@zama-fhe/sdk 2.2.0-alpha.8 → 2.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/activity.cjs +1 -1
- package/dist/cjs/activity.cjs.map +1 -1
- package/dist/cjs/index.cjs +2 -2
- package/dist/cjs/query/index.cjs +1 -1
- package/dist/cjs/query/index.cjs.map +1 -1
- package/dist/esm/{activity-DoDLK_gV.js → activity-Ctiuld0m.js} +2 -2
- package/dist/esm/{activity-DoDLK_gV.js.map → activity-Ctiuld0m.js.map} +1 -1
- package/dist/esm/assertions-CASetdUe.js +2 -0
- package/dist/esm/assertions-CASetdUe.js.map +1 -0
- package/dist/esm/{fhe-artifact-cache-vzh7Xn9G.js → fhe-artifact-cache-DNoPom4I.js} +2 -2
- package/dist/esm/{fhe-artifact-cache-vzh7Xn9G.js.map → fhe-artifact-cache-DNoPom4I.js.map} +1 -1
- package/dist/esm/{hex-BVdZkMrT.js → hex-CVGYqDKx.js} +2 -2
- package/dist/esm/{hex-BVdZkMrT.js.map → hex-CVGYqDKx.js.map} +1 -1
- package/dist/esm/index.js +1 -1
- package/dist/esm/node/index.js +1 -1
- package/dist/esm/node/relayer-sdk.node-worker.js +1 -1
- package/dist/esm/query/index.d.ts +5 -1
- package/dist/esm/query/index.js +1 -1
- package/dist/esm/query/index.js.map +1 -1
- package/package.json +1 -1
- package/dist/esm/assertions-BNzM20oj.js +0 -2
- package/dist/esm/assertions-BNzM20oj.js.map +0 -1
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import{i as e,n as t,r as n,t as r}from"./relayer-DxMV-NQT.js";import{t as i}from"./encryption-CKqGKzHs.js";import{r as a,t as o}from"./memory-storage-DNvc-6oK.js";import{i as s,n as c,r as l,t as u}from"./assertions-BNzM20oj.js";import{t as d}from"./hex-BVdZkMrT.js";import{_ as f,c as p,f as m,l as h,m as g}from"./wrappers-registry-DqPr_JG2.js";import{erc20Abi as _,getAddress as v,isAddress as y}from"viem";var b=class extends n{constructor(t,n){super(e.SigningRejected,t,n),this.name=`SigningRejectedError`}},x=class extends n{constructor(t,n){super(e.SigningFailed,t,n),this.name=`SigningFailedError`}};function ee(e,t){let n=typeof e==`object`&&!!e&&`code`in e&&e.code===4001,r=e instanceof Error?e.message:String(e),i=r.toLowerCase().includes(`user rejected`)||r.toLowerCase().includes(`user denied`),a=`${t}: ${r}`;throw n||i?new b(a,{cause:e}):new x(a,{cause:e})}var te=class extends n{constructor(t,n){super(e.KeypairExpired,t,n),this.name=`KeypairExpiredError`}},ne=class extends n{constructor(t,n){super(e.InvalidKeypair,t,n),this.name=`InvalidKeypairError`}},S=class extends n{constructor(t,n){super(e.NoCiphertext,t,n),this.name=`NoCiphertextError`}},re=class extends n{constructor(t,n){super(e.DelegationSelfNotAllowed,t,n),this.name=`DelegationSelfNotAllowedError`}},ie=class extends n{constructor(t,n){super(e.DelegationCooldown,t,n),this.name=`DelegationCooldownError`}},C=class extends n{constructor(t,n){super(e.DelegationNotFound,t,n),this.name=`DelegationNotFoundError`}},w=class extends n{constructor(t,n){super(e.DelegationExpired,t,n),this.name=`DelegationExpiredError`}},T=class extends n{constructor(t,n){super(e.DelegationNotPropagated,t,n),this.name=`DelegationNotPropagatedError`}};function ae(e){return{address:e,abi:_,functionName:`name`,args:[]}}function oe(e){return{address:e,abi:_,functionName:`symbol`,args:[]}}function E(e){return{address:e,abi:_,functionName:`decimals`,args:[]}}function se(e){return{address:e,abi:_,functionName:`totalSupply`,args:[]}}function ce(e,t){return{address:e,abi:_,functionName:`balanceOf`,args:[t]}}function D(e,t,n){return{address:e,abi:_,functionName:`allowance`,args:[t,n]}}function le(e,t,n){return{address:e,abi:_,functionName:`approve`,args:[t,n]}}const O=[{inputs:[{internalType:`uint64`,name:`wrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`unwrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`deployFee_`,type:`uint64`},{internalType:`uint64`,name:`batchTransferFee_`,type:`uint64`},{internalType:`address`,name:`feeRecipient_`,type:`address`}],stateMutability:`nonpayable`,type:`constructor`},{inputs:[],name:`AccessControlBadConfirmation`,type:`error`},{inputs:[{internalType:`address`,name:`account`,type:`address`},{internalType:`bytes32`,name:`neededRole`,type:`bytes32`}],name:`AccessControlUnauthorizedAccount`,type:`error`},{inputs:[],name:`FeeExceedsMaximum`,type:`error`},{inputs:[],name:`ZeroAddressFeeRecipient`,type:`error`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldBatchTransferFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`BatchTransferFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldDeployFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`DeployFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`address`,name:`oldRecipient`,type:`address`},{indexed:!0,internalType:`address`,name:`newRecipient`,type:`address`}],name:`FeeRecipientUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`previousAdminRole`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`newAdminRole`,type:`bytes32`}],name:`RoleAdminChanged`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleGranted`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleRevoked`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`bool`,name:`active`,type:`bool`}],name:`SwapperFeeWaiverUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`UnwrapFeeBasisPointsUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`WrapFeeBasisPointsUpdated`,type:`event`},{inputs:[],name:`DEFAULT_ADMIN_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`FEE_MANAGER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`MAX_BASIS_POINTS`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`SWAPPER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`batchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`deployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`feeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getBatchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`address`,name:`deployer`,type:`address`}],name:`getDeployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getFeeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`}],name:`getRoleAdmin`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint64`,name:`amount`,type:`uint64`},{internalType:`address`,name:`unwrapFrom`,type:`address`},{internalType:`address`,name:`unwrapTo`,type:`address`}],name:`getUnwrapFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint256`,name:`amount`,type:`uint256`},{internalType:`address`,name:`wrapFrom`,type:`address`},{internalType:`address`,name:`wrapTo`,type:`address`}],name:`getWrapFee`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`grantRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`hasRole`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`protocolId`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`pure`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`callerConfirmation`,type:`address`}],name:`renounceRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`revokeRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`setBatchTransferFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`setDeployFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`recipient`,type:`address`}],name:`setFeeRecipient`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bool`,name:`active`,type:`bool`}],name:`setSwapperFeeWaiverActive`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setUnwrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setWrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes4`,name:`interfaceId`,type:`bytes4`}],name:`supportsInterface`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`swapperFeeWaiverActive`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`unwrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`wrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function ue(e,t,n,r){return{address:e,abi:O,functionName:`getWrapFee`,args:[t,n,r]}}function de(e,t,n,r){return{address:e,abi:O,functionName:`getUnwrapFee`,args:[t,n,r]}}function fe(e){return{address:e,abi:O,functionName:`getBatchTransferFee`,args:[]}}function pe(e){return{address:e,abi:O,functionName:`getFeeRecipient`,args:[]}}const k=[{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`},{internalType:`uint64`,name:`expirationDate`,type:`uint64`}],name:`delegateForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`revokeDelegationForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegator`,type:`address`},{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`getUserDecryptionDelegationExpirationDate`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function me(e,t,n,r){return{address:e,abi:k,functionName:`delegateForUserDecryption`,args:[t,n,r]}}function he(e,t,n){return{address:e,abi:k,functionName:`revokeDelegationForUserDecryption`,args:[t,n]}}function A(e,t,n,r){return{address:e,abi:k,functionName:`getUserDecryptionDelegationExpirationDate`,args:[t,n,r]}}const j=2n**64n-1n,M={CredentialsLoading:`credentials:loading`,CredentialsCached:`credentials:cached`,CredentialsExpired:`credentials:expired`,CredentialsCreating:`credentials:creating`,CredentialsCreated:`credentials:created`,CredentialsRevoked:`credentials:revoked`,CredentialsPersistFailed:`credentials:persist_failed`,CredentialsAllowed:`credentials:allowed`,CredentialsCorrupted:`credentials:corrupted`,SessionExpired:`session:expired`,EncryptStart:`encrypt:start`,EncryptEnd:`encrypt:end`,EncryptError:`encrypt:error`,DecryptStart:`decrypt:start`,DecryptEnd:`decrypt:end`,DecryptError:`decrypt:error`,TransactionError:`transaction:error`,ShieldSubmitted:`shield:submitted`,TransferSubmitted:`transfer:submitted`,TransferFromSubmitted:`transferFrom:submitted`,ApproveSubmitted:`approve:submitted`,ApproveUnderlyingSubmitted:`approveUnderlying:submitted`,UnwrapSubmitted:`unwrap:submitted`,FinalizeUnwrapSubmitted:`finalizeUnwrap:submitted`,DelegationSubmitted:`delegation:submitted`,RevokeDelegationSubmitted:`revokeDelegation:submitted`,UnshieldPhase1Submitted:`unshield:phase1_submitted`,UnshieldPhase2Started:`unshield:phase2_started`,UnshieldPhase2Submitted:`unshield:phase2_submitted`};var ge=class{#e=null;#t=null;clearCache(){this.#e=null,this.#t=null}async encrypt(e,t,n){let r=await this.#n(t,n),i=crypto.getRandomValues(new Uint8Array(12)),a=new TextEncoder,o=await crypto.subtle.encrypt({name:`AES-GCM`,iv:i},r,a.encode(e));return{iv:btoa(String.fromCharCode(...i)),ciphertext:btoa(String.fromCharCode(...new Uint8Array(o)))}}async decrypt(e,t,n){let r=await this.#n(t,n),i=Uint8Array.from(atob(e.iv),e=>e.charCodeAt(0)),a=Uint8Array.from(atob(e.ciphertext),e=>e.charCodeAt(0)),o=await crypto.subtle.decrypt({name:`AES-GCM`,iv:i},r,a);return d(new TextDecoder().decode(o))}async#n(e,t){let n=`${e}:${t}`;if(this.#e&&this.#t===n)return this.#e;let r=new TextEncoder,i=await crypto.subtle.importKey(`raw`,r.encode(e),`PBKDF2`,!1,[`deriveKey`]),a=await crypto.subtle.deriveKey({name:`PBKDF2`,salt:r.encode(t),iterations:6e5,hash:`SHA-256`},i,{name:`AES-GCM`,length:256},!1,[`encrypt`,`decrypt`]);return this.#t=n,this.#e=a,a}};function N(e){l(e,`Stored credentials`),s(e.publicKey,`credentials.publicKey`),u(e.contractAddresses,`credentials.contractAddresses`);for(let t of e.contractAddresses)c(typeof t==`string`&&y(t,{strict:!1}),`Expected each contractAddress to be a valid hex address`);l(e.encryptedPrivateKey,`credentials.encryptedPrivateKey`),s(e.encryptedPrivateKey.iv,`encryptedPrivateKey.iv`),s(e.encryptedPrivateKey.ciphertext,`encryptedPrivateKey.ciphertext`),c(typeof e.startTimestamp==`number`,`Expected credentials.startTimestamp to be a number`),c(typeof e.durationDays==`number`,`Expected credentials.durationDays to be a number`)}function _e(e){N(e);let t=e;c(typeof t.delegatorAddress==`string`&&y(t.delegatorAddress,{strict:!1}),`Expected credentials.delegatorAddress to be a valid address`),c(typeof t.delegateAddress==`string`&&y(t.delegateAddress,{strict:!1}),`Expected credentials.delegateAddress to be a valid address`),c(typeof t.startTimestamp==`number`,`Expected startTimestamp to be a number`),c(typeof t.durationDays==`number`,`Expected durationDays to be a number`)}function P(e){return Math.floor(Date.now()/1e3)<e.startTimestamp+e.durationDays*86400}function F(e,t){let n=new Set(t.map(e=>v(e))),r=new Set(e.map(e=>v(e)));return n.isSubsetOf(r)}function I(e,t){return P(e)?F(e.contractAddresses,t):!1}function L(e){return[...new Set(e.map(e=>v(e)))].toSorted()}async function R(...e){let t=await crypto.subtle.digest(`SHA-256`,new TextEncoder().encode(e.map(String).join(`:`)));return Array.from(new Uint8Array(t)).map(e=>e.toString(16).padStart(2,`0`)).join(``).slice(0,32)}var ve=class{#e;constructor(e){this.#e=e}#t(e){l(e,`Session entry`),s(e.signature,`session.signature`),c(typeof e.createdAt==`number`,`Expected session.createdAt to be a number`),c(typeof e.ttl==`number`||e.ttl===`infinite`,`Expected session.ttl to be a number or "infinite"`)}async get(e){let t=await this.#e.get(e);return t===null?null:(this.#t(t),t)}async set(e){let t={signature:e.signature,createdAt:Math.floor(Date.now()/1e3),ttl:e.ttl};await this.#e.set(e.key,t)}async delete(e){await this.#e.delete(e)}isExpired(e){return e.ttl===`infinite`?!1:e.ttl===0?!0:Math.floor(Date.now()/1e3)-e.createdAt>=e.ttl}},ye=class{signer;storage;sessionSignatures;crypto;keypairTTL;sessionTTL;#e;#t=null;#n=null;#r=null;constructor(e){if(this.signer=e.signer,this.storage=e.storage,this.sessionSignatures=new ve(e.sessionStorage),this.crypto=new ge,this.keypairTTL=e.keypairTTL??86400,this.sessionTTL=e.sessionTTL??2592e3,this.#e=e.onEvent??(()=>{}),typeof this.keypairTTL==`number`&&this.keypairTTL<0)throw Error(`keypairTTL must be >= 0`);if(typeof this.sessionTTL==`number`&&this.sessionTTL<0)throw Error(`sessionTTL must be >= 0`)}emit(e){this.#e({...e,timestamp:Date.now()})}async resolveCredentials({key:e,contracts:t,createKey:n,createFn:r}){this.emit({type:M.CredentialsLoading,contractAddresses:t});try{let n=await this.storage.get(e);if(n){this.assertEncrypted(n);let r=await this.sessionSignatures.get(e);if(r)if(this.sessionSignatures.isExpired(r))await this.sessionSignatures.delete(e),this.emit({type:M.SessionExpired,reason:`ttl`});else{let i=await this.decryptCredentials(n,r.signature);if(I(i,t))return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i;if(P(i))return this.#i({key:e,credentials:i,requiredContracts:t});this.emit({type:M.CredentialsExpired,contractAddresses:t})}if(P(n)){if(F(n.contractAddresses,t)){let r=await this.signForContracts(n,n.contractAddresses);await this.sessionSignatures.set({key:e,signature:r,ttl:this.sessionTTL});let i=await this.decryptCredentials(n,r);return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i}let r=await this.signForContracts(n,n.contractAddresses),i=await this.decryptCredentials(n,r);return this.#i({key:e,credentials:i,requiredContracts:t})}this.emit({type:M.CredentialsExpired,contractAddresses:t})}}catch(t){if(t instanceof b||t instanceof x)throw t;console.warn(`[zama-sdk] Credential resolution failed, recreating:`,t),this.emit({type:M.CredentialsCorrupted,error:a(t)}),await this.#o(e)}return(!this.#t||this.#n!==n)&&(this.#n=n,this.#t=r().then(e=>(this.emit({type:M.CredentialsAllowed,contractAddresses:t}),e)).finally(()=>{this.#t=null,this.#n=null})),this.#t}async checkExpired(e,t){try{let n=await this.storage.get(e);return n?(this.assertEncrypted(n),!I(n,t?[t]:[])):!1}catch(e){return console.warn(`[zama-sdk] isExpired check failed, treating as expired:`,e),!0}}async revokeSession(e,t){await this.sessionSignatures.delete(e),this.clearCaches(),this.emit({type:M.CredentialsRevoked,...t?{contractAddresses:t}:{}})}async checkAllowed(e){let t=await this.sessionSignatures.get(e);return t===null?!1:!this.sessionSignatures.isExpired(t)}async clearAll(e){await this.sessionSignatures.delete(e),this.clearCaches(),await this.#o(e)}clearCaches(){this.crypto.clearCache()}async createCredentials({key:e,contractAddresses:t,createFn:n,errorContext:r}){this.emit({type:M.CredentialsCreating,contractAddresses:t});try{let r=await n();return await this.persistCredentials(e,r),await this.sessionSignatures.set({key:e,signature:r.signature,ttl:this.sessionTTL}),this.emit({type:M.CredentialsCreated,contractAddresses:t}),r}catch(e){ee(e,r)}}async#i({key:e,credentials:t,requiredContracts:n}){if(this.#r){let e=await this.#r;if(F(e.contractAddresses,n))return this.emit({type:M.CredentialsAllowed,contractAddresses:n}),e;t=e}let r=this.#a({key:e,credentials:t,requiredContracts:n});this.#r=r;try{return await r}finally{this.#r===r&&(this.#r=null)}}async#a({key:e,credentials:t,requiredContracts:n}){let r=L([...t.contractAddresses,...n]),i=await this.signForContracts(t,r),a={...t,contractAddresses:r,signature:i};return await this.persistCredentials(e,a),await this.sessionSignatures.set({key:e,signature:i,ttl:this.sessionTTL}),this.emit({type:M.CredentialsAllowed,contractAddresses:n}),a}async persistCredentials(e,t){try{let n=await this.encryptCredentials(t);await this.storage.set(e,n)}catch(e){console.warn(`[zama-sdk] Failed to encrypt credentials for persistence:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}async#o(e){try{await this.storage.delete(e)}catch(e){console.warn(`[zama-sdk] Failed to delete credentials:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}};function be(e){if(typeof e!=`object`||!e)return!1;let t=Reflect.get(e,`runtime`);return typeof t!=`object`||!t?!1:typeof Reflect.get(t,`id`)==`string`}var xe=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t){return R(v(e),t)}constructor(e){super(e),this.#e=e.relayer,be(typeof globalThis<`u`?Reflect.get(globalThis,`chrome`):void 0)&&e.sessionStorage instanceof o&&console.warn(`[zama-sdk] Detected Chrome extension context with in-memory session storage. Session signatures will be lost on service worker restart and won't be shared across contexts. Consider using chromeSessionStorage instead. `)}async allow(...e){let t=L(e),n=await this.#r();return this.resolveCredentials({key:n,contracts:t,createKey:t.join(`,`),createFn:()=>this.create(t)})}async isExpired(e){return this.checkExpired(await this.#r(),e)}async revoke(...e){await this.revokeSession(await this.#r(),e.length>0?e:void 0)}async revokeByKey(e){await this.revokeSession(e)}async isAllowed(){return this.checkAllowed(await this.#r())}async clear(){await this.clearAll(await this.#r())}async create(e){let t=L(e),n=await this.#r();return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let e=await this.#e.generateKeypair(),n=Math.floor(Date.now()/1e3),r=Math.ceil(this.keypairTTL/86400),i=await this.#e.createEIP712(e.publicKey,t,n,r),a=await this.signer.signTypedData(i);return{publicKey:e.publicKey,privateKey:e.privateKey,signature:a,contractAddresses:t,startTimestamp:n,durationDays:r}},errorContext:`Failed to create decrypt credentials`})}assertEncrypted(e){N(e)}async signForContracts(e,t){let n=await this.#e.createEIP712(e.publicKey,t,e.startTimestamp,e.durationDays);return this.signer.signTypedData(n)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#r(){let t=await this.signer.getAddress(),n=await this.signer.getChainId(),r=`${v(t)}:${n}`;if(this.#t&&this.#n===r)return this.#t;let i=await e.computeStoreKey(t,n);return this.#n=r,this.#t=i,i}},Se=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t,n){return R(v(e),v(t),n)}constructor(e){super(e),this.#e=e.relayer}async allow(e,...t){let n=v(e),r=L(t),i=await this.#i(n);return this.resolveCredentials({key:i,contracts:r,createKey:`${n}:${r.join(`,`)}`,createFn:()=>this.#r(n,r)})}async isExpired(e,t){return this.checkExpired(await this.#i(v(e)),t)}async revoke(e){await this.revokeSession(await this.#i(v(e)))}async isAllowed(e){return this.checkAllowed(await this.#i(v(e)))}async clear(e){await this.clearAll(await this.#i(v(e)))}async#r(e,t){let n=await this.#i(e);return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let n=await this.#e.generateKeypair(),r=await this.signer.getAddress(),i=Math.floor(Date.now()/1e3),a=Math.ceil(this.keypairTTL/86400),o={publicKey:n.publicKey,startTimestamp:i,durationDays:a,delegatorAddress:e},s=await this.#a(o,t);return{publicKey:n.publicKey,privateKey:n.privateKey,signature:s,contractAddresses:t,startTimestamp:i,durationDays:a,delegatorAddress:e,delegateAddress:r}},errorContext:`Failed to create delegated decrypt credentials`})}assertEncrypted(e){_e(e)}async signForContracts(e,t){return this.#a(e,t)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#i(t){let n=await this.signer.getAddress(),r=await this.signer.getChainId(),i=`${v(n)}:${v(t)}:${r}`;if(this.#t&&this.#n===i)return this.#t;let a=await e.computeStoreKey(n,t,r);return this.#n=i,this.#t=a,a}async#a(e,t){let n=await this.#e.createDelegatedUserDecryptEIP712(e.publicKey,t,e.delegatorAddress,e.startTimestamp,e.durationDays);return this.signer.signTypedData({domain:{...n.domain,chainId:Number(n.domain.chainId)},types:n.types,message:{...n.message,startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays)}})}};const Ce=`zama:balances`;function we(e,t,n){return`zama:balance:${v(e)}:${v(t)}:${n.toLowerCase()}`}async function z({storage:e,tokenAddress:t,owner:n,handle:r}){try{let i=await e.get(we(t,n,r));return i===null?null:BigInt(i)}catch(e){return console.warn(`[zama-sdk] Balance cache read failed:`,e),null}}async function B(e){let{storage:t,tokenAddress:n,owner:r,handle:i,value:a}=e,o=we(n,r,i);try{await t.set(o,a.toString()),await Te(t,o)}catch{}}const V=new WeakMap;async function Te(e,t){let n=(V.get(e)??Promise.resolve()).then(async()=>{let n=await e.get(Ce),r=n?JSON.parse(n):[];r.includes(t)||(r.push(t),await e.set(Ce,JSON.stringify(r)))});return V.set(e,n.catch(()=>{})),n}async function Ee(e,t=1/0){if(Number.isFinite(t)&&t<=0)throw Error(`maxConcurrency must be a positive number`);if(!Number.isFinite(t)||t>=e.length)return Promise.all(e.map(e=>e()));let n=Array.from({length:e.length}),r=0;async function i(){for(;r<e.length;){let t=r++;e[t]&&(n[t]=await e[t]())}}return await Promise.all(Array.from({length:t},i)),n}const De=`0x0000000000000000000000000000000000000000000000000000000000000000`;var Oe=class e{credentials;delegatedCredentials;relayer;signer;address;storage;#e;constructor(e){let t={relayer:e.relayer,signer:e.signer,storage:e.storage,sessionStorage:e.sessionStorage,keypairTTL:e.keypairTTL??86400,sessionTTL:e.sessionTTL??2592e3,onEvent:e.onEvent};this.credentials=e.credentials??new xe(t),this.delegatedCredentials=e.delegatedCredentials??new Se(t),this.relayer=e.relayer,this.signer=e.signer,this.address=v(e.address),this.storage=e.storage,this.#e=e.onEvent}emit(e){this.#e?.({...e,tokenAddress:this.address,timestamp:Date.now()})}async balanceOf(e){let t=e?v(e):await this.signer.getAddress(),n=await this.readConfidentialBalanceOf(t);return this.decryptBalance(n,t)}async confidentialBalanceOf(e){let t=e?v(e):await this.signer.getAddress();return this.readConfidentialBalanceOf(t)}async isConfidential(){return await this.signer.readContract(m(this.address,p))}async isWrapper(){return await this.signer.readContract(m(this.address,h))}static async batchDecryptBalances(t,n){if(t.length===0)return new Map;let{handles:r,owner:i,onError:a,maxConcurrency:o}=n??{},s=t[0],c=e.assertSameRelayer(t),l=i??await s.signer.getAddress();return e.#t({tokens:t,handles:r,ownerAddress:l,onError:a,maxConcurrency:o,obtainCreds:e=>s.credentials.allow(...e),decrypt:(e,t,n)=>c.userDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,signerAddress:l,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch decryption`})}static async batchDecryptBalancesAs(t,n){if(t.length===0)return new Map;let{delegatorAddress:r,handles:i,owner:a,onError:o,maxConcurrency:s}=n,c=a??r,l=t[0];return e.assertSameRelayer(t),e.#t({tokens:t,handles:i,ownerAddress:c,onError:o,maxConcurrency:s,preFlightCheck:()=>l.#n(r),obtainCreds:e=>l.delegatedCredentials.allow(r,...e),decrypt:(e,t,n)=>l.relayer.delegatedUserDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch delegated decryption`})}static async#t(e){let{tokens:t,handles:n,ownerAddress:r,onError:o,maxConcurrency:s,obtainCreds:c,decrypt:l,errorPrefix:u}=e,d=t[0],f=n??await Promise.all(t.map(e=>e.readConfidentialBalanceOf(r)));if(t.length!==f.length)throw new i(`tokens.length (${t.length}) must equal handles.length (${f.length})`);let p=d.storage,m=new Map,h=[],g=await Promise.all(t.map((e,t)=>{let n=f[t];return e.isZeroHandle(n)?0n:z({storage:p,tokenAddress:e.address,owner:r,handle:n})}));for(let e=0;e<t.length;e++){let n=t[e],r=f[e],i=g[e];if(i!=null){m.set(n.address,i);continue}h.push({token:n,handle:r})}if(h.length===0)return m;e.preFlightCheck&&await e.preFlightCheck();let _=await c(h.map(e=>e.token.address)),v=[],y=[];for(let{token:e,handle:t}of h)y.push(()=>l(_,t,e.address).then(async n=>{let a=n[t];if(a===void 0)throw new i(`${u} returned no value for handle ${t} on token ${e.address}`);m.set(e.address,a);try{await B({storage:p,tokenAddress:e.address,owner:r,handle:t,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}}).catch(t=>{let n=a(t);if(o)try{m.set(e.address,o(n,e.address))}catch(t){v.push({address:e.address,error:a(t)})}else v.push({address:e.address,error:n})}));if(await Ee(y,s),v.length>0){let e=v.map(e=>`${e.address}: ${e.error.message}`).join(`; `);throw new i(`${u} failed for ${v.length} token(s): ${e}`)}return m}async underlyingToken(){return this.signer.readContract(g(this.address))}async allowance(e,t){let n=v(e),r=await this.signer.readContract(g(n)),i=t?v(t):await this.signer.getAddress();return this.signer.readContract(D(r,i,n))}async name(){return this.signer.readContract(ae(this.address))}async symbol(){return this.signer.readContract(oe(this.address))}async decimals(){return this.signer.readContract(E(this.address))}async allow(){await this.credentials.allow(this.address)}async isAllowed(){return this.credentials.isAllowed()}async revoke(...e){await this.credentials.revoke(...e)}static async allow(...e){if(e.length===0)return;let t=e.map(e=>e.address);await e[0].credentials.allow(...t)}async getAclAddress(){return this.relayer.getAclAddress()}async isDelegated(e){let t=await this.getDelegationExpiry(e);return t===0n?!1:t===j?!0:t>await this.signer.getBlockTimestamp()}async getDelegationExpiry({delegatorAddress:e,delegateAddress:t}){let n=await this.getAclAddress();return this.signer.readContract(A(n,v(e),v(t),this.address))}async#n(e){let t=await this.signer.getAddress(),n=await this.getDelegationExpiry({delegatorAddress:e,delegateAddress:t});if(n===0n)throw new C(`No active delegation from ${e} to ${t} for ${this.address}`);if(n!==j&&n<=await this.signer.getBlockTimestamp())throw new w(`Delegation from ${e} to ${t} for ${this.address} has expired`)}async readConfidentialBalanceOf(e){return await this.signer.readContract(f(this.address,e))}isZeroHandle(e){return e===`0x0000000000000000000000000000000000000000000000000000000000000000`||e===`0x`}async decryptBalanceAs({delegatorAddress:e,owner:t}){let n=v(e),r=t?v(t):n,o=await this.readConfidentialBalanceOf(r);if(this.isZeroHandle(o))return 0n;let s=await z({storage:this.storage,tokenAddress:this.address,owner:r,handle:o});if(s!==null)return s;await this.#n(n);let c=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.delegatedCredentials.allow(n,this.address),t=await this.relayer.delegatedUserDecrypt({handles:[o],contractAddress:this.address,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-c});let a=t[o];if(a===void 0)throw new i(`Delegated decryption returned no value for handle ${o}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:r,handle:o,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return a}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-c}),H(e,`Failed to decrypt delegated balance`,!0)}}async decryptBalance(e,t){if(this.isZeroHandle(e))return 0n;let n=t??await this.signer.getAddress(),r=await z({storage:this.storage,tokenAddress:this.address,owner:n,handle:e});if(r!==null)return r;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let t=await this.relayer.userDecrypt({handles:[e],contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:n,startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});let r=t[e];if(r===void 0)throw new i(`Decryption returned no value for handle ${e}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:n,handle:e,value:r})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return r}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt balance`)}}async decryptHandles(e,t){let n=new Map,r=[];for(let t of e)this.isZeroHandle(t)?n.set(t,0n):r.push(t);if(r.length===0)return n;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.relayer.userDecrypt({handles:r,contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:t??await this.signer.getAddress(),startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});for(let t of r){let r=e[t];if(r===void 0)throw new i(`Decryption returned no value for handle ${t}`);n.set(t,r)}}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt handles`)}return n}static assertSameRelayer(e){let t=e[0].relayer;for(let n=1;n<e.length;n++)if(e[n].relayer!==t)throw new r(`All tokens in a batch operation must share the same relayer instance`);return t}};function H(e,n,r=!1){if(e instanceof i||e instanceof S||e instanceof t||e instanceof T||e instanceof b||e instanceof x)return e;let a=typeof e==`object`&&e&&`statusCode`in e&&typeof e.statusCode==`number`?e.statusCode:void 0;return a===400?new S(e instanceof Error?e.message:`No ciphertext for this account`,{cause:e}):r&&a===500?new T(`Delegated decryption failed with a server error. This is most commonly caused by the delegation not having propagated to the gateway yet — after granting delegation, allow 1–2 minutes for cross-chain synchronization before retrying. If the error persists, the gateway or relayer may be experiencing an unrelated issue.`,{cause:e}):a===void 0?new i(n,{cause:e}):new t(e instanceof Error?e.message:n,a,{cause:e})}const U={ConfidentialTransfer:`0x67500e8d0ed826d2194f514dd0d8124f35648ab6e3fb5e6ed867134cffe661e9`,Wrapped:`0x1f7907f4d84043abe0fb7c74e8865ee5fe93fe4f691c54a7b8fa9d6fb17c7cba`,UnwrapRequested:`0x77d02d353c5629272875d11f1b34ec4c65d7430b075575b78cd2502034c469ee`,UnwrappedFinalized:`0xc64e7c81b18b674fc5b037d8a0041bfe3332d86c780a4688f404ee01fbabb152`,UnwrappedStarted:`0x3838891d4843c6d7f9f494570b6fd8843f4e3c3ddb817c1411760bd31b819806`};function W(e){return v(d(e.slice(-40)))}function G(e){return BigInt(e)}function ke(e){return e}function K(e,t){let n=2+t*64,r=e.slice(n,n+64);return r.length===64?r:r.padEnd(64,`0`)}function Ae(e,t){return v(d(K(e,t).slice(-40)))}function q(e,t){return BigInt(`0x`+K(e,t))}function J(e,t){return BigInt(`0x`+K(e,t))!==0n}function Y(e,t){return d(K(e,t))}function je(e){return e.topics[0]!==U.ConfidentialTransfer||e.topics.length<4?null:{eventName:`ConfidentialTransfer`,from:W(e.topics[1]),to:W(e.topics[2]),encryptedAmountHandle:ke(e.topics[3])}}function X(e){return e.topics[0]!==U.Wrapped||e.topics.length<3?null:{eventName:`Wrapped`,to:W(e.topics[1]),mintTxId:G(e.topics[2]),mintAmount:q(e.data,0),amountIn:q(e.data,1),feeAmount:q(e.data,2)}}function Z(e){return e.topics[0]!==U.UnwrapRequested||e.topics.length<2?null:{eventName:`UnwrapRequested`,receiver:W(e.topics[1]),encryptedAmount:Y(e.data,0)}}function Me(e){return e.topics[0]!==U.UnwrappedFinalized||e.topics.length<3?null:{eventName:`UnwrappedFinalized`,burntAmountHandle:ke(e.topics[1]),nextTxId:G(e.topics[2]),finalizeSuccess:J(e.data,0),feeTransferSuccess:J(e.data,1),burnAmount:q(e.data,2),unwrapAmount:q(e.data,3),feeAmount:q(e.data,4)}}function Ne(e){return e.topics[0]!==U.UnwrappedStarted||e.topics.length<4?null:{eventName:`UnwrappedStarted`,requestId:G(e.topics[1]),txId:G(e.topics[2]),to:W(e.topics[3]),returnVal:J(e.data,0),refund:Ae(e.data,1),requestedAmount:Y(e.data,2),burnAmount:Y(e.data,3)}}function Q(e){return je(e)??X(e)??Z(e)??Me(e)??Ne(e)}function Pe(e){let t=[];for(let n of e){let e=Q(n);e&&t.push(e)}return t}function Fe(e){for(let t of e){let e=Z(t);if(e)return e}return null}function Ie(e){for(let t of e){let e=X(t);if(e)return e}return null}const Le=[U.ConfidentialTransfer,U.Wrapped,U.UnwrapRequested,U.UnwrappedFinalized,U.UnwrappedStarted];function Re(e,t){return e.toLowerCase()===t.toLowerCase()}function $(e,t,n){let r=t!==void 0&&Re(e,t),i=n!==void 0&&Re(e,n);return r&&i?`self`:r?`outgoing`:`incoming`}function ze(e,t,n){switch(e.eventName){case`ConfidentialTransfer`:return Be(e,t,n);case`Wrapped`:return Ve(e,t,n);case`UnwrapRequested`:return He(e,t,n);case`UnwrappedStarted`:return Ue(e,t,n);case`UnwrappedFinalized`:return We(e,n)}}function Be(e,t,n){return{type:`transfer`,direction:$(t,e.from,e.to),amount:{type:`encrypted`,handle:e.encryptedAmountHandle},from:e.from,to:e.to,metadata:n,rawEvent:e}}function Ve(e,t,n){return{type:`shield`,direction:$(t,void 0,e.to),amount:{type:`clear`,value:e.amountIn},to:e.to,fee:e.feeAmount,metadata:n,rawEvent:e}}function He(e,t,n){return{type:`unshield_requested`,direction:$(t,void 0,e.receiver),amount:{type:`encrypted`,handle:e.encryptedAmount},to:e.receiver,metadata:n,rawEvent:e}}function Ue(e,t,n){return{type:`unshield_started`,direction:$(t,void 0,e.to),amount:{type:`encrypted`,handle:e.requestedAmount},to:e.to,success:e.returnVal,metadata:n,rawEvent:e}}function We(e,t){return{type:`unshield_finalized`,direction:`incoming`,amount:{type:`clear`,value:e.unwrapAmount},fee:e.feeAmount,success:e.finalizeSuccess,metadata:t,rawEvent:e}}function Ge(e,t){let n=[];for(let r of e){let e=Q(r);if(!e)continue;let i={transactionHash:r.transactionHash,blockNumber:r.blockNumber,logIndex:r.logIndex};n.push(ze(e,t,i))}return n}function Ke(e){let t=new Set;for(let n of e)if(n.amount.type===`encrypted`&&n.amount.decryptedValue===void 0){let e=n.amount.handle;e!==`0x`&&e!==`0x0000000000000000000000000000000000000000000000000000000000000000`&&t.add(e)}return[...t]}function qe(e,t){return e.map(e=>{if(e.amount.type!==`encrypted`)return e;let n=t.get(e.amount.handle);return n===void 0?e:{...e,amount:{type:`encrypted`,handle:e.amount.handle,decryptedValue:n}}})}function Je(e){return[...e].toSorted((e,t)=>{let n=e.metadata.blockNumber,r=t.metadata.blockNumber;if(n===void 0&&r===void 0)return 0;if(n===void 0)return-1;if(r===void 0)return 1;let i=typeof n==`bigint`?n:BigInt(n),a=typeof r==`bigint`?r:BigInt(r);if(a>i)return 1;if(a<i)return-1;let o=e.metadata.logIndex??0;return(t.metadata.logIndex??0)-o})}export{le as A,re as B,A as C,de as D,pe as E,oe as F,b as G,te as H,ie as I,w as L,E as M,se as N,ue as O,ae as P,C as R,me as S,fe as T,S as U,ne as V,x as W,De as _,Le as a,M as b,Q as c,Me as d,Ne as f,Oe as g,Ie as h,Je as i,ce as j,D as k,Pe as l,Fe as m,Ke as n,U as o,X as p,Ge as r,je as s,qe as t,Z as u,Se as v,he as w,j as x,xe as y,T as z};
|
|
2
|
-
//# sourceMappingURL=activity-
|
|
1
|
+
import{i as e,n as t,r as n,t as r}from"./relayer-DxMV-NQT.js";import{t as i}from"./encryption-CKqGKzHs.js";import{r as a,t as o}from"./memory-storage-DNvc-6oK.js";import{a as s,i as c,n as l,t as u}from"./assertions-CASetdUe.js";import{t as d}from"./hex-CVGYqDKx.js";import{_ as f,c as p,f as m,l as h,m as g}from"./wrappers-registry-DqPr_JG2.js";import{erc20Abi as _,getAddress as v,isAddress as y}from"viem";var b=class extends n{constructor(t,n){super(e.SigningRejected,t,n),this.name=`SigningRejectedError`}},x=class extends n{constructor(t,n){super(e.SigningFailed,t,n),this.name=`SigningFailedError`}};function ee(e,t){let n=typeof e==`object`&&!!e&&`code`in e&&e.code===4001,r=e instanceof Error?e.message:String(e),i=r.toLowerCase().includes(`user rejected`)||r.toLowerCase().includes(`user denied`),a=`${t}: ${r}`;throw n||i?new b(a,{cause:e}):new x(a,{cause:e})}var te=class extends n{constructor(t,n){super(e.KeypairExpired,t,n),this.name=`KeypairExpiredError`}},ne=class extends n{constructor(t,n){super(e.InvalidKeypair,t,n),this.name=`InvalidKeypairError`}},S=class extends n{constructor(t,n){super(e.NoCiphertext,t,n),this.name=`NoCiphertextError`}},re=class extends n{constructor(t,n){super(e.DelegationSelfNotAllowed,t,n),this.name=`DelegationSelfNotAllowedError`}},ie=class extends n{constructor(t,n){super(e.DelegationCooldown,t,n),this.name=`DelegationCooldownError`}},C=class extends n{constructor(t,n){super(e.DelegationNotFound,t,n),this.name=`DelegationNotFoundError`}},w=class extends n{constructor(t,n){super(e.DelegationExpired,t,n),this.name=`DelegationExpiredError`}},T=class extends n{constructor(t,n){super(e.DelegationNotPropagated,t,n),this.name=`DelegationNotPropagatedError`}};function ae(e){return{address:e,abi:_,functionName:`name`,args:[]}}function oe(e){return{address:e,abi:_,functionName:`symbol`,args:[]}}function E(e){return{address:e,abi:_,functionName:`decimals`,args:[]}}function se(e){return{address:e,abi:_,functionName:`totalSupply`,args:[]}}function ce(e,t){return{address:e,abi:_,functionName:`balanceOf`,args:[t]}}function D(e,t,n){return{address:e,abi:_,functionName:`allowance`,args:[t,n]}}function le(e,t,n){return{address:e,abi:_,functionName:`approve`,args:[t,n]}}const O=[{inputs:[{internalType:`uint64`,name:`wrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`unwrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`deployFee_`,type:`uint64`},{internalType:`uint64`,name:`batchTransferFee_`,type:`uint64`},{internalType:`address`,name:`feeRecipient_`,type:`address`}],stateMutability:`nonpayable`,type:`constructor`},{inputs:[],name:`AccessControlBadConfirmation`,type:`error`},{inputs:[{internalType:`address`,name:`account`,type:`address`},{internalType:`bytes32`,name:`neededRole`,type:`bytes32`}],name:`AccessControlUnauthorizedAccount`,type:`error`},{inputs:[],name:`FeeExceedsMaximum`,type:`error`},{inputs:[],name:`ZeroAddressFeeRecipient`,type:`error`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldBatchTransferFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`BatchTransferFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldDeployFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`DeployFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`address`,name:`oldRecipient`,type:`address`},{indexed:!0,internalType:`address`,name:`newRecipient`,type:`address`}],name:`FeeRecipientUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`previousAdminRole`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`newAdminRole`,type:`bytes32`}],name:`RoleAdminChanged`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleGranted`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleRevoked`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`bool`,name:`active`,type:`bool`}],name:`SwapperFeeWaiverUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`UnwrapFeeBasisPointsUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`WrapFeeBasisPointsUpdated`,type:`event`},{inputs:[],name:`DEFAULT_ADMIN_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`FEE_MANAGER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`MAX_BASIS_POINTS`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`SWAPPER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`batchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`deployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`feeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getBatchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`address`,name:`deployer`,type:`address`}],name:`getDeployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getFeeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`}],name:`getRoleAdmin`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint64`,name:`amount`,type:`uint64`},{internalType:`address`,name:`unwrapFrom`,type:`address`},{internalType:`address`,name:`unwrapTo`,type:`address`}],name:`getUnwrapFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint256`,name:`amount`,type:`uint256`},{internalType:`address`,name:`wrapFrom`,type:`address`},{internalType:`address`,name:`wrapTo`,type:`address`}],name:`getWrapFee`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`grantRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`hasRole`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`protocolId`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`pure`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`callerConfirmation`,type:`address`}],name:`renounceRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`revokeRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`setBatchTransferFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`setDeployFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`recipient`,type:`address`}],name:`setFeeRecipient`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bool`,name:`active`,type:`bool`}],name:`setSwapperFeeWaiverActive`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setUnwrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setWrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes4`,name:`interfaceId`,type:`bytes4`}],name:`supportsInterface`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`swapperFeeWaiverActive`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`unwrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`wrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function ue(e,t,n,r){return{address:e,abi:O,functionName:`getWrapFee`,args:[t,n,r]}}function de(e,t,n,r){return{address:e,abi:O,functionName:`getUnwrapFee`,args:[t,n,r]}}function fe(e){return{address:e,abi:O,functionName:`getBatchTransferFee`,args:[]}}function pe(e){return{address:e,abi:O,functionName:`getFeeRecipient`,args:[]}}const k=[{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`},{internalType:`uint64`,name:`expirationDate`,type:`uint64`}],name:`delegateForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`revokeDelegationForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegator`,type:`address`},{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`getUserDecryptionDelegationExpirationDate`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function me(e,t,n,r){return{address:e,abi:k,functionName:`delegateForUserDecryption`,args:[t,n,r]}}function he(e,t,n){return{address:e,abi:k,functionName:`revokeDelegationForUserDecryption`,args:[t,n]}}function A(e,t,n,r){return{address:e,abi:k,functionName:`getUserDecryptionDelegationExpirationDate`,args:[t,n,r]}}const j=2n**64n-1n,M={CredentialsLoading:`credentials:loading`,CredentialsCached:`credentials:cached`,CredentialsExpired:`credentials:expired`,CredentialsCreating:`credentials:creating`,CredentialsCreated:`credentials:created`,CredentialsRevoked:`credentials:revoked`,CredentialsPersistFailed:`credentials:persist_failed`,CredentialsAllowed:`credentials:allowed`,CredentialsCorrupted:`credentials:corrupted`,SessionExpired:`session:expired`,EncryptStart:`encrypt:start`,EncryptEnd:`encrypt:end`,EncryptError:`encrypt:error`,DecryptStart:`decrypt:start`,DecryptEnd:`decrypt:end`,DecryptError:`decrypt:error`,TransactionError:`transaction:error`,ShieldSubmitted:`shield:submitted`,TransferSubmitted:`transfer:submitted`,TransferFromSubmitted:`transferFrom:submitted`,ApproveSubmitted:`approve:submitted`,ApproveUnderlyingSubmitted:`approveUnderlying:submitted`,UnwrapSubmitted:`unwrap:submitted`,FinalizeUnwrapSubmitted:`finalizeUnwrap:submitted`,DelegationSubmitted:`delegation:submitted`,RevokeDelegationSubmitted:`revokeDelegation:submitted`,UnshieldPhase1Submitted:`unshield:phase1_submitted`,UnshieldPhase2Started:`unshield:phase2_started`,UnshieldPhase2Submitted:`unshield:phase2_submitted`};var ge=class{#e=null;#t=null;clearCache(){this.#e=null,this.#t=null}async encrypt(e,t,n){let r=await this.#n(t,n),i=crypto.getRandomValues(new Uint8Array(12)),a=new TextEncoder,o=await crypto.subtle.encrypt({name:`AES-GCM`,iv:i},r,a.encode(e));return{iv:btoa(String.fromCharCode(...i)),ciphertext:btoa(String.fromCharCode(...new Uint8Array(o)))}}async decrypt(e,t,n){let r=await this.#n(t,n),i=Uint8Array.from(atob(e.iv),e=>e.charCodeAt(0)),a=Uint8Array.from(atob(e.ciphertext),e=>e.charCodeAt(0)),o=await crypto.subtle.decrypt({name:`AES-GCM`,iv:i},r,a);return d(new TextDecoder().decode(o))}async#n(e,t){let n=`${e}:${t}`;if(this.#e&&this.#t===n)return this.#e;let r=new TextEncoder,i=await crypto.subtle.importKey(`raw`,r.encode(e),`PBKDF2`,!1,[`deriveKey`]),a=await crypto.subtle.deriveKey({name:`PBKDF2`,salt:r.encode(t),iterations:6e5,hash:`SHA-256`},i,{name:`AES-GCM`,length:256},!1,[`encrypt`,`decrypt`]);return this.#t=n,this.#e=a,a}};function N(e){c(e,`Stored credentials`),s(e.publicKey,`credentials.publicKey`),u(e.contractAddresses,`credentials.contractAddresses`);for(let t of e.contractAddresses)l(typeof t==`string`&&y(t,{strict:!1}),`Expected each contractAddress to be a valid hex address`);c(e.encryptedPrivateKey,`credentials.encryptedPrivateKey`),s(e.encryptedPrivateKey.iv,`encryptedPrivateKey.iv`),s(e.encryptedPrivateKey.ciphertext,`encryptedPrivateKey.ciphertext`),l(typeof e.startTimestamp==`number`,`Expected credentials.startTimestamp to be a number`),l(typeof e.durationDays==`number`,`Expected credentials.durationDays to be a number`)}function _e(e){N(e);let t=e;l(typeof t.delegatorAddress==`string`&&y(t.delegatorAddress,{strict:!1}),`Expected credentials.delegatorAddress to be a valid address`),l(typeof t.delegateAddress==`string`&&y(t.delegateAddress,{strict:!1}),`Expected credentials.delegateAddress to be a valid address`),l(typeof t.startTimestamp==`number`,`Expected startTimestamp to be a number`),l(typeof t.durationDays==`number`,`Expected durationDays to be a number`)}function P(e){return Math.floor(Date.now()/1e3)<e.startTimestamp+e.durationDays*86400}function F(e,t){let n=new Set(t.map(e=>v(e))),r=new Set(e.map(e=>v(e)));return n.isSubsetOf(r)}function I(e,t){return P(e)?F(e.contractAddresses,t):!1}function L(e){return[...new Set(e.map(e=>v(e)))].toSorted()}async function R(...e){let t=await crypto.subtle.digest(`SHA-256`,new TextEncoder().encode(e.map(String).join(`:`)));return Array.from(new Uint8Array(t)).map(e=>e.toString(16).padStart(2,`0`)).join(``).slice(0,32)}var ve=class{#e;constructor(e){this.#e=e}#t(e){c(e,`Session entry`),s(e.signature,`session.signature`),l(typeof e.createdAt==`number`,`Expected session.createdAt to be a number`),l(typeof e.ttl==`number`||e.ttl===`infinite`,`Expected session.ttl to be a number or "infinite"`)}async get(e){let t=await this.#e.get(e);return t===null?null:(this.#t(t),t)}async set(e){let t={signature:e.signature,createdAt:Math.floor(Date.now()/1e3),ttl:e.ttl};await this.#e.set(e.key,t)}async delete(e){await this.#e.delete(e)}isExpired(e){return e.ttl===`infinite`?!1:e.ttl===0?!0:Math.floor(Date.now()/1e3)-e.createdAt>=e.ttl}},ye=class{signer;storage;sessionSignatures;crypto;keypairTTL;sessionTTL;#e;#t=null;#n=null;#r=null;constructor(e){if(this.signer=e.signer,this.storage=e.storage,this.sessionSignatures=new ve(e.sessionStorage),this.crypto=new ge,this.keypairTTL=e.keypairTTL??86400,this.sessionTTL=e.sessionTTL??2592e3,this.#e=e.onEvent??(()=>{}),typeof this.keypairTTL==`number`&&this.keypairTTL<0)throw Error(`keypairTTL must be >= 0`);if(typeof this.sessionTTL==`number`&&this.sessionTTL<0)throw Error(`sessionTTL must be >= 0`)}emit(e){this.#e({...e,timestamp:Date.now()})}async resolveCredentials({key:e,contracts:t,createKey:n,createFn:r}){this.emit({type:M.CredentialsLoading,contractAddresses:t});try{let n=await this.storage.get(e);if(n){this.assertEncrypted(n);let r=await this.sessionSignatures.get(e);if(r)if(this.sessionSignatures.isExpired(r))await this.sessionSignatures.delete(e),this.emit({type:M.SessionExpired,reason:`ttl`});else{let i=await this.decryptCredentials(n,r.signature);if(I(i,t))return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i;if(P(i))return this.#i({key:e,credentials:i,requiredContracts:t});this.emit({type:M.CredentialsExpired,contractAddresses:t})}if(P(n)){if(F(n.contractAddresses,t)){let r=await this.signForContracts(n,n.contractAddresses);await this.sessionSignatures.set({key:e,signature:r,ttl:this.sessionTTL});let i=await this.decryptCredentials(n,r);return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i}let r=await this.signForContracts(n,n.contractAddresses),i=await this.decryptCredentials(n,r);return this.#i({key:e,credentials:i,requiredContracts:t})}this.emit({type:M.CredentialsExpired,contractAddresses:t})}}catch(t){if(t instanceof b||t instanceof x)throw t;console.warn(`[zama-sdk] Credential resolution failed, recreating:`,t),this.emit({type:M.CredentialsCorrupted,error:a(t)}),await this.#o(e)}return(!this.#t||this.#n!==n)&&(this.#n=n,this.#t=r().then(e=>(this.emit({type:M.CredentialsAllowed,contractAddresses:t}),e)).finally(()=>{this.#t=null,this.#n=null})),this.#t}async checkExpired(e,t){try{let n=await this.storage.get(e);return n?(this.assertEncrypted(n),!I(n,t?[t]:[])):!1}catch(e){return console.warn(`[zama-sdk] isExpired check failed, treating as expired:`,e),!0}}async revokeSession(e,t){await this.sessionSignatures.delete(e),this.clearCaches(),this.emit({type:M.CredentialsRevoked,...t?{contractAddresses:t}:{}})}async checkAllowed(e){let t=await this.sessionSignatures.get(e);return t===null?!1:!this.sessionSignatures.isExpired(t)}async clearAll(e){await this.sessionSignatures.delete(e),this.clearCaches(),await this.#o(e)}clearCaches(){this.crypto.clearCache()}async createCredentials({key:e,contractAddresses:t,createFn:n,errorContext:r}){this.emit({type:M.CredentialsCreating,contractAddresses:t});try{let r=await n();return await this.persistCredentials(e,r),await this.sessionSignatures.set({key:e,signature:r.signature,ttl:this.sessionTTL}),this.emit({type:M.CredentialsCreated,contractAddresses:t}),r}catch(e){ee(e,r)}}async#i({key:e,credentials:t,requiredContracts:n}){if(this.#r){let e=await this.#r;if(F(e.contractAddresses,n))return this.emit({type:M.CredentialsAllowed,contractAddresses:n}),e;t=e}let r=this.#a({key:e,credentials:t,requiredContracts:n});this.#r=r;try{return await r}finally{this.#r===r&&(this.#r=null)}}async#a({key:e,credentials:t,requiredContracts:n}){let r=L([...t.contractAddresses,...n]),i=await this.signForContracts(t,r),a={...t,contractAddresses:r,signature:i};return await this.persistCredentials(e,a),await this.sessionSignatures.set({key:e,signature:i,ttl:this.sessionTTL}),this.emit({type:M.CredentialsAllowed,contractAddresses:n}),a}async persistCredentials(e,t){try{let n=await this.encryptCredentials(t);await this.storage.set(e,n)}catch(e){console.warn(`[zama-sdk] Failed to encrypt credentials for persistence:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}async#o(e){try{await this.storage.delete(e)}catch(e){console.warn(`[zama-sdk] Failed to delete credentials:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}};function be(e){if(typeof e!=`object`||!e)return!1;let t=Reflect.get(e,`runtime`);return typeof t!=`object`||!t?!1:typeof Reflect.get(t,`id`)==`string`}var xe=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t){return R(v(e),t)}constructor(e){super(e),this.#e=e.relayer,be(typeof globalThis<`u`?Reflect.get(globalThis,`chrome`):void 0)&&e.sessionStorage instanceof o&&console.warn(`[zama-sdk] Detected Chrome extension context with in-memory session storage. Session signatures will be lost on service worker restart and won't be shared across contexts. Consider using chromeSessionStorage instead. `)}async allow(...e){let t=L(e),n=await this.#r();return this.resolveCredentials({key:n,contracts:t,createKey:t.join(`,`),createFn:()=>this.create(t)})}async isExpired(e){return this.checkExpired(await this.#r(),e)}async revoke(...e){await this.revokeSession(await this.#r(),e.length>0?e:void 0)}async revokeByKey(e){await this.revokeSession(e)}async isAllowed(){return this.checkAllowed(await this.#r())}async clear(){await this.clearAll(await this.#r())}async create(e){let t=L(e),n=await this.#r();return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let e=await this.#e.generateKeypair(),n=Math.floor(Date.now()/1e3),r=Math.ceil(this.keypairTTL/86400),i=await this.#e.createEIP712(e.publicKey,t,n,r),a=await this.signer.signTypedData(i);return{publicKey:e.publicKey,privateKey:e.privateKey,signature:a,contractAddresses:t,startTimestamp:n,durationDays:r}},errorContext:`Failed to create decrypt credentials`})}assertEncrypted(e){N(e)}async signForContracts(e,t){let n=await this.#e.createEIP712(e.publicKey,t,e.startTimestamp,e.durationDays);return this.signer.signTypedData(n)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#r(){let t=await this.signer.getAddress(),n=await this.signer.getChainId(),r=`${v(t)}:${n}`;if(this.#t&&this.#n===r)return this.#t;let i=await e.computeStoreKey(t,n);return this.#n=r,this.#t=i,i}},Se=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t,n){return R(v(e),v(t),n)}constructor(e){super(e),this.#e=e.relayer}async allow(e,...t){let n=v(e),r=L(t),i=await this.#i(n);return this.resolveCredentials({key:i,contracts:r,createKey:`${n}:${r.join(`,`)}`,createFn:()=>this.#r(n,r)})}async isExpired(e,t){return this.checkExpired(await this.#i(v(e)),t)}async revoke(e){await this.revokeSession(await this.#i(v(e)))}async isAllowed(e){return this.checkAllowed(await this.#i(v(e)))}async clear(e){await this.clearAll(await this.#i(v(e)))}async#r(e,t){let n=await this.#i(e);return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let n=await this.#e.generateKeypair(),r=await this.signer.getAddress(),i=Math.floor(Date.now()/1e3),a=Math.ceil(this.keypairTTL/86400),o={publicKey:n.publicKey,startTimestamp:i,durationDays:a,delegatorAddress:e},s=await this.#a(o,t);return{publicKey:n.publicKey,privateKey:n.privateKey,signature:s,contractAddresses:t,startTimestamp:i,durationDays:a,delegatorAddress:e,delegateAddress:r}},errorContext:`Failed to create delegated decrypt credentials`})}assertEncrypted(e){_e(e)}async signForContracts(e,t){return this.#a(e,t)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#i(t){let n=await this.signer.getAddress(),r=await this.signer.getChainId(),i=`${v(n)}:${v(t)}:${r}`;if(this.#t&&this.#n===i)return this.#t;let a=await e.computeStoreKey(n,t,r);return this.#n=i,this.#t=a,a}async#a(e,t){let n=await this.#e.createDelegatedUserDecryptEIP712(e.publicKey,t,e.delegatorAddress,e.startTimestamp,e.durationDays);return this.signer.signTypedData({domain:{...n.domain,chainId:Number(n.domain.chainId)},types:n.types,message:{...n.message,startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays)}})}};const Ce=`zama:balances`;function we(e,t,n){return`zama:balance:${v(e)}:${v(t)}:${n.toLowerCase()}`}async function z({storage:e,tokenAddress:t,owner:n,handle:r}){try{let i=await e.get(we(t,n,r));return i===null?null:BigInt(i)}catch(e){return console.warn(`[zama-sdk] Balance cache read failed:`,e),null}}async function B(e){let{storage:t,tokenAddress:n,owner:r,handle:i,value:a}=e,o=we(n,r,i);try{await t.set(o,a.toString()),await Te(t,o)}catch{}}const V=new WeakMap;async function Te(e,t){let n=(V.get(e)??Promise.resolve()).then(async()=>{let n=await e.get(Ce),r=n?JSON.parse(n):[];r.includes(t)||(r.push(t),await e.set(Ce,JSON.stringify(r)))});return V.set(e,n.catch(()=>{})),n}async function Ee(e,t=1/0){if(Number.isFinite(t)&&t<=0)throw Error(`maxConcurrency must be a positive number`);if(!Number.isFinite(t)||t>=e.length)return Promise.all(e.map(e=>e()));let n=Array.from({length:e.length}),r=0;async function i(){for(;r<e.length;){let t=r++;e[t]&&(n[t]=await e[t]())}}return await Promise.all(Array.from({length:t},i)),n}const De=`0x0000000000000000000000000000000000000000000000000000000000000000`;var Oe=class e{credentials;delegatedCredentials;relayer;signer;address;storage;#e;constructor(e){let t={relayer:e.relayer,signer:e.signer,storage:e.storage,sessionStorage:e.sessionStorage,keypairTTL:e.keypairTTL??86400,sessionTTL:e.sessionTTL??2592e3,onEvent:e.onEvent};this.credentials=e.credentials??new xe(t),this.delegatedCredentials=e.delegatedCredentials??new Se(t),this.relayer=e.relayer,this.signer=e.signer,this.address=v(e.address),this.storage=e.storage,this.#e=e.onEvent}emit(e){this.#e?.({...e,tokenAddress:this.address,timestamp:Date.now()})}async balanceOf(e){let t=e?v(e):await this.signer.getAddress(),n=await this.readConfidentialBalanceOf(t);return this.decryptBalance(n,t)}async confidentialBalanceOf(e){let t=e?v(e):await this.signer.getAddress();return this.readConfidentialBalanceOf(t)}async isConfidential(){return await this.signer.readContract(m(this.address,p))}async isWrapper(){return await this.signer.readContract(m(this.address,h))}static async batchDecryptBalances(t,n){if(t.length===0)return new Map;let{handles:r,owner:i,onError:a,maxConcurrency:o}=n??{},s=t[0],c=e.assertSameRelayer(t),l=i??await s.signer.getAddress();return e.#t({tokens:t,handles:r,ownerAddress:l,onError:a,maxConcurrency:o,obtainCreds:e=>s.credentials.allow(...e),decrypt:(e,t,n)=>c.userDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,signerAddress:l,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch decryption`})}static async batchDecryptBalancesAs(t,n){if(t.length===0)return new Map;let{delegatorAddress:r,handles:i,owner:a,onError:o,maxConcurrency:s}=n,c=a??r,l=t[0];return e.assertSameRelayer(t),e.#t({tokens:t,handles:i,ownerAddress:c,onError:o,maxConcurrency:s,preFlightCheck:()=>l.#n(r),obtainCreds:e=>l.delegatedCredentials.allow(r,...e),decrypt:(e,t,n)=>l.relayer.delegatedUserDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch delegated decryption`})}static async#t(e){let{tokens:t,handles:n,ownerAddress:r,onError:o,maxConcurrency:s,obtainCreds:c,decrypt:l,errorPrefix:u}=e,d=t[0],f=n??await Promise.all(t.map(e=>e.readConfidentialBalanceOf(r)));if(t.length!==f.length)throw new i(`tokens.length (${t.length}) must equal handles.length (${f.length})`);let p=d.storage,m=new Map,h=[],g=await Promise.all(t.map((e,t)=>{let n=f[t];return e.isZeroHandle(n)?0n:z({storage:p,tokenAddress:e.address,owner:r,handle:n})}));for(let e=0;e<t.length;e++){let n=t[e],r=f[e],i=g[e];if(i!=null){m.set(n.address,i);continue}h.push({token:n,handle:r})}if(h.length===0)return m;e.preFlightCheck&&await e.preFlightCheck();let _=await c(h.map(e=>e.token.address)),v=[],y=[];for(let{token:e,handle:t}of h)y.push(()=>l(_,t,e.address).then(async n=>{let a=n[t];if(a===void 0)throw new i(`${u} returned no value for handle ${t} on token ${e.address}`);m.set(e.address,a);try{await B({storage:p,tokenAddress:e.address,owner:r,handle:t,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}}).catch(t=>{let n=a(t);if(o)try{m.set(e.address,o(n,e.address))}catch(t){v.push({address:e.address,error:a(t)})}else v.push({address:e.address,error:n})}));if(await Ee(y,s),v.length>0){let e=v.map(e=>`${e.address}: ${e.error.message}`).join(`; `);throw new i(`${u} failed for ${v.length} token(s): ${e}`)}return m}async underlyingToken(){return this.signer.readContract(g(this.address))}async allowance(e,t){let n=v(e),r=await this.signer.readContract(g(n)),i=t?v(t):await this.signer.getAddress();return this.signer.readContract(D(r,i,n))}async name(){return this.signer.readContract(ae(this.address))}async symbol(){return this.signer.readContract(oe(this.address))}async decimals(){return this.signer.readContract(E(this.address))}async allow(){await this.credentials.allow(this.address)}async isAllowed(){return this.credentials.isAllowed()}async revoke(...e){await this.credentials.revoke(...e)}static async allow(...e){if(e.length===0)return;let t=e.map(e=>e.address);await e[0].credentials.allow(...t)}async getAclAddress(){return this.relayer.getAclAddress()}async isDelegated(e){let t=await this.getDelegationExpiry(e);return t===0n?!1:t===j?!0:t>await this.signer.getBlockTimestamp()}async getDelegationExpiry({delegatorAddress:e,delegateAddress:t}){let n=await this.getAclAddress();return this.signer.readContract(A(n,v(e),v(t),this.address))}async#n(e){let t=await this.signer.getAddress(),n=await this.getDelegationExpiry({delegatorAddress:e,delegateAddress:t});if(n===0n)throw new C(`No active delegation from ${e} to ${t} for ${this.address}`);if(n!==j&&n<=await this.signer.getBlockTimestamp())throw new w(`Delegation from ${e} to ${t} for ${this.address} has expired`)}async readConfidentialBalanceOf(e){return await this.signer.readContract(f(this.address,e))}isZeroHandle(e){return e===`0x0000000000000000000000000000000000000000000000000000000000000000`||e===`0x`}async decryptBalanceAs({delegatorAddress:e,owner:t}){let n=v(e),r=t?v(t):n,o=await this.readConfidentialBalanceOf(r);if(this.isZeroHandle(o))return 0n;let s=await z({storage:this.storage,tokenAddress:this.address,owner:r,handle:o});if(s!==null)return s;await this.#n(n);let c=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.delegatedCredentials.allow(n,this.address),t=await this.relayer.delegatedUserDecrypt({handles:[o],contractAddress:this.address,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-c});let a=t[o];if(a===void 0)throw new i(`Delegated decryption returned no value for handle ${o}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:r,handle:o,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return a}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-c}),H(e,`Failed to decrypt delegated balance`,!0)}}async decryptBalance(e,t){if(this.isZeroHandle(e))return 0n;let n=t??await this.signer.getAddress(),r=await z({storage:this.storage,tokenAddress:this.address,owner:n,handle:e});if(r!==null)return r;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let t=await this.relayer.userDecrypt({handles:[e],contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:n,startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});let r=t[e];if(r===void 0)throw new i(`Decryption returned no value for handle ${e}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:n,handle:e,value:r})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return r}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt balance`)}}async decryptHandles(e,t){let n=new Map,r=[];for(let t of e)this.isZeroHandle(t)?n.set(t,0n):r.push(t);if(r.length===0)return n;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.relayer.userDecrypt({handles:r,contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:t??await this.signer.getAddress(),startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});for(let t of r){let r=e[t];if(r===void 0)throw new i(`Decryption returned no value for handle ${t}`);n.set(t,r)}}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt handles`)}return n}static assertSameRelayer(e){let t=e[0].relayer;for(let n=1;n<e.length;n++)if(e[n].relayer!==t)throw new r(`All tokens in a batch operation must share the same relayer instance`);return t}};function H(e,n,r=!1){if(e instanceof i||e instanceof S||e instanceof t||e instanceof T||e instanceof b||e instanceof x)return e;let a=typeof e==`object`&&e&&`statusCode`in e&&typeof e.statusCode==`number`?e.statusCode:void 0;return a===400?new S(e instanceof Error?e.message:`No ciphertext for this account`,{cause:e}):r&&a===500?new T(`Delegated decryption failed with a server error. This is most commonly caused by the delegation not having propagated to the gateway yet — after granting delegation, allow 1–2 minutes for cross-chain synchronization before retrying. If the error persists, the gateway or relayer may be experiencing an unrelated issue.`,{cause:e}):a===void 0?new i(n,{cause:e}):new t(e instanceof Error?e.message:n,a,{cause:e})}const U={ConfidentialTransfer:`0x67500e8d0ed826d2194f514dd0d8124f35648ab6e3fb5e6ed867134cffe661e9`,Wrapped:`0x1f7907f4d84043abe0fb7c74e8865ee5fe93fe4f691c54a7b8fa9d6fb17c7cba`,UnwrapRequested:`0x77d02d353c5629272875d11f1b34ec4c65d7430b075575b78cd2502034c469ee`,UnwrappedFinalized:`0xc64e7c81b18b674fc5b037d8a0041bfe3332d86c780a4688f404ee01fbabb152`,UnwrappedStarted:`0x3838891d4843c6d7f9f494570b6fd8843f4e3c3ddb817c1411760bd31b819806`};function W(e){return v(d(e.slice(-40)))}function G(e){return BigInt(e)}function ke(e){return e}function K(e,t){let n=2+t*64,r=e.slice(n,n+64);return r.length===64?r:r.padEnd(64,`0`)}function Ae(e,t){return v(d(K(e,t).slice(-40)))}function q(e,t){return BigInt(`0x`+K(e,t))}function J(e,t){return BigInt(`0x`+K(e,t))!==0n}function Y(e,t){return d(K(e,t))}function je(e){return e.topics[0]!==U.ConfidentialTransfer||e.topics.length<4?null:{eventName:`ConfidentialTransfer`,from:W(e.topics[1]),to:W(e.topics[2]),encryptedAmountHandle:ke(e.topics[3])}}function X(e){return e.topics[0]!==U.Wrapped||e.topics.length<3?null:{eventName:`Wrapped`,to:W(e.topics[1]),mintTxId:G(e.topics[2]),mintAmount:q(e.data,0),amountIn:q(e.data,1),feeAmount:q(e.data,2)}}function Z(e){return e.topics[0]!==U.UnwrapRequested||e.topics.length<2?null:{eventName:`UnwrapRequested`,receiver:W(e.topics[1]),encryptedAmount:Y(e.data,0)}}function Me(e){return e.topics[0]!==U.UnwrappedFinalized||e.topics.length<3?null:{eventName:`UnwrappedFinalized`,burntAmountHandle:ke(e.topics[1]),nextTxId:G(e.topics[2]),finalizeSuccess:J(e.data,0),feeTransferSuccess:J(e.data,1),burnAmount:q(e.data,2),unwrapAmount:q(e.data,3),feeAmount:q(e.data,4)}}function Ne(e){return e.topics[0]!==U.UnwrappedStarted||e.topics.length<4?null:{eventName:`UnwrappedStarted`,requestId:G(e.topics[1]),txId:G(e.topics[2]),to:W(e.topics[3]),returnVal:J(e.data,0),refund:Ae(e.data,1),requestedAmount:Y(e.data,2),burnAmount:Y(e.data,3)}}function Q(e){return je(e)??X(e)??Z(e)??Me(e)??Ne(e)}function Pe(e){let t=[];for(let n of e){let e=Q(n);e&&t.push(e)}return t}function Fe(e){for(let t of e){let e=Z(t);if(e)return e}return null}function Ie(e){for(let t of e){let e=X(t);if(e)return e}return null}const Le=[U.ConfidentialTransfer,U.Wrapped,U.UnwrapRequested,U.UnwrappedFinalized,U.UnwrappedStarted];function Re(e,t){return e.toLowerCase()===t.toLowerCase()}function $(e,t,n){let r=t!==void 0&&Re(e,t),i=n!==void 0&&Re(e,n);return r&&i?`self`:r?`outgoing`:`incoming`}function ze(e,t,n){switch(e.eventName){case`ConfidentialTransfer`:return Be(e,t,n);case`Wrapped`:return Ve(e,t,n);case`UnwrapRequested`:return He(e,t,n);case`UnwrappedStarted`:return Ue(e,t,n);case`UnwrappedFinalized`:return We(e,n)}}function Be(e,t,n){return{type:`transfer`,direction:$(t,e.from,e.to),amount:{type:`encrypted`,handle:e.encryptedAmountHandle},from:e.from,to:e.to,metadata:n,rawEvent:e}}function Ve(e,t,n){return{type:`shield`,direction:$(t,void 0,e.to),amount:{type:`clear`,value:e.amountIn},to:e.to,fee:e.feeAmount,metadata:n,rawEvent:e}}function He(e,t,n){return{type:`unshield_requested`,direction:$(t,void 0,e.receiver),amount:{type:`encrypted`,handle:e.encryptedAmount},to:e.receiver,metadata:n,rawEvent:e}}function Ue(e,t,n){return{type:`unshield_started`,direction:$(t,void 0,e.to),amount:{type:`encrypted`,handle:e.requestedAmount},to:e.to,success:e.returnVal,metadata:n,rawEvent:e}}function We(e,t){return{type:`unshield_finalized`,direction:`incoming`,amount:{type:`clear`,value:e.unwrapAmount},fee:e.feeAmount,success:e.finalizeSuccess,metadata:t,rawEvent:e}}function Ge(e,t){let n=[];for(let r of e){let e=Q(r);if(!e)continue;let i={transactionHash:r.transactionHash,blockNumber:r.blockNumber,logIndex:r.logIndex};n.push(ze(e,t,i))}return n}function Ke(e){let t=new Set;for(let n of e)if(n.amount.type===`encrypted`&&n.amount.decryptedValue===void 0){let e=n.amount.handle;e!==`0x`&&e!==`0x0000000000000000000000000000000000000000000000000000000000000000`&&t.add(e)}return[...t]}function qe(e,t){return e.map(e=>{if(e.amount.type!==`encrypted`)return e;let n=t.get(e.amount.handle);return n===void 0?e:{...e,amount:{type:`encrypted`,handle:e.amount.handle,decryptedValue:n}}})}function Je(e){return[...e].toSorted((e,t)=>{let n=e.metadata.blockNumber,r=t.metadata.blockNumber;if(n===void 0&&r===void 0)return 0;if(n===void 0)return-1;if(r===void 0)return 1;let i=typeof n==`bigint`?n:BigInt(n),a=typeof r==`bigint`?r:BigInt(r);if(a>i)return 1;if(a<i)return-1;let o=e.metadata.logIndex??0;return(t.metadata.logIndex??0)-o})}export{le as A,re as B,A as C,de as D,pe as E,oe as F,b as G,te as H,ie as I,w as L,E as M,se as N,ue as O,ae as P,C as R,me as S,fe as T,S as U,ne as V,x as W,De as _,Le as a,M as b,Q as c,Me as d,Ne as f,Oe as g,Ie as h,Je as i,ce as j,D as k,Pe as l,Fe as m,Ke as n,U as o,X as p,Ge as r,je as s,qe as t,Z as u,Se as v,he as w,j as x,xe as y,T as z};
|
|
2
|
+
//# sourceMappingURL=activity-Ctiuld0m.js.map
|