@zama-fhe/sdk 2.2.0-alpha.9 → 2.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,2 @@
1
+ function e(e,t){if(e==null)throw TypeError(`${t} must not be null or undefined`)}function t(e,t){if(typeof e!=`object`||!e||Array.isArray(e))throw TypeError(`${t} must be an object, got ${typeof e}`)}function n(e,t){if(typeof e!=`string`)throw TypeError(`${t} must be a string, got ${typeof e}`)}function r(e,t){if(!Array.isArray(e))throw TypeError(`${t} must be an array, got ${typeof e}`)}function i(e,t,r){n(e[t],r)}function a(e,t){if(!e)throw TypeError(t)}export{n as a,t as i,a as n,i as o,e as r,r as t};
2
+ //# sourceMappingURL=assertions-CASetdUe.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"assertions-CASetdUe.js","names":[],"sources":["../../src/utils/assertions.ts"],"sourcesContent":["export function assertNonNullable<T>(value: T, context: string): asserts value is NonNullable<T> {\n if (value === null || value === undefined) {\n throw new TypeError(`${context} must not be null or undefined`);\n }\n}\n\nexport function assertObject(\n value: unknown,\n context: string,\n): asserts value is Record<string, unknown> {\n if (typeof value !== \"object\" || value === null || Array.isArray(value)) {\n throw new TypeError(`${context} must be an object, got ${typeof value}`);\n }\n}\n\nexport function assertString(value: unknown, context: string): asserts value is string {\n if (typeof value !== \"string\") {\n throw new TypeError(`${context} must be a string, got ${typeof value}`);\n }\n}\n\nexport function assertArray(value: unknown, context: string): asserts value is unknown[] {\n if (!Array.isArray(value)) {\n throw new TypeError(`${context} must be an array, got ${typeof value}`);\n }\n}\n\n// eslint-disable-next-line @typescript-eslint/no-unsafe-function-type\nexport function assertFunction(value: unknown, context: string): asserts value is Function {\n if (typeof value !== \"function\") {\n throw new TypeError(`${context} must be a function, got ${typeof value}`);\n }\n}\n\n/** Assert that `obj[key]` is a string. Narrows `obj` to include `{ [key]: string }`. */\nexport function assertStringProp<\n K extends string,\n O extends Record<string, unknown> = Record<string, unknown>,\n>(obj: O, key: K, context: string): asserts obj is O & Record<K, string> {\n assertString(obj[key], context);\n}\n\n/** Assert that `obj[key]` is a function. Narrows `obj` to include `{ [key]: F }`. */\nexport function assertFunctionProp<\n K extends string,\n // eslint-disable-next-line @typescript-eslint/no-unsafe-function-type\n F extends Function,\n O extends Record<string, unknown> = Record<string, unknown>,\n>(obj: O, key: K, context: string): asserts obj is O & Record<K, F> {\n assertFunction(obj[key], context);\n}\n\nexport function assertCondition(condition: boolean, message: string): asserts condition {\n if (!condition) {\n throw new TypeError(message);\n }\n}\n"],"mappings":"AAAA,SAAgB,EAAqB,EAAU,EAAkD,CAC/F,GAAI,GAAU,KACZ,MAAU,UAAU,GAAG,EAAQ,gCAAgC,CAInE,SAAgB,EACd,EACA,EAC0C,CAC1C,GAAI,OAAO,GAAU,WAAY,GAAkB,MAAM,QAAQ,EAAM,CACrE,MAAU,UAAU,GAAG,EAAQ,0BAA0B,OAAO,IAAQ,CAI5E,SAAgB,EAAa,EAAgB,EAA0C,CACrF,GAAI,OAAO,GAAU,SACnB,MAAU,UAAU,GAAG,EAAQ,yBAAyB,OAAO,IAAQ,CAI3E,SAAgB,EAAY,EAAgB,EAA6C,CACvF,GAAI,CAAC,MAAM,QAAQ,EAAM,CACvB,MAAU,UAAU,GAAG,EAAQ,yBAAyB,OAAO,IAAQ,CAY3E,SAAgB,EAGd,EAAQ,EAAQ,EAAuD,CACvE,EAAa,EAAI,GAAM,EAAQ,CAajC,SAAgB,EAAgB,EAAoB,EAAoC,CACtF,GAAI,CAAC,EACH,MAAU,UAAU,EAAQ"}
@@ -1,2 +1,2 @@
1
- import{r as e}from"./memory-storage-DNvc-6oK.js";import{a as t,r as n}from"./assertions-BNzM20oj.js";const r=3e4;var i=class{#e=null;#t=new Map;#n=null;config;logger;constructor(e,t){this.config=e,this.logger=t}async initWorker(){return this.#e?this.#e:(this.#n||=this.#r().catch(e=>{throw this.#n=null,e}),this.#n)}async#r(){let e=this.createWorker();this.wireEvents(e);try{let{type:t,payload:n}=this.getInitPayload();await this.sendRequestTo(e,t,n,6e4),this.onWorkerReady?.(e),this.#e=e}catch(t){throw this.terminateWorker(e),t}return this.#e}terminate(){if(this.#e){for(let[e,t]of this.#t)clearTimeout(t.timeoutId),t.reject(Error(`Worker terminated`)),this.#t.delete(e);this.terminateWorker(this.#e),this.#e=null}this.#n=null}handleResponse(e){let t=this.#t.get(e.id);if(!t){this.logger?.warn(`[WorkerClient] Received response for unknown request`,{id:e.id});return}let n=Math.round(performance.now()-t.startTime);if(clearTimeout(t.timeoutId),this.#t.delete(e.id),e.success)this.logger?.debug(`[WorkerClient] ← ${t.type} OK`,{id:e.id,elapsed:n}),t.resolve(e.data);else{this.logger?.error(`[WorkerClient] ← ${t.type} FAILED`,{id:e.id,elapsed:n,error:e.error});let r=Error(e.error);`statusCode`in e&&typeof e.statusCode==`number`&&(r.statusCode=e.statusCode),t.reject(r)}}handleWorkerError(e){this.logger?.error(`[WorkerClient] Worker error`,{error:e});let t=this.#e;this.#e=null,this.#i(`Worker error: ${e}`),t&&this.terminateWorker(t)}handleWorkerMessageError(){this.logger?.error(`[WorkerClient] Message deserialization failed`);let e=this.#e;this.#e=null,this.#i(`Worker message deserialization failed`),e&&this.terminateWorker(e)}sendRequestTo(e,t,n,i=r){return new Promise((r,a)=>{let o=this.generateRequestId(),s=performance.now();this.logger?.debug(`[WorkerClient] → ${t}`,{id:o});let c=setTimeout(()=>{this.#t.delete(o);let e=Math.round(performance.now()-s);this.logger?.error(`[WorkerClient] ${t} timed out after ${i}ms`,{id:o,elapsed:e}),a(Error(`Request ${t} timed out after ${i}ms`))},i);this.#t.set(o,{resolve:r,reject:a,timeoutId:c,startTime:s,type:t});let l={id:o,type:t,payload:n};this.postMessage(e,l)})}async sendRequest(e,t,n=r){let i=await this.initWorker();return this.sendRequestTo(i,e,t,n)}async generateKeypair(){return this.sendRequest(`GENERATE_KEYPAIR`,{})}async createEIP712(e){return this.sendRequest(`CREATE_EIP712`,e)}async encrypt(e){return this.sendRequest(`ENCRYPT`,e)}async userDecrypt(e){return this.sendRequest(`USER_DECRYPT`,e)}async publicDecrypt(e){return this.sendRequest(`PUBLIC_DECRYPT`,{handles:e})}async createDelegatedUserDecryptEIP712(e){return this.sendRequest(`CREATE_DELEGATED_EIP712`,e)}async delegatedUserDecrypt(e){return this.sendRequest(`DELEGATED_USER_DECRYPT`,e)}async requestZKProofVerification(e){return this.sendRequest(`REQUEST_ZK_PROOF_VERIFICATION`,{zkProof:e})}async getPublicKey(){return this.sendRequest(`GET_PUBLIC_KEY`,{})}async getPublicParams(e){return this.sendRequest(`GET_PUBLIC_PARAMS`,{bits:e})}#i(e){for(let[t,n]of this.#t)clearTimeout(n.timeoutId),n.reject(Error(e)),this.#t.delete(t)}};const a=8192,o=300*1e3;function s(e){let t=[];for(let n=0;n<e.length;n+=a)t.push(String.fromCharCode(...e.subarray(n,n+a)));return btoa(t.join(``))}function c(e){let t;try{t=atob(e)}catch{throw Error(`Invalid base64 data (length: ${e.length})`)}if(t.length===0)throw Error(`Decoded artifact is empty`);let n=new Uint8Array(t.length);for(let e=0;e<t.length;e++)n[e]=t.charCodeAt(e);return n}function l(e){return`fhe:pubkey:${e}`}function u(e,t){return`fhe:params:${e}:${t}`}function d(e){return`fhe:params-index:${e}`}function f(e){n(e,`CachedPublicKey`),t(e,`publicKeyId`,`CachedPublicKey.publicKeyId`),t(e,`publicKey`,`CachedPublicKey.publicKey`)}function p(e){n(e,`CachedPublicParams`),t(e,`publicParamsId`,`CachedPublicParams.publicParamsId`),t(e,`publicParams`,`CachedPublicParams.publicParams`)}var m=class{#e;#t;#n;#r;#i;#a;#o=new Map;#s=null;#c=new Map;#l=null;#u=null;constructor(e){this.#e=e.storage,this.#t=e.chainId,this.#n=e.relayerUrl,this.#r=(e.ttl??86400)*1e3,this.#i=e.logger??console}async getPublicKey(e){if(this.#a!==void 0)return this.#a;if(this.#s)return this.#s;this.#s=this.#d(e);try{return await this.#s}finally{this.#s=null}}async#d(t){let n=l(this.#t);try{let e=await this.#e.get(n);if(e){f(e);let t={publicKeyId:e.publicKeyId,publicKey:c(e.publicKey)};return this.#a=t,t}}catch(t){await this.#g(n),this.#i.warn(`Failed to read public key from persistent storage, falling back to network fetch`,{chainId:this.#t,error:e(t).message})}let r=await t();if(r===null)return null;this.#a=r;try{let e={publicKeyId:r.publicKeyId,publicKey:s(r.publicKey),lastValidatedAt:Date.now()};await this.#e.set(n,e)}catch(t){this.#i.warn(`Failed to persist public key to storage`,{chainId:this.#t,error:e(t).message})}return r}async getPublicParams(e,t){let n=this.#o.get(e);if(n!==void 0)return n;let r=this.#c.get(e);if(r)return r;let i=this.#f(e,t);this.#c.set(e,i);try{return await i}finally{this.#c.delete(e)}}async#f(t,n){let r=u(this.#t,t);try{let e=await this.#e.get(r);if(e){p(e);let n={publicParamsId:e.publicParamsId,publicParams:c(e.publicParams)};return this.#o.set(t,n),n}}catch(n){await this.#g(r),this.#i.warn(`Failed to read public params from persistent storage, falling back to network fetch`,{chainId:this.#t,bits:t,error:e(n).message})}let i=await n();if(i===null)return null;this.#o.set(t,i);try{let n={publicParamsId:i.publicParamsId,publicParams:s(i.publicParams),lastValidatedAt:Date.now()};await this.#e.set(r,n);let a=d(this.#t),o=await this.#e.get(a).catch(t=>(this.#i.warn(`Failed to read params index from storage`,{chainId:this.#t,error:e(t).message}),null))??[];o.includes(t)||await this.#e.set(a,[...o,t])}catch(n){this.#i.warn(`Failed to persist public params to storage`,{chainId:this.#t,bits:t,error:e(n).message})}return i}async revalidateIfDue(){if(this.#l)return this.#l;this.#l=this.#p();try{return await this.#l}finally{this.#l=null}}async#p(){let t=Date.now();if(this.#u!==null&&t-this.#u<this.#r||!this.#n)return!1;let n=l(this.#t),r=null,i=[];try{let[a,s]=await Promise.all([this.#e.get(n),this.#h()]);if(a)try{f(a),r={...a,lastValidatedAt:a.lastValidatedAt??0}}catch(t){this.#i.warn(`Corrupt public key cache entry detected, deleting`,{chainId:this.#t,error:e(t).message}),await this.#g(n)}if(i=s,!r)return!1;if([r,...i.map(e=>e.data)].every(e=>t-e.lastValidatedAt<this.#r))return this.#u=t,!1;let c=await globalThis.fetch(`${this.#n}/keyurl`);if(!c.ok){let e=t-this.#r+o;return this.#i.warn(`Manifest fetch failed during revalidation, retrying in 5 min`,{status:c.status,relayerUrl:this.#n}),await this.#v(n,{...r,lastValidatedAt:e},i.map(t=>({...t,data:{...t.data,lastValidatedAt:e}}))),this.#u=e,!1}let l=await c.json();if(!l||typeof l!=`object`||!(`fhePublicKey`in l)||!l.fhePublicKey?.urls?.length||!(`crs`in l)||typeof l.crs!=`object`){this.#i.error(`Relayer manifest has unexpected shape — check relayer URL and API version`,{relayerUrl:this.#n,manifestKeys:l&&typeof l==`object`?Object.keys(l):[]});let e=t-this.#r+o;return await this.#v(n,{...r,lastValidatedAt:e},i.map(t=>({...t,data:{...t.data,lastValidatedAt:e}}))),this.#u=e,!1}let u=l,d=u.fhePublicKey.urls[0];if(r.artifactUrl&&d&&d!==r.artifactUrl)return await this.#_(n,i),this.#u=null,!0;let p={...r,lastValidatedAt:t};if(d){let e=await this.#m(d,r);if(!e.fresh)return await this.#_(n,i),this.#u=null,!0;p={...p,artifactUrl:d,etag:e.etag,lastModified:e.lastModified}}let m=[];for(let e of i){let r=u.crs[String(e.bits)]?.urls[0];if(e.data.artifactUrl&&r&&r!==e.data.artifactUrl)return await this.#_(n,i),this.#u=null,!0;let a={...e.data,lastValidatedAt:t};if(r){let t=await this.#m(r,e.data);if(!t.fresh)return await this.#_(n,i),this.#u=null,!0;a={...a,artifactUrl:r,etag:t.etag,lastModified:t.lastModified}}m.push({...e,data:a})}return await this.#v(n,p,m),this.#u=t,!1}catch(a){let s=e(a),c=a instanceof TypeError||a instanceof ReferenceError||a instanceof RangeError||a instanceof SyntaxError,l=c?`error`:`warn`;this.#i[l](c?`Unexpected error during revalidation (possible bug)`:`Revalidation failed, using cached artifacts (fail-open)`,{chainId:this.#t,relayerUrl:this.#n,error:s.message});let u=t-this.#r+o;try{r&&await this.#v(n,{...r,lastValidatedAt:u},i.map(e=>({...e,data:{...e.data,lastValidatedAt:u}})))}catch(t){this.#i.warn(`Failed to update validation timestamps after revalidation error`,{chainId:this.#t,error:e(t).message})}return this.#u=u,!1}}async#m(e,t){let n=!!(t.etag||t.lastModified),r={};t.etag&&(r[`If-None-Match`]=t.etag),t.lastModified&&(r[`If-Modified-Since`]=t.lastModified);let i=await globalThis.fetch(e,{method:`HEAD`,headers:r});if(i.status===405&&(i=await globalThis.fetch(e,{headers:r})),!i.ok&&i.status!==304)throw Error(`Artifact freshness check failed: HEAD ${e} returned ${i.status}`);let a=i.headers.get(`etag`)??void 0,o=i.headers.get(`last-modified`)??void 0;return i.status===304?{fresh:!0,etag:a??t.etag,lastModified:o??t.lastModified}:n?{fresh:!1,etag:a,lastModified:o}:{fresh:!0,etag:a,lastModified:o}}async#h(){let t=d(this.#t),n=await this.#e.get(t).catch(t=>(this.#i.warn(`Failed to read params index, CRS revalidation may be incomplete`,{chainId:this.#t,error:e(t).message}),null))??[],r=new Set([...this.#o.keys(),...n]),i=Array.from(r);return(await Promise.all(i.map(async t=>{let n=u(this.#t,t),r;try{r=await this.#e.get(n)}catch(n){return this.#i.warn(`Failed to read cached params entry during revalidation`,{chainId:this.#t,bits:t,error:e(n).message}),null}if(!r)return null;try{return p(r),{bits:t,key:n,data:{...r,lastValidatedAt:r.lastValidatedAt??0}}}catch(r){return this.#i.warn(`Corrupt params cache entry detected, deleting`,{chainId:this.#t,bits:t,error:e(r).message}),await this.#g(n),null}}))).filter(e=>e!==null)}async#g(t){await this.#e.delete(t).catch(n=>{this.#i.warn(`Failed to delete cache entry`,{chainId:this.#t,key:t,error:e(n).message})})}async#_(t,n){let r=d(this.#t);try{await Promise.all([this.#e.delete(t),this.#e.delete(r),...n.map(e=>this.#e.delete(e.key))])}catch(t){this.#i.warn(`Failed to clear stale artifacts from persistent storage`,{chainId:this.#t,error:e(t).message})}this.#a=void 0,this.#o.clear()}async#v(t,n,r){let i=[this.#e.set(t,n).catch(t=>{this.#i.warn(`Failed to update public key validation timestamp`,{chainId:this.#t,error:e(t).message})}),...r.map(t=>this.#e.set(t.key,t.data).catch(t=>{this.#i.warn(`Failed to update params validation timestamp`,{chainId:this.#t,error:e(t).message})}))];await Promise.all(i)}};export{i as n,m as t};
2
- //# sourceMappingURL=fhe-artifact-cache-vzh7Xn9G.js.map
1
+ import{r as e}from"./memory-storage-DNvc-6oK.js";import{i as t,o as n}from"./assertions-CASetdUe.js";const r=3e4;var i=class{#e=null;#t=new Map;#n=null;config;logger;constructor(e,t){this.config=e,this.logger=t}async initWorker(){return this.#e?this.#e:(this.#n||=this.#r().catch(e=>{throw this.#n=null,e}),this.#n)}async#r(){let e=this.createWorker();this.wireEvents(e);try{let{type:t,payload:n}=this.getInitPayload();await this.sendRequestTo(e,t,n,6e4),this.onWorkerReady?.(e),this.#e=e}catch(t){throw this.terminateWorker(e),t}return this.#e}terminate(){if(this.#e){for(let[e,t]of this.#t)clearTimeout(t.timeoutId),t.reject(Error(`Worker terminated`)),this.#t.delete(e);this.terminateWorker(this.#e),this.#e=null}this.#n=null}handleResponse(e){let t=this.#t.get(e.id);if(!t){this.logger?.warn(`[WorkerClient] Received response for unknown request`,{id:e.id});return}let n=Math.round(performance.now()-t.startTime);if(clearTimeout(t.timeoutId),this.#t.delete(e.id),e.success)this.logger?.debug(`[WorkerClient] ← ${t.type} OK`,{id:e.id,elapsed:n}),t.resolve(e.data);else{this.logger?.error(`[WorkerClient] ← ${t.type} FAILED`,{id:e.id,elapsed:n,error:e.error});let r=Error(e.error);`statusCode`in e&&typeof e.statusCode==`number`&&(r.statusCode=e.statusCode),t.reject(r)}}handleWorkerError(e){this.logger?.error(`[WorkerClient] Worker error`,{error:e});let t=this.#e;this.#e=null,this.#i(`Worker error: ${e}`),t&&this.terminateWorker(t)}handleWorkerMessageError(){this.logger?.error(`[WorkerClient] Message deserialization failed`);let e=this.#e;this.#e=null,this.#i(`Worker message deserialization failed`),e&&this.terminateWorker(e)}sendRequestTo(e,t,n,i=r){return new Promise((r,a)=>{let o=this.generateRequestId(),s=performance.now();this.logger?.debug(`[WorkerClient] → ${t}`,{id:o});let c=setTimeout(()=>{this.#t.delete(o);let e=Math.round(performance.now()-s);this.logger?.error(`[WorkerClient] ${t} timed out after ${i}ms`,{id:o,elapsed:e}),a(Error(`Request ${t} timed out after ${i}ms`))},i);this.#t.set(o,{resolve:r,reject:a,timeoutId:c,startTime:s,type:t});let l={id:o,type:t,payload:n};this.postMessage(e,l)})}async sendRequest(e,t,n=r){let i=await this.initWorker();return this.sendRequestTo(i,e,t,n)}async generateKeypair(){return this.sendRequest(`GENERATE_KEYPAIR`,{})}async createEIP712(e){return this.sendRequest(`CREATE_EIP712`,e)}async encrypt(e){return this.sendRequest(`ENCRYPT`,e)}async userDecrypt(e){return this.sendRequest(`USER_DECRYPT`,e)}async publicDecrypt(e){return this.sendRequest(`PUBLIC_DECRYPT`,{handles:e})}async createDelegatedUserDecryptEIP712(e){return this.sendRequest(`CREATE_DELEGATED_EIP712`,e)}async delegatedUserDecrypt(e){return this.sendRequest(`DELEGATED_USER_DECRYPT`,e)}async requestZKProofVerification(e){return this.sendRequest(`REQUEST_ZK_PROOF_VERIFICATION`,{zkProof:e})}async getPublicKey(){return this.sendRequest(`GET_PUBLIC_KEY`,{})}async getPublicParams(e){return this.sendRequest(`GET_PUBLIC_PARAMS`,{bits:e})}#i(e){for(let[t,n]of this.#t)clearTimeout(n.timeoutId),n.reject(Error(e)),this.#t.delete(t)}};const a=8192,o=300*1e3;function s(e){let t=[];for(let n=0;n<e.length;n+=a)t.push(String.fromCharCode(...e.subarray(n,n+a)));return btoa(t.join(``))}function c(e){let t;try{t=atob(e)}catch{throw Error(`Invalid base64 data (length: ${e.length})`)}if(t.length===0)throw Error(`Decoded artifact is empty`);let n=new Uint8Array(t.length);for(let e=0;e<t.length;e++)n[e]=t.charCodeAt(e);return n}function l(e){return`fhe:pubkey:${e}`}function u(e,t){return`fhe:params:${e}:${t}`}function d(e){return`fhe:params-index:${e}`}function f(e){t(e,`CachedPublicKey`),n(e,`publicKeyId`,`CachedPublicKey.publicKeyId`),n(e,`publicKey`,`CachedPublicKey.publicKey`)}function p(e){t(e,`CachedPublicParams`),n(e,`publicParamsId`,`CachedPublicParams.publicParamsId`),n(e,`publicParams`,`CachedPublicParams.publicParams`)}var m=class{#e;#t;#n;#r;#i;#a;#o=new Map;#s=null;#c=new Map;#l=null;#u=null;constructor(e){this.#e=e.storage,this.#t=e.chainId,this.#n=e.relayerUrl,this.#r=(e.ttl??86400)*1e3,this.#i=e.logger??console}async getPublicKey(e){if(this.#a!==void 0)return this.#a;if(this.#s)return this.#s;this.#s=this.#d(e);try{return await this.#s}finally{this.#s=null}}async#d(t){let n=l(this.#t);try{let e=await this.#e.get(n);if(e){f(e);let t={publicKeyId:e.publicKeyId,publicKey:c(e.publicKey)};return this.#a=t,t}}catch(t){await this.#g(n),this.#i.warn(`Failed to read public key from persistent storage, falling back to network fetch`,{chainId:this.#t,error:e(t).message})}let r=await t();if(r===null)return null;this.#a=r;try{let e={publicKeyId:r.publicKeyId,publicKey:s(r.publicKey),lastValidatedAt:Date.now()};await this.#e.set(n,e)}catch(t){this.#i.warn(`Failed to persist public key to storage`,{chainId:this.#t,error:e(t).message})}return r}async getPublicParams(e,t){let n=this.#o.get(e);if(n!==void 0)return n;let r=this.#c.get(e);if(r)return r;let i=this.#f(e,t);this.#c.set(e,i);try{return await i}finally{this.#c.delete(e)}}async#f(t,n){let r=u(this.#t,t);try{let e=await this.#e.get(r);if(e){p(e);let n={publicParamsId:e.publicParamsId,publicParams:c(e.publicParams)};return this.#o.set(t,n),n}}catch(n){await this.#g(r),this.#i.warn(`Failed to read public params from persistent storage, falling back to network fetch`,{chainId:this.#t,bits:t,error:e(n).message})}let i=await n();if(i===null)return null;this.#o.set(t,i);try{let n={publicParamsId:i.publicParamsId,publicParams:s(i.publicParams),lastValidatedAt:Date.now()};await this.#e.set(r,n);let a=d(this.#t),o=await this.#e.get(a).catch(t=>(this.#i.warn(`Failed to read params index from storage`,{chainId:this.#t,error:e(t).message}),null))??[];o.includes(t)||await this.#e.set(a,[...o,t])}catch(n){this.#i.warn(`Failed to persist public params to storage`,{chainId:this.#t,bits:t,error:e(n).message})}return i}async revalidateIfDue(){if(this.#l)return this.#l;this.#l=this.#p();try{return await this.#l}finally{this.#l=null}}async#p(){let t=Date.now();if(this.#u!==null&&t-this.#u<this.#r||!this.#n)return!1;let n=l(this.#t),r=null,i=[];try{let[a,s]=await Promise.all([this.#e.get(n),this.#h()]);if(a)try{f(a),r={...a,lastValidatedAt:a.lastValidatedAt??0}}catch(t){this.#i.warn(`Corrupt public key cache entry detected, deleting`,{chainId:this.#t,error:e(t).message}),await this.#g(n)}if(i=s,!r)return!1;if([r,...i.map(e=>e.data)].every(e=>t-e.lastValidatedAt<this.#r))return this.#u=t,!1;let c=await globalThis.fetch(`${this.#n}/keyurl`);if(!c.ok){let e=t-this.#r+o;return this.#i.warn(`Manifest fetch failed during revalidation, retrying in 5 min`,{status:c.status,relayerUrl:this.#n}),await this.#v(n,{...r,lastValidatedAt:e},i.map(t=>({...t,data:{...t.data,lastValidatedAt:e}}))),this.#u=e,!1}let l=await c.json();if(!l||typeof l!=`object`||!(`fhePublicKey`in l)||!l.fhePublicKey?.urls?.length||!(`crs`in l)||typeof l.crs!=`object`){this.#i.error(`Relayer manifest has unexpected shape — check relayer URL and API version`,{relayerUrl:this.#n,manifestKeys:l&&typeof l==`object`?Object.keys(l):[]});let e=t-this.#r+o;return await this.#v(n,{...r,lastValidatedAt:e},i.map(t=>({...t,data:{...t.data,lastValidatedAt:e}}))),this.#u=e,!1}let u=l,d=u.fhePublicKey.urls[0];if(r.artifactUrl&&d&&d!==r.artifactUrl)return await this.#_(n,i),this.#u=null,!0;let p={...r,lastValidatedAt:t};if(d){let e=await this.#m(d,r);if(!e.fresh)return await this.#_(n,i),this.#u=null,!0;p={...p,artifactUrl:d,etag:e.etag,lastModified:e.lastModified}}let m=[];for(let e of i){let r=u.crs[String(e.bits)]?.urls[0];if(e.data.artifactUrl&&r&&r!==e.data.artifactUrl)return await this.#_(n,i),this.#u=null,!0;let a={...e.data,lastValidatedAt:t};if(r){let t=await this.#m(r,e.data);if(!t.fresh)return await this.#_(n,i),this.#u=null,!0;a={...a,artifactUrl:r,etag:t.etag,lastModified:t.lastModified}}m.push({...e,data:a})}return await this.#v(n,p,m),this.#u=t,!1}catch(a){let s=e(a),c=a instanceof TypeError||a instanceof ReferenceError||a instanceof RangeError||a instanceof SyntaxError,l=c?`error`:`warn`;this.#i[l](c?`Unexpected error during revalidation (possible bug)`:`Revalidation failed, using cached artifacts (fail-open)`,{chainId:this.#t,relayerUrl:this.#n,error:s.message});let u=t-this.#r+o;try{r&&await this.#v(n,{...r,lastValidatedAt:u},i.map(e=>({...e,data:{...e.data,lastValidatedAt:u}})))}catch(t){this.#i.warn(`Failed to update validation timestamps after revalidation error`,{chainId:this.#t,error:e(t).message})}return this.#u=u,!1}}async#m(e,t){let n=!!(t.etag||t.lastModified),r={};t.etag&&(r[`If-None-Match`]=t.etag),t.lastModified&&(r[`If-Modified-Since`]=t.lastModified);let i=await globalThis.fetch(e,{method:`HEAD`,headers:r});if(i.status===405&&(i=await globalThis.fetch(e,{headers:r})),!i.ok&&i.status!==304)throw Error(`Artifact freshness check failed: HEAD ${e} returned ${i.status}`);let a=i.headers.get(`etag`)??void 0,o=i.headers.get(`last-modified`)??void 0;return i.status===304?{fresh:!0,etag:a??t.etag,lastModified:o??t.lastModified}:n?{fresh:!1,etag:a,lastModified:o}:{fresh:!0,etag:a,lastModified:o}}async#h(){let t=d(this.#t),n=await this.#e.get(t).catch(t=>(this.#i.warn(`Failed to read params index, CRS revalidation may be incomplete`,{chainId:this.#t,error:e(t).message}),null))??[],r=new Set([...this.#o.keys(),...n]),i=Array.from(r);return(await Promise.all(i.map(async t=>{let n=u(this.#t,t),r;try{r=await this.#e.get(n)}catch(n){return this.#i.warn(`Failed to read cached params entry during revalidation`,{chainId:this.#t,bits:t,error:e(n).message}),null}if(!r)return null;try{return p(r),{bits:t,key:n,data:{...r,lastValidatedAt:r.lastValidatedAt??0}}}catch(r){return this.#i.warn(`Corrupt params cache entry detected, deleting`,{chainId:this.#t,bits:t,error:e(r).message}),await this.#g(n),null}}))).filter(e=>e!==null)}async#g(t){await this.#e.delete(t).catch(n=>{this.#i.warn(`Failed to delete cache entry`,{chainId:this.#t,key:t,error:e(n).message})})}async#_(t,n){let r=d(this.#t);try{await Promise.all([this.#e.delete(t),this.#e.delete(r),...n.map(e=>this.#e.delete(e.key))])}catch(t){this.#i.warn(`Failed to clear stale artifacts from persistent storage`,{chainId:this.#t,error:e(t).message})}this.#a=void 0,this.#o.clear()}async#v(t,n,r){let i=[this.#e.set(t,n).catch(t=>{this.#i.warn(`Failed to update public key validation timestamp`,{chainId:this.#t,error:e(t).message})}),...r.map(t=>this.#e.set(t.key,t.data).catch(t=>{this.#i.warn(`Failed to update params validation timestamp`,{chainId:this.#t,error:e(t).message})}))];await Promise.all(i)}};export{i as n,m as t};
2
+ //# sourceMappingURL=fhe-artifact-cache-DNoPom4I.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"fhe-artifact-cache-vzh7Xn9G.js","names":["#worker","#initPromise","#doInitWorker","#pendingRequests","#rejectAllPending","#storage","#chainId","#relayerUrl","#ttlMs","#logger","#publicKeyMem","#publicKeyInflight","#loadPublicKey","#deleteQuietly","#publicParamsMem","#publicParamsInflight","#loadPublicParams","#revalidationInflight","#revalidateIfDueInner","#lastRevalidatedAt","#collectParamEntries","#writeEntries","#clearAll","#checkArtifactFreshness"],"sources":["../../src/worker/worker.base-client.ts","../../src/relayer/fhe-artifact-cache.ts"],"sourcesContent":["import type { Handle } from \"../relayer/relayer-sdk.types\";\nimport type { ZKProofLike } from \"@zama-fhe/relayer-sdk/bundle\";\nimport type {\n CreateDelegatedEIP712Payload,\n CreateDelegatedEIP712ResponseData,\n CreateEIP712Payload,\n CreateEIP712ResponseData,\n DelegatedUserDecryptPayload,\n DelegatedUserDecryptResponseData,\n EncryptPayload,\n EncryptResponseData,\n GenerateKeypairResponseData,\n GetPublicKeyResponseData,\n GetPublicParamsResponseData,\n InitResponseData,\n PublicDecryptResponseData,\n RequestZKProofVerificationResponseData,\n UserDecryptPayload,\n UserDecryptResponseData,\n GenericLogger,\n WorkerRequest,\n WorkerRequestType,\n WorkerResponse,\n} from \"./worker.types\";\n\n/** Pending request tracker */\ninterface PendingRequest<T> {\n resolve: (value: T) => void;\n reject: (error: Error) => void;\n timeoutId: ReturnType<typeof setTimeout>;\n startTime: number;\n type: WorkerRequestType;\n}\n\n/** Default timeout for operations (30 seconds) */\nexport const DEFAULT_TIMEOUT_MS = 30_000;\n\n/** Extended timeout for WASM initialization (60 seconds) */\nexport const INIT_TIMEOUT_MS = 60_000;\n\n/**\n * Abstract base class for worker clients (browser Web Worker and Node.js worker_threads).\n * Encapsulates all shared logic: pending request tracking, timeouts, init dedup, domain methods.\n * Subclasses implement the abstract hooks for platform-specific worker creation and messaging.\n */\nexport abstract class BaseWorkerClient<TWorker, TConfig> {\n #worker: TWorker | null = null;\n #pendingRequests = new Map<string, PendingRequest<unknown>>();\n #initPromise: Promise<TWorker> | null = null;\n protected readonly config: TConfig;\n protected readonly logger: GenericLogger | undefined;\n\n constructor(config: TConfig, logger: GenericLogger | undefined) {\n this.config = config;\n this.logger = logger;\n }\n\n // ===========================================================================\n // Abstract hooks — subclasses must implement\n // ===========================================================================\n\n /** Create the platform-specific worker instance. */\n protected abstract createWorker(): TWorker;\n\n /** Wire message/error/messageerror events on the worker. */\n protected abstract wireEvents(worker: TWorker): void;\n\n /** Post a message to the worker. */\n protected abstract postMessage(worker: TWorker, request: WorkerRequest): void;\n\n /** Terminate the platform-specific worker. */\n protected abstract terminateWorker(worker: TWorker): void;\n\n /** Generate a unique request ID. */\n protected abstract generateRequestId(): string;\n\n /** Return the init request type and payload. */\n protected abstract getInitPayload(): {\n type: WorkerRequestType;\n payload: WorkerRequest[\"payload\"];\n };\n\n /** Optional hook called after worker init succeeds (e.g. for node worker.unref()). */\n protected onWorkerReady?(_worker: TWorker): void;\n\n // ===========================================================================\n // Shared init / terminate\n // ===========================================================================\n\n async initWorker(): Promise<TWorker> {\n if (this.#worker) {\n return this.#worker;\n }\n\n if (!this.#initPromise) {\n this.#initPromise = this.#doInitWorker().catch((error) => {\n this.#initPromise = null;\n throw error;\n });\n }\n return this.#initPromise;\n }\n\n async #doInitWorker(): Promise<TWorker> {\n const worker = this.createWorker();\n this.wireEvents(worker);\n\n try {\n const { type, payload } = this.getInitPayload();\n await this.sendRequestTo<InitResponseData>(worker, type, payload, INIT_TIMEOUT_MS);\n this.onWorkerReady?.(worker);\n this.#worker = worker;\n } catch (error) {\n this.terminateWorker(worker);\n throw error;\n }\n\n return this.#worker;\n }\n\n terminate(): void {\n if (this.#worker) {\n for (const [id, pending] of this.#pendingRequests) {\n clearTimeout(pending.timeoutId);\n pending.reject(new Error(\"Worker terminated\"));\n this.#pendingRequests.delete(id);\n }\n\n this.terminateWorker(this.#worker);\n this.#worker = null;\n }\n this.#initPromise = null;\n }\n\n // ===========================================================================\n // Message handling (called by subclass event wiring)\n // ===========================================================================\n\n protected handleResponse(response: WorkerResponse<unknown>): void {\n const pending = this.#pendingRequests.get(response.id);\n\n if (!pending) {\n this.logger?.warn(\"[WorkerClient] Received response for unknown request\", {\n id: response.id,\n });\n return;\n }\n\n const elapsed = Math.round(performance.now() - pending.startTime);\n\n clearTimeout(pending.timeoutId);\n this.#pendingRequests.delete(response.id);\n\n if (response.success) {\n this.logger?.debug(`[WorkerClient] ← ${pending.type} OK`, {\n id: response.id,\n elapsed,\n });\n pending.resolve(response.data);\n } else {\n this.logger?.error(`[WorkerClient] ← ${pending.type} FAILED`, {\n id: response.id,\n elapsed,\n error: response.error,\n });\n const err = new Error(response.error);\n if (\"statusCode\" in response && typeof response.statusCode === \"number\") {\n (err as Error & { statusCode?: number }).statusCode = response.statusCode;\n }\n pending.reject(err);\n }\n }\n\n protected handleWorkerError(message: string): void {\n this.logger?.error(\"[WorkerClient] Worker error\", { error: message });\n const worker = this.#worker;\n this.#worker = null;\n this.#rejectAllPending(`Worker error: ${message}`);\n if (worker) {\n this.terminateWorker(worker);\n }\n }\n\n protected handleWorkerMessageError(): void {\n this.logger?.error(\"[WorkerClient] Message deserialization failed\");\n const worker = this.#worker;\n this.#worker = null;\n this.#rejectAllPending(\"Worker message deserialization failed\");\n if (worker) {\n this.terminateWorker(worker);\n }\n }\n\n // ===========================================================================\n // Request sending\n // ===========================================================================\n\n protected sendRequestTo<T>(\n worker: TWorker,\n type: WorkerRequestType,\n payload: WorkerRequest[\"payload\"],\n timeoutMs: number = DEFAULT_TIMEOUT_MS,\n ): Promise<T> {\n return new Promise<T>((resolve, reject) => {\n const id = this.generateRequestId();\n const startTime = performance.now();\n this.logger?.debug(`[WorkerClient] → ${type}`, { id });\n\n const timeoutId = setTimeout(() => {\n this.#pendingRequests.delete(id);\n const elapsed = Math.round(performance.now() - startTime);\n this.logger?.error(`[WorkerClient] ${type} timed out after ${timeoutMs}ms`, {\n id,\n elapsed,\n });\n reject(new Error(`Request ${type} timed out after ${timeoutMs}ms`));\n }, timeoutMs);\n\n this.#pendingRequests.set(id, {\n resolve: resolve as (value: unknown) => void,\n reject,\n timeoutId,\n startTime,\n type,\n });\n\n const request = { id, type, payload } as WorkerRequest;\n this.postMessage(worker, request);\n });\n }\n\n protected async sendRequest<T>(\n type: WorkerRequestType,\n payload: WorkerRequest[\"payload\"],\n timeoutMs: number = DEFAULT_TIMEOUT_MS,\n ): Promise<T> {\n const worker = await this.initWorker();\n return this.sendRequestTo<T>(worker, type, payload, timeoutMs);\n }\n\n // ===========================================================================\n // Domain methods\n // ===========================================================================\n\n async generateKeypair(): Promise<GenerateKeypairResponseData> {\n return this.sendRequest<GenerateKeypairResponseData>(\"GENERATE_KEYPAIR\", {});\n }\n\n async createEIP712(params: CreateEIP712Payload): Promise<CreateEIP712ResponseData> {\n return this.sendRequest<CreateEIP712ResponseData>(\"CREATE_EIP712\", params);\n }\n\n async encrypt(params: EncryptPayload): Promise<EncryptResponseData> {\n return this.sendRequest<EncryptResponseData>(\"ENCRYPT\", params);\n }\n\n async userDecrypt(params: UserDecryptPayload): Promise<UserDecryptResponseData> {\n return this.sendRequest<UserDecryptResponseData>(\"USER_DECRYPT\", params);\n }\n\n async publicDecrypt(handles: Handle[]): Promise<PublicDecryptResponseData> {\n return this.sendRequest<PublicDecryptResponseData>(\"PUBLIC_DECRYPT\", { handles });\n }\n\n async createDelegatedUserDecryptEIP712(\n params: CreateDelegatedEIP712Payload,\n ): Promise<CreateDelegatedEIP712ResponseData> {\n return this.sendRequest<CreateDelegatedEIP712ResponseData>(\"CREATE_DELEGATED_EIP712\", params);\n }\n\n async delegatedUserDecrypt(\n params: DelegatedUserDecryptPayload,\n ): Promise<DelegatedUserDecryptResponseData> {\n return this.sendRequest<DelegatedUserDecryptResponseData>(\"DELEGATED_USER_DECRYPT\", params);\n }\n\n async requestZKProofVerification(\n zkProof: ZKProofLike,\n ): Promise<RequestZKProofVerificationResponseData> {\n return this.sendRequest<RequestZKProofVerificationResponseData>(\n \"REQUEST_ZK_PROOF_VERIFICATION\",\n { zkProof },\n );\n }\n\n async getPublicKey(): Promise<GetPublicKeyResponseData> {\n return this.sendRequest<GetPublicKeyResponseData>(\"GET_PUBLIC_KEY\", {});\n }\n\n async getPublicParams(bits: number): Promise<GetPublicParamsResponseData> {\n return this.sendRequest<GetPublicParamsResponseData>(\"GET_PUBLIC_PARAMS\", { bits });\n }\n\n // ===========================================================================\n // Internal helpers\n // ===========================================================================\n\n #rejectAllPending(message: string): void {\n for (const [id, pending] of this.#pendingRequests) {\n clearTimeout(pending.timeoutId);\n pending.reject(new Error(message));\n this.#pendingRequests.delete(id);\n }\n }\n}\n","import type { GenericStorage } from \"../types\";\nimport { assertObject, assertStringProp, toError } from \"../utils\";\nimport type { GenericLogger } from \"../worker/worker.types\";\n\n// ── Cached data shapes ──────────────────────────────────────\n\n/** Cached shape for the FHE network public key. */\ninterface CachedPublicKey {\n publicKeyId: string;\n /** Base64-encoded Uint8Array. */\n publicKey: string;\n /** Artifact URL from the manifest. */\n artifactUrl?: string;\n /** HTTP ETag from the artifact response. */\n etag?: string;\n /** HTTP Last-Modified from the artifact response. */\n lastModified?: string;\n /** Epoch-ms timestamp of the last successful revalidation. */\n lastValidatedAt: number;\n}\n\n/** Cached shape for FHE public params. */\ninterface CachedPublicParams {\n publicParamsId: string;\n /** Base64-encoded Uint8Array. */\n publicParams: string;\n artifactUrl?: string;\n etag?: string;\n lastModified?: string;\n lastValidatedAt: number;\n}\n\n// ── Return types ────────────────────────────────────────────\n\n/** Return type of the public key fetcher. */\ntype PublicKeyResult = { publicKeyId: string; publicKey: Uint8Array } | null;\n\n/** Return type of the public params fetcher. */\ntype PublicParamsResult = {\n publicParamsId: string;\n publicParams: Uint8Array;\n} | null;\n\n// ── Constants ───────────────────────────────────────────────\n\n/** Max chunk size for String.fromCharCode to avoid call-stack overflow on large buffers. */\nconst CHUNK_SIZE = 8192;\n\n/** On revalidation failure, retry after 5 minutes instead of the full TTL. */\nconst SHORT_RETRY_MS = 5 * 60 * 1000;\n\n// ── Helpers ─────────────────────────────────────────────────\n\nfunction toBase64(bytes: Uint8Array): string {\n const chunks: string[] = [];\n for (let i = 0; i < bytes.length; i += CHUNK_SIZE) {\n chunks.push(String.fromCharCode(...bytes.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(chunks.join(\"\"));\n}\n\nfunction fromBase64(b64: string): Uint8Array {\n let binary: string;\n try {\n binary = atob(b64);\n } catch {\n throw new Error(`Invalid base64 data (length: ${b64.length})`);\n }\n if (binary.length === 0) {\n throw new Error(\"Decoded artifact is empty\");\n }\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n}\n\nfunction pubkeyStorageKey(chainId: number): string {\n return `fhe:pubkey:${chainId}`;\n}\n\nfunction paramsStorageKey(chainId: number, bits: number): string {\n return `fhe:params:${chainId}:${bits}`;\n}\n\nfunction paramsIndexKey(chainId: number): string {\n return `fhe:params-index:${chainId}`;\n}\n\nfunction assertCachedPk(v: unknown): asserts v is CachedPublicKey {\n assertObject(v, \"CachedPublicKey\");\n assertStringProp(v, \"publicKeyId\", \"CachedPublicKey.publicKeyId\");\n assertStringProp(v, \"publicKey\", \"CachedPublicKey.publicKey\");\n}\n\nfunction assertCachedParams(v: unknown): asserts v is CachedPublicParams {\n assertObject(v, \"CachedPublicParams\");\n assertStringProp(v, \"publicParamsId\", \"CachedPublicParams.publicParamsId\");\n assertStringProp(v, \"publicParams\", \"CachedPublicParams.publicParams\");\n}\n\n/** Manifest shape returned by the relayer `/keyurl` endpoint. */\ninterface ManifestShape {\n fhePublicKey: { dataId: string; urls: string[] };\n crs: Record<string, { dataId: string; urls: string[] }>;\n}\n\n// ── ArtifactCache ──────────────────────────────────────────\n\n/**\n * Persistent cache for FHE network public key and public params.\n * Uses a {@link GenericStorage} backend (e.g. MemoryStorage, or any\n * user-provided async key-value adapter) to avoid re-downloading large\n * binary data on every app instantiation.\n *\n * Cache keys are scoped by chain ID.\n */\nexport class FheArtifactCache {\n readonly #storage: GenericStorage;\n readonly #chainId: number;\n readonly #relayerUrl: string;\n readonly #ttlMs: number;\n readonly #logger: GenericLogger;\n #publicKeyMem: PublicKeyResult | undefined;\n #publicParamsMem = new Map<number, PublicParamsResult>();\n #publicKeyInflight: Promise<PublicKeyResult> | null = null;\n #publicParamsInflight = new Map<number, Promise<PublicParamsResult>>();\n #revalidationInflight: Promise<boolean> | null = null;\n /** In-memory guard to skip storage reads when revalidation isn't due. */\n #lastRevalidatedAt: number | null = null;\n\n constructor(opts: {\n storage: GenericStorage;\n chainId: number;\n relayerUrl: string;\n /** Cache TTL in seconds. Default: 86 400 (24 h). Set to 0 to revalidate on every operation. */\n ttl?: number;\n logger?: GenericLogger;\n }) {\n this.#storage = opts.storage;\n this.#chainId = opts.chainId;\n this.#relayerUrl = opts.relayerUrl;\n this.#ttlMs = (opts.ttl ?? 86_400) * 1000;\n this.#logger = opts.logger ?? console;\n }\n\n // ── getPublicKey ────────────────────────────────────────\n\n async getPublicKey(fetcher: () => Promise<PublicKeyResult>): Promise<PublicKeyResult> {\n if (this.#publicKeyMem !== undefined) {\n return this.#publicKeyMem;\n }\n\n // Deduplicate concurrent calls\n if (this.#publicKeyInflight) {\n return this.#publicKeyInflight;\n }\n\n this.#publicKeyInflight = this.#loadPublicKey(fetcher);\n try {\n return await this.#publicKeyInflight;\n } finally {\n this.#publicKeyInflight = null;\n }\n }\n\n async #loadPublicKey(fetcher: () => Promise<PublicKeyResult>): Promise<PublicKeyResult> {\n const key = pubkeyStorageKey(this.#chainId);\n\n try {\n const raw = await this.#storage.get(key);\n if (raw) {\n assertCachedPk(raw);\n const result: PublicKeyResult = {\n publicKeyId: raw.publicKeyId,\n publicKey: fromBase64(raw.publicKey),\n };\n this.#publicKeyMem = result;\n return result;\n }\n } catch (err) {\n // Corrupt or unreadable entry — delete and fall through to fetcher\n await this.#deleteQuietly(key);\n this.#logger.warn(\n \"Failed to read public key from persistent storage, falling back to network fetch\",\n {\n chainId: this.#chainId,\n error: toError(err).message,\n },\n );\n }\n\n const result = await fetcher();\n if (result === null) {\n return null;\n }\n\n this.#publicKeyMem = result;\n\n try {\n const cached: CachedPublicKey = {\n publicKeyId: result.publicKeyId,\n publicKey: toBase64(result.publicKey),\n lastValidatedAt: Date.now(),\n };\n await this.#storage.set(key, cached);\n } catch (err) {\n this.#logger.warn(\"Failed to persist public key to storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }\n\n return result;\n }\n\n // ── getPublicParams ─────────────────────────────────────\n\n async getPublicParams(\n bits: number,\n fetcher: () => Promise<PublicParamsResult>,\n ): Promise<PublicParamsResult> {\n const mem = this.#publicParamsMem.get(bits);\n if (mem !== undefined) {\n return mem;\n }\n\n // Deduplicate concurrent calls\n const inflight = this.#publicParamsInflight.get(bits);\n if (inflight) {\n return inflight;\n }\n\n const promise = this.#loadPublicParams(bits, fetcher);\n this.#publicParamsInflight.set(bits, promise);\n try {\n return await promise;\n } finally {\n this.#publicParamsInflight.delete(bits);\n }\n }\n\n async #loadPublicParams(\n bits: number,\n fetcher: () => Promise<PublicParamsResult>,\n ): Promise<PublicParamsResult> {\n const key = paramsStorageKey(this.#chainId, bits);\n\n try {\n const raw = await this.#storage.get(key);\n if (raw) {\n assertCachedParams(raw);\n const result: PublicParamsResult = {\n publicParamsId: raw.publicParamsId,\n publicParams: fromBase64(raw.publicParams),\n };\n this.#publicParamsMem.set(bits, result);\n return result;\n }\n } catch (err) {\n // Corrupt or unreadable entry — delete and fall through to fetcher\n await this.#deleteQuietly(key);\n this.#logger.warn(\n \"Failed to read public params from persistent storage, falling back to network fetch\",\n {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n },\n );\n }\n\n const result = await fetcher();\n if (result === null) {\n return null;\n }\n\n this.#publicParamsMem.set(bits, result);\n\n try {\n const cached: CachedPublicParams = {\n publicParamsId: result.publicParamsId,\n publicParams: toBase64(result.publicParams),\n lastValidatedAt: Date.now(),\n };\n await this.#storage.set(key, cached);\n\n // Update params index for cold-start CRS detection\n const idxKey = paramsIndexKey(this.#chainId);\n const existing =\n (await this.#storage.get<number[]>(idxKey).catch((err) => {\n this.#logger.warn(\"Failed to read params index from storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n return null;\n })) ?? [];\n if (!existing.includes(bits)) {\n await this.#storage.set(idxKey, [...existing, bits]);\n }\n } catch (err) {\n this.#logger.warn(\"Failed to persist public params to storage\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n }\n\n return result;\n }\n\n // ── Artifact-level revalidation ─────────────────────────\n\n /**\n * Check whether cached FHE artifacts are still fresh by issuing\n * HTTP conditional requests (ETag / If-None-Match, Last-Modified /\n * If-Modified-Since) against the actual artifact CDN URLs.\n *\n * @returns `true` if the cache was invalidated and the caller should\n * re-fetch artifacts, `false` otherwise.\n */\n async revalidateIfDue(): Promise<boolean> {\n // Concurrency guard — coalesce overlapping calls\n if (this.#revalidationInflight) {\n return this.#revalidationInflight;\n }\n this.#revalidationInflight = this.#revalidateIfDueInner();\n try {\n return await this.#revalidationInflight;\n } finally {\n this.#revalidationInflight = null;\n }\n }\n\n async #revalidateIfDueInner(): Promise<boolean> {\n // Fast path: in-memory timestamp check avoids storage I/O on every call\n const now = Date.now();\n if (this.#lastRevalidatedAt !== null && now - this.#lastRevalidatedAt < this.#ttlMs) {\n return false;\n }\n\n // Skip revalidation when relayerUrl is not configured (e.g. Hardhat)\n if (!this.#relayerUrl) {\n return false;\n }\n\n const pkKey = pubkeyStorageKey(this.#chainId);\n\n // Track partial progress so the catch block can reuse already-read data\n let storedPk: CachedPublicKey | null = null;\n let paramEntries: Array<{\n bits: number;\n key: string;\n data: CachedPublicParams;\n }> = [];\n\n try {\n // 1. Read PK cache entry and collect params entries in parallel\n const [pkRaw, entries] = await Promise.all([\n this.#storage.get(pkKey),\n this.#collectParamEntries(),\n ]);\n\n // Validate PK shape\n if (pkRaw) {\n try {\n assertCachedPk(pkRaw);\n storedPk = { ...pkRaw, lastValidatedAt: pkRaw.lastValidatedAt ?? 0 };\n } catch (err) {\n this.#logger.warn(\"Corrupt public key cache entry detected, deleting\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n await this.#deleteQuietly(pkKey);\n }\n }\n\n paramEntries = entries;\n\n if (!storedPk) {\n return false;\n }\n\n // 2. Check if all entries are within TTL\n const allEntries: Array<{ lastValidatedAt: number }> = [\n storedPk,\n ...paramEntries.map((e) => e.data),\n ];\n const allFresh = allEntries.every((e) => now - e.lastValidatedAt < this.#ttlMs);\n if (allFresh) {\n this.#lastRevalidatedAt = now;\n return false;\n }\n\n // 3. Fetch manifest to discover current artifact URLs\n const manifestRes = await globalThis.fetch(`${this.#relayerUrl}/keyurl`);\n if (!manifestRes.ok) {\n // Treat as transient failure — use short retry instead of full TTL\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n this.#logger.warn(\"Manifest fetch failed during revalidation, retrying in 5 min\", {\n status: manifestRes.status,\n relayerUrl: this.#relayerUrl,\n });\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n\n const manifest = (await manifestRes.json()) as unknown;\n\n // Validate manifest shape — a malformed response indicates a permanent\n // config error (wrong relayer URL, API version mismatch), not a transient\n // network issue. Log at error level so it's actionable.\n if (\n !manifest ||\n typeof manifest !== \"object\" ||\n !(\"fhePublicKey\" in manifest) ||\n !(manifest as ManifestShape).fhePublicKey?.urls?.length ||\n !(\"crs\" in manifest) ||\n typeof (manifest as ManifestShape).crs !== \"object\"\n ) {\n this.#logger.error(\n \"Relayer manifest has unexpected shape — check relayer URL and API version\",\n {\n relayerUrl: this.#relayerUrl,\n manifestKeys: manifest && typeof manifest === \"object\" ? Object.keys(manifest) : [],\n },\n );\n // Fail-open with short retry — but the error-level log distinguishes this from transient failures\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n const validManifest = manifest as ManifestShape;\n\n // ── 4. Check PK artifact ──────────────────────────\n const pkArtifactUrl = validManifest.fhePublicKey.urls[0];\n\n // URL change → stale\n if (storedPk.artifactUrl && pkArtifactUrl && pkArtifactUrl !== storedPk.artifactUrl) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n\n let updatedPk: CachedPublicKey = { ...storedPk, lastValidatedAt: now };\n if (pkArtifactUrl) {\n const freshness = await this.#checkArtifactFreshness(pkArtifactUrl, storedPk);\n if (!freshness.fresh) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n updatedPk = {\n ...updatedPk,\n artifactUrl: pkArtifactUrl,\n etag: freshness.etag,\n lastModified: freshness.lastModified,\n };\n }\n\n // ── 5. Check each CRS artifact ────────────────────\n const updatedParamEntries: typeof paramEntries = [];\n for (const entry of paramEntries) {\n const manifestCrs = validManifest.crs[String(entry.bits)];\n const crsUrl = manifestCrs?.urls[0];\n\n // URL change → stale\n if (entry.data.artifactUrl && crsUrl && crsUrl !== entry.data.artifactUrl) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n\n let updatedData: CachedPublicParams = {\n ...entry.data,\n lastValidatedAt: now,\n };\n if (crsUrl) {\n const freshness = await this.#checkArtifactFreshness(crsUrl, entry.data);\n if (!freshness.fresh) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n updatedData = {\n ...updatedData,\n artifactUrl: crsUrl,\n etag: freshness.etag,\n lastModified: freshness.lastModified,\n };\n }\n updatedParamEntries.push({ ...entry, data: updatedData });\n }\n\n // 6. All fresh — update timestamps and HTTP validators\n await this.#writeEntries(pkKey, updatedPk, updatedParamEntries);\n this.#lastRevalidatedAt = now;\n return false;\n } catch (err) {\n const error = toError(err);\n const isProgrammingError =\n err instanceof TypeError ||\n err instanceof ReferenceError ||\n err instanceof RangeError ||\n err instanceof SyntaxError;\n const level = isProgrammingError ? \"error\" : \"warn\";\n this.#logger[level](\n isProgrammingError\n ? \"Unexpected error during revalidation (possible bug)\"\n : \"Revalidation failed, using cached artifacts (fail-open)\",\n {\n chainId: this.#chainId,\n relayerUrl: this.#relayerUrl,\n error: error.message,\n },\n );\n\n // Fail-open: use short retry interval (5 min) instead of full TTL\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n try {\n if (storedPk) {\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n }\n } catch (innerErr) {\n this.#logger.warn(\"Failed to update validation timestamps after revalidation error\", {\n chainId: this.#chainId,\n error: toError(innerErr).message,\n });\n }\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n }\n\n // ── Artifact freshness via HTTP conditional requests ───\n\n async #checkArtifactFreshness(\n url: string,\n cached: { etag?: string; lastModified?: string },\n ): Promise<{ fresh: boolean; etag?: string; lastModified?: string }> {\n const hasValidators = Boolean(cached.etag || cached.lastModified);\n const headers: Record<string, string> = {};\n if (cached.etag) {\n headers[\"If-None-Match\"] = cached.etag;\n }\n if (cached.lastModified) {\n headers[\"If-Modified-Since\"] = cached.lastModified;\n }\n\n // HEAD avoids downloading the (potentially multi-MB) artifact body.\n // With conditional headers, the server returns 304 if unchanged or 200 (no body) if stale.\n let res = await globalThis.fetch(url, { method: \"HEAD\", headers });\n\n // Fallback to GET if HEAD is not supported (e.g. some CDN/WAF configs)\n if (res.status === 405) {\n res = await globalThis.fetch(url, { headers });\n }\n\n // Treat server errors as transient — throw so the outer catch applies fail-open with short retry.\n // Without this, a CDN 5xx would be misinterpreted as \"artifact changed\" and wipe the cache.\n if (!res.ok && res.status !== 304) {\n throw new Error(`Artifact freshness check failed: HEAD ${url} returned ${res.status}`);\n }\n\n const etag = res.headers.get(\"etag\") ?? undefined;\n const lastModified = res.headers.get(\"last-modified\") ?? undefined;\n\n if (res.status === 304) {\n return {\n fresh: true,\n etag: etag ?? cached.etag,\n lastModified: lastModified ?? cached.lastModified,\n };\n }\n\n if (!hasValidators) {\n // First revalidation — capture validators, treat as fresh\n return { fresh: true, etag, lastModified };\n }\n\n // 200 = artifact changed\n return { fresh: false, etag, lastModified };\n }\n\n // ── Internal helpers ────────────────────────────────────\n\n async #collectParamEntries(): Promise<\n Array<{ bits: number; key: string; data: CachedPublicParams }>\n > {\n // Merge in-memory keys with persisted index for cold-start CRS detection\n const idxKey = paramsIndexKey(this.#chainId);\n const persistedBits =\n (await this.#storage.get<number[]>(idxKey).catch((err) => {\n this.#logger.warn(\"Failed to read params index, CRS revalidation may be incomplete\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n return null;\n })) ?? [];\n const allBits = new Set([...this.#publicParamsMem.keys(), ...persistedBits]);\n\n const bitsArray = Array.from(allBits);\n const results = await Promise.all(\n bitsArray.map(async (bits) => {\n const pKey = paramsStorageKey(this.#chainId, bits);\n // Separate storage read from validation so we only delete on corruption\n let raw: unknown;\n try {\n raw = await this.#storage.get(pKey);\n } catch (err) {\n this.#logger.warn(\"Failed to read cached params entry during revalidation\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n return null;\n }\n if (!raw) {\n return null;\n }\n try {\n assertCachedParams(raw);\n return {\n bits,\n key: pKey,\n data: {\n ...raw,\n lastValidatedAt: raw.lastValidatedAt ?? 0,\n } as CachedPublicParams,\n };\n } catch (err) {\n this.#logger.warn(\"Corrupt params cache entry detected, deleting\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n await this.#deleteQuietly(pKey);\n return null;\n }\n }),\n );\n return results.filter(\n (e): e is { bits: number; key: string; data: CachedPublicParams } => e !== null,\n );\n }\n\n async #deleteQuietly(key: string): Promise<void> {\n await this.#storage.delete(key).catch((err) => {\n this.#logger.warn(\"Failed to delete cache entry\", {\n chainId: this.#chainId,\n key,\n error: toError(err).message,\n });\n });\n }\n\n async #clearAll(pkKey: string, paramEntries: Array<{ key: string }>): Promise<void> {\n const idxKey = paramsIndexKey(this.#chainId);\n // Delete from persistent storage first — if this fails, in-memory cache\n // still serves stale data, but the next revalidation cycle will retry.\n try {\n await Promise.all([\n this.#storage.delete(pkKey),\n this.#storage.delete(idxKey),\n ...paramEntries.map((entry) => this.#storage.delete(entry.key)),\n ]);\n } catch (err) {\n this.#logger.warn(\"Failed to clear stale artifacts from persistent storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }\n // Clear in-memory after storage to avoid re-loading stale entries on failure\n this.#publicKeyMem = undefined;\n this.#publicParamsMem.clear();\n }\n\n async #writeEntries(\n pkKey: string,\n pk: CachedPublicKey,\n paramEntries: Array<{ key: string; data: CachedPublicParams }>,\n ): Promise<void> {\n const writes = [\n this.#storage.set(pkKey, pk).catch((err) => {\n this.#logger.warn(\"Failed to update public key validation timestamp\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }),\n ...paramEntries.map((entry) =>\n this.#storage.set(entry.key, entry.data).catch((err) => {\n this.#logger.warn(\"Failed to update params validation timestamp\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }),\n ),\n ];\n await Promise.all(writes);\n }\n}\n"],"mappings":"qGAmCA,MAAa,EAAqB,IAUlC,IAAsB,EAAtB,KAAyD,CACvD,GAA0B,KAC1B,GAAmB,IAAI,IACvB,GAAwC,KACxC,OACA,OAEA,YAAY,EAAiB,EAAmC,CAC9D,KAAK,OAAS,EACd,KAAK,OAAS,EAmChB,MAAM,YAA+B,CAWnC,OAVI,MAAA,EACK,MAAA,GAGT,AACE,MAAA,IAAoB,MAAA,GAAoB,CAAC,MAAO,GAAU,CAExD,KADA,OAAA,EAAoB,KACd,GACN,CAEG,MAAA,GAGT,MAAA,GAAwC,CACtC,IAAM,EAAS,KAAK,cAAc,CAClC,KAAK,WAAW,EAAO,CAEvB,GAAI,CACF,GAAM,CAAE,OAAM,WAAY,KAAK,gBAAgB,CAC/C,MAAM,KAAK,cAAgC,EAAQ,EAAM,EAAS,IAAgB,CAClF,KAAK,gBAAgB,EAAO,CAC5B,MAAA,EAAe,QACR,EAAO,CAEd,MADA,KAAK,gBAAgB,EAAO,CACtB,EAGR,OAAO,MAAA,EAGT,WAAkB,CAChB,GAAI,MAAA,EAAc,CAChB,IAAK,GAAM,CAAC,EAAI,KAAY,MAAA,EAC1B,aAAa,EAAQ,UAAU,CAC/B,EAAQ,OAAW,MAAM,oBAAoB,CAAC,CAC9C,MAAA,EAAsB,OAAO,EAAG,CAGlC,KAAK,gBAAgB,MAAA,EAAa,CAClC,MAAA,EAAe,KAEjB,MAAA,EAAoB,KAOtB,eAAyB,EAAyC,CAChE,IAAM,EAAU,MAAA,EAAsB,IAAI,EAAS,GAAG,CAEtD,GAAI,CAAC,EAAS,CACZ,KAAK,QAAQ,KAAK,uDAAwD,CACxE,GAAI,EAAS,GACd,CAAC,CACF,OAGF,IAAM,EAAU,KAAK,MAAM,YAAY,KAAK,CAAG,EAAQ,UAAU,CAKjE,GAHA,aAAa,EAAQ,UAAU,CAC/B,MAAA,EAAsB,OAAO,EAAS,GAAG,CAErC,EAAS,QACX,KAAK,QAAQ,MAAM,oBAAoB,EAAQ,KAAK,KAAM,CACxD,GAAI,EAAS,GACb,UACD,CAAC,CACF,EAAQ,QAAQ,EAAS,KAAK,KACzB,CACL,KAAK,QAAQ,MAAM,oBAAoB,EAAQ,KAAK,SAAU,CAC5D,GAAI,EAAS,GACb,UACA,MAAO,EAAS,MACjB,CAAC,CACF,IAAM,EAAU,MAAM,EAAS,MAAM,CACjC,eAAgB,GAAY,OAAO,EAAS,YAAe,WAC5D,EAAwC,WAAa,EAAS,YAEjE,EAAQ,OAAO,EAAI,EAIvB,kBAA4B,EAAuB,CACjD,KAAK,QAAQ,MAAM,8BAA+B,CAAE,MAAO,EAAS,CAAC,CACrE,IAAM,EAAS,MAAA,EACf,MAAA,EAAe,KACf,MAAA,EAAuB,iBAAiB,IAAU,CAC9C,GACF,KAAK,gBAAgB,EAAO,CAIhC,0BAA2C,CACzC,KAAK,QAAQ,MAAM,gDAAgD,CACnE,IAAM,EAAS,MAAA,EACf,MAAA,EAAe,KACf,MAAA,EAAuB,wCAAwC,CAC3D,GACF,KAAK,gBAAgB,EAAO,CAQhC,cACE,EACA,EACA,EACA,EAAoB,EACR,CACZ,OAAO,IAAI,SAAY,EAAS,IAAW,CACzC,IAAM,EAAK,KAAK,mBAAmB,CAC7B,EAAY,YAAY,KAAK,CACnC,KAAK,QAAQ,MAAM,oBAAoB,IAAQ,CAAE,KAAI,CAAC,CAEtD,IAAM,EAAY,eAAiB,CACjC,MAAA,EAAsB,OAAO,EAAG,CAChC,IAAM,EAAU,KAAK,MAAM,YAAY,KAAK,CAAG,EAAU,CACzD,KAAK,QAAQ,MAAM,kBAAkB,EAAK,mBAAmB,EAAU,IAAK,CAC1E,KACA,UACD,CAAC,CACF,EAAW,MAAM,WAAW,EAAK,mBAAmB,EAAU,IAAI,CAAC,EAClE,EAAU,CAEb,MAAA,EAAsB,IAAI,EAAI,CACnB,UACT,SACA,YACA,YACA,OACD,CAAC,CAEF,IAAM,EAAU,CAAE,KAAI,OAAM,UAAS,CACrC,KAAK,YAAY,EAAQ,EAAQ,EACjC,CAGJ,MAAgB,YACd,EACA,EACA,EAAoB,EACR,CACZ,IAAM,EAAS,MAAM,KAAK,YAAY,CACtC,OAAO,KAAK,cAAiB,EAAQ,EAAM,EAAS,EAAU,CAOhE,MAAM,iBAAwD,CAC5D,OAAO,KAAK,YAAyC,mBAAoB,EAAE,CAAC,CAG9E,MAAM,aAAa,EAAgE,CACjF,OAAO,KAAK,YAAsC,gBAAiB,EAAO,CAG5E,MAAM,QAAQ,EAAsD,CAClE,OAAO,KAAK,YAAiC,UAAW,EAAO,CAGjE,MAAM,YAAY,EAA8D,CAC9E,OAAO,KAAK,YAAqC,eAAgB,EAAO,CAG1E,MAAM,cAAc,EAAuD,CACzE,OAAO,KAAK,YAAuC,iBAAkB,CAAE,UAAS,CAAC,CAGnF,MAAM,iCACJ,EAC4C,CAC5C,OAAO,KAAK,YAA+C,0BAA2B,EAAO,CAG/F,MAAM,qBACJ,EAC2C,CAC3C,OAAO,KAAK,YAA8C,yBAA0B,EAAO,CAG7F,MAAM,2BACJ,EACiD,CACjD,OAAO,KAAK,YACV,gCACA,CAAE,UAAS,CACZ,CAGH,MAAM,cAAkD,CACtD,OAAO,KAAK,YAAsC,iBAAkB,EAAE,CAAC,CAGzE,MAAM,gBAAgB,EAAoD,CACxE,OAAO,KAAK,YAAyC,oBAAqB,CAAE,OAAM,CAAC,CAOrF,GAAkB,EAAuB,CACvC,IAAK,GAAM,CAAC,EAAI,KAAY,MAAA,EAC1B,aAAa,EAAQ,UAAU,CAC/B,EAAQ,OAAW,MAAM,EAAQ,CAAC,CAClC,MAAA,EAAsB,OAAO,EAAG,GC/PtC,MAAM,EAAa,KAGb,EAAiB,IAAS,IAIhC,SAAS,EAAS,EAA2B,CAC3C,IAAM,EAAmB,EAAE,CAC3B,IAAK,IAAI,EAAI,EAAG,EAAI,EAAM,OAAQ,GAAK,EACrC,EAAO,KAAK,OAAO,aAAa,GAAG,EAAM,SAAS,EAAG,EAAI,EAAW,CAAC,CAAC,CAExE,OAAO,KAAK,EAAO,KAAK,GAAG,CAAC,CAG9B,SAAS,EAAW,EAAyB,CAC3C,IAAI,EACJ,GAAI,CACF,EAAS,KAAK,EAAI,MACZ,CACN,MAAU,MAAM,gCAAgC,EAAI,OAAO,GAAG,CAEhE,GAAI,EAAO,SAAW,EACpB,MAAU,MAAM,4BAA4B,CAE9C,IAAM,EAAQ,IAAI,WAAW,EAAO,OAAO,CAC3C,IAAK,IAAI,EAAI,EAAG,EAAI,EAAO,OAAQ,IACjC,EAAM,GAAK,EAAO,WAAW,EAAE,CAEjC,OAAO,EAGT,SAAS,EAAiB,EAAyB,CACjD,MAAO,cAAc,IAGvB,SAAS,EAAiB,EAAiB,EAAsB,CAC/D,MAAO,cAAc,EAAQ,GAAG,IAGlC,SAAS,EAAe,EAAyB,CAC/C,MAAO,oBAAoB,IAG7B,SAAS,EAAe,EAA0C,CAChE,EAAa,EAAG,kBAAkB,CAClC,EAAiB,EAAG,cAAe,8BAA8B,CACjE,EAAiB,EAAG,YAAa,4BAA4B,CAG/D,SAAS,EAAmB,EAA6C,CACvE,EAAa,EAAG,qBAAqB,CACrC,EAAiB,EAAG,iBAAkB,oCAAoC,CAC1E,EAAiB,EAAG,eAAgB,kCAAkC,CAmBxE,IAAa,EAAb,KAA8B,CAC5B,GACA,GACA,GACA,GACA,GACA,GACA,GAAmB,IAAI,IACvB,GAAsD,KACtD,GAAwB,IAAI,IAC5B,GAAiD,KAEjD,GAAoC,KAEpC,YAAY,EAOT,CACD,MAAA,EAAgB,EAAK,QACrB,MAAA,EAAgB,EAAK,QACrB,MAAA,EAAmB,EAAK,WACxB,MAAA,GAAe,EAAK,KAAO,OAAU,IACrC,MAAA,EAAe,EAAK,QAAU,QAKhC,MAAM,aAAa,EAAmE,CACpF,GAAI,MAAA,IAAuB,IAAA,GACzB,OAAO,MAAA,EAIT,GAAI,MAAA,EACF,OAAO,MAAA,EAGT,MAAA,EAA0B,MAAA,EAAoB,EAAQ,CACtD,GAAI,CACF,OAAO,MAAM,MAAA,SACL,CACR,MAAA,EAA0B,MAI9B,MAAA,EAAqB,EAAmE,CACtF,IAAM,EAAM,EAAiB,MAAA,EAAc,CAE3C,GAAI,CACF,IAAM,EAAM,MAAM,MAAA,EAAc,IAAI,EAAI,CACxC,GAAI,EAAK,CACP,EAAe,EAAI,CACnB,IAAM,EAA0B,CAC9B,YAAa,EAAI,YACjB,UAAW,EAAW,EAAI,UAAU,CACrC,CAED,MADA,OAAA,EAAqB,EACd,SAEF,EAAK,CAEZ,MAAM,MAAA,EAAoB,EAAI,CAC9B,MAAA,EAAa,KACX,mFACA,CACE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CACF,CAGH,IAAM,EAAS,MAAM,GAAS,CAC9B,GAAI,IAAW,KACb,OAAO,KAGT,MAAA,EAAqB,EAErB,GAAI,CACF,IAAM,EAA0B,CAC9B,YAAa,EAAO,YACpB,UAAW,EAAS,EAAO,UAAU,CACrC,gBAAiB,KAAK,KAAK,CAC5B,CACD,MAAM,MAAA,EAAc,IAAI,EAAK,EAAO,OAC7B,EAAK,CACZ,MAAA,EAAa,KAAK,0CAA2C,CAC3D,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,OAAO,EAKT,MAAM,gBACJ,EACA,EAC6B,CAC7B,IAAM,EAAM,MAAA,EAAsB,IAAI,EAAK,CAC3C,GAAI,IAAQ,IAAA,GACV,OAAO,EAIT,IAAM,EAAW,MAAA,EAA2B,IAAI,EAAK,CACrD,GAAI,EACF,OAAO,EAGT,IAAM,EAAU,MAAA,EAAuB,EAAM,EAAQ,CACrD,MAAA,EAA2B,IAAI,EAAM,EAAQ,CAC7C,GAAI,CACF,OAAO,MAAM,SACL,CACR,MAAA,EAA2B,OAAO,EAAK,EAI3C,MAAA,EACE,EACA,EAC6B,CAC7B,IAAM,EAAM,EAAiB,MAAA,EAAe,EAAK,CAEjD,GAAI,CACF,IAAM,EAAM,MAAM,MAAA,EAAc,IAAI,EAAI,CACxC,GAAI,EAAK,CACP,EAAmB,EAAI,CACvB,IAAM,EAA6B,CACjC,eAAgB,EAAI,eACpB,aAAc,EAAW,EAAI,aAAa,CAC3C,CAED,OADA,MAAA,EAAsB,IAAI,EAAM,EAAO,CAChC,SAEF,EAAK,CAEZ,MAAM,MAAA,EAAoB,EAAI,CAC9B,MAAA,EAAa,KACX,sFACA,CACE,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CACF,CAGH,IAAM,EAAS,MAAM,GAAS,CAC9B,GAAI,IAAW,KACb,OAAO,KAGT,MAAA,EAAsB,IAAI,EAAM,EAAO,CAEvC,GAAI,CACF,IAAM,EAA6B,CACjC,eAAgB,EAAO,eACvB,aAAc,EAAS,EAAO,aAAa,CAC3C,gBAAiB,KAAK,KAAK,CAC5B,CACD,MAAM,MAAA,EAAc,IAAI,EAAK,EAAO,CAGpC,IAAM,EAAS,EAAe,MAAA,EAAc,CACtC,EACH,MAAM,MAAA,EAAc,IAAc,EAAO,CAAC,MAAO,IAChD,MAAA,EAAa,KAAK,2CAA4C,CAC5D,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,MACP,EAAK,EAAE,CACN,EAAS,SAAS,EAAK,EAC1B,MAAM,MAAA,EAAc,IAAI,EAAQ,CAAC,GAAG,EAAU,EAAK,CAAC,OAE/C,EAAK,CACZ,MAAA,EAAa,KAAK,6CAA8C,CAC9D,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,OAAO,EAaT,MAAM,iBAAoC,CAExC,GAAI,MAAA,EACF,OAAO,MAAA,EAET,MAAA,EAA6B,MAAA,GAA4B,CACzD,GAAI,CACF,OAAO,MAAM,MAAA,SACL,CACR,MAAA,EAA6B,MAIjC,MAAA,GAAgD,CAE9C,IAAM,EAAM,KAAK,KAAK,CAMtB,GALI,MAAA,IAA4B,MAAQ,EAAM,MAAA,EAA0B,MAAA,GAKpE,CAAC,MAAA,EACH,MAAO,GAGT,IAAM,EAAQ,EAAiB,MAAA,EAAc,CAGzC,EAAmC,KACnC,EAIC,EAAE,CAEP,GAAI,CAEF,GAAM,CAAC,EAAO,GAAW,MAAM,QAAQ,IAAI,CACzC,MAAA,EAAc,IAAI,EAAM,CACxB,MAAA,GAA2B,CAC5B,CAAC,CAGF,GAAI,EACF,GAAI,CACF,EAAe,EAAM,CACrB,EAAW,CAAE,GAAG,EAAO,gBAAiB,EAAM,iBAAmB,EAAG,OAC7D,EAAK,CACZ,MAAA,EAAa,KAAK,oDAAqD,CACrE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACF,MAAM,MAAA,EAAoB,EAAM,CAMpC,GAFA,EAAe,EAEX,CAAC,EACH,MAAO,GAST,GALuD,CACrD,EACA,GAAG,EAAa,IAAK,GAAM,EAAE,KAAK,CACnC,CAC2B,MAAO,GAAM,EAAM,EAAE,gBAAkB,MAAA,EAAY,CAG7E,MADA,OAAA,EAA0B,EACnB,GAIT,IAAM,EAAc,MAAM,WAAW,MAAM,GAAG,MAAA,EAAiB,SAAS,CACxE,GAAI,CAAC,EAAY,GAAI,CAEnB,IAAM,EAAiB,EAAM,MAAA,EAAc,EAc3C,OAbA,MAAA,EAAa,KAAK,+DAAgE,CAChF,OAAQ,EAAY,OACpB,WAAY,MAAA,EACb,CAAC,CACF,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,CACD,MAAA,EAA0B,EACnB,GAGT,IAAM,EAAY,MAAM,EAAY,MAAM,CAK1C,GACE,CAAC,GACD,OAAO,GAAa,UACpB,EAAE,iBAAkB,IACpB,CAAE,EAA2B,cAAc,MAAM,QACjD,EAAE,QAAS,IACX,OAAQ,EAA2B,KAAQ,SAC3C,CACA,MAAA,EAAa,MACX,4EACA,CACE,WAAY,MAAA,EACZ,aAAc,GAAY,OAAO,GAAa,SAAW,OAAO,KAAK,EAAS,CAAG,EAAE,CACpF,CACF,CAED,IAAM,EAAiB,EAAM,MAAA,EAAc,EAU3C,OATA,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,CACD,MAAA,EAA0B,EACnB,GAET,IAAM,EAAgB,EAGhB,EAAgB,EAAc,aAAa,KAAK,GAGtD,GAAI,EAAS,aAAe,GAAiB,IAAkB,EAAS,YAGtE,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAGT,IAAI,EAA6B,CAAE,GAAG,EAAU,gBAAiB,EAAK,CACtE,GAAI,EAAe,CACjB,IAAM,EAAY,MAAM,MAAA,EAA6B,EAAe,EAAS,CAC7E,GAAI,CAAC,EAAU,MAGb,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAET,EAAY,CACV,GAAG,EACH,YAAa,EACb,KAAM,EAAU,KAChB,aAAc,EAAU,aACzB,CAIH,IAAM,EAA2C,EAAE,CACnD,IAAK,IAAM,KAAS,EAAc,CAEhC,IAAM,EADc,EAAc,IAAI,OAAO,EAAM,KAAK,GAC5B,KAAK,GAGjC,GAAI,EAAM,KAAK,aAAe,GAAU,IAAW,EAAM,KAAK,YAG5D,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAGT,IAAI,EAAkC,CACpC,GAAG,EAAM,KACT,gBAAiB,EAClB,CACD,GAAI,EAAQ,CACV,IAAM,EAAY,MAAM,MAAA,EAA6B,EAAQ,EAAM,KAAK,CACxE,GAAI,CAAC,EAAU,MAGb,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAET,EAAc,CACZ,GAAG,EACH,YAAa,EACb,KAAM,EAAU,KAChB,aAAc,EAAU,aACzB,CAEH,EAAoB,KAAK,CAAE,GAAG,EAAO,KAAM,EAAa,CAAC,CAM3D,OAFA,MAAM,MAAA,EAAmB,EAAO,EAAW,EAAoB,CAC/D,MAAA,EAA0B,EACnB,SACA,EAAK,CACZ,IAAM,EAAQ,EAAQ,EAAI,CACpB,EACJ,aAAe,WACf,aAAe,gBACf,aAAe,YACf,aAAe,YACX,EAAQ,EAAqB,QAAU,OAC7C,MAAA,EAAa,GACX,EACI,sDACA,0DACJ,CACE,QAAS,MAAA,EACT,WAAY,MAAA,EACZ,MAAO,EAAM,QACd,CACF,CAGD,IAAM,EAAiB,EAAM,MAAA,EAAc,EAC3C,GAAI,CACE,GACF,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,OAEI,EAAU,CACjB,MAAA,EAAa,KAAK,kEAAmE,CACnF,QAAS,MAAA,EACT,MAAO,EAAQ,EAAS,CAAC,QAC1B,CAAC,CAGJ,MADA,OAAA,EAA0B,EACnB,IAMX,MAAA,EACE,EACA,EACmE,CACnE,IAAM,EAAgB,GAAQ,EAAO,MAAQ,EAAO,cAC9C,EAAkC,EAAE,CACtC,EAAO,OACT,EAAQ,iBAAmB,EAAO,MAEhC,EAAO,eACT,EAAQ,qBAAuB,EAAO,cAKxC,IAAI,EAAM,MAAM,WAAW,MAAM,EAAK,CAAE,OAAQ,OAAQ,UAAS,CAAC,CASlE,GANI,EAAI,SAAW,MACjB,EAAM,MAAM,WAAW,MAAM,EAAK,CAAE,UAAS,CAAC,EAK5C,CAAC,EAAI,IAAM,EAAI,SAAW,IAC5B,MAAU,MAAM,yCAAyC,EAAI,YAAY,EAAI,SAAS,CAGxF,IAAM,EAAO,EAAI,QAAQ,IAAI,OAAO,EAAI,IAAA,GAClC,EAAe,EAAI,QAAQ,IAAI,gBAAgB,EAAI,IAAA,GAgBzD,OAdI,EAAI,SAAW,IACV,CACL,MAAO,GACP,KAAM,GAAQ,EAAO,KACrB,aAAc,GAAgB,EAAO,aACtC,CAGE,EAME,CAAE,MAAO,GAAO,OAAM,eAAc,CAJlC,CAAE,MAAO,GAAM,OAAM,eAAc,CAS9C,MAAA,GAEE,CAEA,IAAM,EAAS,EAAe,MAAA,EAAc,CACtC,EACH,MAAM,MAAA,EAAc,IAAc,EAAO,CAAC,MAAO,IAChD,MAAA,EAAa,KAAK,kEAAmE,CACnF,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,MACP,EAAK,EAAE,CACL,EAAU,IAAI,IAAI,CAAC,GAAG,MAAA,EAAsB,MAAM,CAAE,GAAG,EAAc,CAAC,CAEtE,EAAY,MAAM,KAAK,EAAQ,CAwCrC,OAvCgB,MAAM,QAAQ,IAC5B,EAAU,IAAI,KAAO,IAAS,CAC5B,IAAM,EAAO,EAAiB,MAAA,EAAe,EAAK,CAE9C,EACJ,GAAI,CACF,EAAM,MAAM,MAAA,EAAc,IAAI,EAAK,OAC5B,EAAK,CAMZ,OALA,MAAA,EAAa,KAAK,yDAA0D,CAC1E,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,KAET,GAAI,CAAC,EACH,OAAO,KAET,GAAI,CAEF,OADA,EAAmB,EAAI,CAChB,CACL,OACA,IAAK,EACL,KAAM,CACJ,GAAG,EACH,gBAAiB,EAAI,iBAAmB,EACzC,CACF,OACM,EAAK,CAOZ,OANA,MAAA,EAAa,KAAK,gDAAiD,CACjE,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACF,MAAM,MAAA,EAAoB,EAAK,CACxB,OAET,CACH,EACc,OACZ,GAAoE,IAAM,KAC5E,CAGH,MAAA,EAAqB,EAA4B,CAC/C,MAAM,MAAA,EAAc,OAAO,EAAI,CAAC,MAAO,GAAQ,CAC7C,MAAA,EAAa,KAAK,+BAAgC,CAChD,QAAS,MAAA,EACT,MACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CAGJ,MAAA,EAAgB,EAAe,EAAqD,CAClF,IAAM,EAAS,EAAe,MAAA,EAAc,CAG5C,GAAI,CACF,MAAM,QAAQ,IAAI,CAChB,MAAA,EAAc,OAAO,EAAM,CAC3B,MAAA,EAAc,OAAO,EAAO,CAC5B,GAAG,EAAa,IAAK,GAAU,MAAA,EAAc,OAAO,EAAM,IAAI,CAAC,CAChE,CAAC,OACK,EAAK,CACZ,MAAA,EAAa,KAAK,0DAA2D,CAC3E,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,MAAA,EAAqB,IAAA,GACrB,MAAA,EAAsB,OAAO,CAG/B,MAAA,EACE,EACA,EACA,EACe,CACf,IAAM,EAAS,CACb,MAAA,EAAc,IAAI,EAAO,EAAG,CAAC,MAAO,GAAQ,CAC1C,MAAA,EAAa,KAAK,mDAAoD,CACpE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CACF,GAAG,EAAa,IAAK,GACnB,MAAA,EAAc,IAAI,EAAM,IAAK,EAAM,KAAK,CAAC,MAAO,GAAQ,CACtD,MAAA,EAAa,KAAK,+CAAgD,CAChE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CACH,CACF,CACD,MAAM,QAAQ,IAAI,EAAO"}
1
+ {"version":3,"file":"fhe-artifact-cache-DNoPom4I.js","names":["#worker","#initPromise","#doInitWorker","#pendingRequests","#rejectAllPending","#storage","#chainId","#relayerUrl","#ttlMs","#logger","#publicKeyMem","#publicKeyInflight","#loadPublicKey","#deleteQuietly","#publicParamsMem","#publicParamsInflight","#loadPublicParams","#revalidationInflight","#revalidateIfDueInner","#lastRevalidatedAt","#collectParamEntries","#writeEntries","#clearAll","#checkArtifactFreshness"],"sources":["../../src/worker/worker.base-client.ts","../../src/relayer/fhe-artifact-cache.ts"],"sourcesContent":["import type { Handle } from \"../relayer/relayer-sdk.types\";\nimport type { ZKProofLike } from \"@zama-fhe/relayer-sdk/bundle\";\nimport type {\n CreateDelegatedEIP712Payload,\n CreateDelegatedEIP712ResponseData,\n CreateEIP712Payload,\n CreateEIP712ResponseData,\n DelegatedUserDecryptPayload,\n DelegatedUserDecryptResponseData,\n EncryptPayload,\n EncryptResponseData,\n GenerateKeypairResponseData,\n GetPublicKeyResponseData,\n GetPublicParamsResponseData,\n InitResponseData,\n PublicDecryptResponseData,\n RequestZKProofVerificationResponseData,\n UserDecryptPayload,\n UserDecryptResponseData,\n GenericLogger,\n WorkerRequest,\n WorkerRequestType,\n WorkerResponse,\n} from \"./worker.types\";\n\n/** Pending request tracker */\ninterface PendingRequest<T> {\n resolve: (value: T) => void;\n reject: (error: Error) => void;\n timeoutId: ReturnType<typeof setTimeout>;\n startTime: number;\n type: WorkerRequestType;\n}\n\n/** Default timeout for operations (30 seconds) */\nexport const DEFAULT_TIMEOUT_MS = 30_000;\n\n/** Extended timeout for WASM initialization (60 seconds) */\nexport const INIT_TIMEOUT_MS = 60_000;\n\n/**\n * Abstract base class for worker clients (browser Web Worker and Node.js worker_threads).\n * Encapsulates all shared logic: pending request tracking, timeouts, init dedup, domain methods.\n * Subclasses implement the abstract hooks for platform-specific worker creation and messaging.\n */\nexport abstract class BaseWorkerClient<TWorker, TConfig> {\n #worker: TWorker | null = null;\n #pendingRequests = new Map<string, PendingRequest<unknown>>();\n #initPromise: Promise<TWorker> | null = null;\n protected readonly config: TConfig;\n protected readonly logger: GenericLogger | undefined;\n\n constructor(config: TConfig, logger: GenericLogger | undefined) {\n this.config = config;\n this.logger = logger;\n }\n\n // ===========================================================================\n // Abstract hooks — subclasses must implement\n // ===========================================================================\n\n /** Create the platform-specific worker instance. */\n protected abstract createWorker(): TWorker;\n\n /** Wire message/error/messageerror events on the worker. */\n protected abstract wireEvents(worker: TWorker): void;\n\n /** Post a message to the worker. */\n protected abstract postMessage(worker: TWorker, request: WorkerRequest): void;\n\n /** Terminate the platform-specific worker. */\n protected abstract terminateWorker(worker: TWorker): void;\n\n /** Generate a unique request ID. */\n protected abstract generateRequestId(): string;\n\n /** Return the init request type and payload. */\n protected abstract getInitPayload(): {\n type: WorkerRequestType;\n payload: WorkerRequest[\"payload\"];\n };\n\n /** Optional hook called after worker init succeeds (e.g. for node worker.unref()). */\n protected onWorkerReady?(_worker: TWorker): void;\n\n // ===========================================================================\n // Shared init / terminate\n // ===========================================================================\n\n async initWorker(): Promise<TWorker> {\n if (this.#worker) {\n return this.#worker;\n }\n\n if (!this.#initPromise) {\n this.#initPromise = this.#doInitWorker().catch((error) => {\n this.#initPromise = null;\n throw error;\n });\n }\n return this.#initPromise;\n }\n\n async #doInitWorker(): Promise<TWorker> {\n const worker = this.createWorker();\n this.wireEvents(worker);\n\n try {\n const { type, payload } = this.getInitPayload();\n await this.sendRequestTo<InitResponseData>(worker, type, payload, INIT_TIMEOUT_MS);\n this.onWorkerReady?.(worker);\n this.#worker = worker;\n } catch (error) {\n this.terminateWorker(worker);\n throw error;\n }\n\n return this.#worker;\n }\n\n terminate(): void {\n if (this.#worker) {\n for (const [id, pending] of this.#pendingRequests) {\n clearTimeout(pending.timeoutId);\n pending.reject(new Error(\"Worker terminated\"));\n this.#pendingRequests.delete(id);\n }\n\n this.terminateWorker(this.#worker);\n this.#worker = null;\n }\n this.#initPromise = null;\n }\n\n // ===========================================================================\n // Message handling (called by subclass event wiring)\n // ===========================================================================\n\n protected handleResponse(response: WorkerResponse<unknown>): void {\n const pending = this.#pendingRequests.get(response.id);\n\n if (!pending) {\n this.logger?.warn(\"[WorkerClient] Received response for unknown request\", {\n id: response.id,\n });\n return;\n }\n\n const elapsed = Math.round(performance.now() - pending.startTime);\n\n clearTimeout(pending.timeoutId);\n this.#pendingRequests.delete(response.id);\n\n if (response.success) {\n this.logger?.debug(`[WorkerClient] ← ${pending.type} OK`, {\n id: response.id,\n elapsed,\n });\n pending.resolve(response.data);\n } else {\n this.logger?.error(`[WorkerClient] ← ${pending.type} FAILED`, {\n id: response.id,\n elapsed,\n error: response.error,\n });\n const err = new Error(response.error);\n if (\"statusCode\" in response && typeof response.statusCode === \"number\") {\n (err as Error & { statusCode?: number }).statusCode = response.statusCode;\n }\n pending.reject(err);\n }\n }\n\n protected handleWorkerError(message: string): void {\n this.logger?.error(\"[WorkerClient] Worker error\", { error: message });\n const worker = this.#worker;\n this.#worker = null;\n this.#rejectAllPending(`Worker error: ${message}`);\n if (worker) {\n this.terminateWorker(worker);\n }\n }\n\n protected handleWorkerMessageError(): void {\n this.logger?.error(\"[WorkerClient] Message deserialization failed\");\n const worker = this.#worker;\n this.#worker = null;\n this.#rejectAllPending(\"Worker message deserialization failed\");\n if (worker) {\n this.terminateWorker(worker);\n }\n }\n\n // ===========================================================================\n // Request sending\n // ===========================================================================\n\n protected sendRequestTo<T>(\n worker: TWorker,\n type: WorkerRequestType,\n payload: WorkerRequest[\"payload\"],\n timeoutMs: number = DEFAULT_TIMEOUT_MS,\n ): Promise<T> {\n return new Promise<T>((resolve, reject) => {\n const id = this.generateRequestId();\n const startTime = performance.now();\n this.logger?.debug(`[WorkerClient] → ${type}`, { id });\n\n const timeoutId = setTimeout(() => {\n this.#pendingRequests.delete(id);\n const elapsed = Math.round(performance.now() - startTime);\n this.logger?.error(`[WorkerClient] ${type} timed out after ${timeoutMs}ms`, {\n id,\n elapsed,\n });\n reject(new Error(`Request ${type} timed out after ${timeoutMs}ms`));\n }, timeoutMs);\n\n this.#pendingRequests.set(id, {\n resolve: resolve as (value: unknown) => void,\n reject,\n timeoutId,\n startTime,\n type,\n });\n\n const request = { id, type, payload } as WorkerRequest;\n this.postMessage(worker, request);\n });\n }\n\n protected async sendRequest<T>(\n type: WorkerRequestType,\n payload: WorkerRequest[\"payload\"],\n timeoutMs: number = DEFAULT_TIMEOUT_MS,\n ): Promise<T> {\n const worker = await this.initWorker();\n return this.sendRequestTo<T>(worker, type, payload, timeoutMs);\n }\n\n // ===========================================================================\n // Domain methods\n // ===========================================================================\n\n async generateKeypair(): Promise<GenerateKeypairResponseData> {\n return this.sendRequest<GenerateKeypairResponseData>(\"GENERATE_KEYPAIR\", {});\n }\n\n async createEIP712(params: CreateEIP712Payload): Promise<CreateEIP712ResponseData> {\n return this.sendRequest<CreateEIP712ResponseData>(\"CREATE_EIP712\", params);\n }\n\n async encrypt(params: EncryptPayload): Promise<EncryptResponseData> {\n return this.sendRequest<EncryptResponseData>(\"ENCRYPT\", params);\n }\n\n async userDecrypt(params: UserDecryptPayload): Promise<UserDecryptResponseData> {\n return this.sendRequest<UserDecryptResponseData>(\"USER_DECRYPT\", params);\n }\n\n async publicDecrypt(handles: Handle[]): Promise<PublicDecryptResponseData> {\n return this.sendRequest<PublicDecryptResponseData>(\"PUBLIC_DECRYPT\", { handles });\n }\n\n async createDelegatedUserDecryptEIP712(\n params: CreateDelegatedEIP712Payload,\n ): Promise<CreateDelegatedEIP712ResponseData> {\n return this.sendRequest<CreateDelegatedEIP712ResponseData>(\"CREATE_DELEGATED_EIP712\", params);\n }\n\n async delegatedUserDecrypt(\n params: DelegatedUserDecryptPayload,\n ): Promise<DelegatedUserDecryptResponseData> {\n return this.sendRequest<DelegatedUserDecryptResponseData>(\"DELEGATED_USER_DECRYPT\", params);\n }\n\n async requestZKProofVerification(\n zkProof: ZKProofLike,\n ): Promise<RequestZKProofVerificationResponseData> {\n return this.sendRequest<RequestZKProofVerificationResponseData>(\n \"REQUEST_ZK_PROOF_VERIFICATION\",\n { zkProof },\n );\n }\n\n async getPublicKey(): Promise<GetPublicKeyResponseData> {\n return this.sendRequest<GetPublicKeyResponseData>(\"GET_PUBLIC_KEY\", {});\n }\n\n async getPublicParams(bits: number): Promise<GetPublicParamsResponseData> {\n return this.sendRequest<GetPublicParamsResponseData>(\"GET_PUBLIC_PARAMS\", { bits });\n }\n\n // ===========================================================================\n // Internal helpers\n // ===========================================================================\n\n #rejectAllPending(message: string): void {\n for (const [id, pending] of this.#pendingRequests) {\n clearTimeout(pending.timeoutId);\n pending.reject(new Error(message));\n this.#pendingRequests.delete(id);\n }\n }\n}\n","import type { GenericStorage } from \"../types\";\nimport { assertObject, assertStringProp, toError } from \"../utils\";\nimport type { GenericLogger } from \"../worker/worker.types\";\n\n// ── Cached data shapes ──────────────────────────────────────\n\n/** Cached shape for the FHE network public key. */\ninterface CachedPublicKey {\n publicKeyId: string;\n /** Base64-encoded Uint8Array. */\n publicKey: string;\n /** Artifact URL from the manifest. */\n artifactUrl?: string;\n /** HTTP ETag from the artifact response. */\n etag?: string;\n /** HTTP Last-Modified from the artifact response. */\n lastModified?: string;\n /** Epoch-ms timestamp of the last successful revalidation. */\n lastValidatedAt: number;\n}\n\n/** Cached shape for FHE public params. */\ninterface CachedPublicParams {\n publicParamsId: string;\n /** Base64-encoded Uint8Array. */\n publicParams: string;\n artifactUrl?: string;\n etag?: string;\n lastModified?: string;\n lastValidatedAt: number;\n}\n\n// ── Return types ────────────────────────────────────────────\n\n/** Return type of the public key fetcher. */\ntype PublicKeyResult = { publicKeyId: string; publicKey: Uint8Array } | null;\n\n/** Return type of the public params fetcher. */\ntype PublicParamsResult = {\n publicParamsId: string;\n publicParams: Uint8Array;\n} | null;\n\n// ── Constants ───────────────────────────────────────────────\n\n/** Max chunk size for String.fromCharCode to avoid call-stack overflow on large buffers. */\nconst CHUNK_SIZE = 8192;\n\n/** On revalidation failure, retry after 5 minutes instead of the full TTL. */\nconst SHORT_RETRY_MS = 5 * 60 * 1000;\n\n// ── Helpers ─────────────────────────────────────────────────\n\nfunction toBase64(bytes: Uint8Array): string {\n const chunks: string[] = [];\n for (let i = 0; i < bytes.length; i += CHUNK_SIZE) {\n chunks.push(String.fromCharCode(...bytes.subarray(i, i + CHUNK_SIZE)));\n }\n return btoa(chunks.join(\"\"));\n}\n\nfunction fromBase64(b64: string): Uint8Array {\n let binary: string;\n try {\n binary = atob(b64);\n } catch {\n throw new Error(`Invalid base64 data (length: ${b64.length})`);\n }\n if (binary.length === 0) {\n throw new Error(\"Decoded artifact is empty\");\n }\n const bytes = new Uint8Array(binary.length);\n for (let i = 0; i < binary.length; i++) {\n bytes[i] = binary.charCodeAt(i);\n }\n return bytes;\n}\n\nfunction pubkeyStorageKey(chainId: number): string {\n return `fhe:pubkey:${chainId}`;\n}\n\nfunction paramsStorageKey(chainId: number, bits: number): string {\n return `fhe:params:${chainId}:${bits}`;\n}\n\nfunction paramsIndexKey(chainId: number): string {\n return `fhe:params-index:${chainId}`;\n}\n\nfunction assertCachedPk(v: unknown): asserts v is CachedPublicKey {\n assertObject(v, \"CachedPublicKey\");\n assertStringProp(v, \"publicKeyId\", \"CachedPublicKey.publicKeyId\");\n assertStringProp(v, \"publicKey\", \"CachedPublicKey.publicKey\");\n}\n\nfunction assertCachedParams(v: unknown): asserts v is CachedPublicParams {\n assertObject(v, \"CachedPublicParams\");\n assertStringProp(v, \"publicParamsId\", \"CachedPublicParams.publicParamsId\");\n assertStringProp(v, \"publicParams\", \"CachedPublicParams.publicParams\");\n}\n\n/** Manifest shape returned by the relayer `/keyurl` endpoint. */\ninterface ManifestShape {\n fhePublicKey: { dataId: string; urls: string[] };\n crs: Record<string, { dataId: string; urls: string[] }>;\n}\n\n// ── ArtifactCache ──────────────────────────────────────────\n\n/**\n * Persistent cache for FHE network public key and public params.\n * Uses a {@link GenericStorage} backend (e.g. MemoryStorage, or any\n * user-provided async key-value adapter) to avoid re-downloading large\n * binary data on every app instantiation.\n *\n * Cache keys are scoped by chain ID.\n */\nexport class FheArtifactCache {\n readonly #storage: GenericStorage;\n readonly #chainId: number;\n readonly #relayerUrl: string;\n readonly #ttlMs: number;\n readonly #logger: GenericLogger;\n #publicKeyMem: PublicKeyResult | undefined;\n #publicParamsMem = new Map<number, PublicParamsResult>();\n #publicKeyInflight: Promise<PublicKeyResult> | null = null;\n #publicParamsInflight = new Map<number, Promise<PublicParamsResult>>();\n #revalidationInflight: Promise<boolean> | null = null;\n /** In-memory guard to skip storage reads when revalidation isn't due. */\n #lastRevalidatedAt: number | null = null;\n\n constructor(opts: {\n storage: GenericStorage;\n chainId: number;\n relayerUrl: string;\n /** Cache TTL in seconds. Default: 86 400 (24 h). Set to 0 to revalidate on every operation. */\n ttl?: number;\n logger?: GenericLogger;\n }) {\n this.#storage = opts.storage;\n this.#chainId = opts.chainId;\n this.#relayerUrl = opts.relayerUrl;\n this.#ttlMs = (opts.ttl ?? 86_400) * 1000;\n this.#logger = opts.logger ?? console;\n }\n\n // ── getPublicKey ────────────────────────────────────────\n\n async getPublicKey(fetcher: () => Promise<PublicKeyResult>): Promise<PublicKeyResult> {\n if (this.#publicKeyMem !== undefined) {\n return this.#publicKeyMem;\n }\n\n // Deduplicate concurrent calls\n if (this.#publicKeyInflight) {\n return this.#publicKeyInflight;\n }\n\n this.#publicKeyInflight = this.#loadPublicKey(fetcher);\n try {\n return await this.#publicKeyInflight;\n } finally {\n this.#publicKeyInflight = null;\n }\n }\n\n async #loadPublicKey(fetcher: () => Promise<PublicKeyResult>): Promise<PublicKeyResult> {\n const key = pubkeyStorageKey(this.#chainId);\n\n try {\n const raw = await this.#storage.get(key);\n if (raw) {\n assertCachedPk(raw);\n const result: PublicKeyResult = {\n publicKeyId: raw.publicKeyId,\n publicKey: fromBase64(raw.publicKey),\n };\n this.#publicKeyMem = result;\n return result;\n }\n } catch (err) {\n // Corrupt or unreadable entry — delete and fall through to fetcher\n await this.#deleteQuietly(key);\n this.#logger.warn(\n \"Failed to read public key from persistent storage, falling back to network fetch\",\n {\n chainId: this.#chainId,\n error: toError(err).message,\n },\n );\n }\n\n const result = await fetcher();\n if (result === null) {\n return null;\n }\n\n this.#publicKeyMem = result;\n\n try {\n const cached: CachedPublicKey = {\n publicKeyId: result.publicKeyId,\n publicKey: toBase64(result.publicKey),\n lastValidatedAt: Date.now(),\n };\n await this.#storage.set(key, cached);\n } catch (err) {\n this.#logger.warn(\"Failed to persist public key to storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }\n\n return result;\n }\n\n // ── getPublicParams ─────────────────────────────────────\n\n async getPublicParams(\n bits: number,\n fetcher: () => Promise<PublicParamsResult>,\n ): Promise<PublicParamsResult> {\n const mem = this.#publicParamsMem.get(bits);\n if (mem !== undefined) {\n return mem;\n }\n\n // Deduplicate concurrent calls\n const inflight = this.#publicParamsInflight.get(bits);\n if (inflight) {\n return inflight;\n }\n\n const promise = this.#loadPublicParams(bits, fetcher);\n this.#publicParamsInflight.set(bits, promise);\n try {\n return await promise;\n } finally {\n this.#publicParamsInflight.delete(bits);\n }\n }\n\n async #loadPublicParams(\n bits: number,\n fetcher: () => Promise<PublicParamsResult>,\n ): Promise<PublicParamsResult> {\n const key = paramsStorageKey(this.#chainId, bits);\n\n try {\n const raw = await this.#storage.get(key);\n if (raw) {\n assertCachedParams(raw);\n const result: PublicParamsResult = {\n publicParamsId: raw.publicParamsId,\n publicParams: fromBase64(raw.publicParams),\n };\n this.#publicParamsMem.set(bits, result);\n return result;\n }\n } catch (err) {\n // Corrupt or unreadable entry — delete and fall through to fetcher\n await this.#deleteQuietly(key);\n this.#logger.warn(\n \"Failed to read public params from persistent storage, falling back to network fetch\",\n {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n },\n );\n }\n\n const result = await fetcher();\n if (result === null) {\n return null;\n }\n\n this.#publicParamsMem.set(bits, result);\n\n try {\n const cached: CachedPublicParams = {\n publicParamsId: result.publicParamsId,\n publicParams: toBase64(result.publicParams),\n lastValidatedAt: Date.now(),\n };\n await this.#storage.set(key, cached);\n\n // Update params index for cold-start CRS detection\n const idxKey = paramsIndexKey(this.#chainId);\n const existing =\n (await this.#storage.get<number[]>(idxKey).catch((err) => {\n this.#logger.warn(\"Failed to read params index from storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n return null;\n })) ?? [];\n if (!existing.includes(bits)) {\n await this.#storage.set(idxKey, [...existing, bits]);\n }\n } catch (err) {\n this.#logger.warn(\"Failed to persist public params to storage\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n }\n\n return result;\n }\n\n // ── Artifact-level revalidation ─────────────────────────\n\n /**\n * Check whether cached FHE artifacts are still fresh by issuing\n * HTTP conditional requests (ETag / If-None-Match, Last-Modified /\n * If-Modified-Since) against the actual artifact CDN URLs.\n *\n * @returns `true` if the cache was invalidated and the caller should\n * re-fetch artifacts, `false` otherwise.\n */\n async revalidateIfDue(): Promise<boolean> {\n // Concurrency guard — coalesce overlapping calls\n if (this.#revalidationInflight) {\n return this.#revalidationInflight;\n }\n this.#revalidationInflight = this.#revalidateIfDueInner();\n try {\n return await this.#revalidationInflight;\n } finally {\n this.#revalidationInflight = null;\n }\n }\n\n async #revalidateIfDueInner(): Promise<boolean> {\n // Fast path: in-memory timestamp check avoids storage I/O on every call\n const now = Date.now();\n if (this.#lastRevalidatedAt !== null && now - this.#lastRevalidatedAt < this.#ttlMs) {\n return false;\n }\n\n // Skip revalidation when relayerUrl is not configured (e.g. Hardhat)\n if (!this.#relayerUrl) {\n return false;\n }\n\n const pkKey = pubkeyStorageKey(this.#chainId);\n\n // Track partial progress so the catch block can reuse already-read data\n let storedPk: CachedPublicKey | null = null;\n let paramEntries: Array<{\n bits: number;\n key: string;\n data: CachedPublicParams;\n }> = [];\n\n try {\n // 1. Read PK cache entry and collect params entries in parallel\n const [pkRaw, entries] = await Promise.all([\n this.#storage.get(pkKey),\n this.#collectParamEntries(),\n ]);\n\n // Validate PK shape\n if (pkRaw) {\n try {\n assertCachedPk(pkRaw);\n storedPk = { ...pkRaw, lastValidatedAt: pkRaw.lastValidatedAt ?? 0 };\n } catch (err) {\n this.#logger.warn(\"Corrupt public key cache entry detected, deleting\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n await this.#deleteQuietly(pkKey);\n }\n }\n\n paramEntries = entries;\n\n if (!storedPk) {\n return false;\n }\n\n // 2. Check if all entries are within TTL\n const allEntries: Array<{ lastValidatedAt: number }> = [\n storedPk,\n ...paramEntries.map((e) => e.data),\n ];\n const allFresh = allEntries.every((e) => now - e.lastValidatedAt < this.#ttlMs);\n if (allFresh) {\n this.#lastRevalidatedAt = now;\n return false;\n }\n\n // 3. Fetch manifest to discover current artifact URLs\n const manifestRes = await globalThis.fetch(`${this.#relayerUrl}/keyurl`);\n if (!manifestRes.ok) {\n // Treat as transient failure — use short retry instead of full TTL\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n this.#logger.warn(\"Manifest fetch failed during revalidation, retrying in 5 min\", {\n status: manifestRes.status,\n relayerUrl: this.#relayerUrl,\n });\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n\n const manifest = (await manifestRes.json()) as unknown;\n\n // Validate manifest shape — a malformed response indicates a permanent\n // config error (wrong relayer URL, API version mismatch), not a transient\n // network issue. Log at error level so it's actionable.\n if (\n !manifest ||\n typeof manifest !== \"object\" ||\n !(\"fhePublicKey\" in manifest) ||\n !(manifest as ManifestShape).fhePublicKey?.urls?.length ||\n !(\"crs\" in manifest) ||\n typeof (manifest as ManifestShape).crs !== \"object\"\n ) {\n this.#logger.error(\n \"Relayer manifest has unexpected shape — check relayer URL and API version\",\n {\n relayerUrl: this.#relayerUrl,\n manifestKeys: manifest && typeof manifest === \"object\" ? Object.keys(manifest) : [],\n },\n );\n // Fail-open with short retry — but the error-level log distinguishes this from transient failures\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n const validManifest = manifest as ManifestShape;\n\n // ── 4. Check PK artifact ──────────────────────────\n const pkArtifactUrl = validManifest.fhePublicKey.urls[0];\n\n // URL change → stale\n if (storedPk.artifactUrl && pkArtifactUrl && pkArtifactUrl !== storedPk.artifactUrl) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n\n let updatedPk: CachedPublicKey = { ...storedPk, lastValidatedAt: now };\n if (pkArtifactUrl) {\n const freshness = await this.#checkArtifactFreshness(pkArtifactUrl, storedPk);\n if (!freshness.fresh) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n updatedPk = {\n ...updatedPk,\n artifactUrl: pkArtifactUrl,\n etag: freshness.etag,\n lastModified: freshness.lastModified,\n };\n }\n\n // ── 5. Check each CRS artifact ────────────────────\n const updatedParamEntries: typeof paramEntries = [];\n for (const entry of paramEntries) {\n const manifestCrs = validManifest.crs[String(entry.bits)];\n const crsUrl = manifestCrs?.urls[0];\n\n // URL change → stale\n if (entry.data.artifactUrl && crsUrl && crsUrl !== entry.data.artifactUrl) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n\n let updatedData: CachedPublicParams = {\n ...entry.data,\n lastValidatedAt: now,\n };\n if (crsUrl) {\n const freshness = await this.#checkArtifactFreshness(crsUrl, entry.data);\n if (!freshness.fresh) {\n await this.#clearAll(pkKey, paramEntries);\n this.#lastRevalidatedAt = null;\n return true;\n }\n updatedData = {\n ...updatedData,\n artifactUrl: crsUrl,\n etag: freshness.etag,\n lastModified: freshness.lastModified,\n };\n }\n updatedParamEntries.push({ ...entry, data: updatedData });\n }\n\n // 6. All fresh — update timestamps and HTTP validators\n await this.#writeEntries(pkKey, updatedPk, updatedParamEntries);\n this.#lastRevalidatedAt = now;\n return false;\n } catch (err) {\n const error = toError(err);\n const isProgrammingError =\n err instanceof TypeError ||\n err instanceof ReferenceError ||\n err instanceof RangeError ||\n err instanceof SyntaxError;\n const level = isProgrammingError ? \"error\" : \"warn\";\n this.#logger[level](\n isProgrammingError\n ? \"Unexpected error during revalidation (possible bug)\"\n : \"Revalidation failed, using cached artifacts (fail-open)\",\n {\n chainId: this.#chainId,\n relayerUrl: this.#relayerUrl,\n error: error.message,\n },\n );\n\n // Fail-open: use short retry interval (5 min) instead of full TTL\n const retryTimestamp = now - this.#ttlMs + SHORT_RETRY_MS;\n try {\n if (storedPk) {\n await this.#writeEntries(\n pkKey,\n { ...storedPk, lastValidatedAt: retryTimestamp },\n paramEntries.map((e) => ({\n ...e,\n data: { ...e.data, lastValidatedAt: retryTimestamp },\n })),\n );\n }\n } catch (innerErr) {\n this.#logger.warn(\"Failed to update validation timestamps after revalidation error\", {\n chainId: this.#chainId,\n error: toError(innerErr).message,\n });\n }\n this.#lastRevalidatedAt = retryTimestamp;\n return false;\n }\n }\n\n // ── Artifact freshness via HTTP conditional requests ───\n\n async #checkArtifactFreshness(\n url: string,\n cached: { etag?: string; lastModified?: string },\n ): Promise<{ fresh: boolean; etag?: string; lastModified?: string }> {\n const hasValidators = Boolean(cached.etag || cached.lastModified);\n const headers: Record<string, string> = {};\n if (cached.etag) {\n headers[\"If-None-Match\"] = cached.etag;\n }\n if (cached.lastModified) {\n headers[\"If-Modified-Since\"] = cached.lastModified;\n }\n\n // HEAD avoids downloading the (potentially multi-MB) artifact body.\n // With conditional headers, the server returns 304 if unchanged or 200 (no body) if stale.\n let res = await globalThis.fetch(url, { method: \"HEAD\", headers });\n\n // Fallback to GET if HEAD is not supported (e.g. some CDN/WAF configs)\n if (res.status === 405) {\n res = await globalThis.fetch(url, { headers });\n }\n\n // Treat server errors as transient — throw so the outer catch applies fail-open with short retry.\n // Without this, a CDN 5xx would be misinterpreted as \"artifact changed\" and wipe the cache.\n if (!res.ok && res.status !== 304) {\n throw new Error(`Artifact freshness check failed: HEAD ${url} returned ${res.status}`);\n }\n\n const etag = res.headers.get(\"etag\") ?? undefined;\n const lastModified = res.headers.get(\"last-modified\") ?? undefined;\n\n if (res.status === 304) {\n return {\n fresh: true,\n etag: etag ?? cached.etag,\n lastModified: lastModified ?? cached.lastModified,\n };\n }\n\n if (!hasValidators) {\n // First revalidation — capture validators, treat as fresh\n return { fresh: true, etag, lastModified };\n }\n\n // 200 = artifact changed\n return { fresh: false, etag, lastModified };\n }\n\n // ── Internal helpers ────────────────────────────────────\n\n async #collectParamEntries(): Promise<\n Array<{ bits: number; key: string; data: CachedPublicParams }>\n > {\n // Merge in-memory keys with persisted index for cold-start CRS detection\n const idxKey = paramsIndexKey(this.#chainId);\n const persistedBits =\n (await this.#storage.get<number[]>(idxKey).catch((err) => {\n this.#logger.warn(\"Failed to read params index, CRS revalidation may be incomplete\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n return null;\n })) ?? [];\n const allBits = new Set([...this.#publicParamsMem.keys(), ...persistedBits]);\n\n const bitsArray = Array.from(allBits);\n const results = await Promise.all(\n bitsArray.map(async (bits) => {\n const pKey = paramsStorageKey(this.#chainId, bits);\n // Separate storage read from validation so we only delete on corruption\n let raw: unknown;\n try {\n raw = await this.#storage.get(pKey);\n } catch (err) {\n this.#logger.warn(\"Failed to read cached params entry during revalidation\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n return null;\n }\n if (!raw) {\n return null;\n }\n try {\n assertCachedParams(raw);\n return {\n bits,\n key: pKey,\n data: {\n ...raw,\n lastValidatedAt: raw.lastValidatedAt ?? 0,\n } as CachedPublicParams,\n };\n } catch (err) {\n this.#logger.warn(\"Corrupt params cache entry detected, deleting\", {\n chainId: this.#chainId,\n bits,\n error: toError(err).message,\n });\n await this.#deleteQuietly(pKey);\n return null;\n }\n }),\n );\n return results.filter(\n (e): e is { bits: number; key: string; data: CachedPublicParams } => e !== null,\n );\n }\n\n async #deleteQuietly(key: string): Promise<void> {\n await this.#storage.delete(key).catch((err) => {\n this.#logger.warn(\"Failed to delete cache entry\", {\n chainId: this.#chainId,\n key,\n error: toError(err).message,\n });\n });\n }\n\n async #clearAll(pkKey: string, paramEntries: Array<{ key: string }>): Promise<void> {\n const idxKey = paramsIndexKey(this.#chainId);\n // Delete from persistent storage first — if this fails, in-memory cache\n // still serves stale data, but the next revalidation cycle will retry.\n try {\n await Promise.all([\n this.#storage.delete(pkKey),\n this.#storage.delete(idxKey),\n ...paramEntries.map((entry) => this.#storage.delete(entry.key)),\n ]);\n } catch (err) {\n this.#logger.warn(\"Failed to clear stale artifacts from persistent storage\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }\n // Clear in-memory after storage to avoid re-loading stale entries on failure\n this.#publicKeyMem = undefined;\n this.#publicParamsMem.clear();\n }\n\n async #writeEntries(\n pkKey: string,\n pk: CachedPublicKey,\n paramEntries: Array<{ key: string; data: CachedPublicParams }>,\n ): Promise<void> {\n const writes = [\n this.#storage.set(pkKey, pk).catch((err) => {\n this.#logger.warn(\"Failed to update public key validation timestamp\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }),\n ...paramEntries.map((entry) =>\n this.#storage.set(entry.key, entry.data).catch((err) => {\n this.#logger.warn(\"Failed to update params validation timestamp\", {\n chainId: this.#chainId,\n error: toError(err).message,\n });\n }),\n ),\n ];\n await Promise.all(writes);\n }\n}\n"],"mappings":"qGAmCA,MAAa,EAAqB,IAUlC,IAAsB,EAAtB,KAAyD,CACvD,GAA0B,KAC1B,GAAmB,IAAI,IACvB,GAAwC,KACxC,OACA,OAEA,YAAY,EAAiB,EAAmC,CAC9D,KAAK,OAAS,EACd,KAAK,OAAS,EAmChB,MAAM,YAA+B,CAWnC,OAVI,MAAA,EACK,MAAA,GAGT,AACE,MAAA,IAAoB,MAAA,GAAoB,CAAC,MAAO,GAAU,CAExD,KADA,OAAA,EAAoB,KACd,GACN,CAEG,MAAA,GAGT,MAAA,GAAwC,CACtC,IAAM,EAAS,KAAK,cAAc,CAClC,KAAK,WAAW,EAAO,CAEvB,GAAI,CACF,GAAM,CAAE,OAAM,WAAY,KAAK,gBAAgB,CAC/C,MAAM,KAAK,cAAgC,EAAQ,EAAM,EAAS,IAAgB,CAClF,KAAK,gBAAgB,EAAO,CAC5B,MAAA,EAAe,QACR,EAAO,CAEd,MADA,KAAK,gBAAgB,EAAO,CACtB,EAGR,OAAO,MAAA,EAGT,WAAkB,CAChB,GAAI,MAAA,EAAc,CAChB,IAAK,GAAM,CAAC,EAAI,KAAY,MAAA,EAC1B,aAAa,EAAQ,UAAU,CAC/B,EAAQ,OAAW,MAAM,oBAAoB,CAAC,CAC9C,MAAA,EAAsB,OAAO,EAAG,CAGlC,KAAK,gBAAgB,MAAA,EAAa,CAClC,MAAA,EAAe,KAEjB,MAAA,EAAoB,KAOtB,eAAyB,EAAyC,CAChE,IAAM,EAAU,MAAA,EAAsB,IAAI,EAAS,GAAG,CAEtD,GAAI,CAAC,EAAS,CACZ,KAAK,QAAQ,KAAK,uDAAwD,CACxE,GAAI,EAAS,GACd,CAAC,CACF,OAGF,IAAM,EAAU,KAAK,MAAM,YAAY,KAAK,CAAG,EAAQ,UAAU,CAKjE,GAHA,aAAa,EAAQ,UAAU,CAC/B,MAAA,EAAsB,OAAO,EAAS,GAAG,CAErC,EAAS,QACX,KAAK,QAAQ,MAAM,oBAAoB,EAAQ,KAAK,KAAM,CACxD,GAAI,EAAS,GACb,UACD,CAAC,CACF,EAAQ,QAAQ,EAAS,KAAK,KACzB,CACL,KAAK,QAAQ,MAAM,oBAAoB,EAAQ,KAAK,SAAU,CAC5D,GAAI,EAAS,GACb,UACA,MAAO,EAAS,MACjB,CAAC,CACF,IAAM,EAAU,MAAM,EAAS,MAAM,CACjC,eAAgB,GAAY,OAAO,EAAS,YAAe,WAC5D,EAAwC,WAAa,EAAS,YAEjE,EAAQ,OAAO,EAAI,EAIvB,kBAA4B,EAAuB,CACjD,KAAK,QAAQ,MAAM,8BAA+B,CAAE,MAAO,EAAS,CAAC,CACrE,IAAM,EAAS,MAAA,EACf,MAAA,EAAe,KACf,MAAA,EAAuB,iBAAiB,IAAU,CAC9C,GACF,KAAK,gBAAgB,EAAO,CAIhC,0BAA2C,CACzC,KAAK,QAAQ,MAAM,gDAAgD,CACnE,IAAM,EAAS,MAAA,EACf,MAAA,EAAe,KACf,MAAA,EAAuB,wCAAwC,CAC3D,GACF,KAAK,gBAAgB,EAAO,CAQhC,cACE,EACA,EACA,EACA,EAAoB,EACR,CACZ,OAAO,IAAI,SAAY,EAAS,IAAW,CACzC,IAAM,EAAK,KAAK,mBAAmB,CAC7B,EAAY,YAAY,KAAK,CACnC,KAAK,QAAQ,MAAM,oBAAoB,IAAQ,CAAE,KAAI,CAAC,CAEtD,IAAM,EAAY,eAAiB,CACjC,MAAA,EAAsB,OAAO,EAAG,CAChC,IAAM,EAAU,KAAK,MAAM,YAAY,KAAK,CAAG,EAAU,CACzD,KAAK,QAAQ,MAAM,kBAAkB,EAAK,mBAAmB,EAAU,IAAK,CAC1E,KACA,UACD,CAAC,CACF,EAAW,MAAM,WAAW,EAAK,mBAAmB,EAAU,IAAI,CAAC,EAClE,EAAU,CAEb,MAAA,EAAsB,IAAI,EAAI,CACnB,UACT,SACA,YACA,YACA,OACD,CAAC,CAEF,IAAM,EAAU,CAAE,KAAI,OAAM,UAAS,CACrC,KAAK,YAAY,EAAQ,EAAQ,EACjC,CAGJ,MAAgB,YACd,EACA,EACA,EAAoB,EACR,CACZ,IAAM,EAAS,MAAM,KAAK,YAAY,CACtC,OAAO,KAAK,cAAiB,EAAQ,EAAM,EAAS,EAAU,CAOhE,MAAM,iBAAwD,CAC5D,OAAO,KAAK,YAAyC,mBAAoB,EAAE,CAAC,CAG9E,MAAM,aAAa,EAAgE,CACjF,OAAO,KAAK,YAAsC,gBAAiB,EAAO,CAG5E,MAAM,QAAQ,EAAsD,CAClE,OAAO,KAAK,YAAiC,UAAW,EAAO,CAGjE,MAAM,YAAY,EAA8D,CAC9E,OAAO,KAAK,YAAqC,eAAgB,EAAO,CAG1E,MAAM,cAAc,EAAuD,CACzE,OAAO,KAAK,YAAuC,iBAAkB,CAAE,UAAS,CAAC,CAGnF,MAAM,iCACJ,EAC4C,CAC5C,OAAO,KAAK,YAA+C,0BAA2B,EAAO,CAG/F,MAAM,qBACJ,EAC2C,CAC3C,OAAO,KAAK,YAA8C,yBAA0B,EAAO,CAG7F,MAAM,2BACJ,EACiD,CACjD,OAAO,KAAK,YACV,gCACA,CAAE,UAAS,CACZ,CAGH,MAAM,cAAkD,CACtD,OAAO,KAAK,YAAsC,iBAAkB,EAAE,CAAC,CAGzE,MAAM,gBAAgB,EAAoD,CACxE,OAAO,KAAK,YAAyC,oBAAqB,CAAE,OAAM,CAAC,CAOrF,GAAkB,EAAuB,CACvC,IAAK,GAAM,CAAC,EAAI,KAAY,MAAA,EAC1B,aAAa,EAAQ,UAAU,CAC/B,EAAQ,OAAW,MAAM,EAAQ,CAAC,CAClC,MAAA,EAAsB,OAAO,EAAG,GC/PtC,MAAM,EAAa,KAGb,EAAiB,IAAS,IAIhC,SAAS,EAAS,EAA2B,CAC3C,IAAM,EAAmB,EAAE,CAC3B,IAAK,IAAI,EAAI,EAAG,EAAI,EAAM,OAAQ,GAAK,EACrC,EAAO,KAAK,OAAO,aAAa,GAAG,EAAM,SAAS,EAAG,EAAI,EAAW,CAAC,CAAC,CAExE,OAAO,KAAK,EAAO,KAAK,GAAG,CAAC,CAG9B,SAAS,EAAW,EAAyB,CAC3C,IAAI,EACJ,GAAI,CACF,EAAS,KAAK,EAAI,MACZ,CACN,MAAU,MAAM,gCAAgC,EAAI,OAAO,GAAG,CAEhE,GAAI,EAAO,SAAW,EACpB,MAAU,MAAM,4BAA4B,CAE9C,IAAM,EAAQ,IAAI,WAAW,EAAO,OAAO,CAC3C,IAAK,IAAI,EAAI,EAAG,EAAI,EAAO,OAAQ,IACjC,EAAM,GAAK,EAAO,WAAW,EAAE,CAEjC,OAAO,EAGT,SAAS,EAAiB,EAAyB,CACjD,MAAO,cAAc,IAGvB,SAAS,EAAiB,EAAiB,EAAsB,CAC/D,MAAO,cAAc,EAAQ,GAAG,IAGlC,SAAS,EAAe,EAAyB,CAC/C,MAAO,oBAAoB,IAG7B,SAAS,EAAe,EAA0C,CAChE,EAAa,EAAG,kBAAkB,CAClC,EAAiB,EAAG,cAAe,8BAA8B,CACjE,EAAiB,EAAG,YAAa,4BAA4B,CAG/D,SAAS,EAAmB,EAA6C,CACvE,EAAa,EAAG,qBAAqB,CACrC,EAAiB,EAAG,iBAAkB,oCAAoC,CAC1E,EAAiB,EAAG,eAAgB,kCAAkC,CAmBxE,IAAa,EAAb,KAA8B,CAC5B,GACA,GACA,GACA,GACA,GACA,GACA,GAAmB,IAAI,IACvB,GAAsD,KACtD,GAAwB,IAAI,IAC5B,GAAiD,KAEjD,GAAoC,KAEpC,YAAY,EAOT,CACD,MAAA,EAAgB,EAAK,QACrB,MAAA,EAAgB,EAAK,QACrB,MAAA,EAAmB,EAAK,WACxB,MAAA,GAAe,EAAK,KAAO,OAAU,IACrC,MAAA,EAAe,EAAK,QAAU,QAKhC,MAAM,aAAa,EAAmE,CACpF,GAAI,MAAA,IAAuB,IAAA,GACzB,OAAO,MAAA,EAIT,GAAI,MAAA,EACF,OAAO,MAAA,EAGT,MAAA,EAA0B,MAAA,EAAoB,EAAQ,CACtD,GAAI,CACF,OAAO,MAAM,MAAA,SACL,CACR,MAAA,EAA0B,MAI9B,MAAA,EAAqB,EAAmE,CACtF,IAAM,EAAM,EAAiB,MAAA,EAAc,CAE3C,GAAI,CACF,IAAM,EAAM,MAAM,MAAA,EAAc,IAAI,EAAI,CACxC,GAAI,EAAK,CACP,EAAe,EAAI,CACnB,IAAM,EAA0B,CAC9B,YAAa,EAAI,YACjB,UAAW,EAAW,EAAI,UAAU,CACrC,CAED,MADA,OAAA,EAAqB,EACd,SAEF,EAAK,CAEZ,MAAM,MAAA,EAAoB,EAAI,CAC9B,MAAA,EAAa,KACX,mFACA,CACE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CACF,CAGH,IAAM,EAAS,MAAM,GAAS,CAC9B,GAAI,IAAW,KACb,OAAO,KAGT,MAAA,EAAqB,EAErB,GAAI,CACF,IAAM,EAA0B,CAC9B,YAAa,EAAO,YACpB,UAAW,EAAS,EAAO,UAAU,CACrC,gBAAiB,KAAK,KAAK,CAC5B,CACD,MAAM,MAAA,EAAc,IAAI,EAAK,EAAO,OAC7B,EAAK,CACZ,MAAA,EAAa,KAAK,0CAA2C,CAC3D,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,OAAO,EAKT,MAAM,gBACJ,EACA,EAC6B,CAC7B,IAAM,EAAM,MAAA,EAAsB,IAAI,EAAK,CAC3C,GAAI,IAAQ,IAAA,GACV,OAAO,EAIT,IAAM,EAAW,MAAA,EAA2B,IAAI,EAAK,CACrD,GAAI,EACF,OAAO,EAGT,IAAM,EAAU,MAAA,EAAuB,EAAM,EAAQ,CACrD,MAAA,EAA2B,IAAI,EAAM,EAAQ,CAC7C,GAAI,CACF,OAAO,MAAM,SACL,CACR,MAAA,EAA2B,OAAO,EAAK,EAI3C,MAAA,EACE,EACA,EAC6B,CAC7B,IAAM,EAAM,EAAiB,MAAA,EAAe,EAAK,CAEjD,GAAI,CACF,IAAM,EAAM,MAAM,MAAA,EAAc,IAAI,EAAI,CACxC,GAAI,EAAK,CACP,EAAmB,EAAI,CACvB,IAAM,EAA6B,CACjC,eAAgB,EAAI,eACpB,aAAc,EAAW,EAAI,aAAa,CAC3C,CAED,OADA,MAAA,EAAsB,IAAI,EAAM,EAAO,CAChC,SAEF,EAAK,CAEZ,MAAM,MAAA,EAAoB,EAAI,CAC9B,MAAA,EAAa,KACX,sFACA,CACE,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CACF,CAGH,IAAM,EAAS,MAAM,GAAS,CAC9B,GAAI,IAAW,KACb,OAAO,KAGT,MAAA,EAAsB,IAAI,EAAM,EAAO,CAEvC,GAAI,CACF,IAAM,EAA6B,CACjC,eAAgB,EAAO,eACvB,aAAc,EAAS,EAAO,aAAa,CAC3C,gBAAiB,KAAK,KAAK,CAC5B,CACD,MAAM,MAAA,EAAc,IAAI,EAAK,EAAO,CAGpC,IAAM,EAAS,EAAe,MAAA,EAAc,CACtC,EACH,MAAM,MAAA,EAAc,IAAc,EAAO,CAAC,MAAO,IAChD,MAAA,EAAa,KAAK,2CAA4C,CAC5D,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,MACP,EAAK,EAAE,CACN,EAAS,SAAS,EAAK,EAC1B,MAAM,MAAA,EAAc,IAAI,EAAQ,CAAC,GAAG,EAAU,EAAK,CAAC,OAE/C,EAAK,CACZ,MAAA,EAAa,KAAK,6CAA8C,CAC9D,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,OAAO,EAaT,MAAM,iBAAoC,CAExC,GAAI,MAAA,EACF,OAAO,MAAA,EAET,MAAA,EAA6B,MAAA,GAA4B,CACzD,GAAI,CACF,OAAO,MAAM,MAAA,SACL,CACR,MAAA,EAA6B,MAIjC,MAAA,GAAgD,CAE9C,IAAM,EAAM,KAAK,KAAK,CAMtB,GALI,MAAA,IAA4B,MAAQ,EAAM,MAAA,EAA0B,MAAA,GAKpE,CAAC,MAAA,EACH,MAAO,GAGT,IAAM,EAAQ,EAAiB,MAAA,EAAc,CAGzC,EAAmC,KACnC,EAIC,EAAE,CAEP,GAAI,CAEF,GAAM,CAAC,EAAO,GAAW,MAAM,QAAQ,IAAI,CACzC,MAAA,EAAc,IAAI,EAAM,CACxB,MAAA,GAA2B,CAC5B,CAAC,CAGF,GAAI,EACF,GAAI,CACF,EAAe,EAAM,CACrB,EAAW,CAAE,GAAG,EAAO,gBAAiB,EAAM,iBAAmB,EAAG,OAC7D,EAAK,CACZ,MAAA,EAAa,KAAK,oDAAqD,CACrE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACF,MAAM,MAAA,EAAoB,EAAM,CAMpC,GAFA,EAAe,EAEX,CAAC,EACH,MAAO,GAST,GALuD,CACrD,EACA,GAAG,EAAa,IAAK,GAAM,EAAE,KAAK,CACnC,CAC2B,MAAO,GAAM,EAAM,EAAE,gBAAkB,MAAA,EAAY,CAG7E,MADA,OAAA,EAA0B,EACnB,GAIT,IAAM,EAAc,MAAM,WAAW,MAAM,GAAG,MAAA,EAAiB,SAAS,CACxE,GAAI,CAAC,EAAY,GAAI,CAEnB,IAAM,EAAiB,EAAM,MAAA,EAAc,EAc3C,OAbA,MAAA,EAAa,KAAK,+DAAgE,CAChF,OAAQ,EAAY,OACpB,WAAY,MAAA,EACb,CAAC,CACF,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,CACD,MAAA,EAA0B,EACnB,GAGT,IAAM,EAAY,MAAM,EAAY,MAAM,CAK1C,GACE,CAAC,GACD,OAAO,GAAa,UACpB,EAAE,iBAAkB,IACpB,CAAE,EAA2B,cAAc,MAAM,QACjD,EAAE,QAAS,IACX,OAAQ,EAA2B,KAAQ,SAC3C,CACA,MAAA,EAAa,MACX,4EACA,CACE,WAAY,MAAA,EACZ,aAAc,GAAY,OAAO,GAAa,SAAW,OAAO,KAAK,EAAS,CAAG,EAAE,CACpF,CACF,CAED,IAAM,EAAiB,EAAM,MAAA,EAAc,EAU3C,OATA,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,CACD,MAAA,EAA0B,EACnB,GAET,IAAM,EAAgB,EAGhB,EAAgB,EAAc,aAAa,KAAK,GAGtD,GAAI,EAAS,aAAe,GAAiB,IAAkB,EAAS,YAGtE,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAGT,IAAI,EAA6B,CAAE,GAAG,EAAU,gBAAiB,EAAK,CACtE,GAAI,EAAe,CACjB,IAAM,EAAY,MAAM,MAAA,EAA6B,EAAe,EAAS,CAC7E,GAAI,CAAC,EAAU,MAGb,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAET,EAAY,CACV,GAAG,EACH,YAAa,EACb,KAAM,EAAU,KAChB,aAAc,EAAU,aACzB,CAIH,IAAM,EAA2C,EAAE,CACnD,IAAK,IAAM,KAAS,EAAc,CAEhC,IAAM,EADc,EAAc,IAAI,OAAO,EAAM,KAAK,GAC5B,KAAK,GAGjC,GAAI,EAAM,KAAK,aAAe,GAAU,IAAW,EAAM,KAAK,YAG5D,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAGT,IAAI,EAAkC,CACpC,GAAG,EAAM,KACT,gBAAiB,EAClB,CACD,GAAI,EAAQ,CACV,IAAM,EAAY,MAAM,MAAA,EAA6B,EAAQ,EAAM,KAAK,CACxE,GAAI,CAAC,EAAU,MAGb,OAFA,MAAM,MAAA,EAAe,EAAO,EAAa,CACzC,MAAA,EAA0B,KACnB,GAET,EAAc,CACZ,GAAG,EACH,YAAa,EACb,KAAM,EAAU,KAChB,aAAc,EAAU,aACzB,CAEH,EAAoB,KAAK,CAAE,GAAG,EAAO,KAAM,EAAa,CAAC,CAM3D,OAFA,MAAM,MAAA,EAAmB,EAAO,EAAW,EAAoB,CAC/D,MAAA,EAA0B,EACnB,SACA,EAAK,CACZ,IAAM,EAAQ,EAAQ,EAAI,CACpB,EACJ,aAAe,WACf,aAAe,gBACf,aAAe,YACf,aAAe,YACX,EAAQ,EAAqB,QAAU,OAC7C,MAAA,EAAa,GACX,EACI,sDACA,0DACJ,CACE,QAAS,MAAA,EACT,WAAY,MAAA,EACZ,MAAO,EAAM,QACd,CACF,CAGD,IAAM,EAAiB,EAAM,MAAA,EAAc,EAC3C,GAAI,CACE,GACF,MAAM,MAAA,EACJ,EACA,CAAE,GAAG,EAAU,gBAAiB,EAAgB,CAChD,EAAa,IAAK,IAAO,CACvB,GAAG,EACH,KAAM,CAAE,GAAG,EAAE,KAAM,gBAAiB,EAAgB,CACrD,EAAE,CACJ,OAEI,EAAU,CACjB,MAAA,EAAa,KAAK,kEAAmE,CACnF,QAAS,MAAA,EACT,MAAO,EAAQ,EAAS,CAAC,QAC1B,CAAC,CAGJ,MADA,OAAA,EAA0B,EACnB,IAMX,MAAA,EACE,EACA,EACmE,CACnE,IAAM,EAAgB,GAAQ,EAAO,MAAQ,EAAO,cAC9C,EAAkC,EAAE,CACtC,EAAO,OACT,EAAQ,iBAAmB,EAAO,MAEhC,EAAO,eACT,EAAQ,qBAAuB,EAAO,cAKxC,IAAI,EAAM,MAAM,WAAW,MAAM,EAAK,CAAE,OAAQ,OAAQ,UAAS,CAAC,CASlE,GANI,EAAI,SAAW,MACjB,EAAM,MAAM,WAAW,MAAM,EAAK,CAAE,UAAS,CAAC,EAK5C,CAAC,EAAI,IAAM,EAAI,SAAW,IAC5B,MAAU,MAAM,yCAAyC,EAAI,YAAY,EAAI,SAAS,CAGxF,IAAM,EAAO,EAAI,QAAQ,IAAI,OAAO,EAAI,IAAA,GAClC,EAAe,EAAI,QAAQ,IAAI,gBAAgB,EAAI,IAAA,GAgBzD,OAdI,EAAI,SAAW,IACV,CACL,MAAO,GACP,KAAM,GAAQ,EAAO,KACrB,aAAc,GAAgB,EAAO,aACtC,CAGE,EAME,CAAE,MAAO,GAAO,OAAM,eAAc,CAJlC,CAAE,MAAO,GAAM,OAAM,eAAc,CAS9C,MAAA,GAEE,CAEA,IAAM,EAAS,EAAe,MAAA,EAAc,CACtC,EACH,MAAM,MAAA,EAAc,IAAc,EAAO,CAAC,MAAO,IAChD,MAAA,EAAa,KAAK,kEAAmE,CACnF,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,MACP,EAAK,EAAE,CACL,EAAU,IAAI,IAAI,CAAC,GAAG,MAAA,EAAsB,MAAM,CAAE,GAAG,EAAc,CAAC,CAEtE,EAAY,MAAM,KAAK,EAAQ,CAwCrC,OAvCgB,MAAM,QAAQ,IAC5B,EAAU,IAAI,KAAO,IAAS,CAC5B,IAAM,EAAO,EAAiB,MAAA,EAAe,EAAK,CAE9C,EACJ,GAAI,CACF,EAAM,MAAM,MAAA,EAAc,IAAI,EAAK,OAC5B,EAAK,CAMZ,OALA,MAAA,EAAa,KAAK,yDAA0D,CAC1E,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACK,KAET,GAAI,CAAC,EACH,OAAO,KAET,GAAI,CAEF,OADA,EAAmB,EAAI,CAChB,CACL,OACA,IAAK,EACL,KAAM,CACJ,GAAG,EACH,gBAAiB,EAAI,iBAAmB,EACzC,CACF,OACM,EAAK,CAOZ,OANA,MAAA,EAAa,KAAK,gDAAiD,CACjE,QAAS,MAAA,EACT,OACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CACF,MAAM,MAAA,EAAoB,EAAK,CACxB,OAET,CACH,EACc,OACZ,GAAoE,IAAM,KAC5E,CAGH,MAAA,EAAqB,EAA4B,CAC/C,MAAM,MAAA,EAAc,OAAO,EAAI,CAAC,MAAO,GAAQ,CAC7C,MAAA,EAAa,KAAK,+BAAgC,CAChD,QAAS,MAAA,EACT,MACA,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CAGJ,MAAA,EAAgB,EAAe,EAAqD,CAClF,IAAM,EAAS,EAAe,MAAA,EAAc,CAG5C,GAAI,CACF,MAAM,QAAQ,IAAI,CAChB,MAAA,EAAc,OAAO,EAAM,CAC3B,MAAA,EAAc,OAAO,EAAO,CAC5B,GAAG,EAAa,IAAK,GAAU,MAAA,EAAc,OAAO,EAAM,IAAI,CAAC,CAChE,CAAC,OACK,EAAK,CACZ,MAAA,EAAa,KAAK,0DAA2D,CAC3E,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,CAGJ,MAAA,EAAqB,IAAA,GACrB,MAAA,EAAsB,OAAO,CAG/B,MAAA,EACE,EACA,EACA,EACe,CACf,IAAM,EAAS,CACb,MAAA,EAAc,IAAI,EAAO,EAAG,CAAC,MAAO,GAAQ,CAC1C,MAAA,EAAa,KAAK,mDAAoD,CACpE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CACF,GAAG,EAAa,IAAK,GACnB,MAAA,EAAc,IAAI,EAAM,IAAK,EAAM,KAAK,CAAC,MAAO,GAAQ,CACtD,MAAA,EAAa,KAAK,+CAAgD,CAChE,QAAS,MAAA,EACT,MAAO,EAAQ,EAAI,CAAC,QACrB,CAAC,EACF,CACH,CACF,CACD,MAAM,QAAQ,IAAI,EAAO"}
@@ -1,2 +1,2 @@
1
- import{n as e}from"./assertions-BNzM20oj.js";function t(e){return e.startsWith(`0x`)?e:`0x${e}`}function n(t){return e(t.startsWith(`0x`),`Expected 0x-prefixed hex, got: ${t}`),t.slice(2)}export{n,t};
2
- //# sourceMappingURL=hex-BVdZkMrT.js.map
1
+ import{n as e}from"./assertions-CASetdUe.js";function t(e){return e.startsWith(`0x`)?e:`0x${e}`}function n(t){return e(t.startsWith(`0x`),`Expected 0x-prefixed hex, got: ${t}`),t.slice(2)}export{n,t};
2
+ //# sourceMappingURL=hex-CVGYqDKx.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"hex-BVdZkMrT.js","names":[],"sources":["../../src/utils/hex.ts"],"sourcesContent":["import type { Hex } from \"viem\";\nimport { assertCondition } from \"./assertions\";\n\n/** Normalize a un-prefixed hex payload to a 0x-prefixed `Hex` value. */\nexport function prefixHex(value: string): Hex {\n return (value.startsWith(\"0x\") ? value : `0x${value}`) as Hex;\n}\n\n/** Convert a public `Hex` value back an unprefixed format. */\nexport function unprefixHex(value: Hex): string {\n assertCondition(value.startsWith(\"0x\"), `Expected 0x-prefixed hex, got: ${value}`);\n return value.slice(2);\n}\n"],"mappings":"6CAIA,SAAgB,EAAU,EAAoB,CAC5C,OAAQ,EAAM,WAAW,KAAK,CAAG,EAAQ,KAAK,IAIhD,SAAgB,EAAY,EAAoB,CAE9C,OADA,EAAgB,EAAM,WAAW,KAAK,CAAE,kCAAkC,IAAQ,CAC3E,EAAM,MAAM,EAAE"}
1
+ {"version":3,"file":"hex-CVGYqDKx.js","names":[],"sources":["../../src/utils/hex.ts"],"sourcesContent":["import type { Hex } from \"viem\";\nimport { assertCondition } from \"./assertions\";\n\n/** Normalize a un-prefixed hex payload to a 0x-prefixed `Hex` value. */\nexport function prefixHex(value: string): Hex {\n return (value.startsWith(\"0x\") ? value : `0x${value}`) as Hex;\n}\n\n/** Convert a public `Hex` value back an unprefixed format. */\nexport function unprefixHex(value: Hex): string {\n assertCondition(value.startsWith(\"0x\"), `Expected 0x-prefixed hex, got: ${value}`);\n return value.slice(2);\n}\n"],"mappings":"6CAIA,SAAgB,EAAU,EAAoB,CAC5C,OAAQ,EAAM,WAAW,KAAK,CAAG,EAAQ,KAAK,IAIhD,SAAgB,EAAY,EAAoB,CAE9C,OADA,EAAgB,EAAM,WAAW,KAAK,CAAE,kCAAkC,IAAQ,CAC3E,EAAM,MAAM,EAAE"}
package/dist/esm/index.js CHANGED
@@ -1,4 +1,4 @@
1
- import{a as e,i as t,n,r,t as i}from"./relayer-DxMV-NQT.js";import{A as a,B as o,C as s,D as c,E as l,F as u,G as d,H as f,I as p,L as ee,M as m,N as te,O as ne,P as h,R as re,S as ie,T as ae,U as oe,V as se,W as ce,_ as le,a as ue,b as g,c as de,d as fe,f as pe,g as _,h as me,i as he,j as ge,k as v,l as _e,m as ve,n as ye,o as be,p as xe,r as Se,s as Ce,t as we,u as Te,v as y,w as b,x as Ee,y as x,z as De}from"./activity-DoDLK_gV.js";import{n as S,t as C}from"./encryption-CKqGKzHs.js";import{n as Oe,t as ke}from"./fhe-artifact-cache-vzh7Xn9G.js";import{n as Ae,r as w,t as T}from"./memory-storage-DNvc-6oK.js";import{a as je,r as E}from"./assertions-BNzM20oj.js";import{a as Me,i as D,n as Ne,o as O,r as k,t as A}from"./relayer-utils-BeoTNDM4.js";import{C as j,D as Pe,E as M,O as N,S as Fe,T as Ie,_ as Le,a as P,b as F,c as Re,d as ze,f as Be,g as I,h as L,i as R,k as z,l as Ve,m as B,n as V,o as H,p as He,r as Ue,s as U,t as W,u as We,v as Ge,w as Ke,x as qe,y as Je}from"./wrappers-registry-DqPr_JG2.js";import{n as Ye,r as Xe,t as Ze}from"./transfer-batcher-BXIo7hnu.js";import{n as Qe}from"./cleartext-DuOGGACw.js";import{getAddress as G,hexToBigInt as $e}from"viem";var K=class extends r{constructor(e,n){super(t.ApprovalFailed,e,n),this.name=`ApprovalFailedError`}},q=class extends r{constructor(e,n){super(t.TransactionReverted,e,n),this.name=`TransactionRevertedError`}},J=class{#e=null;#t=null;#n;#r;#i;constructor(e=`CredentialStore`,t=1,n=`credentials`){this.#n=e,this.#r=t,this.#i=n}#a(){return this.#e?Promise.resolve(this.#e):(this.#t||=new Promise((e,t)=>{let n=indexedDB.open(this.#n,this.#r);n.onupgradeneeded=()=>{let e=n.result;e.objectStoreNames.contains(this.#i)||e.createObjectStore(this.#i,{keyPath:`key`})},n.onsuccess=()=>{this.#e=n.result,this.#t=null,this.#e.onversionchange=()=>{console.warn(`IndexedDB "${this.#n}" closing due to version change from another tab`),this.#e?.close(),this.#e=null,this.#t=null},this.#e.onclose=()=>{this.#e=null,this.#t=null},e(this.#e)},n.onerror=()=>{this.#e=null,this.#t=null,t(n.error)}}),this.#t)}async#o(e,t){let n=await this.#a();return new Promise((r,i)=>{let a=n.transaction(this.#i,e);a.onabort=()=>i(a.error??Error(`Transaction aborted`));let o=t(a.objectStore(this.#i));e===`readonly`?o.onsuccess=()=>r(o.result):a.oncomplete=()=>r(o.result),o.onerror=()=>i(o.error)})}async get(e){return(await this.#o(`readonly`,t=>t.get(e)))?.value??null}async set(e,t){await this.#o(`readwrite`,n=>n.put({key:e,value:t}))}async delete(e){await this.#o(`readwrite`,t=>t.delete(e))}async clear(){await this.#o(`readwrite`,e=>e.clear())}};const et=new J;function tt(e,t){if(typeof e!=`function`)throw TypeError(`${t} must be a function, got ${typeof e}`)}function nt(e,t,n){tt(e[t],n)}function rt(){let e=globalThis;for(let t of[e.chrome,e.browser])try{E(t,`ns`);let{runtime:e}=t;return E(e,`runtime`),je(e,`id`,`runtime.id`),nt(e,`getURL`,`runtime.getURL`),e}catch{continue}}var it=`(function() {
1
+ import{a as e,i as t,n,r,t as i}from"./relayer-DxMV-NQT.js";import{A as a,B as o,C as s,D as c,E as l,F as u,G as d,H as f,I as p,L as ee,M as m,N as te,O as ne,P as h,R as re,S as ie,T as ae,U as oe,V as se,W as ce,_ as le,a as ue,b as g,c as de,d as fe,f as pe,g as _,h as me,i as he,j as ge,k as v,l as _e,m as ve,n as ye,o as be,p as xe,r as Se,s as Ce,t as we,u as Te,v as y,w as b,x as Ee,y as x,z as De}from"./activity-Ctiuld0m.js";import{n as S,t as C}from"./encryption-CKqGKzHs.js";import{n as Oe,t as ke}from"./fhe-artifact-cache-DNoPom4I.js";import{n as Ae,r as w,t as T}from"./memory-storage-DNvc-6oK.js";import{i as E,o as je}from"./assertions-CASetdUe.js";import{a as Me,i as D,n as Ne,o as O,r as k,t as A}from"./relayer-utils-BeoTNDM4.js";import{C as j,D as Pe,E as M,O as N,S as Fe,T as Ie,_ as Le,a as P,b as F,c as Re,d as ze,f as Be,g as I,h as L,i as R,k as z,l as Ve,m as B,n as V,o as H,p as He,r as Ue,s as U,t as W,u as We,v as Ge,w as Ke,x as qe,y as Je}from"./wrappers-registry-DqPr_JG2.js";import{n as Ye,r as Xe,t as Ze}from"./transfer-batcher-BXIo7hnu.js";import{n as Qe}from"./cleartext-DuOGGACw.js";import{getAddress as G,hexToBigInt as $e}from"viem";var K=class extends r{constructor(e,n){super(t.ApprovalFailed,e,n),this.name=`ApprovalFailedError`}},q=class extends r{constructor(e,n){super(t.TransactionReverted,e,n),this.name=`TransactionRevertedError`}},J=class{#e=null;#t=null;#n;#r;#i;constructor(e=`CredentialStore`,t=1,n=`credentials`){this.#n=e,this.#r=t,this.#i=n}#a(){return this.#e?Promise.resolve(this.#e):(this.#t||=new Promise((e,t)=>{let n=indexedDB.open(this.#n,this.#r);n.onupgradeneeded=()=>{let e=n.result;e.objectStoreNames.contains(this.#i)||e.createObjectStore(this.#i,{keyPath:`key`})},n.onsuccess=()=>{this.#e=n.result,this.#t=null,this.#e.onversionchange=()=>{console.warn(`IndexedDB "${this.#n}" closing due to version change from another tab`),this.#e?.close(),this.#e=null,this.#t=null},this.#e.onclose=()=>{this.#e=null,this.#t=null},e(this.#e)},n.onerror=()=>{this.#e=null,this.#t=null,t(n.error)}}),this.#t)}async#o(e,t){let n=await this.#a();return new Promise((r,i)=>{let a=n.transaction(this.#i,e);a.onabort=()=>i(a.error??Error(`Transaction aborted`));let o=t(a.objectStore(this.#i));e===`readonly`?o.onsuccess=()=>r(o.result):a.oncomplete=()=>r(o.result),o.onerror=()=>i(o.error)})}async get(e){return(await this.#o(`readonly`,t=>t.get(e)))?.value??null}async set(e,t){await this.#o(`readwrite`,n=>n.put({key:e,value:t}))}async delete(e){await this.#o(`readwrite`,t=>t.delete(e))}async clear(){await this.#o(`readwrite`,e=>e.clear())}};const et=new J;function tt(e,t){if(typeof e!=`function`)throw TypeError(`${t} must be a function, got ${typeof e}`)}function nt(e,t,n){tt(e[t],n)}function rt(){let e=globalThis;for(let t of[e.chrome,e.browser])try{E(t,`ns`);let{runtime:e}=t;return E(e,`runtime`),je(e,`id`,`runtime.id`),nt(e,`getURL`,`runtime.getURL`),e}catch{continue}}var it=`(function() {
2
2
  //#region src/utils/assertions.ts
3
3
  function assertObject(value, context) {
4
4
  if (typeof value !== "object" || value === null || Array.isArray(value)) throw new TypeError(\`\${context} must be an object, got \${typeof value}\`);
@@ -1,2 +1,2 @@
1
- import{r as e,t}from"../relayer-DxMV-NQT.js";import{n,t as r}from"../fhe-artifact-cache-vzh7Xn9G.js";import{t as i}from"../memory-storage-DNvc-6oK.js";import{a,i as o,n as s,o as c,r as l,t as u}from"../relayer-utils-BeoTNDM4.js";import{availableParallelism as d}from"node:os";import{Worker as f}from"node:worker_threads";import{randomUUID as p}from"node:crypto";import{AsyncLocalStorage as m}from"node:async_hooks";var h=class extends n{constructor(e){super(e,e.logger)}createWorker(){return new f(new URL(`relayer-sdk.node-worker.js`,import.meta.url))}wireEvents(e){e.on(`message`,e=>this.handleResponse(e)),e.on(`error`,e=>this.handleWorkerError(e.message)),e.on(`messageerror`,()=>this.handleWorkerMessageError())}postMessage(e,t){e.postMessage(t)}terminateWorker(e){e.terminate()}generateRequestId(){return p()}getInitPayload(){return{type:`NODE_INIT`,payload:{fhevmConfig:this.config.fhevmConfig}}}onWorkerReady(e){e.unref()}},g=class{#e=[];#t=[];#n;#r;#i=null;constructor(e){this.#n=e,this.#r=e.poolSize??Math.min(d(),4)}get poolSize(){return this.#r}async initPool(){if(!(this.#e.length>0))return this.#i||=this.#a().finally(()=>{this.#i=null}),this.#i}async#a(){for(let e=0;e<this.#r;e++)this.#e.push(new h(this.#n)),this.#t.push(0);try{await Promise.all(this.#e.map(e=>e.initWorker()))}catch(e){for(let e of this.#e)e.terminate();throw this.#e.length=0,this.#t.length=0,e}}terminate(){for(let e of this.#e)e.terminate();this.#e.length=0,this.#t.length=0}#o(){let e=0,t=this.#t[0];for(let n=1;n<this.#t.length;n++)this.#t[n]<t&&(t=this.#t[n],e=n);return e}async#s(e){if(this.#e.length===0)throw Error(`NodeWorkerPool not initialized. Call initPool() first.`);let t=this.#o();this.#t[t]++;try{return await e(this.#e[t])}finally{this.#t[t]--}}async generateKeypair(){return this.#s(e=>e.generateKeypair())}async createEIP712(e){return this.#s(t=>t.createEIP712(e))}async encrypt(e){return this.#s(t=>t.encrypt(e))}async userDecrypt(e){return this.#s(t=>t.userDecrypt(e))}async publicDecrypt(e){return this.#s(t=>t.publicDecrypt(e))}async createDelegatedUserDecryptEIP712(e){return this.#s(t=>t.createDelegatedUserDecryptEIP712(e))}async delegatedUserDecrypt(e){return this.#s(t=>t.delegatedUserDecrypt(e))}async requestZKProofVerification(e){return this.#s(t=>t.requestZKProofVerification(e))}async getPublicKey(){return this.#s(e=>e.getPublicKey())}async getPublicParams(e){return this.#s(t=>t.getPublicParams(e))}},_=class{#e;#t=null;#n=null;#r=null;#i=!1;#a=null;#o=null;constructor(e){this.#e={fheArtifactStorage:new i,...e}}async#s(){let e=await this.#e.getChainId(),{transports:t,poolSize:n}=this.#e;return{fhevmConfig:Object.assign({},u[e],t[e]),poolSize:n,logger:this.#e.logger}}async#c(){if(this.#r)return this.#r;this.#r=this.#u();try{return await this.#r}finally{this.#r=null}}#l(){this.#t?.terminate(),this.#t=null,this.#n=null,this.#o=null}async#u(){if(this.#i)throw new t(`RelayerNode has been terminated`);let n=await this.#e.getChainId();if(this.#a!==null&&n!==this.#a&&this.#l(),this.#a=n,!this.#o&&this.#e.fheArtifactStorage){let e=Object.assign({},u[n],this.#e.transports[n]);this.#o=new r({storage:this.#e.fheArtifactStorage,chainId:n,relayerUrl:e.relayerUrl,ttl:this.#e.fheArtifactCacheTTL,logger:this.#e.logger})}if(this.#o){let e=!1;try{e=await this.#o.revalidateIfDue()}catch(e){this.#e.logger?.warn(`Artifact revalidation failed, proceeding with potentially stale cache`,{error:e instanceof Error?e.message:String(e)})}e&&(this.#e.logger?.info(`Cached FHE artifacts are stale — reinitializing`),this.#l())}return this.#n||=this.#d().catch(n=>{throw this.#n=null,n instanceof e?n:new t(`Failed to initialize FHE worker pool`,{cause:n})}),this.#n}async#d(){let e=new g(await this.#s());if(await e.initPool(),this.#i)throw e.terminate(),Error(`RelayerNode was terminated during initialization`);return this.#t=e,e}terminate(){this.#i=!0,this.#t&&=(this.#t.terminate(),null),this.#n=null,this.#r=null}async generateKeypair(){let e=await(await this.#c()).generateKeypair();return{publicKey:e.publicKey,privateKey:e.privateKey}}async createEIP712(e,t,n,r=7){let i=await(await this.#c()).createEIP712({publicKey:e,contractAddresses:t,startTimestamp:n,durationDays:r}),o={name:i.domain.name,version:i.domain.version,chainId:i.domain.chainId,verifyingContract:i.domain.verifyingContract};return{domain:o,types:{EIP712Domain:a(o),UserDecryptRequestVerification:i.types.UserDecryptRequestVerification},message:{publicKey:i.message.publicKey,contractAddresses:i.message.contractAddresses,startTimestamp:i.message.startTimestamp,durationDays:i.message.durationDays,extraData:i.message.extraData}}}async encrypt(e){return c(async()=>{let t=await(await this.#c()).encrypt(e);return{handles:t.handles,inputProof:t.inputProof}})}async userDecrypt(e){return c(async()=>(await(await this.#c()).userDecrypt(e)).clearValues)}async publicDecrypt(e){return c(async()=>{let t=await(await this.#c()).publicDecrypt(e);return{clearValues:t.clearValues,abiEncodedClearValues:t.abiEncodedClearValues,decryptionProof:t.decryptionProof}})}async createDelegatedUserDecryptEIP712(e,t,n,r,i=7){return(await this.#c()).createDelegatedUserDecryptEIP712({publicKey:e,contractAddresses:t,delegatorAddress:n,startTimestamp:r,durationDays:i})}async delegatedUserDecrypt(e){return c(async()=>(await(await this.#c()).delegatedUserDecrypt(e)).clearValues)}async requestZKProofVerification(e){return c(async()=>(await this.#c()).requestZKProofVerification(e))}async getPublicKey(){let e=await this.#c();return this.#o?this.#o.getPublicKey(async()=>(await e.getPublicKey()).result):(await e.getPublicKey()).result}async getPublicParams(e){let t=await this.#c();return this.#o?this.#o.getPublicParams(e,async()=>(await t.getPublicParams(e)).result):(await t.getPublicParams(e)).result}async getAclAddress(){let e=await this.#e.getChainId(),n=Object.assign({},u[e],this.#e.transports[e]);if(!n.aclContractAddress)throw new t(`No ACL address configured for chain ${e}`);return n.aclContractAddress}},v=class{#e=new m;run(e){return this.#e.run(new Map,e)}async get(e){return this.#e.getStore()?.get(e)??null}async set(e,t){this.#e.getStore()?.set(e,t)}async delete(e){this.#e.getStore()?.delete(e)}};const y=new v;export{v as AsyncLocalMapStorage,n as BaseWorkerClient,s as HardhatConfig,l as MainnetConfig,h as NodeWorkerClient,g as NodeWorkerPool,_ as RelayerNode,o as SepoliaConfig,y as asyncLocalStorage};
1
+ import{r as e,t}from"../relayer-DxMV-NQT.js";import{n,t as r}from"../fhe-artifact-cache-DNoPom4I.js";import{t as i}from"../memory-storage-DNvc-6oK.js";import{a,i as o,n as s,o as c,r as l,t as u}from"../relayer-utils-BeoTNDM4.js";import{availableParallelism as d}from"node:os";import{Worker as f}from"node:worker_threads";import{randomUUID as p}from"node:crypto";import{AsyncLocalStorage as m}from"node:async_hooks";var h=class extends n{constructor(e){super(e,e.logger)}createWorker(){return new f(new URL(`relayer-sdk.node-worker.js`,import.meta.url))}wireEvents(e){e.on(`message`,e=>this.handleResponse(e)),e.on(`error`,e=>this.handleWorkerError(e.message)),e.on(`messageerror`,()=>this.handleWorkerMessageError())}postMessage(e,t){e.postMessage(t)}terminateWorker(e){e.terminate()}generateRequestId(){return p()}getInitPayload(){return{type:`NODE_INIT`,payload:{fhevmConfig:this.config.fhevmConfig}}}onWorkerReady(e){e.unref()}},g=class{#e=[];#t=[];#n;#r;#i=null;constructor(e){this.#n=e,this.#r=e.poolSize??Math.min(d(),4)}get poolSize(){return this.#r}async initPool(){if(!(this.#e.length>0))return this.#i||=this.#a().finally(()=>{this.#i=null}),this.#i}async#a(){for(let e=0;e<this.#r;e++)this.#e.push(new h(this.#n)),this.#t.push(0);try{await Promise.all(this.#e.map(e=>e.initWorker()))}catch(e){for(let e of this.#e)e.terminate();throw this.#e.length=0,this.#t.length=0,e}}terminate(){for(let e of this.#e)e.terminate();this.#e.length=0,this.#t.length=0}#o(){let e=0,t=this.#t[0];for(let n=1;n<this.#t.length;n++)this.#t[n]<t&&(t=this.#t[n],e=n);return e}async#s(e){if(this.#e.length===0)throw Error(`NodeWorkerPool not initialized. Call initPool() first.`);let t=this.#o();this.#t[t]++;try{return await e(this.#e[t])}finally{this.#t[t]--}}async generateKeypair(){return this.#s(e=>e.generateKeypair())}async createEIP712(e){return this.#s(t=>t.createEIP712(e))}async encrypt(e){return this.#s(t=>t.encrypt(e))}async userDecrypt(e){return this.#s(t=>t.userDecrypt(e))}async publicDecrypt(e){return this.#s(t=>t.publicDecrypt(e))}async createDelegatedUserDecryptEIP712(e){return this.#s(t=>t.createDelegatedUserDecryptEIP712(e))}async delegatedUserDecrypt(e){return this.#s(t=>t.delegatedUserDecrypt(e))}async requestZKProofVerification(e){return this.#s(t=>t.requestZKProofVerification(e))}async getPublicKey(){return this.#s(e=>e.getPublicKey())}async getPublicParams(e){return this.#s(t=>t.getPublicParams(e))}},_=class{#e;#t=null;#n=null;#r=null;#i=!1;#a=null;#o=null;constructor(e){this.#e={fheArtifactStorage:new i,...e}}async#s(){let e=await this.#e.getChainId(),{transports:t,poolSize:n}=this.#e;return{fhevmConfig:Object.assign({},u[e],t[e]),poolSize:n,logger:this.#e.logger}}async#c(){if(this.#r)return this.#r;this.#r=this.#u();try{return await this.#r}finally{this.#r=null}}#l(){this.#t?.terminate(),this.#t=null,this.#n=null,this.#o=null}async#u(){if(this.#i)throw new t(`RelayerNode has been terminated`);let n=await this.#e.getChainId();if(this.#a!==null&&n!==this.#a&&this.#l(),this.#a=n,!this.#o&&this.#e.fheArtifactStorage){let e=Object.assign({},u[n],this.#e.transports[n]);this.#o=new r({storage:this.#e.fheArtifactStorage,chainId:n,relayerUrl:e.relayerUrl,ttl:this.#e.fheArtifactCacheTTL,logger:this.#e.logger})}if(this.#o){let e=!1;try{e=await this.#o.revalidateIfDue()}catch(e){this.#e.logger?.warn(`Artifact revalidation failed, proceeding with potentially stale cache`,{error:e instanceof Error?e.message:String(e)})}e&&(this.#e.logger?.info(`Cached FHE artifacts are stale — reinitializing`),this.#l())}return this.#n||=this.#d().catch(n=>{throw this.#n=null,n instanceof e?n:new t(`Failed to initialize FHE worker pool`,{cause:n})}),this.#n}async#d(){let e=new g(await this.#s());if(await e.initPool(),this.#i)throw e.terminate(),Error(`RelayerNode was terminated during initialization`);return this.#t=e,e}terminate(){this.#i=!0,this.#t&&=(this.#t.terminate(),null),this.#n=null,this.#r=null}async generateKeypair(){let e=await(await this.#c()).generateKeypair();return{publicKey:e.publicKey,privateKey:e.privateKey}}async createEIP712(e,t,n,r=7){let i=await(await this.#c()).createEIP712({publicKey:e,contractAddresses:t,startTimestamp:n,durationDays:r}),o={name:i.domain.name,version:i.domain.version,chainId:i.domain.chainId,verifyingContract:i.domain.verifyingContract};return{domain:o,types:{EIP712Domain:a(o),UserDecryptRequestVerification:i.types.UserDecryptRequestVerification},message:{publicKey:i.message.publicKey,contractAddresses:i.message.contractAddresses,startTimestamp:i.message.startTimestamp,durationDays:i.message.durationDays,extraData:i.message.extraData}}}async encrypt(e){return c(async()=>{let t=await(await this.#c()).encrypt(e);return{handles:t.handles,inputProof:t.inputProof}})}async userDecrypt(e){return c(async()=>(await(await this.#c()).userDecrypt(e)).clearValues)}async publicDecrypt(e){return c(async()=>{let t=await(await this.#c()).publicDecrypt(e);return{clearValues:t.clearValues,abiEncodedClearValues:t.abiEncodedClearValues,decryptionProof:t.decryptionProof}})}async createDelegatedUserDecryptEIP712(e,t,n,r,i=7){return(await this.#c()).createDelegatedUserDecryptEIP712({publicKey:e,contractAddresses:t,delegatorAddress:n,startTimestamp:r,durationDays:i})}async delegatedUserDecrypt(e){return c(async()=>(await(await this.#c()).delegatedUserDecrypt(e)).clearValues)}async requestZKProofVerification(e){return c(async()=>(await this.#c()).requestZKProofVerification(e))}async getPublicKey(){let e=await this.#c();return this.#o?this.#o.getPublicKey(async()=>(await e.getPublicKey()).result):(await e.getPublicKey()).result}async getPublicParams(e){let t=await this.#c();return this.#o?this.#o.getPublicParams(e,async()=>(await t.getPublicParams(e)).result):(await t.getPublicParams(e)).result}async getAclAddress(){let e=await this.#e.getChainId(),n=Object.assign({},u[e],this.#e.transports[e]);if(!n.aclContractAddress)throw new t(`No ACL address configured for chain ${e}`);return n.aclContractAddress}},v=class{#e=new m;run(e){return this.#e.run(new Map,e)}async get(e){return this.#e.getStore()?.get(e)??null}async set(e,t){this.#e.getStore()?.set(e,t)}async delete(e){this.#e.getStore()?.delete(e)}};const y=new v;export{v as AsyncLocalMapStorage,n as BaseWorkerClient,s as HardhatConfig,l as MainnetConfig,h as NodeWorkerClient,g as NodeWorkerPool,_ as RelayerNode,o as SepoliaConfig,y as asyncLocalStorage};
2
2
  //# sourceMappingURL=index.js.map
@@ -1,2 +1,2 @@
1
- import{n as e,t}from"../hex-BVdZkMrT.js";import{parentPort as n}from"node:worker_threads";if(!n)throw Error(`This script must be run as a worker thread`);const r=n;let i=null;function a(e,t,n,i){let a={id:e,type:t,success:!0,data:n};r.postMessage(a,i)}function o(e,t,n){let i={id:e,type:t,success:!1,error:n};r.postMessage(i)}async function s(e){let{id:t,type:n,payload:r}=e,{fhevmConfig:s}=r;try{let e=await import(`@zama-fhe/relayer-sdk/node`),r={...s,batchRpcCalls:!1};i=await e.createInstance(r),a(t,n,{initialized:!0})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] Init error:`,r),o(t,n,r)}}function c(e){return typeof e==`boolean`?e?1n:0n:e}function l(e){throw Error(`Unsupported FHE type`)}async function u(e){let{id:t,type:n,payload:r}=e,{values:s,contractAddress:u,userAddress:d}=r;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=i.createEncryptedInput(u,d);for(let t of s){let{value:n,type:r}=t;switch(r){case`ebool`:e.addBool(typeof n==`boolean`?n:n!==0n);break;case`euint8`:e.add8(c(n));break;case`euint16`:e.add16(c(n));break;case`euint32`:e.add32(c(n));break;case`euint64`:e.add64(c(n));break;case`euint128`:e.add128(c(n));break;case`euint256`:e.add256(c(n));break;case`eaddress`:e.addAddress(String(n));break;default:l(r)}}let r=await e.encrypt();a(t,n,{handles:r.handles,inputProof:r.inputProof},[r.inputProof.buffer,...r.handles.map(e=>e.buffer)])}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] Encrypt error:`,r),o(t,n,r)}}async function d(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let t=s.handles.map(e=>({handle:e,contractAddress:s.contractAddress}));a(n,r,{clearValues:await i.userDecrypt(t,e(s.privateKey),e(s.publicKey),s.signature,s.signedContractAddresses,s.signerAddress,s.startTimestamp,s.durationDays)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] UserDecrypt error:`,t),o(n,r,t)}}async function f(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{...await i.publicDecrypt(r.handles)})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] PublicDecrypt error:`,r),o(t,n,r)}}function p(e){let{id:n,type:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=i.generateKeypair();a(n,r,{publicKey:t(e.publicKey),privateKey:t(e.privateKey)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GenerateKeypair error:`,t),o(n,r,t)}}function m(n){let{id:r,type:s,payload:c}=n;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let n=i.createEIP712(e(c.publicKey),c.contractAddresses,c.startTimestamp,c.durationDays);a(r,s,{domain:{name:n.domain.name,version:n.domain.version,chainId:Number(n.domain.chainId),verifyingContract:n.domain.verifyingContract},types:{UserDecryptRequestVerification:n.types.UserDecryptRequestVerification.map(e=>({name:e.name,type:e.type}))},message:{publicKey:t(n.message.publicKey),contractAddresses:[...n.message.contractAddresses],startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays),extraData:t(n.message.extraData)}})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] CreateEIP712 error:`,t),o(r,s,t)}}function h(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(n,r,i.createDelegatedUserDecryptEIP712(e(s.publicKey),s.contractAddresses,s.delegatorAddress,s.startTimestamp,s.durationDays))}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] CreateDelegatedEIP712 error:`,t),o(n,r,t)}}async function g(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let t=s.handles.map(e=>({handle:e,contractAddress:s.contractAddress}));a(n,r,{clearValues:await i.delegatedUserDecrypt(t,e(s.privateKey),e(s.publicKey),s.signature,s.signedContractAddresses,s.delegatorAddress,s.delegateAddress,s.startTimestamp,s.durationDays)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] DelegatedUserDecrypt error:`,t),o(n,r,t)}}async function _(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=await i.requestZKProofVerification(r.zkProof);a(t,n,e,[e.inputProof.buffer,...e.handles.map(e=>e.buffer)])}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] RequestZKProofVerification error:`,r),o(t,n,r)}}function v(e){let{id:t,type:n}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{result:i.getPublicKey()})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GetPublicKey error:`,r),o(t,n,r)}}function y(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{result:i.getPublicParams(r.bits)})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GetPublicParams error:`,r),o(t,n,r)}}async function b(e){try{switch(e.type){case`NODE_INIT`:await s(e);break;case`ENCRYPT`:await u(e);break;case`USER_DECRYPT`:await d(e);break;case`PUBLIC_DECRYPT`:await f(e);break;case`GENERATE_KEYPAIR`:p(e);break;case`CREATE_EIP712`:m(e);break;case`CREATE_DELEGATED_EIP712`:h(e);break;case`DELEGATED_USER_DECRYPT`:await g(e);break;case`REQUEST_ZK_PROOF_VERIFICATION`:await _(e);break;case`GET_PUBLIC_KEY`:v(e);break;case`GET_PUBLIC_PARAMS`:y(e);break;default:console.error(`[NodeWorker] Unknown request type:`,e.type)}}catch(t){let n=t instanceof Error?t.message:String(t);o(e.id,e.type,n)}}r.on(`message`,e=>{b(e)});
1
+ import{n as e,t}from"../hex-CVGYqDKx.js";import{parentPort as n}from"node:worker_threads";if(!n)throw Error(`This script must be run as a worker thread`);const r=n;let i=null;function a(e,t,n,i){let a={id:e,type:t,success:!0,data:n};r.postMessage(a,i)}function o(e,t,n){let i={id:e,type:t,success:!1,error:n};r.postMessage(i)}async function s(e){let{id:t,type:n,payload:r}=e,{fhevmConfig:s}=r;try{let e=await import(`@zama-fhe/relayer-sdk/node`),r={...s,batchRpcCalls:!1};i=await e.createInstance(r),a(t,n,{initialized:!0})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] Init error:`,r),o(t,n,r)}}function c(e){return typeof e==`boolean`?e?1n:0n:e}function l(e){throw Error(`Unsupported FHE type`)}async function u(e){let{id:t,type:n,payload:r}=e,{values:s,contractAddress:u,userAddress:d}=r;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=i.createEncryptedInput(u,d);for(let t of s){let{value:n,type:r}=t;switch(r){case`ebool`:e.addBool(typeof n==`boolean`?n:n!==0n);break;case`euint8`:e.add8(c(n));break;case`euint16`:e.add16(c(n));break;case`euint32`:e.add32(c(n));break;case`euint64`:e.add64(c(n));break;case`euint128`:e.add128(c(n));break;case`euint256`:e.add256(c(n));break;case`eaddress`:e.addAddress(String(n));break;default:l(r)}}let r=await e.encrypt();a(t,n,{handles:r.handles,inputProof:r.inputProof},[r.inputProof.buffer,...r.handles.map(e=>e.buffer)])}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] Encrypt error:`,r),o(t,n,r)}}async function d(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let t=s.handles.map(e=>({handle:e,contractAddress:s.contractAddress}));a(n,r,{clearValues:await i.userDecrypt(t,e(s.privateKey),e(s.publicKey),s.signature,s.signedContractAddresses,s.signerAddress,s.startTimestamp,s.durationDays)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] UserDecrypt error:`,t),o(n,r,t)}}async function f(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{...await i.publicDecrypt(r.handles)})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] PublicDecrypt error:`,r),o(t,n,r)}}function p(e){let{id:n,type:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=i.generateKeypair();a(n,r,{publicKey:t(e.publicKey),privateKey:t(e.privateKey)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GenerateKeypair error:`,t),o(n,r,t)}}function m(n){let{id:r,type:s,payload:c}=n;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let n=i.createEIP712(e(c.publicKey),c.contractAddresses,c.startTimestamp,c.durationDays);a(r,s,{domain:{name:n.domain.name,version:n.domain.version,chainId:Number(n.domain.chainId),verifyingContract:n.domain.verifyingContract},types:{UserDecryptRequestVerification:n.types.UserDecryptRequestVerification.map(e=>({name:e.name,type:e.type}))},message:{publicKey:t(n.message.publicKey),contractAddresses:[...n.message.contractAddresses],startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays),extraData:t(n.message.extraData)}})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] CreateEIP712 error:`,t),o(r,s,t)}}function h(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(n,r,i.createDelegatedUserDecryptEIP712(e(s.publicKey),s.contractAddresses,s.delegatorAddress,s.startTimestamp,s.durationDays))}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] CreateDelegatedEIP712 error:`,t),o(n,r,t)}}async function g(t){let{id:n,type:r,payload:s}=t;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let t=s.handles.map(e=>({handle:e,contractAddress:s.contractAddress}));a(n,r,{clearValues:await i.delegatedUserDecrypt(t,e(s.privateKey),e(s.publicKey),s.signature,s.signedContractAddresses,s.delegatorAddress,s.delegateAddress,s.startTimestamp,s.durationDays)})}catch(e){let t=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] DelegatedUserDecrypt error:`,t),o(n,r,t)}}async function _(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);let e=await i.requestZKProofVerification(r.zkProof);a(t,n,e,[e.inputProof.buffer,...e.handles.map(e=>e.buffer)])}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] RequestZKProofVerification error:`,r),o(t,n,r)}}function v(e){let{id:t,type:n}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{result:i.getPublicKey()})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GetPublicKey error:`,r),o(t,n,r)}}function y(e){let{id:t,type:n,payload:r}=e;try{if(!i)throw Error(`SDK not initialized. Call NODE_INIT first.`);a(t,n,{result:i.getPublicParams(r.bits)})}catch(e){let r=e instanceof Error?e.message:String(e);console.error(`[NodeWorker] GetPublicParams error:`,r),o(t,n,r)}}async function b(e){try{switch(e.type){case`NODE_INIT`:await s(e);break;case`ENCRYPT`:await u(e);break;case`USER_DECRYPT`:await d(e);break;case`PUBLIC_DECRYPT`:await f(e);break;case`GENERATE_KEYPAIR`:p(e);break;case`CREATE_EIP712`:m(e);break;case`CREATE_DELEGATED_EIP712`:h(e);break;case`DELEGATED_USER_DECRYPT`:await g(e);break;case`REQUEST_ZK_PROOF_VERIFICATION`:await _(e);break;case`GET_PUBLIC_KEY`:v(e);break;case`GET_PUBLIC_PARAMS`:y(e);break;default:console.error(`[NodeWorker] Unknown request type:`,e.type)}}catch(t){let n=t instanceof Error?t.message:String(t);o(e.id,e.type,n)}}r.on(`message`,e=>{b(e)});
2
2
  //# sourceMappingURL=relayer-sdk.node-worker.js.map
@@ -746,11 +746,15 @@ interface DelegationStatusData {
746
746
  expiryTimestamp: bigint;
747
747
  }
748
748
  interface DelegationStatusQueryConfig {
749
+ tokenAddress: Address | undefined;
749
750
  delegatorAddress?: Address;
750
751
  delegateAddress?: Address;
751
752
  query?: Record<string, unknown>;
752
753
  }
753
- declare function delegationStatusQueryOptions(signer: GenericSigner, relayer: RelayerSDK, tokenAddress: Address | undefined, config: DelegationStatusQueryConfig): QueryFactoryOptions<DelegationStatusData, Error, DelegationStatusData, ReturnType<typeof zamaQueryKeys.delegationStatus.scope>>;
754
+ declare function delegationStatusQueryOptions(sdk: {
755
+ signer: GenericSigner;
756
+ relayer: RelayerSDK;
757
+ }, config: DelegationStatusQueryConfig): QueryFactoryOptions<DelegationStatusData, Error, DelegationStatusData, ReturnType<typeof zamaQueryKeys.delegationStatus.scope>>;
754
758
  //#endregion
755
759
  export { type ActivityAmount, type ActivityDirection, type ActivityFeedConfig, type ActivityFeedQueryConfig, type ActivityItem, type ActivityLogMetadata, type ActivityType, type ApproveSubmittedEvent, type ApproveUnderlyingParams, type ApproveUnderlyingSubmittedEvent, type BaseEvent, type BatchDecryptAsOptions, type BatchDecryptBalancesAsParams, type BatchDecryptOptions, type ConfidentialApproveParams, type ConfidentialBalanceQueryConfig, type ConfidentialBalancesData, type ConfidentialBalancesQueryConfig, type ConfidentialHandleQueryConfig, type ConfidentialHandlesQueryConfig, type ConfidentialIsApprovedQueryConfig, type ConfidentialTokenAddressQueryConfig, type ConfidentialTransferEvent, type ConfidentialTransferFromParams, type ConfidentialTransferParams, type CreateDelegatedUserDecryptEIP712Params, type CreateEIP712Params, type CredentialsAllowedEvent, type CredentialsCachedEvent, type CredentialsCorruptedEvent, type CredentialsCreatedEvent, type CredentialsCreatingEvent, type CredentialsExpiredEvent, type CredentialsLoadingEvent, type CredentialsManager, type CredentialsManagerConfig, type CredentialsPersistFailedEvent, type CredentialsRevokedEvent, type DecryptBalanceAsParams, type DecryptEndEvent, type DecryptErrorEvent, type DecryptHandle, type DecryptStartEvent, type DelegateDecryptionParams, type DelegatedUserDecryptParams, type DelegationStatusData, type DelegationStatusQueryConfig, type DelegationSubmittedEvent, type EIP712TypedData, type EncryptEndEvent, type EncryptErrorEvent, type EncryptInput, type EncryptParams, type EncryptResult, type EncryptStartEvent, type EncryptedBalanceHandle, type FeeQueryConfig, type FinalizeUnwrapParams, type FinalizeUnwrapSubmittedEvent, type GenericSigner, type GenericStorage, type IsAllowedQueryConfig, type IsConfidentialQueryConfig, type IsConfidentialTokenValidQueryConfig, type ListPairsQueryConfig, type MutationFactoryOptions, type OnChainEvent, type PublicDecryptResult, type PublicKeyQueryConfig, type PublicParamsQueryConfig, type QueryClientLike, type QueryFactoryOptions, type QueryFilterLike, type QueryLike, type RawLog, type ReadonlyToken, type ReadonlyTokenConfig, type RelayerSDK, type ResumeUnshieldParams, type RevokeDelegationParams, type RevokeDelegationSubmittedEvent, type SessionExpiredEvent, type ShieldCallbacks, type ShieldETHParams, type ShieldFeeQueryConfig, type ShieldParams, type ShieldSubmittedEvent, type SignerAddressQueryConfig, type SignerLifecycleCallbacks, type StoredCredentials, type StrippedQueryOptionKeys, type Token, type TokenAddressQueryConfig, type TokenConfig, type TokenMetadata, type TokenMetadataQueryConfig, type TokenPairQueryConfig, type TokenPairsSliceQueryConfig, type TotalSupplyQueryConfig, type TransactionErrorEvent, type TransactionReceipt, type TransactionResult, type TransferCallbacks, type TransferFromSubmittedEvent, type TransferSubmittedEvent, type UnderlyingAllowanceQueryConfig, type UnshieldAllParams, type UnshieldCallbacks, type UnshieldFeeQueryConfig, type UnshieldParams, type UnshieldPhase1SubmittedEvent, type UnshieldPhase2StartedEvent, type UnshieldPhase2SubmittedEvent, type UnwrapParams, type UnwrapRequestedEvent, type UnwrapSubmittedEvent, type UnwrappedFinalizedEvent, type UnwrappedStartedEvent, type UserDecryptCallbacks, type UserDecryptMutationParams, type UserDecryptParams, type WrappedEvent, type WrapperDiscoveryQueryConfig, type WrappersRegistryQueryConfig, ZERO_HANDLE, type ZamaSDK, type ZamaSDKConfig, type ZamaSDKEvent, type ZamaSDKEventInput, type ZamaSDKEventListener, ZamaSDKEvents, activityFeedQueryOptions, allowMutationOptions, approveUnderlyingMutationOptions, batchDecryptBalancesAsMutationOptions, batchTransferFeeQueryOptions, confidentialApproveMutationOptions, confidentialBalanceQueryOptions, confidentialBalancesQueryOptions, confidentialHandleQueryOptions, confidentialHandlesQueryOptions, confidentialIsApprovedQueryOptions, confidentialTokenAddressQueryOptions, confidentialTransferFromMutationOptions, confidentialTransferMutationOptions, createDelegatedUserDecryptEIP712MutationOptions, createEIP712MutationOptions, decryptBalanceAsMutationOptions, delegateDecryptionMutationOptions, delegatedUserDecryptMutationOptions, delegationStatusQueryOptions, deriveActivityFeedLogsKey, encryptMutationOptions, feeRecipientQueryOptions, filterQueryOptions, finalizeUnwrapMutationOptions, generateKeypairMutationOptions, hashFn, invalidateAfterApprove, invalidateAfterApproveUnderlying, invalidateAfterShield, invalidateAfterTransfer, invalidateAfterUnshield, invalidateAfterUnwrap, invalidateBalanceQueries, invalidateWagmiBalanceQueries, invalidateWalletLifecycleQueries, isAllowedQueryOptions, isConfidentialQueryOptions, isConfidentialTokenValidQueryOptions, isWrapperQueryOptions, listPairsQueryOptions, publicDecryptMutationOptions, publicKeyQueryOptions, publicParamsQueryOptions, requestZKProofVerificationMutationOptions, resumeUnshieldMutationOptions, revokeDelegationMutationOptions, revokeMutationOptions, revokeSessionMutationOptions, shieldETHMutationOptions, shieldFeeQueryOptions, shieldMutationOptions, signerAddressQueryOptions, tokenAddressQueryOptions, tokenMetadataQueryOptions, tokenPairQueryOptions, tokenPairsLengthQueryOptions, tokenPairsQueryOptions, tokenPairsSliceQueryOptions, totalSupplyQueryOptions, underlyingAllowanceQueryOptions, unshieldAllMutationOptions, unshieldFeeQueryOptions, unshieldMutationOptions, unwrapAllMutationOptions, unwrapMutationOptions, userDecryptMutationOptions, wrapperDiscoveryQueryOptions, zamaQueryKeys };
756
760
  //# sourceMappingURL=index.d.ts.map
@@ -1,2 +1,2 @@
1
- import{C as e,D as t,E as n,F as r,M as i,O as a,P as o,T as s,b as c,g as l,i as u,k as d,n as f,r as p,t as m,x as h}from"../activity-DoDLK_gV.js";import{t as g}from"../encryption-CKqGKzHs.js";import{C as _,D as v,_ as y,a as b,d as x,i as S,m as C,n as w,o as ee,r as te,s as ne,t as re,u as ie}from"../wrappers-registry-DqPr_JG2.js";import{getAddress as T,zeroAddress as E}from"viem";function D(e){if(!O(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!O(n)||!n.hasOwnProperty(`isPrototypeOf`))}function O(e){return Object.prototype.toString.call(e)===`[object Object]`}const k=`0x0000000000000000000000000000000000000000000000000000000000000000`;function A(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:y,meta:b,query:x,pollingInterval:S,...C}=e;return C}function j(e){return JSON.stringify(e,(e,t)=>D(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const M=e=>e.map(e=>T(e)),N=e=>e===void 0?void 0:T(e),P={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:T(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:T(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:T(e),...t?{owner:T(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:T(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:T(e),...t?{owner:T(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:M(e),...t?{owner:T(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:M(e),...t?{owner:T(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:T(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:T(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:T(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=N(e),i=N(t),a=N(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:T(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:T(e),...t?{owner:T(t)}:{},...n?{wrapperAddress:T(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=N(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=N(e),i=N(t),a=N(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:T(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:T(e)}],scope:(e,t,n,r)=>[`zama.activityFeed`,{tokenAddress:T(e),...t?{userAddress:T(t)}:{},...n?{logsKey:n}:{},...r===void 0?{}:{decrypt:r}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,r)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:T(e)}:{},...t===void 0?{}:{amount:t},...n?{from:T(n)}:{},...r?{to:T(r)}:{}}],unshieldFee:(e,t,n,r)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:T(e)}:{},...t===void 0?{}:{amount:t},...n?{from:T(n)}:{},...r?{to:T(r)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:T(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:T(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:T(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=N(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=N(e),i=N(t),a=N(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:T(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:T(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:T(e),tokenAddress:T(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:T(e),confidentialTokenAddress:T(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:T(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:T(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:T(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:T(e),confidentialTokenAddress:T(t)}],listPairs:(e,t,n,r)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:T(e),page:t,pageSize:n,metadata:r}]}};function F(e,t){e.invalidateQueries({queryKey:P.underlyingAllowance.token(t)})}function I(e,t){L(e,t),F(e,t),G(e),e.invalidateQueries({queryKey:P.activityFeed.token(t)})}function L(e,t){e.invalidateQueries({queryKey:P.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:P.confidentialHandles.all}),e.invalidateQueries({queryKey:P.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:P.confidentialBalances.all})}function R(e,t){L(e,t),F(e,t),G(e),e.invalidateQueries({queryKey:P.activityFeed.token(t)})}function z(e,t){L(e,t),F(e,t),G(e),e.invalidateQueries({queryKey:P.activityFeed.token(t)})}function B(e,t){L(e,t),e.invalidateQueries({queryKey:P.activityFeed.token(t)})}function V(e,t){F(e,t)}function H(e,t){e.invalidateQueries({queryKey:P.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:P.activityFeed.token(t)})}function U(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function W(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function G(e){e.invalidateQueries({predicate:W})}function K(e){e.removeQueries({queryKey:P.signerAddress.all}),e.removeQueries({queryKey:P.decryption.all}),e.invalidateQueries({predicate:U}),G(e)}const q=new WeakMap;let J=1;function Y(e){let t=q.get(e);if(t!==void 0)return t;let n=J++;return q.set(e,n),n}function ae(e,t){return{...A(t?.query??{}),queryKey:P.signerAddress.scope(Y(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function oe(e,t,n){let a=P.tokenMetadata.token(t);return{...A(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey,[a,s,c]=await Promise.all([e.readContract(o(n)),e.readContract(r(n)),e.readContract(i(n))]);return{name:a,symbol:s,decimals:c}},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function se(e,t,n){let r=P.isConfidential.token(t);return{...A(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(ie(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ce(e,t,n){let r=P.isWrapper.token(t);return{...A(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(x(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function le(e,t,n){let r=P.totalSupply.token(t);return{...A(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(v(n))},staleTime:3e4,enabled:n?.query?.enabled!==!1}}function ue(e,t){let n=P.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...A(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function de(e,t,n){let r=n.owner,i=n.wrapperAddress,a=n.query?.enabled!==!1,o=P.underlyingAllowance.scope(t,r,i);return{...A(n.query??{}),queryKey:o,queryFn:async t=>{let[,{owner:n,wrapperAddress:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`wrapperAddress is required`);let i=await e.readContract(C(r));return e.readContract(d(i,n,r))},staleTime:3e4,enabled:!!(r&&i)&&a}}function fe(e,t,n){let r=n.holder,i=n.spender,a=n.query?.enabled!==!1,o=P.confidentialIsApproved.scope(t,r,i);return{...A(n.query??{}),queryKey:o,queryFn:async t=>{let[,{tokenAddress:n,holder:r,spender:i}]=t.queryKey;if(!n)throw Error(`tokenAddress is required`);if(!r)throw Error(`holder is required`);if(!i)throw Error(`spender is required`);return e.readContract(_(n,r,i))},staleTime:3e4,enabled:!!(t&&r&&i)&&a}}function X(e){return e===void 0?void 0:BigInt(e)}function pe(e,t){let n=t.amount?.toString(),r=t.feeManagerAddress,i=t.from,o=t.to,s=t.query?.enabled!==!1,c=P.fees.shieldFee(r,n,i,o);return{...A(t.query??{}),queryKey:c,queryFn:async t=>{let[,n]=t.queryKey,r=X(n.amount);if(!n.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(r===void 0)throw Error(`amount is required`);if(!n.from)throw Error(`from is required`);if(!n.to)throw Error(`to is required`);return e.readContract(a(n.feeManagerAddress,r,n.from,n.to))},staleTime:3e4,enabled:!!(r&&n!==void 0&&i&&o)&&s}}function me(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,o=n.to,s=n.query?.enabled!==!1,c=P.fees.unshieldFee(i,r,a,o);return{...A(n.query??{}),queryKey:c,queryFn:async n=>{let[,r]=n.queryKey,i=X(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&o)&&s}}function he(e,t,n){let r=n?.query?.enabled!==!1,i=P.fees.batchTransferFee(t);return{...A(n?.query??{}),queryKey:i,queryFn:async t=>{let[,{feeManagerAddress:n}]=t.queryKey;if(!n)throw Error(`feeManagerAddress is required`);return e.readContract(s(n))},staleTime:3e4,enabled:!!t&&r}}function ge(e,t,r){let i=r?.query?.enabled!==!1,a=P.fees.feeRecipient(t);return{...A(r?.query??{}),queryKey:a,queryFn:async t=>{let[,{feeManagerAddress:r}]=t.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(n(r))},staleTime:3e4,enabled:!!t&&i}}function _e(e,t){let n=P.publicKey.all;return{...A(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function ve(e,t,n){let r=P.publicParams.bits(t);return{...A(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ye(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=P.confidentialHandle.owner(t,r);return{...A(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return await e.readContract(y(n,r))},enabled:!!r&&i,refetchInterval:n?.pollingInterval??1e4}}function be(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=P.confidentialBalance.owner(e.address,n,r);return{...A(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function xe(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=P.confidentialHandles.tokens(t,r);return{...A(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddresses:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return Promise.all(n.map(async t=>await e.readContract(y(t,r))))},enabled:!!(r&&t.length>0)&&i,refetchInterval:n?.pollingInterval??1e4}}function Se(e,t){let n=e.map(e=>e.address),r=t?.resultAddresses??n,i=t?.owner,a=t?.handles,o=t?.query?.enabled!==!1,s=Array.isArray(a)&&a.length===e.length&&a.every(e=>!!e),c=P.confidentialBalances.tokens(n,i,a);return{...A(t?.query??{}),queryKey:c,queryFn:async n=>{let[,{owner:i,handles:a}]=n.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`handles are required`);let o=new Map,s=await l.batchDecryptBalances(e,{owner:i,handles:a,maxConcurrency:t?.maxConcurrency,onError:(e,t)=>(o.set(t,e),0n)}),c=new Map,u=new Map;for(let t=0;t<e.length;t++){let n=e[t].address,i=r[t],a=o.get(n);if(a)u.set(i,a);else{let e=s.get(n);e!==void 0&&c.set(i,e)}}if(u.size===e.length&&e.length>0)throw u.values().next().value??new g(`All token balance decryptions failed`);return{balances:c,errors:u,isPartialError:u.size>0}},enabled:r.length===e.length&&!!i&&e.length>0&&s&&o,staleTime:1/0}}function Z(e){if(e)return j([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function Ce(e,t,n){let r=t.userAddress,i=t.decrypt??!0,a=t.logs,o=t.logsKey??Z(a),s=n?.query?.enabled!==!1,c=P.activityFeed.scope(e.address,r,o,i);return{...A(n?.query??{}),queryKey:c,queryFn:async t=>{let[,{userAddress:n,decrypt:r}]=t.queryKey;if(!n)throw Error(`userAddress is required`);if(!a)throw Error(`logs are required`);let i=p(a,n);if(!r)return u(i);let o=f(i);return o.length===0?u(i):u(m(i,await e.decryptHandles(o,n)))},staleTime:1/0,enabled:!!(r&&a)&&s}}const Q=86400*1e3;function we(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=P.wrappersRegistry.tokenPairs(t.registryAddress??E);return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(S(n))},staleTime:Q,enabled:n}}function Te(e,t){let n=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,r=P.wrappersRegistry.confidentialTokenAddress(t.registryAddress??E,t.tokenAddress??E);return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,tokenAddress:r}]=t.queryKey;return e.readContract(re(n,r))},staleTime:Q,enabled:n}}function Ee(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=P.wrappersRegistry.tokenAddress(t.registryAddress??E,t.confidentialTokenAddress??E);return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(w(n,r))},staleTime:Q,enabled:n}}function De(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=P.wrappersRegistry.tokenPairsLength(t.registryAddress??E);return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(b(n))},staleTime:Q,enabled:n}}function Oe(e,t){let n=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,r=P.wrappersRegistry.tokenPairsSlice(t.registryAddress??E,String(t.fromIndex??0n),String(t.toIndex??0n));return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,fromIndex:r,toIndex:i}]=t.queryKey;return e.readContract(ee(n,BigInt(r),BigInt(i)))},staleTime:Q,enabled:n}}function ke(e,t){let n=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,r=P.wrappersRegistry.tokenPair(t.registryAddress??E,String(t.index??0n));return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,index:r}]=t.queryKey;return e.readContract(te(n,BigInt(r)))},staleTime:Q,enabled:n}}function Ae(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=P.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??E,t.confidentialTokenAddress??E);return{...A(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(ne(n,r))},staleTime:Q,enabled:n}}function je(e,t){let n=t.page??1,r=t.pageSize??100,i=t.metadata??!1,a=!!t.registryAddress&&t.query?.enabled!==!1,o=P.wrappersRegistry.listPairs(t.registryAddress??E,n,r,i);return{...A(t.query??{}),queryKey:o,queryFn:async()=>e.listPairs({page:n,pageSize:r,metadata:i}),staleTime:e.ttlMs,enabled:a}}function Me(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function Ne(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function Pe(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function Fe(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function Ie(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function Le(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function Re(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function ze(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function Be(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function Ve(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function He(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function Ue(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function We(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function Ge(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function Ke(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function qe(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function Je(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function $(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(P.decryption.handle(t),n)}}}function Ye(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function Xe(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Ze(e,t){return{...A(t.query??{}),queryKey:P.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function Qe(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function $e(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function et(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function tt(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(P.decryption.handle(t),n)}}}function nt(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function rt(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async t=>l.batchDecryptBalancesAs(e,t)}}function it(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function at(t,n,r,i){return{...A(i.query??{}),queryKey:P.delegationStatus.scope(r,i.delegatorAddress,i.delegateAddress),queryFn:async r=>{let[,{tokenAddress:i,delegatorAddress:a,delegateAddress:o}]=r.queryKey;if(!i)throw Error(`tokenAddress is required`);if(!a)throw Error(`delegatorAddress is required`);if(!o)throw Error(`delegateAddress is required`);let s=await n.getAclAddress(),c=await t.readContract(e(s,a,o,i)),l;return l=c===0n?!1:c===h?!0:c>await t.getBlockTimestamp(),{isDelegated:l,expiryTimestamp:c}},enabled:!!(r&&i.delegatorAddress&&i.delegateAddress)&&i.query?.enabled!==!1}}export{k as ZERO_HANDLE,c as ZamaSDKEvents,Ce as activityFeedQueryOptions,Xe as allowMutationOptions,Le as approveUnderlyingMutationOptions,rt as batchDecryptBalancesAsMutationOptions,he as batchTransferFeeQueryOptions,Ie as confidentialApproveMutationOptions,be as confidentialBalanceQueryOptions,Se as confidentialBalancesQueryOptions,ye as confidentialHandleQueryOptions,xe as confidentialHandlesQueryOptions,fe as confidentialIsApprovedQueryOptions,Te as confidentialTokenAddressQueryOptions,Fe as confidentialTransferFromMutationOptions,Pe as confidentialTransferMutationOptions,qe as createDelegatedUserDecryptEIP712MutationOptions,Ke as createEIP712MutationOptions,nt as decryptBalanceAsMutationOptions,et as delegateDecryptionMutationOptions,Je as delegatedUserDecryptMutationOptions,at as delegationStatusQueryOptions,Z as deriveActivityFeedLogsKey,We as encryptMutationOptions,ge as feeRecipientQueryOptions,A as filterQueryOptions,Ue as finalizeUnwrapMutationOptions,Ge as generateKeypairMutationOptions,j as hashFn,H as invalidateAfterApprove,V as invalidateAfterApproveUnderlying,R as invalidateAfterShield,B as invalidateAfterTransfer,z as invalidateAfterUnshield,I as invalidateAfterUnwrap,L as invalidateBalanceQueries,G as invalidateWagmiBalanceQueries,K as invalidateWalletLifecycleQueries,Ze as isAllowedQueryOptions,se as isConfidentialQueryOptions,Ae as isConfidentialTokenValidQueryOptions,ce as isWrapperQueryOptions,je as listPairsQueryOptions,$ as publicDecryptMutationOptions,_e as publicKeyQueryOptions,ve as publicParamsQueryOptions,Ye as requestZKProofVerificationMutationOptions,Be as resumeUnshieldMutationOptions,it as revokeDelegationMutationOptions,Qe as revokeMutationOptions,$e as revokeSessionMutationOptions,Ne as shieldETHMutationOptions,pe as shieldFeeQueryOptions,Me as shieldMutationOptions,ae as signerAddressQueryOptions,Ee as tokenAddressQueryOptions,oe as tokenMetadataQueryOptions,ke as tokenPairQueryOptions,De as tokenPairsLengthQueryOptions,we as tokenPairsQueryOptions,Oe as tokenPairsSliceQueryOptions,le as totalSupplyQueryOptions,de as underlyingAllowanceQueryOptions,ze as unshieldAllMutationOptions,me as unshieldFeeQueryOptions,Re as unshieldMutationOptions,He as unwrapAllMutationOptions,Ve as unwrapMutationOptions,tt as userDecryptMutationOptions,ue as wrapperDiscoveryQueryOptions,P as zamaQueryKeys};
1
+ import{C as e,D as t,E as n,F as r,M as i,O as a,P as o,T as s,b as c,g as l,i as u,k as d,n as f,r as p,t as m,x as h}from"../activity-Ctiuld0m.js";import{t as g}from"../encryption-CKqGKzHs.js";import{r as _}from"../assertions-CASetdUe.js";import{C as v,D as y,_ as b,a as x,d as S,i as C,m as w,n as T,o as ee,r as te,s as ne,t as re,u as ie}from"../wrappers-registry-DqPr_JG2.js";import{getAddress as E,zeroAddress as D}from"viem";function O(e){if(!k(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!k(n)||!n.hasOwnProperty(`isPrototypeOf`))}function k(e){return Object.prototype.toString.call(e)===`[object Object]`}const A=`0x0000000000000000000000000000000000000000000000000000000000000000`;function j(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:y,meta:b,query:x,pollingInterval:S,...C}=e;return C}function M(e){return JSON.stringify(e,(e,t)=>O(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const N=e=>e.map(e=>E(e)),P=e=>e===void 0?void 0:E(e),F={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:E(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:E(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:E(e),...t?{owner:E(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:E(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:N(e),...t?{owner:E(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:N(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:E(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:E(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:E(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:E(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n?{wrapperAddress:E(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=P(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:E(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:E(e)}],scope:(e,t,n,r)=>[`zama.activityFeed`,{tokenAddress:E(e),...t?{userAddress:E(t)}:{},...n?{logsKey:n}:{},...r===void 0?{}:{decrypt:r}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,r)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],unshieldFee:(e,t,n,r)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:E(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:E(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:E(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=P(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:E(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:E(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:E(e),tokenAddress:E(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:E(e),confidentialTokenAddress:E(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:E(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:E(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:E(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:E(e),confidentialTokenAddress:E(t)}],listPairs:(e,t,n,r)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:E(e),page:t,pageSize:n,metadata:r}]}};function I(e,t){e.invalidateQueries({queryKey:F.underlyingAllowance.token(t)})}function L(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function R(e,t){e.invalidateQueries({queryKey:F.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:F.confidentialHandles.all}),e.invalidateQueries({queryKey:F.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:F.confidentialBalances.all})}function z(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function B(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function V(e,t){R(e,t),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function H(e,t){I(e,t)}function U(e,t){e.invalidateQueries({queryKey:F.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function W(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function G(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function K(e){e.invalidateQueries({predicate:G})}function q(e){e.removeQueries({queryKey:F.signerAddress.all}),e.removeQueries({queryKey:F.decryption.all}),e.invalidateQueries({predicate:W}),K(e)}const J=new WeakMap;let Y=1;function ae(e){let t=J.get(e);if(t!==void 0)return t;let n=Y++;return J.set(e,n),n}function oe(e,t){return{...j(t?.query??{}),queryKey:F.signerAddress.scope(ae(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function se(e,t,n){let a=F.tokenMetadata.token(t);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey,[a,s,c]=await Promise.all([e.readContract(o(n)),e.readContract(r(n)),e.readContract(i(n))]);return{name:a,symbol:s,decimals:c}},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ce(e,t,n){let r=F.isConfidential.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(ie(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function le(e,t,n){let r=F.isWrapper.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(S(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ue(e,t,n){let r=F.totalSupply.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(y(n))},staleTime:3e4,enabled:n?.query?.enabled!==!1}}function de(e,t){let n=F.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...j(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function fe(e,t,n){let r=n.owner,i=n.wrapperAddress,a=n.query?.enabled!==!1,o=F.underlyingAllowance.scope(t,r,i);return{...j(n.query??{}),queryKey:o,queryFn:async t=>{let[,{owner:n,wrapperAddress:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`wrapperAddress is required`);let i=await e.readContract(w(r));return e.readContract(d(i,n,r))},staleTime:3e4,enabled:!!(r&&i)&&a}}function pe(e,t,n){let r=n.holder,i=n.spender,a=n.query?.enabled!==!1,o=F.confidentialIsApproved.scope(t,r,i);return{...j(n.query??{}),queryKey:o,queryFn:async t=>{let[,{tokenAddress:n,holder:r,spender:i}]=t.queryKey;if(!n)throw Error(`tokenAddress is required`);if(!r)throw Error(`holder is required`);if(!i)throw Error(`spender is required`);return e.readContract(v(n,r,i))},staleTime:3e4,enabled:!!(t&&r&&i)&&a}}function X(e){return e===void 0?void 0:BigInt(e)}function me(e,t){let n=t.amount?.toString(),r=t.feeManagerAddress,i=t.from,o=t.to,s=t.query?.enabled!==!1,c=F.fees.shieldFee(r,n,i,o);return{...j(t.query??{}),queryKey:c,queryFn:async t=>{let[,n]=t.queryKey,r=X(n.amount);if(!n.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(r===void 0)throw Error(`amount is required`);if(!n.from)throw Error(`from is required`);if(!n.to)throw Error(`to is required`);return e.readContract(a(n.feeManagerAddress,r,n.from,n.to))},staleTime:3e4,enabled:!!(r&&n!==void 0&&i&&o)&&s}}function he(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,o=n.to,s=n.query?.enabled!==!1,c=F.fees.unshieldFee(i,r,a,o);return{...j(n.query??{}),queryKey:c,queryFn:async n=>{let[,r]=n.queryKey,i=X(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&o)&&s}}function ge(e,t,n){let r=n?.query?.enabled!==!1,i=F.fees.batchTransferFee(t);return{...j(n?.query??{}),queryKey:i,queryFn:async t=>{let[,{feeManagerAddress:n}]=t.queryKey;if(!n)throw Error(`feeManagerAddress is required`);return e.readContract(s(n))},staleTime:3e4,enabled:!!t&&r}}function _e(e,t,r){let i=r?.query?.enabled!==!1,a=F.fees.feeRecipient(t);return{...j(r?.query??{}),queryKey:a,queryFn:async t=>{let[,{feeManagerAddress:r}]=t.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(n(r))},staleTime:3e4,enabled:!!t&&i}}function ve(e,t){let n=F.publicKey.all;return{...j(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function ye(e,t,n){let r=F.publicParams.bits(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function be(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandle.owner(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return await e.readContract(b(n,r))},enabled:!!r&&i,refetchInterval:n?.pollingInterval??1e4}}function xe(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=F.confidentialBalance.owner(e.address,n,r);return{...j(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function Se(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandles.tokens(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddresses:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return Promise.all(n.map(async t=>await e.readContract(b(t,r))))},enabled:!!(r&&t.length>0)&&i,refetchInterval:n?.pollingInterval??1e4}}function Ce(e,t){let n=e.map(e=>e.address),r=t?.resultAddresses??n,i=t?.owner,a=t?.handles,o=t?.query?.enabled!==!1,s=Array.isArray(a)&&a.length===e.length&&a.every(e=>!!e),c=F.confidentialBalances.tokens(n,i,a);return{...j(t?.query??{}),queryKey:c,queryFn:async n=>{let[,{owner:i,handles:a}]=n.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`handles are required`);let o=new Map,s=await l.batchDecryptBalances(e,{owner:i,handles:a,maxConcurrency:t?.maxConcurrency,onError:(e,t)=>(o.set(t,e),0n)}),c=new Map,u=new Map;for(let t=0;t<e.length;t++){let n=e[t].address,i=r[t],a=o.get(n);if(a)u.set(i,a);else{let e=s.get(n);e!==void 0&&c.set(i,e)}}if(u.size===e.length&&e.length>0)throw u.values().next().value??new g(`All token balance decryptions failed`);return{balances:c,errors:u,isPartialError:u.size>0}},enabled:r.length===e.length&&!!i&&e.length>0&&s&&o,staleTime:1/0}}function Z(e){if(e)return M([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function we(e,t,n){let r=t.userAddress,i=t.decrypt??!0,a=t.logs,o=t.logsKey??Z(a),s=n?.query?.enabled!==!1,c=F.activityFeed.scope(e.address,r,o,i);return{...j(n?.query??{}),queryKey:c,queryFn:async t=>{let[,{userAddress:n,decrypt:r}]=t.queryKey;if(!n)throw Error(`userAddress is required`);if(!a)throw Error(`logs are required`);let i=p(a,n);if(!r)return u(i);let o=f(i);return o.length===0?u(i):u(m(i,await e.decryptHandles(o,n)))},staleTime:1/0,enabled:!!(r&&a)&&s}}const Q=86400*1e3;function Te(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairs(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(C(n))},staleTime:Q,enabled:n}}function Ee(e,t){let n=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.confidentialTokenAddress(t.registryAddress??D,t.tokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,tokenAddress:r}]=t.queryKey;return e.readContract(re(n,r))},staleTime:Q,enabled:n}}function De(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenAddress(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(T(n,r))},staleTime:Q,enabled:n}}function Oe(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsLength(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(x(n))},staleTime:Q,enabled:n}}function ke(e,t){let n=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsSlice(t.registryAddress??D,String(t.fromIndex??0n),String(t.toIndex??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,fromIndex:r,toIndex:i}]=t.queryKey;return e.readContract(ee(n,BigInt(r),BigInt(i)))},staleTime:Q,enabled:n}}function Ae(e,t){let n=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPair(t.registryAddress??D,String(t.index??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,index:r}]=t.queryKey;return e.readContract(te(n,BigInt(r)))},staleTime:Q,enabled:n}}function je(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(ne(n,r))},staleTime:Q,enabled:n}}function Me(e,t){let n=t.page??1,r=t.pageSize??100,i=t.metadata??!1,a=!!t.registryAddress&&t.query?.enabled!==!1,o=F.wrappersRegistry.listPairs(t.registryAddress??D,n,r,i);return{...j(t.query??{}),queryKey:o,queryFn:async()=>e.listPairs({page:n,pageSize:r,metadata:i}),staleTime:e.ttlMs,enabled:a}}function Ne(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function Pe(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function Fe(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function Ie(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function Le(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function Re(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function ze(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function Be(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function Ve(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function He(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function Ue(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function We(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function Ge(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function Ke(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function qe(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function Je(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function $(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function Ye(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(F.decryption.handle(t),n)}}}function Xe(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function Ze(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Qe(e,t){return{...j(t.query??{}),queryKey:F.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function $e(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function et(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function tt(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function nt(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(F.decryption.handle(t),n)}}}function rt(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function it(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async t=>l.batchDecryptBalancesAs(e,t)}}function at(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function ot(t,n){return{...j(n.query??{}),queryKey:F.delegationStatus.scope(n.tokenAddress,n.delegatorAddress,n.delegateAddress),queryFn:async n=>{let[,{tokenAddress:r,delegatorAddress:i,delegateAddress:a}]=n.queryKey;_(r,`delegationStatusQueryOptions: tokenAddress`),_(i,`delegationStatusQueryOptions: delegatorAddress`),_(a,`delegationStatusQueryOptions: delegateAddress`);let o=await t.relayer.getAclAddress(),s=await t.signer.readContract(e(o,i,a,r)),c;return c=s===0n?!1:s===h?!0:s>await t.signer.getBlockTimestamp(),{isDelegated:c,expiryTimestamp:s}},enabled:!!(n.tokenAddress&&n.delegatorAddress&&n.delegateAddress)&&n.query?.enabled!==!1}}export{A as ZERO_HANDLE,c as ZamaSDKEvents,we as activityFeedQueryOptions,Ze as allowMutationOptions,Re as approveUnderlyingMutationOptions,it as batchDecryptBalancesAsMutationOptions,ge as batchTransferFeeQueryOptions,Le as confidentialApproveMutationOptions,xe as confidentialBalanceQueryOptions,Ce as confidentialBalancesQueryOptions,be as confidentialHandleQueryOptions,Se as confidentialHandlesQueryOptions,pe as confidentialIsApprovedQueryOptions,Ee as confidentialTokenAddressQueryOptions,Ie as confidentialTransferFromMutationOptions,Fe as confidentialTransferMutationOptions,Je as createDelegatedUserDecryptEIP712MutationOptions,qe as createEIP712MutationOptions,rt as decryptBalanceAsMutationOptions,tt as delegateDecryptionMutationOptions,$ as delegatedUserDecryptMutationOptions,ot as delegationStatusQueryOptions,Z as deriveActivityFeedLogsKey,Ge as encryptMutationOptions,_e as feeRecipientQueryOptions,j as filterQueryOptions,We as finalizeUnwrapMutationOptions,Ke as generateKeypairMutationOptions,M as hashFn,U as invalidateAfterApprove,H as invalidateAfterApproveUnderlying,z as invalidateAfterShield,V as invalidateAfterTransfer,B as invalidateAfterUnshield,L as invalidateAfterUnwrap,R as invalidateBalanceQueries,K as invalidateWagmiBalanceQueries,q as invalidateWalletLifecycleQueries,Qe as isAllowedQueryOptions,ce as isConfidentialQueryOptions,je as isConfidentialTokenValidQueryOptions,le as isWrapperQueryOptions,Me as listPairsQueryOptions,Ye as publicDecryptMutationOptions,ve as publicKeyQueryOptions,ye as publicParamsQueryOptions,Xe as requestZKProofVerificationMutationOptions,Ve as resumeUnshieldMutationOptions,at as revokeDelegationMutationOptions,$e as revokeMutationOptions,et as revokeSessionMutationOptions,Pe as shieldETHMutationOptions,me as shieldFeeQueryOptions,Ne as shieldMutationOptions,oe as signerAddressQueryOptions,De as tokenAddressQueryOptions,se as tokenMetadataQueryOptions,Ae as tokenPairQueryOptions,Oe as tokenPairsLengthQueryOptions,Te as tokenPairsQueryOptions,ke as tokenPairsSliceQueryOptions,ue as totalSupplyQueryOptions,fe as underlyingAllowanceQueryOptions,Be as unshieldAllMutationOptions,he as unshieldFeeQueryOptions,ze as unshieldMutationOptions,Ue as unwrapAllMutationOptions,He as unwrapMutationOptions,nt as userDecryptMutationOptions,de as wrapperDiscoveryQueryOptions,F as zamaQueryKeys};
2
2
  //# sourceMappingURL=index.js.map