, "assertHourlyViewingKey", {
|
|
10824
10573
|
enumerable: true,
|
|
10825
|
-
get: function () { return
|
|
10574
|
+
get: function () { return chunkYFUGKMNS_cjs.assertHourlyViewingKey; }
|
|
10826
10575
|
});
|
|
10827
10576
|
Object.defineProperty(exports, "assertKeccak256Hash", {
|
|
10828
10577
|
enumerable: true,
|
|
10829
|
-
get: function () { return
|
|
10578
|
+
get: function () { return chunkYFUGKMNS_cjs.assertKeccak256Hash; }
|
|
10830
10579
|
});
|
|
10831
10580
|
Object.defineProperty(exports, "assertKeccak512Hash", {
|
|
10832
10581
|
enumerable: true,
|
|
10833
|
-
get: function () { return
|
|
10582
|
+
get: function () { return chunkYFUGKMNS_cjs.assertKeccak512Hash; }
|
|
10834
10583
|
});
|
|
10835
10584
|
Object.defineProperty(exports, "assertMasterSeed", {
|
|
10836
10585
|
enumerable: true,
|
|
10837
|
-
get: function () { return
|
|
10586
|
+
get: function () { return chunkYFUGKMNS_cjs.assertMasterSeed; }
|
|
10838
10587
|
});
|
|
10839
10588
|
Object.defineProperty(exports, "assertMasterViewingKey", {
|
|
10840
10589
|
enumerable: true,
|
|
10841
|
-
get: function () { return
|
|
10590
|
+
get: function () { return chunkYFUGKMNS_cjs.assertMasterViewingKey; }
|
|
10842
10591
|
});
|
|
10843
10592
|
Object.defineProperty(exports, "assertMintViewingKey", {
|
|
10844
10593
|
enumerable: true,
|
|
10845
|
-
get: function () { return
|
|
10594
|
+
get: function () { return chunkYFUGKMNS_cjs.assertMintViewingKey; }
|
|
10846
10595
|
});
|
|
10847
10596
|
Object.defineProperty(exports, "assertMinuteViewingKey", {
|
|
10848
10597
|
enumerable: true,
|
|
10849
|
-
get: function () { return
|
|
10598
|
+
get: function () { return chunkYFUGKMNS_cjs.assertMinuteViewingKey; }
|
|
10850
10599
|
});
|
|
10851
10600
|
Object.defineProperty(exports, "assertMonthlyViewingKey", {
|
|
10852
10601
|
enumerable: true,
|
|
10853
|
-
get: function () { return
|
|
10602
|
+
get: function () { return chunkYFUGKMNS_cjs.assertMonthlyViewingKey; }
|
|
10854
10603
|
});
|
|
10855
10604
|
Object.defineProperty(exports, "assertOptionalData32", {
|
|
10856
10605
|
enumerable: true,
|
|
10857
|
-
get: function () { return
|
|
10606
|
+
get: function () { return chunkYFUGKMNS_cjs.assertOptionalData32; }
|
|
10858
10607
|
});
|
|
10859
10608
|
Object.defineProperty(exports, "assertPoseidonCiphertext", {
|
|
10860
10609
|
enumerable: true,
|
|
10861
|
-
get: function () { return
|
|
10610
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonCiphertext; }
|
|
10862
10611
|
});
|
|
10863
10612
|
Object.defineProperty(exports, "assertPoseidonCounter", {
|
|
10864
10613
|
enumerable: true,
|
|
10865
|
-
get: function () { return
|
|
10614
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonCounter; }
|
|
10866
10615
|
});
|
|
10867
10616
|
Object.defineProperty(exports, "assertPoseidonHash", {
|
|
10868
10617
|
enumerable: true,
|
|
10869
|
-
get: function () { return
|
|
10618
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonHash; }
|
|
10870
10619
|
});
|
|
10871
10620
|
Object.defineProperty(exports, "assertPoseidonKey", {
|
|
10872
10621
|
enumerable: true,
|
|
10873
|
-
get: function () { return
|
|
10622
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonKey; }
|
|
10874
10623
|
});
|
|
10875
10624
|
Object.defineProperty(exports, "assertPoseidonKeystream", {
|
|
10876
10625
|
enumerable: true,
|
|
10877
|
-
get: function () { return
|
|
10626
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonKeystream; }
|
|
10878
10627
|
});
|
|
10879
10628
|
Object.defineProperty(exports, "assertPoseidonPlaintext", {
|
|
10880
10629
|
enumerable: true,
|
|
10881
|
-
get: function () { return
|
|
10630
|
+
get: function () { return chunkYFUGKMNS_cjs.assertPoseidonPlaintext; }
|
|
10882
10631
|
});
|
|
10883
10632
|
Object.defineProperty(exports, "assertRcCiphertext", {
|
|
10884
10633
|
enumerable: true,
|
|
10885
|
-
get: function () { return
|
|
10634
|
+
get: function () { return chunkYFUGKMNS_cjs.assertRcCiphertext; }
|
|
10886
10635
|
});
|
|
10887
10636
|
Object.defineProperty(exports, "assertRcCounter", {
|
|
10888
10637
|
enumerable: true,
|
|
10889
|
-
get: function () { return
|
|
10638
|
+
get: function () { return chunkYFUGKMNS_cjs.assertRcCounter; }
|
|
10890
10639
|
});
|
|
10891
10640
|
Object.defineProperty(exports, "assertRcEncryptionNonce", {
|
|
10892
10641
|
enumerable: true,
|
|
10893
|
-
get: function () { return
|
|
10642
|
+
get: function () { return chunkYFUGKMNS_cjs.assertRcEncryptionNonce; }
|
|
10894
10643
|
});
|
|
10895
10644
|
Object.defineProperty(exports, "assertRcKey", {
|
|
10896
10645
|
enumerable: true,
|
|
10897
|
-
get: function () { return
|
|
10646
|
+
get: function () { return chunkYFUGKMNS_cjs.assertRcKey; }
|
|
10898
10647
|
});
|
|
10899
10648
|
Object.defineProperty(exports, "assertRcPlaintext", {
|
|
10900
10649
|
enumerable: true,
|
|
10901
|
-
get: function () { return
|
|
10650
|
+
get: function () { return chunkYFUGKMNS_cjs.assertRcPlaintext; }
|
|
10902
10651
|
});
|
|
10903
10652
|
Object.defineProperty(exports, "assertSecondViewingKey", {
|
|
10904
10653
|
enumerable: true,
|
|
10905
|
-
get: function () { return
|
|
10654
|
+
get: function () { return chunkYFUGKMNS_cjs.assertSecondViewingKey; }
|
|
10906
10655
|
});
|
|
10907
10656
|
Object.defineProperty(exports, "assertSharedSecret", {
|
|
10908
10657
|
enumerable: true,
|
|
10909
|
-
get: function () { return
|
|
10658
|
+
get: function () { return chunkYFUGKMNS_cjs.assertSharedSecret; }
|
|
10910
10659
|
});
|
|
10911
10660
|
Object.defineProperty(exports, "assertX25519Bytes", {
|
|
10912
10661
|
enumerable: true,
|
|
10913
|
-
get: function () { return
|
|
10662
|
+
get: function () { return chunkYFUGKMNS_cjs.assertX25519Bytes; }
|
|
10914
10663
|
});
|
|
10915
10664
|
Object.defineProperty(exports, "assertX25519Keypair", {
|
|
10916
10665
|
enumerable: true,
|
|
10917
|
-
get: function () { return
|
|
10666
|
+
get: function () { return chunkYFUGKMNS_cjs.assertX25519Keypair; }
|
|
10918
10667
|
});
|
|
10919
10668
|
Object.defineProperty(exports, "assertX25519PrivateKey", {
|
|
10920
10669
|
enumerable: true,
|
|
10921
|
-
get: function () { return
|
|
10670
|
+
get: function () { return chunkYFUGKMNS_cjs.assertX25519PrivateKey; }
|
|
10922
10671
|
});
|
|
10923
10672
|
Object.defineProperty(exports, "assertX25519PublicKey", {
|
|
10924
10673
|
enumerable: true,
|
|
10925
|
-
get: function () { return
|
|
10674
|
+
get: function () { return chunkYFUGKMNS_cjs.assertX25519PublicKey; }
|
|
10926
10675
|
});
|
|
10927
10676
|
Object.defineProperty(exports, "assertYearlyViewingKey", {
|
|
10928
10677
|
enumerable: true,
|
|
10929
|
-
get: function () { return
|
|
10678
|
+
get: function () { return chunkYFUGKMNS_cjs.assertYearlyViewingKey; }
|
|
10930
10679
|
});
|
|
10931
10680
|
Object.defineProperty(exports, "assertZkProofBytes", {
|
|
10932
10681
|
enumerable: true,
|
|
10933
|
-
get: function () { return
|
|
10682
|
+
get: function () { return chunkYFUGKMNS_cjs.assertZkProofBytes; }
|
|
10934
10683
|
});
|
|
10935
10684
|
Object.defineProperty(exports, "buildPersonalizationString", {
|
|
10936
10685
|
enumerable: true,
|
|
10937
|
-
get: function () { return
|
|
10686
|
+
get: function () { return chunkYFUGKMNS_cjs.buildPersonalizationString; }
|
|
10938
10687
|
});
|
|
10939
10688
|
Object.defineProperty(exports, "defaultAesDecryptor", {
|
|
10940
10689
|
enumerable: true,
|
|
10941
|
-
get: function () { return
|
|
10690
|
+
get: function () { return chunkYFUGKMNS_cjs.defaultAesDecryptor; }
|
|
10942
10691
|
});
|
|
10943
10692
|
Object.defineProperty(exports, "defaultAesEncryptor", {
|
|
10944
10693
|
enumerable: true,
|
|
10945
|
-
get: function () { return
|
|
10694
|
+
get: function () { return chunkYFUGKMNS_cjs.defaultAesEncryptor; }
|
|
10946
10695
|
});
|
|
10947
10696
|
Object.defineProperty(exports, "deriveBn254FieldElementFromKeccak512", {
|
|
10948
10697
|
enumerable: true,
|
|
10949
|
-
get: function () { return
|
|
10698
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveBn254FieldElementFromKeccak512; }
|
|
10950
10699
|
});
|
|
10951
10700
|
Object.defineProperty(exports, "deriveEphemeralMasterViewingKey", {
|
|
10952
10701
|
enumerable: true,
|
|
10953
|
-
get: function () { return
|
|
10702
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveEphemeralMasterViewingKey; }
|
|
10954
10703
|
});
|
|
10955
10704
|
Object.defineProperty(exports, "deriveEphemeralMasterViewingKeyBlindingFactor", {
|
|
10956
10705
|
enumerable: true,
|
|
10957
|
-
get: function () { return
|
|
10706
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveEphemeralMasterViewingKeyBlindingFactor; }
|
|
10958
10707
|
});
|
|
10959
10708
|
Object.defineProperty(exports, "deriveEphemeralPoseidonPrivateKey", {
|
|
10960
10709
|
enumerable: true,
|
|
10961
|
-
get: function () { return
|
|
10710
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveEphemeralPoseidonPrivateKey; }
|
|
10962
10711
|
});
|
|
10963
10712
|
Object.defineProperty(exports, "deriveEphemeralPoseidonPrivateKeyBlindingFactor", {
|
|
10964
10713
|
enumerable: true,
|
|
10965
|
-
get: function () { return
|
|
10714
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveEphemeralPoseidonPrivateKeyBlindingFactor; }
|
|
10966
10715
|
});
|
|
10967
10716
|
Object.defineProperty(exports, "deriveKeystreamBlindingFactor", {
|
|
10968
10717
|
enumerable: true,
|
|
10969
|
-
get: function () { return
|
|
10718
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveKeystreamBlindingFactor; }
|
|
10970
10719
|
});
|
|
10971
10720
|
Object.defineProperty(exports, "deriveModifiedGenerationIndexForReceiverClaim", {
|
|
10972
10721
|
enumerable: true,
|
|
10973
|
-
get: function () { return
|
|
10722
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveModifiedGenerationIndexForReceiverClaim; }
|
|
10974
10723
|
});
|
|
10975
10724
|
Object.defineProperty(exports, "deriveModifiedGenerationIndexForSenderClaim", {
|
|
10976
10725
|
enumerable: true,
|
|
10977
|
-
get: function () { return
|
|
10726
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveModifiedGenerationIndexForSenderClaim; }
|
|
10978
10727
|
});
|
|
10979
10728
|
Object.defineProperty(exports, "deriveNullifierFromModifiedGenerationIndex", {
|
|
10980
10729
|
enumerable: true,
|
|
10981
|
-
get: function () { return
|
|
10730
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveNullifierFromModifiedGenerationIndex; }
|
|
10982
10731
|
});
|
|
10983
10732
|
Object.defineProperty(exports, "deriveProofAccountOffsetFromModifiedGenerationIndex", {
|
|
10984
10733
|
enumerable: true,
|
|
10985
|
-
get: function () { return
|
|
10734
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveProofAccountOffsetFromModifiedGenerationIndex; }
|
|
10986
10735
|
});
|
|
10987
10736
|
Object.defineProperty(exports, "deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex", {
|
|
10988
10737
|
enumerable: true,
|
|
10989
|
-
get: function () { return
|
|
10738
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveRandomFactorForPolynomialCommitmentFromModifiedGenerationIndex; }
|
|
10990
10739
|
});
|
|
10991
10740
|
Object.defineProperty(exports, "deriveRandomSecretFromModifiedGenerationIndex", {
|
|
10992
10741
|
enumerable: true,
|
|
10993
|
-
get: function () { return
|
|
10742
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveRandomSecretFromModifiedGenerationIndex; }
|
|
10994
10743
|
});
|
|
10995
10744
|
Object.defineProperty(exports, "deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex", {
|
|
10996
10745
|
enumerable: true,
|
|
10997
|
-
get: function () { return
|
|
10746
|
+
get: function () { return chunkYFUGKMNS_cjs.deriveRescueEncryptionCommitmentBlindingFactorFromModifiedGenerationIndex; }
|
|
10998
10747
|
});
|
|
10999
10748
|
Object.defineProperty(exports, "expandModifiedGenerationIndex", {
|
|
11000
10749
|
enumerable: true,
|
|
11001
|
-
get: function () { return
|
|
10750
|
+
get: function () { return chunkYFUGKMNS_cjs.expandModifiedGenerationIndex; }
|
|
11002
10751
|
});
|
|
11003
10752
|
Object.defineProperty(exports, "getAesDecryptor", {
|
|
11004
10753
|
enumerable: true,
|
|
11005
|
-
get: function () { return
|
|
10754
|
+
get: function () { return chunkYFUGKMNS_cjs.getAesDecryptor; }
|
|
11006
10755
|
});
|
|
11007
10756
|
Object.defineProperty(exports, "getAesEncryptor", {
|
|
11008
10757
|
enumerable: true,
|
|
11009
|
-
get: function () { return
|
|
10758
|
+
get: function () { return chunkYFUGKMNS_cjs.getAesEncryptor; }
|
|
11010
10759
|
});
|
|
11011
10760
|
Object.defineProperty(exports, "getBn254FieldElementFromKeccak512Deriver", {
|
|
11012
10761
|
enumerable: true,
|
|
11013
|
-
get: function () { return
|
|
10762
|
+
get: function () { return chunkYFUGKMNS_cjs.getBn254FieldElementFromKeccak512Deriver; }
|
|
11014
10763
|
});
|
|
11015
10764
|
Object.defineProperty(exports, "getChallengePowersFunction", {
|
|
11016
10765
|
enumerable: true,
|
|
11017
|
-
get: function () { return
|
|
10766
|
+
get: function () { return chunkYFUGKMNS_cjs.getChallengePowersFunction; }
|
|
11018
10767
|
});
|
|
11019
10768
|
Object.defineProperty(exports, "getDailyViewingKeyDeriver", {
|
|
11020
10769
|
enumerable: true,
|
|
11021
|
-
get: function () { return
|
|
10770
|
+
get: function () { return chunkYFUGKMNS_cjs.getDailyViewingKeyDeriver; }
|
|
11022
10771
|
});
|
|
11023
10772
|
Object.defineProperty(exports, "getEphemeralMasterSeedDeriver", {
|
|
11024
10773
|
enumerable: true,
|
|
11025
|
-
get: function () { return
|
|
10774
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralMasterSeedDeriver; }
|
|
11026
10775
|
});
|
|
11027
10776
|
Object.defineProperty(exports, "getEphemeralRescueCommitmentBlindingFactorDeriver", {
|
|
11028
10777
|
enumerable: true,
|
|
11029
|
-
get: function () { return
|
|
10778
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralRescueCommitmentBlindingFactorDeriver; }
|
|
11030
10779
|
});
|
|
11031
10780
|
Object.defineProperty(exports, "getEphemeralUtxoH2RandomSecretDeriver", {
|
|
11032
10781
|
enumerable: true,
|
|
11033
|
-
get: function () { return
|
|
10782
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoH2RandomSecretDeriver; }
|
|
11034
10783
|
});
|
|
11035
10784
|
Object.defineProperty(exports, "getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver", {
|
|
11036
10785
|
enumerable: true,
|
|
11037
|
-
get: function () { return
|
|
10786
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyBlindingFactorDeriver; }
|
|
11038
10787
|
});
|
|
11039
10788
|
Object.defineProperty(exports, "getEphemeralUtxoMasterViewingKeyDeriver", {
|
|
11040
10789
|
enumerable: true,
|
|
11041
|
-
get: function () { return
|
|
10790
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoMasterViewingKeyDeriver; }
|
|
11042
10791
|
});
|
|
11043
10792
|
Object.defineProperty(exports, "getEphemeralUtxoNullifierDeriver", {
|
|
11044
10793
|
enumerable: true,
|
|
11045
|
-
get: function () { return
|
|
10794
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoNullifierDeriver; }
|
|
11046
10795
|
});
|
|
11047
10796
|
Object.defineProperty(exports, "getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver", {
|
|
11048
10797
|
enumerable: true,
|
|
11049
|
-
get: function () { return
|
|
10798
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyBlindingFactorDeriver; }
|
|
11050
10799
|
});
|
|
11051
10800
|
Object.defineProperty(exports, "getEphemeralUtxoPoseidonPrivateKeyDeriver", {
|
|
11052
10801
|
enumerable: true,
|
|
11053
|
-
get: function () { return
|
|
10802
|
+
get: function () { return chunkYFUGKMNS_cjs.getEphemeralUtxoPoseidonPrivateKeyDeriver; }
|
|
11054
10803
|
});
|
|
11055
10804
|
Object.defineProperty(exports, "getFiatShamirChallengeGeneratorFunction", {
|
|
11056
10805
|
enumerable: true,
|
|
11057
|
-
get: function () { return
|
|
10806
|
+
get: function () { return chunkYFUGKMNS_cjs.getFiatShamirChallengeGeneratorFunction; }
|
|
11058
10807
|
});
|
|
11059
10808
|
Object.defineProperty(exports, "getFieldArithmetic", {
|
|
11060
10809
|
enumerable: true,
|
|
11061
|
-
get: function () { return
|
|
10810
|
+
get: function () { return chunkYFUGKMNS_cjs.getFieldArithmetic; }
|
|
11062
10811
|
});
|
|
11063
10812
|
Object.defineProperty(exports, "getHourlyViewingKeyDeriver", {
|
|
11064
10813
|
enumerable: true,
|
|
11065
|
-
get: function () { return
|
|
10814
|
+
get: function () { return chunkYFUGKMNS_cjs.getHourlyViewingKeyDeriver; }
|
|
11066
10815
|
});
|
|
11067
10816
|
Object.defineProperty(exports, "getKeystreamCommitmentGenerator", {
|
|
11068
10817
|
enumerable: true,
|
|
11069
|
-
get: function () { return
|
|
10818
|
+
get: function () { return chunkYFUGKMNS_cjs.getKeystreamCommitmentGenerator; }
|
|
11070
10819
|
});
|
|
11071
10820
|
Object.defineProperty(exports, "getMasterSeedBasedFieldElementDeriver", {
|
|
11072
10821
|
enumerable: true,
|
|
11073
|
-
get: function () { return
|
|
10822
|
+
get: function () { return chunkYFUGKMNS_cjs.getMasterSeedBasedFieldElementDeriver; }
|
|
11074
10823
|
});
|
|
11075
10824
|
Object.defineProperty(exports, "getMasterViewingKeyBlindingFactorDeriver", {
|
|
11076
10825
|
enumerable: true,
|
|
11077
|
-
get: function () { return
|
|
10826
|
+
get: function () { return chunkYFUGKMNS_cjs.getMasterViewingKeyBlindingFactorDeriver; }
|
|
11078
10827
|
});
|
|
11079
10828
|
Object.defineProperty(exports, "getMasterViewingKeyDeriver", {
|
|
11080
10829
|
enumerable: true,
|
|
11081
|
-
get: function () { return
|
|
10830
|
+
get: function () { return chunkYFUGKMNS_cjs.getMasterViewingKeyDeriver; }
|
|
11082
10831
|
});
|
|
11083
10832
|
Object.defineProperty(exports, "getMasterViewingKeyX25519KeypairDeriver", {
|
|
11084
10833
|
enumerable: true,
|
|
11085
|
-
get: function () { return
|
|
10834
|
+
get: function () { return chunkYFUGKMNS_cjs.getMasterViewingKeyX25519KeypairDeriver; }
|
|
11086
10835
|
});
|
|
11087
10836
|
Object.defineProperty(exports, "getMintViewingKeyDeriver", {
|
|
11088
10837
|
enumerable: true,
|
|
11089
|
-
get: function () { return
|
|
10838
|
+
get: function () { return chunkYFUGKMNS_cjs.getMintViewingKeyDeriver; }
|
|
11090
10839
|
});
|
|
11091
10840
|
Object.defineProperty(exports, "getMintX25519KeypairDeriver", {
|
|
11092
10841
|
enumerable: true,
|
|
11093
|
-
get: function () { return
|
|
10842
|
+
get: function () { return chunkYFUGKMNS_cjs.getMintX25519KeypairDeriver; }
|
|
11094
10843
|
});
|
|
11095
10844
|
Object.defineProperty(exports, "getMinuteViewingKeyDeriver", {
|
|
11096
10845
|
enumerable: true,
|
|
11097
|
-
get: function () { return
|
|
10846
|
+
get: function () { return chunkYFUGKMNS_cjs.getMinuteViewingKeyDeriver; }
|
|
11098
10847
|
});
|
|
11099
10848
|
Object.defineProperty(exports, "getModuloPowCurve25519Function", {
|
|
11100
10849
|
enumerable: true,
|
|
11101
|
-
get: function () { return
|
|
10850
|
+
get: function () { return chunkYFUGKMNS_cjs.getModuloPowCurve25519Function; }
|
|
11102
10851
|
});
|
|
11103
10852
|
Object.defineProperty(exports, "getMonthlyViewingKeyDeriver", {
|
|
11104
10853
|
enumerable: true,
|
|
11105
|
-
get: function () { return
|
|
10854
|
+
get: function () { return chunkYFUGKMNS_cjs.getMonthlyViewingKeyDeriver; }
|
|
11106
10855
|
});
|
|
11107
10856
|
Object.defineProperty(exports, "getPersonalizationStringBuilder", {
|
|
11108
10857
|
enumerable: true,
|
|
11109
|
-
get: function () { return
|
|
10858
|
+
get: function () { return chunkYFUGKMNS_cjs.getPersonalizationStringBuilder; }
|
|
11110
10859
|
});
|
|
11111
10860
|
Object.defineProperty(exports, "getPolynomialCommitmentFactorDeriver", {
|
|
11112
10861
|
enumerable: true,
|
|
11113
|
-
get: function () { return
|
|
10862
|
+
get: function () { return chunkYFUGKMNS_cjs.getPolynomialCommitmentFactorDeriver; }
|
|
11114
10863
|
});
|
|
11115
10864
|
Object.defineProperty(exports, "getPolynomialEvaluatorFunction", {
|
|
11116
10865
|
enumerable: true,
|
|
11117
|
-
get: function () { return
|
|
10866
|
+
get: function () { return chunkYFUGKMNS_cjs.getPolynomialEvaluatorFunction; }
|
|
11118
10867
|
});
|
|
11119
10868
|
Object.defineProperty(exports, "getPoseidonAggregator", {
|
|
11120
10869
|
enumerable: true,
|
|
11121
|
-
get: function () { return
|
|
10870
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonAggregator; }
|
|
11122
10871
|
});
|
|
11123
10872
|
Object.defineProperty(exports, "getPoseidonBlindingFactorDeriver", {
|
|
11124
10873
|
enumerable: true,
|
|
11125
|
-
get: function () { return
|
|
10874
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonBlindingFactorDeriver; }
|
|
11126
10875
|
});
|
|
11127
10876
|
Object.defineProperty(exports, "getPoseidonDecryptor", {
|
|
11128
10877
|
enumerable: true,
|
|
11129
|
-
get: function () { return
|
|
10878
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonDecryptor; }
|
|
11130
10879
|
});
|
|
11131
10880
|
Object.defineProperty(exports, "getPoseidonEncryptor", {
|
|
11132
10881
|
enumerable: true,
|
|
11133
|
-
get: function () { return
|
|
10882
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonEncryptor; }
|
|
11134
10883
|
});
|
|
11135
10884
|
Object.defineProperty(exports, "getPoseidonHasher", {
|
|
11136
10885
|
enumerable: true,
|
|
11137
|
-
get: function () { return
|
|
10886
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonHasher; }
|
|
11138
10887
|
});
|
|
11139
10888
|
Object.defineProperty(exports, "getPoseidonKeystreamBlindingFactorDeriver", {
|
|
11140
10889
|
enumerable: true,
|
|
11141
|
-
get: function () { return
|
|
10890
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonKeystreamBlindingFactorDeriver; }
|
|
11142
10891
|
});
|
|
11143
10892
|
Object.defineProperty(exports, "getPoseidonKeystreamGenerator", {
|
|
11144
10893
|
enumerable: true,
|
|
11145
|
-
get: function () { return
|
|
10894
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonKeystreamGenerator; }
|
|
11146
10895
|
});
|
|
11147
10896
|
Object.defineProperty(exports, "getPoseidonPrf", {
|
|
11148
10897
|
enumerable: true,
|
|
11149
|
-
get: function () { return
|
|
10898
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonPrf; }
|
|
11150
10899
|
});
|
|
11151
10900
|
Object.defineProperty(exports, "getPoseidonPrivateKeyDeriver", {
|
|
11152
10901
|
enumerable: true,
|
|
11153
|
-
get: function () { return
|
|
10902
|
+
get: function () { return chunkYFUGKMNS_cjs.getPoseidonPrivateKeyDeriver; }
|
|
11154
10903
|
});
|
|
11155
10904
|
Object.defineProperty(exports, "getPseudorandomU512Deriver", {
|
|
11156
10905
|
enumerable: true,
|
|
11157
|
-
get: function () { return
|
|
10906
|
+
get: function () { return chunkYFUGKMNS_cjs.getPseudorandomU512Deriver; }
|
|
11158
10907
|
});
|
|
11159
10908
|
Object.defineProperty(exports, "getRescueCipher", {
|
|
11160
10909
|
enumerable: true,
|
|
11161
|
-
get: function () { return
|
|
10910
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueCipher; }
|
|
11162
10911
|
});
|
|
11163
10912
|
Object.defineProperty(exports, "getRescueCipherFromKeyPair", {
|
|
11164
10913
|
enumerable: true,
|
|
11165
|
-
get: function () { return
|
|
10914
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueCipherFromKeyPair; }
|
|
11166
10915
|
});
|
|
11167
10916
|
Object.defineProperty(exports, "getRescueCipherInstance", {
|
|
11168
10917
|
enumerable: true,
|
|
11169
|
-
get: function () { return
|
|
10918
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueCipherInstance; }
|
|
11170
10919
|
});
|
|
11171
10920
|
Object.defineProperty(exports, "getRescueCommitmentBlindingFactorDeriver", {
|
|
11172
10921
|
enumerable: true,
|
|
11173
|
-
get: function () { return
|
|
10922
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueCommitmentBlindingFactorDeriver; }
|
|
11174
10923
|
});
|
|
11175
10924
|
Object.defineProperty(exports, "getRescueCommitmentGenerator", {
|
|
11176
10925
|
enumerable: true,
|
|
11177
|
-
get: function () { return
|
|
10926
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueCommitmentGenerator; }
|
|
11178
10927
|
});
|
|
11179
10928
|
Object.defineProperty(exports, "getRescueDecryptorFromPrivateKey", {
|
|
11180
10929
|
enumerable: true,
|
|
11181
|
-
get: function () { return
|
|
10930
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueDecryptorFromPrivateKey; }
|
|
11182
10931
|
});
|
|
11183
10932
|
Object.defineProperty(exports, "getRescueEncryptorFromPrivateKey", {
|
|
11184
10933
|
enumerable: true,
|
|
11185
|
-
get: function () { return
|
|
10934
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueEncryptorFromPrivateKey; }
|
|
11186
10935
|
});
|
|
11187
10936
|
Object.defineProperty(exports, "getRescueEncryptorWithNonceFromPrivateKey", {
|
|
11188
10937
|
enumerable: true,
|
|
11189
|
-
get: function () { return
|
|
10938
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueEncryptorWithNonceFromPrivateKey; }
|
|
11190
10939
|
});
|
|
11191
10940
|
Object.defineProperty(exports, "getRescueKeyGeneratorFromPrivateKey", {
|
|
11192
10941
|
enumerable: true,
|
|
11193
|
-
get: function () { return
|
|
10942
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescueKeyGeneratorFromPrivateKey; }
|
|
11194
10943
|
});
|
|
11195
10944
|
Object.defineProperty(exports, "getRescuePrimeHashFunction", {
|
|
11196
10945
|
enumerable: true,
|
|
11197
|
-
get: function () { return
|
|
10946
|
+
get: function () { return chunkYFUGKMNS_cjs.getRescuePrimeHashFunction; }
|
|
11198
10947
|
});
|
|
11199
10948
|
Object.defineProperty(exports, "getSecondViewingKeyDeriver", {
|
|
11200
10949
|
enumerable: true,
|
|
11201
|
-
get: function () { return
|
|
10950
|
+
get: function () { return chunkYFUGKMNS_cjs.getSecondViewingKeyDeriver; }
|
|
11202
10951
|
});
|
|
11203
10952
|
Object.defineProperty(exports, "getUserAccountX25519KeypairDeriver", {
|
|
11204
10953
|
enumerable: true,
|
|
11205
|
-
get: function () { return
|
|
10954
|
+
get: function () { return chunkYFUGKMNS_cjs.getUserAccountX25519KeypairDeriver; }
|
|
11206
10955
|
});
|
|
11207
10956
|
Object.defineProperty(exports, "getUserCommitmentGeneratorFunction", {
|
|
11208
10957
|
enumerable: true,
|
|
11209
|
-
get: function () { return
|
|
10958
|
+
get: function () { return chunkYFUGKMNS_cjs.getUserCommitmentGeneratorFunction; }
|
|
11210
10959
|
});
|
|
11211
10960
|
Object.defineProperty(exports, "getUtxoCommitmentHashGenerator", {
|
|
11212
10961
|
enumerable: true,
|
|
11213
|
-
get: function () { return
|
|
10962
|
+
get: function () { return chunkYFUGKMNS_cjs.getUtxoCommitmentHashGenerator; }
|
|
11214
10963
|
});
|
|
11215
10964
|
Object.defineProperty(exports, "getYearlyViewingKeyDeriver", {
|
|
11216
10965
|
enumerable: true,
|
|
11217
|
-
get: function () { return
|
|
10966
|
+
get: function () { return chunkYFUGKMNS_cjs.getYearlyViewingKeyDeriver; }
|
|
11218
10967
|
});
|
|
11219
10968
|
Object.defineProperty(exports, "ClaimUtxoError", {
|
|
11220
10969
|
enumerable: true,
|
|
11221
|
-
get: function () { return
|
|
10970
|
+
get: function () { return chunkKCHHJKQN_cjs.ClaimUtxoError; }
|
|
11222
10971
|
});
|
|
11223
10972
|
Object.defineProperty(exports, "ComputationMonitorError", {
|
|
11224
10973
|
enumerable: true,
|
|
11225
|
-
get: function () { return
|
|
10974
|
+
get: function () { return chunkKCHHJKQN_cjs.ComputationMonitorError; }
|
|
11226
10975
|
});
|
|
11227
10976
|
Object.defineProperty(exports, "ConversionError", {
|
|
11228
10977
|
enumerable: true,
|
|
11229
|
-
get: function () { return
|
|
10978
|
+
get: function () { return chunkKCHHJKQN_cjs.ConversionError; }
|
|
11230
10979
|
});
|
|
11231
10980
|
Object.defineProperty(exports, "CreateUtxoError", {
|
|
11232
10981
|
enumerable: true,
|
|
11233
|
-
get: function () { return
|
|
10982
|
+
get: function () { return chunkKCHHJKQN_cjs.CreateUtxoError; }
|
|
11234
10983
|
});
|
|
11235
10984
|
Object.defineProperty(exports, "EncryptedDepositError", {
|
|
11236
10985
|
enumerable: true,
|
|
11237
|
-
get: function () { return
|
|
10986
|
+
get: function () { return chunkKCHHJKQN_cjs.EncryptedDepositError; }
|
|
11238
10987
|
});
|
|
11239
10988
|
Object.defineProperty(exports, "EncryptedWithdrawalError", {
|
|
11240
10989
|
enumerable: true,
|
|
11241
|
-
get: function () { return
|
|
10990
|
+
get: function () { return chunkKCHHJKQN_cjs.EncryptedWithdrawalError; }
|
|
11242
10991
|
});
|
|
11243
10992
|
Object.defineProperty(exports, "FetchUtxosError", {
|
|
11244
10993
|
enumerable: true,
|
|
11245
|
-
get: function () { return
|
|
10994
|
+
get: function () { return chunkKCHHJKQN_cjs.FetchUtxosError; }
|
|
11246
10995
|
});
|
|
11247
10996
|
Object.defineProperty(exports, "QueryError", {
|
|
11248
10997
|
enumerable: true,
|
|
11249
|
-
get: function () { return
|
|
10998
|
+
get: function () { return chunkKCHHJKQN_cjs.QueryError; }
|
|
11250
10999
|
});
|
|
11251
11000
|
Object.defineProperty(exports, "RegistrationError", {
|
|
11252
11001
|
enumerable: true,
|
|
11253
|
-
get: function () { return
|
|
11002
|
+
get: function () { return chunkKCHHJKQN_cjs.RegistrationError; }
|
|
11254
11003
|
});
|
|
11255
11004
|
Object.defineProperty(exports, "isClaimUtxoError", {
|
|
11256
11005
|
enumerable: true,
|
|
11257
|
-
get: function () { return
|
|
11006
|
+
get: function () { return chunkKCHHJKQN_cjs.isClaimUtxoError; }
|
|
11258
11007
|
});
|
|
11259
11008
|
Object.defineProperty(exports, "isComputationMonitorError", {
|
|
11260
11009
|
enumerable: true,
|
|
11261
|
-
get: function () { return
|
|
11010
|
+
get: function () { return chunkKCHHJKQN_cjs.isComputationMonitorError; }
|
|
11262
11011
|
});
|
|
11263
11012
|
Object.defineProperty(exports, "isConversionError", {
|
|
11264
11013
|
enumerable: true,
|
|
11265
|
-
get: function () { return
|
|
11014
|
+
get: function () { return chunkKCHHJKQN_cjs.isConversionError; }
|
|
11266
11015
|
});
|
|
11267
11016
|
Object.defineProperty(exports, "isCreateUtxoError", {
|
|
11268
11017
|
enumerable: true,
|
|
11269
|
-
get: function () { return
|
|
11018
|
+
get: function () { return chunkKCHHJKQN_cjs.isCreateUtxoError; }
|
|
11270
11019
|
});
|
|
11271
11020
|
Object.defineProperty(exports, "isEncryptedDepositError", {
|
|
11272
11021
|
enumerable: true,
|
|
11273
|
-
get: function () { return
|
|
11022
|
+
get: function () { return chunkKCHHJKQN_cjs.isEncryptedDepositError; }
|
|
11274
11023
|
});
|
|
11275
11024
|
Object.defineProperty(exports, "isEncryptedWithdrawalError", {
|
|
11276
11025
|
enumerable: true,
|
|
11277
|
-
get: function () { return
|
|
11026
|
+
get: function () { return chunkKCHHJKQN_cjs.isEncryptedWithdrawalError; }
|
|
11278
11027
|
});
|
|
11279
11028
|
Object.defineProperty(exports, "isFetchUtxosError", {
|
|
11280
11029
|
enumerable: true,
|
|
11281
|
-
get: function () { return
|
|
11030
|
+
get: function () { return chunkKCHHJKQN_cjs.isFetchUtxosError; }
|
|
11282
11031
|
});
|
|
11283
11032
|
Object.defineProperty(exports, "isQueryError", {
|
|
11284
11033
|
enumerable: true,
|
|
11285
|
-
get: function () { return
|
|
11034
|
+
get: function () { return chunkKCHHJKQN_cjs.isQueryError; }
|
|
11286
11035
|
});
|
|
11287
11036
|
Object.defineProperty(exports, "isRegistrationError", {
|
|
11288
11037
|
enumerable: true,
|
|
11289
|
-
get: function () { return
|
|
11038
|
+
get: function () { return chunkKCHHJKQN_cjs.isRegistrationError; }
|
|
11290
11039
|
});
|
|
11291
11040
|
Object.defineProperty(exports, "bn254Add", {
|
|
11292
11041
|
enumerable: true,
|
|
@@ -11430,7 +11179,6 @@ exports.DEFAULT_POLLING_INTERVAL_MS = DEFAULT_POLLING_INTERVAL_MS;
|
|
|
11430
11179
|
exports.DEFAULT_SAFETY_TIMEOUT_MS = DEFAULT_SAFETY_TIMEOUT_MS;
|
|
11431
11180
|
exports.DEFAULT_SIGNATURE_RETRIEVAL_LIMIT = DEFAULT_SIGNATURE_RETRIEVAL_LIMIT;
|
|
11432
11181
|
exports.FEE_OFFSETS = FEE_OFFSETS;
|
|
11433
|
-
exports.IndexerError = IndexerError;
|
|
11434
11182
|
exports.UMBRA_MESSAGE_TO_SIGN = UMBRA_MESSAGE_TO_SIGN;
|
|
11435
11183
|
exports.buildTransactionMessage = buildTransactionMessage;
|
|
11436
11184
|
exports.calculateFee = calculateFee;
|
|
@@ -11440,7 +11188,6 @@ exports.extractMerklePath = extractMerklePath;
|
|
|
11440
11188
|
exports.extractSignatures = extractSignatures;
|
|
11441
11189
|
exports.feeSlabResultToInstructionFields = feeSlabResultToInstructionFields;
|
|
11442
11190
|
exports.forwardAndMonitor = forwardAndMonitor;
|
|
11443
|
-
exports.getBatchMerkleProofFetcher = getBatchMerkleProofFetcher;
|
|
11444
11191
|
exports.getClaimableUtxoScannerFunction = getClaimableUtxoScannerFunction;
|
|
11445
11192
|
exports.getComplianceGrantIssuerFunction = getComplianceGrantIssuerFunction;
|
|
11446
11193
|
exports.getComplianceGrantRevokerFunction = getComplianceGrantRevokerFunction;
|
|
@@ -11458,7 +11205,6 @@ exports.getHardcodedCreateUtxoProtocolFeeProvider = getHardcodedCreateUtxoProtoc
|
|
|
11458
11205
|
exports.getHardcodedDepositProtocolFeeProvider = getHardcodedDepositProtocolFeeProvider;
|
|
11459
11206
|
exports.getHardcodedWithdrawalProtocolFeeProvider = getHardcodedWithdrawalProtocolFeeProvider;
|
|
11460
11207
|
exports.getMasterViewingKeyRotatorFunction = getMasterViewingKeyRotatorFunction;
|
|
11461
|
-
exports.getMerkleProofFetcher = getMerkleProofFetcher;
|
|
11462
11208
|
exports.getMintEncryptionKeyRotatorFunction = getMintEncryptionKeyRotatorFunction;
|
|
11463
11209
|
exports.getNetworkCiphertextReencryptorForNetworkGrantFunction = getNetworkCiphertextReencryptorForNetworkGrantFunction;
|
|
11464
11210
|
exports.getNetworkComplianceGrantQuerierFunction = getNetworkComplianceGrantQuerierFunction;
|
|
@@ -11482,7 +11228,6 @@ exports.getUserComplianceGrantQuerierFunction = getUserComplianceGrantQuerierFun
|
|
|
11482
11228
|
exports.getUserEncryptionKeyRotatorFunction = getUserEncryptionKeyRotatorFunction;
|
|
11483
11229
|
exports.getUserEntropySeedRotatorFunction = getUserEntropySeedRotatorFunction;
|
|
11484
11230
|
exports.getUserRegistrationFunction = getUserRegistrationFunction;
|
|
11485
|
-
exports.getUtxoDataFetcher = getUtxoDataFetcher;
|
|
11486
11231
|
exports.getWebsocketComputationMonitor = getWebsocketComputationMonitor;
|
|
11487
11232
|
exports.leafIndexToPathIndices = leafIndexToPathIndices;
|
|
11488
11233
|
exports.protocolFeeSlabResultToInstructionFields = protocolFeeSlabResultToInstructionFields;
|