@zama-fhe/sdk 2.2.0 → 2.3.0-alpha.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/README.md +1 -1
  2. package/dist/cjs/activity.cjs +1 -1
  3. package/dist/cjs/activity.cjs.map +1 -1
  4. package/dist/cjs/index.cjs +2 -2
  5. package/dist/cjs/index.cjs.map +1 -1
  6. package/dist/cjs/query/index.cjs +1 -1
  7. package/dist/cjs/relayer.cjs +1 -1
  8. package/dist/cjs/relayer.cjs.map +1 -1
  9. package/dist/esm/{activity-CcKSL6Oe.d.ts → activity-BeqE1jb7.d.ts} +89 -8
  10. package/dist/esm/activity-qMhJxqpq.js +2 -0
  11. package/dist/esm/activity-qMhJxqpq.js.map +1 -0
  12. package/dist/esm/cleartext/index.js +1 -1
  13. package/dist/esm/{cleartext-DuOGGACw.js → cleartext-BU7SYjBM.js} +2 -2
  14. package/dist/esm/{cleartext-DuOGGACw.js.map → cleartext-BU7SYjBM.js.map} +1 -1
  15. package/dist/esm/{encryption-CKqGKzHs.js → encryption-UaXE1L_W.js} +2 -2
  16. package/dist/esm/{encryption-CKqGKzHs.js.map → encryption-UaXE1L_W.js.map} +1 -1
  17. package/dist/esm/ethers/index.d.ts +1 -1
  18. package/dist/esm/{index-IhsduS7h.d.ts → index-j4Uv5iQi.d.ts} +176 -2
  19. package/dist/esm/index.d.ts +33 -3
  20. package/dist/esm/index.js +2 -2
  21. package/dist/esm/index.js.map +1 -1
  22. package/dist/esm/node/index.js +1 -1
  23. package/dist/esm/query/index.d.ts +2 -2
  24. package/dist/esm/query/index.js +1 -1
  25. package/dist/esm/relayer-DfjPWTBf.js +2 -0
  26. package/dist/esm/relayer-DfjPWTBf.js.map +1 -0
  27. package/dist/esm/viem/index.d.ts +1 -1
  28. package/package.json +2 -2
  29. package/dist/esm/activity-Ctiuld0m.js +0 -2
  30. package/dist/esm/activity-Ctiuld0m.js.map +0 -1
  31. package/dist/esm/relayer-DxMV-NQT.js +0 -2
  32. package/dist/esm/relayer-DxMV-NQT.js.map +0 -1
@@ -1,2 +1,2 @@
1
- import{r as e,t}from"../relayer-DxMV-NQT.js";import{n,t as r}from"../fhe-artifact-cache-DNoPom4I.js";import{t as i}from"../memory-storage-DNvc-6oK.js";import{a,i as o,n as s,o as c,r as l,t as u}from"../relayer-utils-BeoTNDM4.js";import{availableParallelism as d}from"node:os";import{Worker as f}from"node:worker_threads";import{randomUUID as p}from"node:crypto";import{AsyncLocalStorage as m}from"node:async_hooks";var h=class extends n{constructor(e){super(e,e.logger)}createWorker(){return new f(new URL(`relayer-sdk.node-worker.js`,import.meta.url))}wireEvents(e){e.on(`message`,e=>this.handleResponse(e)),e.on(`error`,e=>this.handleWorkerError(e.message)),e.on(`messageerror`,()=>this.handleWorkerMessageError())}postMessage(e,t){e.postMessage(t)}terminateWorker(e){e.terminate()}generateRequestId(){return p()}getInitPayload(){return{type:`NODE_INIT`,payload:{fhevmConfig:this.config.fhevmConfig}}}onWorkerReady(e){e.unref()}},g=class{#e=[];#t=[];#n;#r;#i=null;constructor(e){this.#n=e,this.#r=e.poolSize??Math.min(d(),4)}get poolSize(){return this.#r}async initPool(){if(!(this.#e.length>0))return this.#i||=this.#a().finally(()=>{this.#i=null}),this.#i}async#a(){for(let e=0;e<this.#r;e++)this.#e.push(new h(this.#n)),this.#t.push(0);try{await Promise.all(this.#e.map(e=>e.initWorker()))}catch(e){for(let e of this.#e)e.terminate();throw this.#e.length=0,this.#t.length=0,e}}terminate(){for(let e of this.#e)e.terminate();this.#e.length=0,this.#t.length=0}#o(){let e=0,t=this.#t[0];for(let n=1;n<this.#t.length;n++)this.#t[n]<t&&(t=this.#t[n],e=n);return e}async#s(e){if(this.#e.length===0)throw Error(`NodeWorkerPool not initialized. Call initPool() first.`);let t=this.#o();this.#t[t]++;try{return await e(this.#e[t])}finally{this.#t[t]--}}async generateKeypair(){return this.#s(e=>e.generateKeypair())}async createEIP712(e){return this.#s(t=>t.createEIP712(e))}async encrypt(e){return this.#s(t=>t.encrypt(e))}async userDecrypt(e){return this.#s(t=>t.userDecrypt(e))}async publicDecrypt(e){return this.#s(t=>t.publicDecrypt(e))}async createDelegatedUserDecryptEIP712(e){return this.#s(t=>t.createDelegatedUserDecryptEIP712(e))}async delegatedUserDecrypt(e){return this.#s(t=>t.delegatedUserDecrypt(e))}async requestZKProofVerification(e){return this.#s(t=>t.requestZKProofVerification(e))}async getPublicKey(){return this.#s(e=>e.getPublicKey())}async getPublicParams(e){return this.#s(t=>t.getPublicParams(e))}},_=class{#e;#t=null;#n=null;#r=null;#i=!1;#a=null;#o=null;constructor(e){this.#e={fheArtifactStorage:new i,...e}}async#s(){let e=await this.#e.getChainId(),{transports:t,poolSize:n}=this.#e;return{fhevmConfig:Object.assign({},u[e],t[e]),poolSize:n,logger:this.#e.logger}}async#c(){if(this.#r)return this.#r;this.#r=this.#u();try{return await this.#r}finally{this.#r=null}}#l(){this.#t?.terminate(),this.#t=null,this.#n=null,this.#o=null}async#u(){if(this.#i)throw new t(`RelayerNode has been terminated`);let n=await this.#e.getChainId();if(this.#a!==null&&n!==this.#a&&this.#l(),this.#a=n,!this.#o&&this.#e.fheArtifactStorage){let e=Object.assign({},u[n],this.#e.transports[n]);this.#o=new r({storage:this.#e.fheArtifactStorage,chainId:n,relayerUrl:e.relayerUrl,ttl:this.#e.fheArtifactCacheTTL,logger:this.#e.logger})}if(this.#o){let e=!1;try{e=await this.#o.revalidateIfDue()}catch(e){this.#e.logger?.warn(`Artifact revalidation failed, proceeding with potentially stale cache`,{error:e instanceof Error?e.message:String(e)})}e&&(this.#e.logger?.info(`Cached FHE artifacts are stale — reinitializing`),this.#l())}return this.#n||=this.#d().catch(n=>{throw this.#n=null,n instanceof e?n:new t(`Failed to initialize FHE worker pool`,{cause:n})}),this.#n}async#d(){let e=new g(await this.#s());if(await e.initPool(),this.#i)throw e.terminate(),Error(`RelayerNode was terminated during initialization`);return this.#t=e,e}terminate(){this.#i=!0,this.#t&&=(this.#t.terminate(),null),this.#n=null,this.#r=null}async generateKeypair(){let e=await(await this.#c()).generateKeypair();return{publicKey:e.publicKey,privateKey:e.privateKey}}async createEIP712(e,t,n,r=7){let i=await(await this.#c()).createEIP712({publicKey:e,contractAddresses:t,startTimestamp:n,durationDays:r}),o={name:i.domain.name,version:i.domain.version,chainId:i.domain.chainId,verifyingContract:i.domain.verifyingContract};return{domain:o,types:{EIP712Domain:a(o),UserDecryptRequestVerification:i.types.UserDecryptRequestVerification},message:{publicKey:i.message.publicKey,contractAddresses:i.message.contractAddresses,startTimestamp:i.message.startTimestamp,durationDays:i.message.durationDays,extraData:i.message.extraData}}}async encrypt(e){return c(async()=>{let t=await(await this.#c()).encrypt(e);return{handles:t.handles,inputProof:t.inputProof}})}async userDecrypt(e){return c(async()=>(await(await this.#c()).userDecrypt(e)).clearValues)}async publicDecrypt(e){return c(async()=>{let t=await(await this.#c()).publicDecrypt(e);return{clearValues:t.clearValues,abiEncodedClearValues:t.abiEncodedClearValues,decryptionProof:t.decryptionProof}})}async createDelegatedUserDecryptEIP712(e,t,n,r,i=7){return(await this.#c()).createDelegatedUserDecryptEIP712({publicKey:e,contractAddresses:t,delegatorAddress:n,startTimestamp:r,durationDays:i})}async delegatedUserDecrypt(e){return c(async()=>(await(await this.#c()).delegatedUserDecrypt(e)).clearValues)}async requestZKProofVerification(e){return c(async()=>(await this.#c()).requestZKProofVerification(e))}async getPublicKey(){let e=await this.#c();return this.#o?this.#o.getPublicKey(async()=>(await e.getPublicKey()).result):(await e.getPublicKey()).result}async getPublicParams(e){let t=await this.#c();return this.#o?this.#o.getPublicParams(e,async()=>(await t.getPublicParams(e)).result):(await t.getPublicParams(e)).result}async getAclAddress(){let e=await this.#e.getChainId(),n=Object.assign({},u[e],this.#e.transports[e]);if(!n.aclContractAddress)throw new t(`No ACL address configured for chain ${e}`);return n.aclContractAddress}},v=class{#e=new m;run(e){return this.#e.run(new Map,e)}async get(e){return this.#e.getStore()?.get(e)??null}async set(e,t){this.#e.getStore()?.set(e,t)}async delete(e){this.#e.getStore()?.delete(e)}};const y=new v;export{v as AsyncLocalMapStorage,n as BaseWorkerClient,s as HardhatConfig,l as MainnetConfig,h as NodeWorkerClient,g as NodeWorkerPool,_ as RelayerNode,o as SepoliaConfig,y as asyncLocalStorage};
1
+ import{r as e,t}from"../relayer-DfjPWTBf.js";import{n,t as r}from"../fhe-artifact-cache-DNoPom4I.js";import{t as i}from"../memory-storage-DNvc-6oK.js";import{a,i as o,n as s,o as c,r as l,t as u}from"../relayer-utils-BeoTNDM4.js";import{availableParallelism as d}from"node:os";import{Worker as f}from"node:worker_threads";import{randomUUID as p}from"node:crypto";import{AsyncLocalStorage as m}from"node:async_hooks";var h=class extends n{constructor(e){super(e,e.logger)}createWorker(){return new f(new URL(`relayer-sdk.node-worker.js`,import.meta.url))}wireEvents(e){e.on(`message`,e=>this.handleResponse(e)),e.on(`error`,e=>this.handleWorkerError(e.message)),e.on(`messageerror`,()=>this.handleWorkerMessageError())}postMessage(e,t){e.postMessage(t)}terminateWorker(e){e.terminate()}generateRequestId(){return p()}getInitPayload(){return{type:`NODE_INIT`,payload:{fhevmConfig:this.config.fhevmConfig}}}onWorkerReady(e){e.unref()}},g=class{#e=[];#t=[];#n;#r;#i=null;constructor(e){this.#n=e,this.#r=e.poolSize??Math.min(d(),4)}get poolSize(){return this.#r}async initPool(){if(!(this.#e.length>0))return this.#i||=this.#a().finally(()=>{this.#i=null}),this.#i}async#a(){for(let e=0;e<this.#r;e++)this.#e.push(new h(this.#n)),this.#t.push(0);try{await Promise.all(this.#e.map(e=>e.initWorker()))}catch(e){for(let e of this.#e)e.terminate();throw this.#e.length=0,this.#t.length=0,e}}terminate(){for(let e of this.#e)e.terminate();this.#e.length=0,this.#t.length=0}#o(){let e=0,t=this.#t[0];for(let n=1;n<this.#t.length;n++)this.#t[n]<t&&(t=this.#t[n],e=n);return e}async#s(e){if(this.#e.length===0)throw Error(`NodeWorkerPool not initialized. Call initPool() first.`);let t=this.#o();this.#t[t]++;try{return await e(this.#e[t])}finally{this.#t[t]--}}async generateKeypair(){return this.#s(e=>e.generateKeypair())}async createEIP712(e){return this.#s(t=>t.createEIP712(e))}async encrypt(e){return this.#s(t=>t.encrypt(e))}async userDecrypt(e){return this.#s(t=>t.userDecrypt(e))}async publicDecrypt(e){return this.#s(t=>t.publicDecrypt(e))}async createDelegatedUserDecryptEIP712(e){return this.#s(t=>t.createDelegatedUserDecryptEIP712(e))}async delegatedUserDecrypt(e){return this.#s(t=>t.delegatedUserDecrypt(e))}async requestZKProofVerification(e){return this.#s(t=>t.requestZKProofVerification(e))}async getPublicKey(){return this.#s(e=>e.getPublicKey())}async getPublicParams(e){return this.#s(t=>t.getPublicParams(e))}},_=class{#e;#t=null;#n=null;#r=null;#i=!1;#a=null;#o=null;constructor(e){this.#e={fheArtifactStorage:new i,...e}}async#s(){let e=await this.#e.getChainId(),{transports:t,poolSize:n}=this.#e;return{fhevmConfig:Object.assign({},u[e],t[e]),poolSize:n,logger:this.#e.logger}}async#c(){if(this.#r)return this.#r;this.#r=this.#u();try{return await this.#r}finally{this.#r=null}}#l(){this.#t?.terminate(),this.#t=null,this.#n=null,this.#o=null}async#u(){if(this.#i)throw new t(`RelayerNode has been terminated`);let n=await this.#e.getChainId();if(this.#a!==null&&n!==this.#a&&this.#l(),this.#a=n,!this.#o&&this.#e.fheArtifactStorage){let e=Object.assign({},u[n],this.#e.transports[n]);this.#o=new r({storage:this.#e.fheArtifactStorage,chainId:n,relayerUrl:e.relayerUrl,ttl:this.#e.fheArtifactCacheTTL,logger:this.#e.logger})}if(this.#o){let e=!1;try{e=await this.#o.revalidateIfDue()}catch(e){this.#e.logger?.warn(`Artifact revalidation failed, proceeding with potentially stale cache`,{error:e instanceof Error?e.message:String(e)})}e&&(this.#e.logger?.info(`Cached FHE artifacts are stale — reinitializing`),this.#l())}return this.#n||=this.#d().catch(n=>{throw this.#n=null,n instanceof e?n:new t(`Failed to initialize FHE worker pool`,{cause:n})}),this.#n}async#d(){let e=new g(await this.#s());if(await e.initPool(),this.#i)throw e.terminate(),Error(`RelayerNode was terminated during initialization`);return this.#t=e,e}terminate(){this.#i=!0,this.#t&&=(this.#t.terminate(),null),this.#n=null,this.#r=null}async generateKeypair(){let e=await(await this.#c()).generateKeypair();return{publicKey:e.publicKey,privateKey:e.privateKey}}async createEIP712(e,t,n,r=7){let i=await(await this.#c()).createEIP712({publicKey:e,contractAddresses:t,startTimestamp:n,durationDays:r}),o={name:i.domain.name,version:i.domain.version,chainId:i.domain.chainId,verifyingContract:i.domain.verifyingContract};return{domain:o,types:{EIP712Domain:a(o),UserDecryptRequestVerification:i.types.UserDecryptRequestVerification},message:{publicKey:i.message.publicKey,contractAddresses:i.message.contractAddresses,startTimestamp:i.message.startTimestamp,durationDays:i.message.durationDays,extraData:i.message.extraData}}}async encrypt(e){return c(async()=>{let t=await(await this.#c()).encrypt(e);return{handles:t.handles,inputProof:t.inputProof}})}async userDecrypt(e){return c(async()=>(await(await this.#c()).userDecrypt(e)).clearValues)}async publicDecrypt(e){return c(async()=>{let t=await(await this.#c()).publicDecrypt(e);return{clearValues:t.clearValues,abiEncodedClearValues:t.abiEncodedClearValues,decryptionProof:t.decryptionProof}})}async createDelegatedUserDecryptEIP712(e,t,n,r,i=7){return(await this.#c()).createDelegatedUserDecryptEIP712({publicKey:e,contractAddresses:t,delegatorAddress:n,startTimestamp:r,durationDays:i})}async delegatedUserDecrypt(e){return c(async()=>(await(await this.#c()).delegatedUserDecrypt(e)).clearValues)}async requestZKProofVerification(e){return c(async()=>(await this.#c()).requestZKProofVerification(e))}async getPublicKey(){let e=await this.#c();return this.#o?this.#o.getPublicKey(async()=>(await e.getPublicKey()).result):(await e.getPublicKey()).result}async getPublicParams(e){let t=await this.#c();return this.#o?this.#o.getPublicParams(e,async()=>(await t.getPublicParams(e)).result):(await t.getPublicParams(e)).result}async getAclAddress(){let e=await this.#e.getChainId(),n=Object.assign({},u[e],this.#e.transports[e]);if(!n.aclContractAddress)throw new t(`No ACL address configured for chain ${e}`);return n.aclContractAddress}},v=class{#e=new m;run(e){return this.#e.run(new Map,e)}async get(e){return this.#e.getStore()?.get(e)??null}async set(e,t){this.#e.getStore()?.set(e,t)}async delete(e){this.#e.getStore()?.delete(e)}};const y=new v;export{v as AsyncLocalMapStorage,n as BaseWorkerClient,s as HardhatConfig,l as MainnetConfig,h as NodeWorkerClient,g as NodeWorkerPool,_ as RelayerNode,o as SepoliaConfig,y as asyncLocalStorage};
2
2
  //# sourceMappingURL=index.js.map
@@ -1,7 +1,7 @@
1
1
  import { C as TransactionResult, S as TransactionReceipt, _ as StoredCredentials, a as EncryptResult, b as SignerLifecycleCallbacks, c as PublicDecryptResult, f as UserDecryptParams, h as UnshieldCallbacks, i as EncryptParams, m as TransferCallbacks, n as EIP712TypedData, o as Handle, p as ShieldCallbacks, r as EncryptInput, t as DelegatedUserDecryptParams, v as GenericStorage, x as RawLog, y as GenericSigner } from "../relayer-sdk.types-D7rylLS4.js";
2
- import { n as TokenWrapperPair, r as TokenWrapperPairWithMetadata, t as PaginatedResult } from "../index-IhsduS7h.js";
2
+ import { n as TokenWrapperPair, r as TokenWrapperPairWithMetadata, t as PaginatedResult } from "../index-j4Uv5iQi.js";
3
3
  import { t as RelayerSDK } from "../relayer-sdk-CcIghrEq.js";
4
- import { $ as CredentialsCreatedEvent, B as ReadonlyToken, Ct as ZamaSDKEvent, D as ZamaSDK, Dt as ZamaSDKEvents, G as CredentialsManager, J as ApproveUnderlyingSubmittedEvent, K as CredentialsManagerConfig, N as Token, O as ZamaSDKConfig, P as TokenConfig, Q as CredentialsCorruptedEvent, R as BatchDecryptAsOptions, St as UnwrapSubmittedEvent, Tt as ZamaSDKEventListener, V as ReadonlyTokenConfig, X as CredentialsAllowedEvent, Y as BaseEvent, Z as CredentialsCachedEvent, _ as WrappedEvent, _t as TransferFromSubmittedEvent, a as ActivityType, at as DecryptEndEvent, bt as UnshieldPhase2StartedEvent, ct as DelegationSubmittedEvent, d as OnChainEvent, dt as EncryptStartEvent, et as CredentialsCreatingEvent, ft as FinalizeUnwrapSubmittedEvent, g as UnwrappedStartedEvent, gt as TransactionErrorEvent, h as UnwrappedFinalizedEvent, ht as ShieldSubmittedEvent, i as ActivityLogMetadata, it as CredentialsRevokedEvent, j as WrappersRegistry, lt as EncryptEndEvent, m as UnwrapRequestedEvent, mt as SessionExpiredEvent, n as ActivityDirection, nt as CredentialsLoadingEvent, ot as DecryptErrorEvent, pt as RevokeDelegationSubmittedEvent, q as ApproveSubmittedEvent, r as ActivityItem, rt as CredentialsPersistFailedEvent, st as DecryptStartEvent, t as ActivityAmount, tt as CredentialsExpiredEvent, u as ConfidentialTransferEvent, ut as EncryptErrorEvent, vt as TransferSubmittedEvent, wt as ZamaSDKEventInput, xt as UnshieldPhase2SubmittedEvent, yt as UnshieldPhase1SubmittedEvent, z as BatchDecryptOptions } from "../activity-CcKSL6Oe.js";
4
+ import { At as UnshieldPhase1SubmittedEvent, Ct as FinalizeUnwrapSubmittedEvent, Dt as TransactionErrorEvent, Et as ShieldSubmittedEvent, Ft as ZamaSDKEventInput, G as TokenConfig, H as WrappersRegistry, It as ZamaSDKEventListener, Mt as UnshieldPhase2SubmittedEvent, Nt as UnwrapSubmittedEvent, Ot as TransferFromSubmittedEvent, Pt as ZamaSDKEvent, Q as ReadonlyTokenConfig, R as ZamaSDK, Rt as ZamaSDKEvents, S as WrappedEvent, St as EncryptStartEvent, Tt as SessionExpiredEvent, W as Token, X as BatchDecryptOptions, Y as BatchDecryptAsOptions, Z as ReadonlyToken, _t as DecryptErrorEvent, a as ActivityType, at as ApproveUnderlyingSubmittedEvent, b as UnwrappedFinalizedEvent, bt as EncryptEndEvent, ct as CredentialsCachedEvent, dt as CredentialsCreatingEvent, ft as CredentialsExpiredEvent, gt as DecryptEndEvent, h as OnChainEvent, ht as CredentialsRevokedEvent, i as ActivityLogMetadata, it as ApproveSubmittedEvent, jt as UnshieldPhase2StartedEvent, kt as TransferSubmittedEvent, lt as CredentialsCorruptedEvent, mt as CredentialsPersistFailedEvent, n as ActivityDirection, nt as CredentialsManager, ot as BaseEvent, p as ConfidentialTransferEvent, pt as CredentialsLoadingEvent, r as ActivityItem, rt as CredentialsManagerConfig, st as CredentialsAllowedEvent, t as ActivityAmount, ut as CredentialsCreatedEvent, vt as DecryptStartEvent, wt as RevokeDelegationSubmittedEvent, x as UnwrappedStartedEvent, xt as EncryptErrorEvent, y as UnwrapRequestedEvent, yt as DelegationSubmittedEvent, z as ZamaSDKConfig } from "../activity-BeqE1jb7.js";
5
5
  import { Address, Hex } from "viem";
6
6
  import { ClearValueType, InputProofBytesType, KeypairType, KmsDelegatedUserDecryptEIP712Type, ZKProofLike } from "@zama-fhe/relayer-sdk/bundle";
7
7
  import { MutationFunctionContext, QueryKey, QueryObserverOptions, skipToken } from "@tanstack/query-core";
@@ -1,2 +1,2 @@
1
- import{C as e,D as t,E as n,F as r,M as i,O as a,P as o,T as s,b as c,g as l,i as u,k as d,n as f,r as p,t as m,x as h}from"../activity-Ctiuld0m.js";import{t as g}from"../encryption-CKqGKzHs.js";import{r as _}from"../assertions-CASetdUe.js";import{C as v,D as y,_ as b,a as x,d as S,i as C,m as w,n as T,o as ee,r as te,s as ne,t as re,u as ie}from"../wrappers-registry-DqPr_JG2.js";import{getAddress as E,zeroAddress as D}from"viem";function O(e){if(!k(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!k(n)||!n.hasOwnProperty(`isPrototypeOf`))}function k(e){return Object.prototype.toString.call(e)===`[object Object]`}const A=`0x0000000000000000000000000000000000000000000000000000000000000000`;function j(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:y,meta:b,query:x,pollingInterval:S,...C}=e;return C}function M(e){return JSON.stringify(e,(e,t)=>O(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const N=e=>e.map(e=>E(e)),P=e=>e===void 0?void 0:E(e),F={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:E(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:E(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:E(e),...t?{owner:E(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:E(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:N(e),...t?{owner:E(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:N(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:E(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:E(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:E(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:E(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n?{wrapperAddress:E(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=P(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:E(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:E(e)}],scope:(e,t,n,r)=>[`zama.activityFeed`,{tokenAddress:E(e),...t?{userAddress:E(t)}:{},...n?{logsKey:n}:{},...r===void 0?{}:{decrypt:r}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,r)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],unshieldFee:(e,t,n,r)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:E(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:E(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:E(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=P(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:E(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:E(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:E(e),tokenAddress:E(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:E(e),confidentialTokenAddress:E(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:E(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:E(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:E(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:E(e),confidentialTokenAddress:E(t)}],listPairs:(e,t,n,r)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:E(e),page:t,pageSize:n,metadata:r}]}};function I(e,t){e.invalidateQueries({queryKey:F.underlyingAllowance.token(t)})}function L(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function R(e,t){e.invalidateQueries({queryKey:F.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:F.confidentialHandles.all}),e.invalidateQueries({queryKey:F.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:F.confidentialBalances.all})}function z(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function B(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function V(e,t){R(e,t),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function H(e,t){I(e,t)}function U(e,t){e.invalidateQueries({queryKey:F.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function W(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function G(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function K(e){e.invalidateQueries({predicate:G})}function q(e){e.removeQueries({queryKey:F.signerAddress.all}),e.removeQueries({queryKey:F.decryption.all}),e.invalidateQueries({predicate:W}),K(e)}const J=new WeakMap;let Y=1;function ae(e){let t=J.get(e);if(t!==void 0)return t;let n=Y++;return J.set(e,n),n}function oe(e,t){return{...j(t?.query??{}),queryKey:F.signerAddress.scope(ae(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function se(e,t,n){let a=F.tokenMetadata.token(t);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey,[a,s,c]=await Promise.all([e.readContract(o(n)),e.readContract(r(n)),e.readContract(i(n))]);return{name:a,symbol:s,decimals:c}},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ce(e,t,n){let r=F.isConfidential.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(ie(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function le(e,t,n){let r=F.isWrapper.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(S(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ue(e,t,n){let r=F.totalSupply.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(y(n))},staleTime:3e4,enabled:n?.query?.enabled!==!1}}function de(e,t){let n=F.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...j(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function fe(e,t,n){let r=n.owner,i=n.wrapperAddress,a=n.query?.enabled!==!1,o=F.underlyingAllowance.scope(t,r,i);return{...j(n.query??{}),queryKey:o,queryFn:async t=>{let[,{owner:n,wrapperAddress:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`wrapperAddress is required`);let i=await e.readContract(w(r));return e.readContract(d(i,n,r))},staleTime:3e4,enabled:!!(r&&i)&&a}}function pe(e,t,n){let r=n.holder,i=n.spender,a=n.query?.enabled!==!1,o=F.confidentialIsApproved.scope(t,r,i);return{...j(n.query??{}),queryKey:o,queryFn:async t=>{let[,{tokenAddress:n,holder:r,spender:i}]=t.queryKey;if(!n)throw Error(`tokenAddress is required`);if(!r)throw Error(`holder is required`);if(!i)throw Error(`spender is required`);return e.readContract(v(n,r,i))},staleTime:3e4,enabled:!!(t&&r&&i)&&a}}function X(e){return e===void 0?void 0:BigInt(e)}function me(e,t){let n=t.amount?.toString(),r=t.feeManagerAddress,i=t.from,o=t.to,s=t.query?.enabled!==!1,c=F.fees.shieldFee(r,n,i,o);return{...j(t.query??{}),queryKey:c,queryFn:async t=>{let[,n]=t.queryKey,r=X(n.amount);if(!n.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(r===void 0)throw Error(`amount is required`);if(!n.from)throw Error(`from is required`);if(!n.to)throw Error(`to is required`);return e.readContract(a(n.feeManagerAddress,r,n.from,n.to))},staleTime:3e4,enabled:!!(r&&n!==void 0&&i&&o)&&s}}function he(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,o=n.to,s=n.query?.enabled!==!1,c=F.fees.unshieldFee(i,r,a,o);return{...j(n.query??{}),queryKey:c,queryFn:async n=>{let[,r]=n.queryKey,i=X(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&o)&&s}}function ge(e,t,n){let r=n?.query?.enabled!==!1,i=F.fees.batchTransferFee(t);return{...j(n?.query??{}),queryKey:i,queryFn:async t=>{let[,{feeManagerAddress:n}]=t.queryKey;if(!n)throw Error(`feeManagerAddress is required`);return e.readContract(s(n))},staleTime:3e4,enabled:!!t&&r}}function _e(e,t,r){let i=r?.query?.enabled!==!1,a=F.fees.feeRecipient(t);return{...j(r?.query??{}),queryKey:a,queryFn:async t=>{let[,{feeManagerAddress:r}]=t.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(n(r))},staleTime:3e4,enabled:!!t&&i}}function ve(e,t){let n=F.publicKey.all;return{...j(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function ye(e,t,n){let r=F.publicParams.bits(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function be(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandle.owner(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return await e.readContract(b(n,r))},enabled:!!r&&i,refetchInterval:n?.pollingInterval??1e4}}function xe(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=F.confidentialBalance.owner(e.address,n,r);return{...j(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function Se(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandles.tokens(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddresses:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return Promise.all(n.map(async t=>await e.readContract(b(t,r))))},enabled:!!(r&&t.length>0)&&i,refetchInterval:n?.pollingInterval??1e4}}function Ce(e,t){let n=e.map(e=>e.address),r=t?.resultAddresses??n,i=t?.owner,a=t?.handles,o=t?.query?.enabled!==!1,s=Array.isArray(a)&&a.length===e.length&&a.every(e=>!!e),c=F.confidentialBalances.tokens(n,i,a);return{...j(t?.query??{}),queryKey:c,queryFn:async n=>{let[,{owner:i,handles:a}]=n.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`handles are required`);let o=new Map,s=await l.batchDecryptBalances(e,{owner:i,handles:a,maxConcurrency:t?.maxConcurrency,onError:(e,t)=>(o.set(t,e),0n)}),c=new Map,u=new Map;for(let t=0;t<e.length;t++){let n=e[t].address,i=r[t],a=o.get(n);if(a)u.set(i,a);else{let e=s.get(n);e!==void 0&&c.set(i,e)}}if(u.size===e.length&&e.length>0)throw u.values().next().value??new g(`All token balance decryptions failed`);return{balances:c,errors:u,isPartialError:u.size>0}},enabled:r.length===e.length&&!!i&&e.length>0&&s&&o,staleTime:1/0}}function Z(e){if(e)return M([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function we(e,t,n){let r=t.userAddress,i=t.decrypt??!0,a=t.logs,o=t.logsKey??Z(a),s=n?.query?.enabled!==!1,c=F.activityFeed.scope(e.address,r,o,i);return{...j(n?.query??{}),queryKey:c,queryFn:async t=>{let[,{userAddress:n,decrypt:r}]=t.queryKey;if(!n)throw Error(`userAddress is required`);if(!a)throw Error(`logs are required`);let i=p(a,n);if(!r)return u(i);let o=f(i);return o.length===0?u(i):u(m(i,await e.decryptHandles(o,n)))},staleTime:1/0,enabled:!!(r&&a)&&s}}const Q=86400*1e3;function Te(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairs(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(C(n))},staleTime:Q,enabled:n}}function Ee(e,t){let n=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.confidentialTokenAddress(t.registryAddress??D,t.tokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,tokenAddress:r}]=t.queryKey;return e.readContract(re(n,r))},staleTime:Q,enabled:n}}function De(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenAddress(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(T(n,r))},staleTime:Q,enabled:n}}function Oe(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsLength(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(x(n))},staleTime:Q,enabled:n}}function ke(e,t){let n=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsSlice(t.registryAddress??D,String(t.fromIndex??0n),String(t.toIndex??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,fromIndex:r,toIndex:i}]=t.queryKey;return e.readContract(ee(n,BigInt(r),BigInt(i)))},staleTime:Q,enabled:n}}function Ae(e,t){let n=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPair(t.registryAddress??D,String(t.index??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,index:r}]=t.queryKey;return e.readContract(te(n,BigInt(r)))},staleTime:Q,enabled:n}}function je(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(ne(n,r))},staleTime:Q,enabled:n}}function Me(e,t){let n=t.page??1,r=t.pageSize??100,i=t.metadata??!1,a=!!t.registryAddress&&t.query?.enabled!==!1,o=F.wrappersRegistry.listPairs(t.registryAddress??D,n,r,i);return{...j(t.query??{}),queryKey:o,queryFn:async()=>e.listPairs({page:n,pageSize:r,metadata:i}),staleTime:e.ttlMs,enabled:a}}function Ne(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function Pe(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function Fe(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function Ie(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function Le(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function Re(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function ze(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function Be(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function Ve(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function He(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function Ue(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function We(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function Ge(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function Ke(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function qe(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function Je(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function $(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function Ye(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(F.decryption.handle(t),n)}}}function Xe(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function Ze(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Qe(e,t){return{...j(t.query??{}),queryKey:F.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function $e(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function et(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function tt(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function nt(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(F.decryption.handle(t),n)}}}function rt(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function it(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async t=>l.batchDecryptBalancesAs(e,t)}}function at(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function ot(t,n){return{...j(n.query??{}),queryKey:F.delegationStatus.scope(n.tokenAddress,n.delegatorAddress,n.delegateAddress),queryFn:async n=>{let[,{tokenAddress:r,delegatorAddress:i,delegateAddress:a}]=n.queryKey;_(r,`delegationStatusQueryOptions: tokenAddress`),_(i,`delegationStatusQueryOptions: delegatorAddress`),_(a,`delegationStatusQueryOptions: delegateAddress`);let o=await t.relayer.getAclAddress(),s=await t.signer.readContract(e(o,i,a,r)),c;return c=s===0n?!1:s===h?!0:s>await t.signer.getBlockTimestamp(),{isDelegated:c,expiryTimestamp:s}},enabled:!!(n.tokenAddress&&n.delegatorAddress&&n.delegateAddress)&&n.query?.enabled!==!1}}export{A as ZERO_HANDLE,c as ZamaSDKEvents,we as activityFeedQueryOptions,Ze as allowMutationOptions,Re as approveUnderlyingMutationOptions,it as batchDecryptBalancesAsMutationOptions,ge as batchTransferFeeQueryOptions,Le as confidentialApproveMutationOptions,xe as confidentialBalanceQueryOptions,Ce as confidentialBalancesQueryOptions,be as confidentialHandleQueryOptions,Se as confidentialHandlesQueryOptions,pe as confidentialIsApprovedQueryOptions,Ee as confidentialTokenAddressQueryOptions,Ie as confidentialTransferFromMutationOptions,Fe as confidentialTransferMutationOptions,Je as createDelegatedUserDecryptEIP712MutationOptions,qe as createEIP712MutationOptions,rt as decryptBalanceAsMutationOptions,tt as delegateDecryptionMutationOptions,$ as delegatedUserDecryptMutationOptions,ot as delegationStatusQueryOptions,Z as deriveActivityFeedLogsKey,Ge as encryptMutationOptions,_e as feeRecipientQueryOptions,j as filterQueryOptions,We as finalizeUnwrapMutationOptions,Ke as generateKeypairMutationOptions,M as hashFn,U as invalidateAfterApprove,H as invalidateAfterApproveUnderlying,z as invalidateAfterShield,V as invalidateAfterTransfer,B as invalidateAfterUnshield,L as invalidateAfterUnwrap,R as invalidateBalanceQueries,K as invalidateWagmiBalanceQueries,q as invalidateWalletLifecycleQueries,Qe as isAllowedQueryOptions,ce as isConfidentialQueryOptions,je as isConfidentialTokenValidQueryOptions,le as isWrapperQueryOptions,Me as listPairsQueryOptions,Ye as publicDecryptMutationOptions,ve as publicKeyQueryOptions,ye as publicParamsQueryOptions,Xe as requestZKProofVerificationMutationOptions,Ve as resumeUnshieldMutationOptions,at as revokeDelegationMutationOptions,$e as revokeMutationOptions,et as revokeSessionMutationOptions,Pe as shieldETHMutationOptions,me as shieldFeeQueryOptions,Ne as shieldMutationOptions,oe as signerAddressQueryOptions,De as tokenAddressQueryOptions,se as tokenMetadataQueryOptions,Ae as tokenPairQueryOptions,Oe as tokenPairsLengthQueryOptions,Te as tokenPairsQueryOptions,ke as tokenPairsSliceQueryOptions,ue as totalSupplyQueryOptions,fe as underlyingAllowanceQueryOptions,Be as unshieldAllMutationOptions,he as unshieldFeeQueryOptions,ze as unshieldMutationOptions,Ue as unwrapAllMutationOptions,He as unwrapMutationOptions,nt as userDecryptMutationOptions,de as wrapperDiscoveryQueryOptions,F as zamaQueryKeys};
1
+ import{F as e,I as t,L as n,O as r,P as i,R as a,U as o,V as s,W as c,i as l,j as u,k as d,n as f,r as p,t as m,w as h}from"../activity-qMhJxqpq.js";import{t as g}from"../encryption-UaXE1L_W.js";import{r as _}from"../assertions-CASetdUe.js";import{C as v,D as y,_ as b,a as x,d as S,i as C,m as w,n as T,o as ee,r as te,s as ne,t as re,u as ie}from"../wrappers-registry-DqPr_JG2.js";import{getAddress as E,zeroAddress as D}from"viem";function O(e){if(!k(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!k(n)||!n.hasOwnProperty(`isPrototypeOf`))}function k(e){return Object.prototype.toString.call(e)===`[object Object]`}const A=`0x0000000000000000000000000000000000000000000000000000000000000000`;function j(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:y,meta:b,query:x,pollingInterval:S,...C}=e;return C}function M(e){return JSON.stringify(e,(e,t)=>O(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const N=e=>e.map(e=>E(e)),P=e=>e===void 0?void 0:E(e),F={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:E(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:E(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:E(e),...t?{owner:E(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:E(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:N(e),...t?{owner:E(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:N(e),...t?{owner:E(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:E(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:E(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:E(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:E(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:E(e),...t?{owner:E(t)}:{},...n?{wrapperAddress:E(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=P(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:E(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:E(e)}],scope:(e,t,n,r)=>[`zama.activityFeed`,{tokenAddress:E(e),...t?{userAddress:E(t)}:{},...n?{logsKey:n}:{},...r===void 0?{}:{decrypt:r}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,r)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],unshieldFee:(e,t,n,r)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:E(e)}:{},...t===void 0?{}:{amount:t},...n?{from:E(n)}:{},...r?{to:E(r)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:E(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:E(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:E(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=P(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=P(e),i=P(t),a=P(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:E(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:E(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:E(e),tokenAddress:E(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:E(e),confidentialTokenAddress:E(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:E(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:E(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:E(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:E(e),confidentialTokenAddress:E(t)}],listPairs:(e,t,n,r)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:E(e),page:t,pageSize:n,metadata:r}]}};function I(e,t){e.invalidateQueries({queryKey:F.underlyingAllowance.token(t)})}function L(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function R(e,t){e.invalidateQueries({queryKey:F.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:F.confidentialHandles.all}),e.invalidateQueries({queryKey:F.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:F.confidentialBalances.all})}function z(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function B(e,t){R(e,t),I(e,t),K(e),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function V(e,t){R(e,t),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function H(e,t){I(e,t)}function U(e,t){e.invalidateQueries({queryKey:F.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:F.activityFeed.token(t)})}function W(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function G(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function K(e){e.invalidateQueries({predicate:G})}function q(e){e.removeQueries({queryKey:F.signerAddress.all}),e.removeQueries({queryKey:F.decryption.all}),e.invalidateQueries({predicate:W}),K(e)}const J=new WeakMap;let Y=1;function ae(e){let t=J.get(e);if(t!==void 0)return t;let n=Y++;return J.set(e,n),n}function oe(e,t){return{...j(t?.query??{}),queryKey:F.signerAddress.scope(ae(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function se(e,t,n){let r=F.tokenMetadata.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey,[r,i,a]=await Promise.all([e.readContract(o(n)),e.readContract(c(n)),e.readContract(s(n))]);return{name:r,symbol:i,decimals:a}},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ce(e,t,n){let r=F.isConfidential.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(ie(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function le(e,t,n){let r=F.isWrapper.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(S(n))},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function ue(e,t,n){let r=F.totalSupply.token(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{tokenAddress:n}]=t.queryKey;return e.readContract(y(n))},staleTime:3e4,enabled:n?.query?.enabled!==!1}}function de(e,t){let n=F.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...j(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function fe(e,t,n){let r=n.owner,i=n.wrapperAddress,o=n.query?.enabled!==!1,s=F.underlyingAllowance.scope(t,r,i);return{...j(n.query??{}),queryKey:s,queryFn:async t=>{let[,{owner:n,wrapperAddress:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`wrapperAddress is required`);let i=await e.readContract(w(r));return e.readContract(a(i,n,r))},staleTime:3e4,enabled:!!(r&&i)&&o}}function pe(e,t,n){let r=n.holder,i=n.spender,a=n.query?.enabled!==!1,o=F.confidentialIsApproved.scope(t,r,i);return{...j(n.query??{}),queryKey:o,queryFn:async t=>{let[,{tokenAddress:n,holder:r,spender:i}]=t.queryKey;if(!n)throw Error(`tokenAddress is required`);if(!r)throw Error(`holder is required`);if(!i)throw Error(`spender is required`);return e.readContract(v(n,r,i))},staleTime:3e4,enabled:!!(t&&r&&i)&&a}}function X(e){return e===void 0?void 0:BigInt(e)}function me(e,t){let r=t.amount?.toString(),i=t.feeManagerAddress,a=t.from,o=t.to,s=t.query?.enabled!==!1,c=F.fees.shieldFee(i,r,a,o);return{...j(t.query??{}),queryKey:c,queryFn:async t=>{let[,r]=t.queryKey,i=X(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(n(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&o)&&s}}function he(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,o=n.to,s=n.query?.enabled!==!1,c=F.fees.unshieldFee(i,r,a,o);return{...j(n.query??{}),queryKey:c,queryFn:async n=>{let[,r]=n.queryKey,i=X(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&o)&&s}}function ge(e,t,n){let r=n?.query?.enabled!==!1,a=F.fees.batchTransferFee(t);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{feeManagerAddress:n}]=t.queryKey;if(!n)throw Error(`feeManagerAddress is required`);return e.readContract(i(n))},staleTime:3e4,enabled:!!t&&r}}function _e(t,n,r){let i=r?.query?.enabled!==!1,a=F.fees.feeRecipient(n);return{...j(r?.query??{}),queryKey:a,queryFn:async n=>{let[,{feeManagerAddress:r}]=n.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return t.readContract(e(r))},staleTime:3e4,enabled:!!n&&i}}function ve(e,t){let n=F.publicKey.all;return{...j(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function ye(e,t,n){let r=F.publicParams.bits(t);return{...j(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function be(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandle.owner(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddress:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return await e.readContract(b(n,r))},enabled:!!r&&i,refetchInterval:n?.pollingInterval??1e4}}function xe(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=F.confidentialBalance.owner(e.address,n,r);return{...j(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function Se(e,t,n){let r=n?.owner,i=n?.query?.enabled!==!1,a=F.confidentialHandles.tokens(t,r);return{...j(n?.query??{}),queryKey:a,queryFn:async t=>{let[,{tokenAddresses:n,owner:r}]=t.queryKey;if(!r)throw Error(`owner is required`);return Promise.all(n.map(async t=>await e.readContract(b(t,r))))},enabled:!!(r&&t.length>0)&&i,refetchInterval:n?.pollingInterval??1e4}}function Ce(e,t){let n=e.map(e=>e.address),r=t?.resultAddresses??n,i=t?.owner,a=t?.handles,o=t?.query?.enabled!==!1,s=Array.isArray(a)&&a.length===e.length&&a.every(e=>!!e),c=F.confidentialBalances.tokens(n,i,a);return{...j(t?.query??{}),queryKey:c,queryFn:async n=>{let[,{owner:i,handles:a}]=n.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`handles are required`);let o=new Map,s=await h.batchDecryptBalances(e,{owner:i,handles:a,maxConcurrency:t?.maxConcurrency,onError:(e,t)=>(o.set(t,e),0n)}),c=new Map,l=new Map;for(let t=0;t<e.length;t++){let n=e[t].address,i=r[t],a=o.get(n);if(a)l.set(i,a);else{let e=s.get(n);e!==void 0&&c.set(i,e)}}if(l.size===e.length&&e.length>0)throw l.values().next().value??new g(`All token balance decryptions failed`);return{balances:c,errors:l,isPartialError:l.size>0}},enabled:r.length===e.length&&!!i&&e.length>0&&s&&o,staleTime:1/0}}function Z(e){if(e)return M([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function we(e,t,n){let r=t.userAddress,i=t.decrypt??!0,a=t.logs,o=t.logsKey??Z(a),s=n?.query?.enabled!==!1,c=F.activityFeed.scope(e.address,r,o,i);return{...j(n?.query??{}),queryKey:c,queryFn:async t=>{let[,{userAddress:n,decrypt:r}]=t.queryKey;if(!n)throw Error(`userAddress is required`);if(!a)throw Error(`logs are required`);let i=p(a,n);if(!r)return l(i);let o=f(i);return o.length===0?l(i):l(m(i,await e.decryptHandles(o,n)))},staleTime:1/0,enabled:!!(r&&a)&&s}}const Q=86400*1e3;function Te(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairs(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(C(n))},staleTime:Q,enabled:n}}function Ee(e,t){let n=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.confidentialTokenAddress(t.registryAddress??D,t.tokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,tokenAddress:r}]=t.queryKey;return e.readContract(re(n,r))},staleTime:Q,enabled:n}}function De(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenAddress(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(T(n,r))},staleTime:Q,enabled:n}}function Oe(e,t){let n=!!t.registryAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsLength(t.registryAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n}]=t.queryKey;return e.readContract(x(n))},staleTime:Q,enabled:n}}function ke(e,t){let n=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPairsSlice(t.registryAddress??D,String(t.fromIndex??0n),String(t.toIndex??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,fromIndex:r,toIndex:i}]=t.queryKey;return e.readContract(ee(n,BigInt(r),BigInt(i)))},staleTime:Q,enabled:n}}function Ae(e,t){let n=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,r=F.wrappersRegistry.tokenPair(t.registryAddress??D,String(t.index??0n));return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,index:r}]=t.queryKey;return e.readContract(te(n,BigInt(r)))},staleTime:Q,enabled:n}}function je(e,t){let n=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,r=F.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??D,t.confidentialTokenAddress??D);return{...j(t.query??{}),queryKey:r,queryFn:async t=>{let[,{registryAddress:n,confidentialTokenAddress:r}]=t.queryKey;return e.readContract(ne(n,r))},staleTime:Q,enabled:n}}function Me(e,t){let n=t.page??1,r=t.pageSize??100,i=t.metadata??!1,a=!!t.registryAddress&&t.query?.enabled!==!1,o=F.wrappersRegistry.listPairs(t.registryAddress??D,n,r,i);return{...j(t.query??{}),queryKey:o,queryFn:async()=>e.listPairs({page:n,pageSize:r,metadata:i}),staleTime:e.ttlMs,enabled:a}}function Ne(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function Pe(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function Fe(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function Ie(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function Le(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function Re(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function ze(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function Be(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function Ve(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function He(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function Ue(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function We(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function Ge(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function Ke(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function qe(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function Je(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function $(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function Ye(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(F.decryption.handle(t),n)}}}function Xe(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function Ze(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Qe(e,t){return{...j(t.query??{}),queryKey:F.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function $e(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function et(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function tt(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function nt(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(F.decryption.handle(t),n)}}}function rt(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function it(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async t=>h.batchDecryptBalancesAs(e,t)}}function at(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function ot(e,t){return{...j(t.query??{}),queryKey:F.delegationStatus.scope(t.tokenAddress,t.delegatorAddress,t.delegateAddress),queryFn:async t=>{let[,{tokenAddress:n,delegatorAddress:r,delegateAddress:i}]=t.queryKey;_(n,`delegationStatusQueryOptions: tokenAddress`),_(r,`delegationStatusQueryOptions: delegatorAddress`),_(i,`delegationStatusQueryOptions: delegateAddress`);let a=await e.relayer.getAclAddress(),o=await e.signer.readContract(u(a,r,i,n)),s;return s=o===0n?!1:o===d?!0:o>await e.signer.getBlockTimestamp(),{isDelegated:s,expiryTimestamp:o}},enabled:!!(t.tokenAddress&&t.delegatorAddress&&t.delegateAddress)&&t.query?.enabled!==!1}}export{A as ZERO_HANDLE,r as ZamaSDKEvents,we as activityFeedQueryOptions,Ze as allowMutationOptions,Re as approveUnderlyingMutationOptions,it as batchDecryptBalancesAsMutationOptions,ge as batchTransferFeeQueryOptions,Le as confidentialApproveMutationOptions,xe as confidentialBalanceQueryOptions,Ce as confidentialBalancesQueryOptions,be as confidentialHandleQueryOptions,Se as confidentialHandlesQueryOptions,pe as confidentialIsApprovedQueryOptions,Ee as confidentialTokenAddressQueryOptions,Ie as confidentialTransferFromMutationOptions,Fe as confidentialTransferMutationOptions,Je as createDelegatedUserDecryptEIP712MutationOptions,qe as createEIP712MutationOptions,rt as decryptBalanceAsMutationOptions,tt as delegateDecryptionMutationOptions,$ as delegatedUserDecryptMutationOptions,ot as delegationStatusQueryOptions,Z as deriveActivityFeedLogsKey,Ge as encryptMutationOptions,_e as feeRecipientQueryOptions,j as filterQueryOptions,We as finalizeUnwrapMutationOptions,Ke as generateKeypairMutationOptions,M as hashFn,U as invalidateAfterApprove,H as invalidateAfterApproveUnderlying,z as invalidateAfterShield,V as invalidateAfterTransfer,B as invalidateAfterUnshield,L as invalidateAfterUnwrap,R as invalidateBalanceQueries,K as invalidateWagmiBalanceQueries,q as invalidateWalletLifecycleQueries,Qe as isAllowedQueryOptions,ce as isConfidentialQueryOptions,je as isConfidentialTokenValidQueryOptions,le as isWrapperQueryOptions,Me as listPairsQueryOptions,Ye as publicDecryptMutationOptions,ve as publicKeyQueryOptions,ye as publicParamsQueryOptions,Xe as requestZKProofVerificationMutationOptions,Ve as resumeUnshieldMutationOptions,at as revokeDelegationMutationOptions,$e as revokeMutationOptions,et as revokeSessionMutationOptions,Pe as shieldETHMutationOptions,me as shieldFeeQueryOptions,Ne as shieldMutationOptions,oe as signerAddressQueryOptions,De as tokenAddressQueryOptions,se as tokenMetadataQueryOptions,Ae as tokenPairQueryOptions,Oe as tokenPairsLengthQueryOptions,Te as tokenPairsQueryOptions,ke as tokenPairsSliceQueryOptions,ue as totalSupplyQueryOptions,fe as underlyingAllowanceQueryOptions,Be as unshieldAllMutationOptions,he as unshieldFeeQueryOptions,ze as unshieldMutationOptions,Ue as unwrapAllMutationOptions,He as unwrapMutationOptions,nt as userDecryptMutationOptions,de as wrapperDiscoveryQueryOptions,F as zamaQueryKeys};
2
2
  //# sourceMappingURL=index.js.map
@@ -0,0 +1,2 @@
1
+ const e={SigningRejected:`SIGNING_REJECTED`,SigningFailed:`SIGNING_FAILED`,EncryptionFailed:`ENCRYPTION_FAILED`,DecryptionFailed:`DECRYPTION_FAILED`,ApprovalFailed:`APPROVAL_FAILED`,TransactionReverted:`TRANSACTION_REVERTED`,KeypairExpired:`KEYPAIR_EXPIRED`,InvalidKeypair:`INVALID_KEYPAIR`,NoCiphertext:`NO_CIPHERTEXT`,RelayerRequestFailed:`RELAYER_REQUEST_FAILED`,Configuration:`CONFIGURATION`,DelegationSelfNotAllowed:`DELEGATION_SELF_NOT_ALLOWED`,DelegationCooldown:`DELEGATION_COOLDOWN`,DelegationNotFound:`DELEGATION_NOT_FOUND`,DelegationExpired:`DELEGATION_EXPIRED`,DelegationExpiryUnchanged:`DELEGATION_EXPIRY_UNCHANGED`,DelegationDelegateEqualsContract:`DELEGATION_DELEGATE_EQUALS_CONTRACT`,DelegationContractIsSelf:`DELEGATION_CONTRACT_IS_SELF`,AclPaused:`ACL_PAUSED`,DelegationExpirationTooSoon:`DELEGATION_EXPIRATION_TOO_SOON`,DelegationNotPropagated:`DELEGATION_NOT_PROPAGATED`};var t=class extends Error{code;constructor(e,t,n){super(t,n),Object.setPrototypeOf(this,new.target.prototype),this.name=`ZamaError`,this.code=e}};function n(e,n){if(e instanceof t){let t=n[e.code];if(t)return t(e)}return n._?.(e)}var r=class extends t{statusCode;constructor(t,n,r){super(e.RelayerRequestFailed,t,r),this.name=`RelayerRequestFailedError`,this.statusCode=n}},i=class extends t{constructor(t,n){super(e.Configuration,t,n),this.name=`ConfigurationError`}};export{n as a,e as i,r as n,t as r,i as t};
2
+ //# sourceMappingURL=relayer-DfjPWTBf.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"relayer-DfjPWTBf.js","names":[],"sources":["../../src/errors/base.ts","../../src/errors/relayer.ts"],"sourcesContent":["/**\n * Typed error codes thrown by the SDK.\n * Use `error.code` or `instanceof` to programmatically handle specific failure modes.\n *\n * @example\n * ```ts\n * try {\n * await token.confidentialTransfer(\"0xTo\", 100n);\n * } catch (e) {\n * if (e instanceof SigningRejectedError) {\n * // User rejected the wallet signature\n * }\n * }\n * ```\n */\nexport const ZamaErrorCode = {\n /** User rejected the wallet signature prompt. */\n SigningRejected: \"SIGNING_REJECTED\",\n /** Wallet signature failed for a reason other than rejection. */\n SigningFailed: \"SIGNING_FAILED\",\n /** FHE encryption failed. */\n EncryptionFailed: \"ENCRYPTION_FAILED\",\n /** FHE decryption failed. */\n DecryptionFailed: \"DECRYPTION_FAILED\",\n /** ERC-20 approval transaction failed. */\n ApprovalFailed: \"APPROVAL_FAILED\",\n /** On-chain transaction reverted. */\n TransactionReverted: \"TRANSACTION_REVERTED\",\n /** FHE keypair has expired and needs regeneration. */\n KeypairExpired: \"KEYPAIR_EXPIRED\",\n /** Relayer rejected FHE keypair (stale, expired, or malformed). */\n InvalidKeypair: \"INVALID_KEYPAIR\",\n /** No FHE ciphertext exists for this account (never shielded). */\n NoCiphertext: \"NO_CIPHERTEXT\",\n /** Relayer HTTP request failed. */\n RelayerRequestFailed: \"RELAYER_REQUEST_FAILED\",\n /** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\n Configuration: \"CONFIGURATION\",\n /** Delegation cannot target self (delegate === msg.sender). */\n DelegationSelfNotAllowed: \"DELEGATION_SELF_NOT_ALLOWED\",\n /** Only one delegate/revoke per (delegator, delegate, contract) per block. */\n DelegationCooldown: \"DELEGATION_COOLDOWN\",\n /** No active delegation found for this (delegator, delegate, contract) tuple. */\n DelegationNotFound: \"DELEGATION_NOT_FOUND\",\n /** The delegation has expired. */\n DelegationExpired: \"DELEGATION_EXPIRED\",\n /** The new expiration date equals the current one — no on-chain change needed. */\n DelegationExpiryUnchanged: \"DELEGATION_EXPIRY_UNCHANGED\",\n /** Delegate address cannot be the contract address. */\n DelegationDelegateEqualsContract: \"DELEGATION_DELEGATE_EQUALS_CONTRACT\",\n /** Contract address cannot be the sender address. */\n DelegationContractIsSelf: \"DELEGATION_CONTRACT_IS_SELF\",\n /** The ACL contract is paused. */\n AclPaused: \"ACL_PAUSED\",\n /** Expiration date is too soon (must be at least 1 hour in the future). */\n DelegationExpirationTooSoon: \"DELEGATION_EXPIRATION_TOO_SOON\",\n /** Delegation exists on-chain but hasn't propagated to the gateway yet. */\n DelegationNotPropagated: \"DELEGATION_NOT_PROPAGATED\",\n} as const;\n\n/** Union of all {@link ZamaErrorCode} string values. */\nexport type ZamaErrorCode = (typeof ZamaErrorCode)[keyof typeof ZamaErrorCode];\n\n/**\n * Base error thrown by all SDK operations.\n * Carries a {@link ZamaErrorCode} for programmatic error handling.\n * Prefer catching specific subclasses (e.g. {@link EncryptionFailedError}).\n */\nexport class ZamaError extends Error {\n /** Machine-readable error code. */\n readonly code: ZamaErrorCode;\n\n constructor(code: ZamaErrorCode, message: string, options?: ErrorOptions) {\n super(message, options);\n Object.setPrototypeOf(this, new.target.prototype);\n this.name = \"ZamaError\";\n this.code = code;\n }\n}\n\n/**\n * Pattern-match on a {@link ZamaError} by its error code.\n * Falls through to the `_` wildcard handler if no specific handler matches.\n * Returns `undefined` if the error is not a `ZamaError` and no `_` handler is provided.\n *\n * @example\n * ```ts\n * matchZamaError(error, {\n * SIGNING_REJECTED: () => toast(\"Please approve in wallet\"),\n * TRANSACTION_REVERTED: (e) => toast(`Tx failed: ${e.message}`),\n * _: () => toast(\"Unknown error\"),\n * });\n * ```\n */\nexport function matchZamaError<R>(\n error: unknown,\n handlers: Partial<Record<ZamaErrorCode, (error: ZamaError) => R>> & {\n _?: (error: unknown) => R;\n },\n): R | undefined {\n if (error instanceof ZamaError) {\n const handler = handlers[error.code];\n if (handler) {\n return handler(error);\n }\n }\n return handlers._?.(error);\n}\n","import { ZamaError, ZamaErrorCode } from \"./base\";\n\n/** Relayer HTTP request failed. */\nexport class RelayerRequestFailedError extends ZamaError {\n /** HTTP status code from the relayer, if available. */\n readonly statusCode: number | undefined;\n\n constructor(message: string, statusCode?: number, options?: ErrorOptions) {\n super(ZamaErrorCode.RelayerRequestFailed, message, options);\n this.name = \"RelayerRequestFailedError\";\n this.statusCode = statusCode;\n }\n}\n\n/** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\nexport class ConfigurationError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.Configuration, message, options);\n this.name = \"ConfigurationError\";\n }\n}\n"],"mappings":"AAeA,MAAa,EAAgB,CAE3B,gBAAiB,mBAEjB,cAAe,iBAEf,iBAAkB,oBAElB,iBAAkB,oBAElB,eAAgB,kBAEhB,oBAAqB,uBAErB,eAAgB,kBAEhB,eAAgB,kBAEhB,aAAc,gBAEd,qBAAsB,yBAEtB,cAAe,gBAEf,yBAA0B,8BAE1B,mBAAoB,sBAEpB,mBAAoB,uBAEpB,kBAAmB,qBAEnB,0BAA2B,8BAE3B,iCAAkC,sCAElC,yBAA0B,8BAE1B,UAAW,aAEX,4BAA6B,iCAE7B,wBAAyB,4BAC1B,CAUD,IAAa,EAAb,cAA+B,KAAM,CAEnC,KAEA,YAAY,EAAqB,EAAiB,EAAwB,CACxE,MAAM,EAAS,EAAQ,CACvB,OAAO,eAAe,KAAM,IAAI,OAAO,UAAU,CACjD,KAAK,KAAO,YACZ,KAAK,KAAO,IAkBhB,SAAgB,EACd,EACA,EAGe,CACf,GAAI,aAAiB,EAAW,CAC9B,IAAM,EAAU,EAAS,EAAM,MAC/B,GAAI,EACF,OAAO,EAAQ,EAAM,CAGzB,OAAO,EAAS,IAAI,EAAM,CCvG5B,IAAa,EAAb,cAA+C,CAAU,CAEvD,WAEA,YAAY,EAAiB,EAAqB,EAAwB,CACxE,MAAM,EAAc,qBAAsB,EAAS,EAAQ,CAC3D,KAAK,KAAO,4BACZ,KAAK,WAAa,IAKT,EAAb,cAAwC,CAAU,CAChD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,cAAe,EAAS,EAAQ,CACpD,KAAK,KAAO"}
@@ -1,5 +1,5 @@
1
1
  import { A as WriteContractConfig, E as ReadContractConfig, S as TransactionReceipt, b as SignerLifecycleCallbacks, n as EIP712TypedData, o as Handle, y as GenericSigner } from "../relayer-sdk.types-D7rylLS4.js";
2
- import { m as BatchTransferData } from "../index-IhsduS7h.js";
2
+ import { h as BatchTransferData } from "../index-j4Uv5iQi.js";
3
3
  import { Abi, Address, ContractFunctionArgs, ContractFunctionName, ContractFunctionReturnType, EIP1193Provider, Hex, PublicClient, WalletClient } from "viem";
4
4
 
5
5
  //#region src/viem/viem-signer.d.ts
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@zama-fhe/sdk",
3
- "version": "2.2.0",
3
+ "version": "2.3.0-alpha.2",
4
4
  "description": "TypeScript SDK for Zama fhEVM confidential smart contracts",
5
5
  "license": "BSD-3-Clause-Clear",
6
6
  "author": "Zama",
@@ -134,7 +134,7 @@
134
134
  "devDependencies": {
135
135
  "@tanstack/query-core": "^5.95.2",
136
136
  "rolldown": "1.0.0-rc.7",
137
- "rolldown-plugin-dts": "^0.22.5"
137
+ "rolldown-plugin-dts": "^0.23.2"
138
138
  },
139
139
  "peerDependencies": {
140
140
  "@tanstack/query-core": ">=5",
@@ -1,2 +0,0 @@
1
- import{i as e,n as t,r as n,t as r}from"./relayer-DxMV-NQT.js";import{t as i}from"./encryption-CKqGKzHs.js";import{r as a,t as o}from"./memory-storage-DNvc-6oK.js";import{a as s,i as c,n as l,t as u}from"./assertions-CASetdUe.js";import{t as d}from"./hex-CVGYqDKx.js";import{_ as f,c as p,f as m,l as h,m as g}from"./wrappers-registry-DqPr_JG2.js";import{erc20Abi as _,getAddress as v,isAddress as y}from"viem";var b=class extends n{constructor(t,n){super(e.SigningRejected,t,n),this.name=`SigningRejectedError`}},x=class extends n{constructor(t,n){super(e.SigningFailed,t,n),this.name=`SigningFailedError`}};function ee(e,t){let n=typeof e==`object`&&!!e&&`code`in e&&e.code===4001,r=e instanceof Error?e.message:String(e),i=r.toLowerCase().includes(`user rejected`)||r.toLowerCase().includes(`user denied`),a=`${t}: ${r}`;throw n||i?new b(a,{cause:e}):new x(a,{cause:e})}var te=class extends n{constructor(t,n){super(e.KeypairExpired,t,n),this.name=`KeypairExpiredError`}},ne=class extends n{constructor(t,n){super(e.InvalidKeypair,t,n),this.name=`InvalidKeypairError`}},S=class extends n{constructor(t,n){super(e.NoCiphertext,t,n),this.name=`NoCiphertextError`}},re=class extends n{constructor(t,n){super(e.DelegationSelfNotAllowed,t,n),this.name=`DelegationSelfNotAllowedError`}},ie=class extends n{constructor(t,n){super(e.DelegationCooldown,t,n),this.name=`DelegationCooldownError`}},C=class extends n{constructor(t,n){super(e.DelegationNotFound,t,n),this.name=`DelegationNotFoundError`}},w=class extends n{constructor(t,n){super(e.DelegationExpired,t,n),this.name=`DelegationExpiredError`}},T=class extends n{constructor(t,n){super(e.DelegationNotPropagated,t,n),this.name=`DelegationNotPropagatedError`}};function ae(e){return{address:e,abi:_,functionName:`name`,args:[]}}function oe(e){return{address:e,abi:_,functionName:`symbol`,args:[]}}function E(e){return{address:e,abi:_,functionName:`decimals`,args:[]}}function se(e){return{address:e,abi:_,functionName:`totalSupply`,args:[]}}function ce(e,t){return{address:e,abi:_,functionName:`balanceOf`,args:[t]}}function D(e,t,n){return{address:e,abi:_,functionName:`allowance`,args:[t,n]}}function le(e,t,n){return{address:e,abi:_,functionName:`approve`,args:[t,n]}}const O=[{inputs:[{internalType:`uint64`,name:`wrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`unwrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`deployFee_`,type:`uint64`},{internalType:`uint64`,name:`batchTransferFee_`,type:`uint64`},{internalType:`address`,name:`feeRecipient_`,type:`address`}],stateMutability:`nonpayable`,type:`constructor`},{inputs:[],name:`AccessControlBadConfirmation`,type:`error`},{inputs:[{internalType:`address`,name:`account`,type:`address`},{internalType:`bytes32`,name:`neededRole`,type:`bytes32`}],name:`AccessControlUnauthorizedAccount`,type:`error`},{inputs:[],name:`FeeExceedsMaximum`,type:`error`},{inputs:[],name:`ZeroAddressFeeRecipient`,type:`error`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldBatchTransferFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`BatchTransferFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldDeployFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`DeployFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`address`,name:`oldRecipient`,type:`address`},{indexed:!0,internalType:`address`,name:`newRecipient`,type:`address`}],name:`FeeRecipientUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`previousAdminRole`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`newAdminRole`,type:`bytes32`}],name:`RoleAdminChanged`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleGranted`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleRevoked`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`bool`,name:`active`,type:`bool`}],name:`SwapperFeeWaiverUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`UnwrapFeeBasisPointsUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`WrapFeeBasisPointsUpdated`,type:`event`},{inputs:[],name:`DEFAULT_ADMIN_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`FEE_MANAGER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`MAX_BASIS_POINTS`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`SWAPPER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`batchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`deployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`feeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getBatchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`address`,name:`deployer`,type:`address`}],name:`getDeployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getFeeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`}],name:`getRoleAdmin`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint64`,name:`amount`,type:`uint64`},{internalType:`address`,name:`unwrapFrom`,type:`address`},{internalType:`address`,name:`unwrapTo`,type:`address`}],name:`getUnwrapFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint256`,name:`amount`,type:`uint256`},{internalType:`address`,name:`wrapFrom`,type:`address`},{internalType:`address`,name:`wrapTo`,type:`address`}],name:`getWrapFee`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`grantRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`hasRole`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`protocolId`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`pure`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`callerConfirmation`,type:`address`}],name:`renounceRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`revokeRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`setBatchTransferFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`setDeployFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`recipient`,type:`address`}],name:`setFeeRecipient`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bool`,name:`active`,type:`bool`}],name:`setSwapperFeeWaiverActive`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setUnwrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setWrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes4`,name:`interfaceId`,type:`bytes4`}],name:`supportsInterface`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`swapperFeeWaiverActive`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`unwrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`wrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function ue(e,t,n,r){return{address:e,abi:O,functionName:`getWrapFee`,args:[t,n,r]}}function de(e,t,n,r){return{address:e,abi:O,functionName:`getUnwrapFee`,args:[t,n,r]}}function fe(e){return{address:e,abi:O,functionName:`getBatchTransferFee`,args:[]}}function pe(e){return{address:e,abi:O,functionName:`getFeeRecipient`,args:[]}}const k=[{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`},{internalType:`uint64`,name:`expirationDate`,type:`uint64`}],name:`delegateForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`revokeDelegationForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegator`,type:`address`},{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`getUserDecryptionDelegationExpirationDate`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function me(e,t,n,r){return{address:e,abi:k,functionName:`delegateForUserDecryption`,args:[t,n,r]}}function he(e,t,n){return{address:e,abi:k,functionName:`revokeDelegationForUserDecryption`,args:[t,n]}}function A(e,t,n,r){return{address:e,abi:k,functionName:`getUserDecryptionDelegationExpirationDate`,args:[t,n,r]}}const j=2n**64n-1n,M={CredentialsLoading:`credentials:loading`,CredentialsCached:`credentials:cached`,CredentialsExpired:`credentials:expired`,CredentialsCreating:`credentials:creating`,CredentialsCreated:`credentials:created`,CredentialsRevoked:`credentials:revoked`,CredentialsPersistFailed:`credentials:persist_failed`,CredentialsAllowed:`credentials:allowed`,CredentialsCorrupted:`credentials:corrupted`,SessionExpired:`session:expired`,EncryptStart:`encrypt:start`,EncryptEnd:`encrypt:end`,EncryptError:`encrypt:error`,DecryptStart:`decrypt:start`,DecryptEnd:`decrypt:end`,DecryptError:`decrypt:error`,TransactionError:`transaction:error`,ShieldSubmitted:`shield:submitted`,TransferSubmitted:`transfer:submitted`,TransferFromSubmitted:`transferFrom:submitted`,ApproveSubmitted:`approve:submitted`,ApproveUnderlyingSubmitted:`approveUnderlying:submitted`,UnwrapSubmitted:`unwrap:submitted`,FinalizeUnwrapSubmitted:`finalizeUnwrap:submitted`,DelegationSubmitted:`delegation:submitted`,RevokeDelegationSubmitted:`revokeDelegation:submitted`,UnshieldPhase1Submitted:`unshield:phase1_submitted`,UnshieldPhase2Started:`unshield:phase2_started`,UnshieldPhase2Submitted:`unshield:phase2_submitted`};var ge=class{#e=null;#t=null;clearCache(){this.#e=null,this.#t=null}async encrypt(e,t,n){let r=await this.#n(t,n),i=crypto.getRandomValues(new Uint8Array(12)),a=new TextEncoder,o=await crypto.subtle.encrypt({name:`AES-GCM`,iv:i},r,a.encode(e));return{iv:btoa(String.fromCharCode(...i)),ciphertext:btoa(String.fromCharCode(...new Uint8Array(o)))}}async decrypt(e,t,n){let r=await this.#n(t,n),i=Uint8Array.from(atob(e.iv),e=>e.charCodeAt(0)),a=Uint8Array.from(atob(e.ciphertext),e=>e.charCodeAt(0)),o=await crypto.subtle.decrypt({name:`AES-GCM`,iv:i},r,a);return d(new TextDecoder().decode(o))}async#n(e,t){let n=`${e}:${t}`;if(this.#e&&this.#t===n)return this.#e;let r=new TextEncoder,i=await crypto.subtle.importKey(`raw`,r.encode(e),`PBKDF2`,!1,[`deriveKey`]),a=await crypto.subtle.deriveKey({name:`PBKDF2`,salt:r.encode(t),iterations:6e5,hash:`SHA-256`},i,{name:`AES-GCM`,length:256},!1,[`encrypt`,`decrypt`]);return this.#t=n,this.#e=a,a}};function N(e){c(e,`Stored credentials`),s(e.publicKey,`credentials.publicKey`),u(e.contractAddresses,`credentials.contractAddresses`);for(let t of e.contractAddresses)l(typeof t==`string`&&y(t,{strict:!1}),`Expected each contractAddress to be a valid hex address`);c(e.encryptedPrivateKey,`credentials.encryptedPrivateKey`),s(e.encryptedPrivateKey.iv,`encryptedPrivateKey.iv`),s(e.encryptedPrivateKey.ciphertext,`encryptedPrivateKey.ciphertext`),l(typeof e.startTimestamp==`number`,`Expected credentials.startTimestamp to be a number`),l(typeof e.durationDays==`number`,`Expected credentials.durationDays to be a number`)}function _e(e){N(e);let t=e;l(typeof t.delegatorAddress==`string`&&y(t.delegatorAddress,{strict:!1}),`Expected credentials.delegatorAddress to be a valid address`),l(typeof t.delegateAddress==`string`&&y(t.delegateAddress,{strict:!1}),`Expected credentials.delegateAddress to be a valid address`),l(typeof t.startTimestamp==`number`,`Expected startTimestamp to be a number`),l(typeof t.durationDays==`number`,`Expected durationDays to be a number`)}function P(e){return Math.floor(Date.now()/1e3)<e.startTimestamp+e.durationDays*86400}function F(e,t){let n=new Set(t.map(e=>v(e))),r=new Set(e.map(e=>v(e)));return n.isSubsetOf(r)}function I(e,t){return P(e)?F(e.contractAddresses,t):!1}function L(e){return[...new Set(e.map(e=>v(e)))].toSorted()}async function R(...e){let t=await crypto.subtle.digest(`SHA-256`,new TextEncoder().encode(e.map(String).join(`:`)));return Array.from(new Uint8Array(t)).map(e=>e.toString(16).padStart(2,`0`)).join(``).slice(0,32)}var ve=class{#e;constructor(e){this.#e=e}#t(e){c(e,`Session entry`),s(e.signature,`session.signature`),l(typeof e.createdAt==`number`,`Expected session.createdAt to be a number`),l(typeof e.ttl==`number`||e.ttl===`infinite`,`Expected session.ttl to be a number or "infinite"`)}async get(e){let t=await this.#e.get(e);return t===null?null:(this.#t(t),t)}async set(e){let t={signature:e.signature,createdAt:Math.floor(Date.now()/1e3),ttl:e.ttl};await this.#e.set(e.key,t)}async delete(e){await this.#e.delete(e)}isExpired(e){return e.ttl===`infinite`?!1:e.ttl===0?!0:Math.floor(Date.now()/1e3)-e.createdAt>=e.ttl}},ye=class{signer;storage;sessionSignatures;crypto;keypairTTL;sessionTTL;#e;#t=null;#n=null;#r=null;constructor(e){if(this.signer=e.signer,this.storage=e.storage,this.sessionSignatures=new ve(e.sessionStorage),this.crypto=new ge,this.keypairTTL=e.keypairTTL??86400,this.sessionTTL=e.sessionTTL??2592e3,this.#e=e.onEvent??(()=>{}),typeof this.keypairTTL==`number`&&this.keypairTTL<0)throw Error(`keypairTTL must be >= 0`);if(typeof this.sessionTTL==`number`&&this.sessionTTL<0)throw Error(`sessionTTL must be >= 0`)}emit(e){this.#e({...e,timestamp:Date.now()})}async resolveCredentials({key:e,contracts:t,createKey:n,createFn:r}){this.emit({type:M.CredentialsLoading,contractAddresses:t});try{let n=await this.storage.get(e);if(n){this.assertEncrypted(n);let r=await this.sessionSignatures.get(e);if(r)if(this.sessionSignatures.isExpired(r))await this.sessionSignatures.delete(e),this.emit({type:M.SessionExpired,reason:`ttl`});else{let i=await this.decryptCredentials(n,r.signature);if(I(i,t))return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i;if(P(i))return this.#i({key:e,credentials:i,requiredContracts:t});this.emit({type:M.CredentialsExpired,contractAddresses:t})}if(P(n)){if(F(n.contractAddresses,t)){let r=await this.signForContracts(n,n.contractAddresses);await this.sessionSignatures.set({key:e,signature:r,ttl:this.sessionTTL});let i=await this.decryptCredentials(n,r);return this.emit({type:M.CredentialsCached,contractAddresses:t}),this.emit({type:M.CredentialsAllowed,contractAddresses:t}),i}let r=await this.signForContracts(n,n.contractAddresses),i=await this.decryptCredentials(n,r);return this.#i({key:e,credentials:i,requiredContracts:t})}this.emit({type:M.CredentialsExpired,contractAddresses:t})}}catch(t){if(t instanceof b||t instanceof x)throw t;console.warn(`[zama-sdk] Credential resolution failed, recreating:`,t),this.emit({type:M.CredentialsCorrupted,error:a(t)}),await this.#o(e)}return(!this.#t||this.#n!==n)&&(this.#n=n,this.#t=r().then(e=>(this.emit({type:M.CredentialsAllowed,contractAddresses:t}),e)).finally(()=>{this.#t=null,this.#n=null})),this.#t}async checkExpired(e,t){try{let n=await this.storage.get(e);return n?(this.assertEncrypted(n),!I(n,t?[t]:[])):!1}catch(e){return console.warn(`[zama-sdk] isExpired check failed, treating as expired:`,e),!0}}async revokeSession(e,t){await this.sessionSignatures.delete(e),this.clearCaches(),this.emit({type:M.CredentialsRevoked,...t?{contractAddresses:t}:{}})}async checkAllowed(e){let t=await this.sessionSignatures.get(e);return t===null?!1:!this.sessionSignatures.isExpired(t)}async clearAll(e){await this.sessionSignatures.delete(e),this.clearCaches(),await this.#o(e)}clearCaches(){this.crypto.clearCache()}async createCredentials({key:e,contractAddresses:t,createFn:n,errorContext:r}){this.emit({type:M.CredentialsCreating,contractAddresses:t});try{let r=await n();return await this.persistCredentials(e,r),await this.sessionSignatures.set({key:e,signature:r.signature,ttl:this.sessionTTL}),this.emit({type:M.CredentialsCreated,contractAddresses:t}),r}catch(e){ee(e,r)}}async#i({key:e,credentials:t,requiredContracts:n}){if(this.#r){let e=await this.#r;if(F(e.contractAddresses,n))return this.emit({type:M.CredentialsAllowed,contractAddresses:n}),e;t=e}let r=this.#a({key:e,credentials:t,requiredContracts:n});this.#r=r;try{return await r}finally{this.#r===r&&(this.#r=null)}}async#a({key:e,credentials:t,requiredContracts:n}){let r=L([...t.contractAddresses,...n]),i=await this.signForContracts(t,r),a={...t,contractAddresses:r,signature:i};return await this.persistCredentials(e,a),await this.sessionSignatures.set({key:e,signature:i,ttl:this.sessionTTL}),this.emit({type:M.CredentialsAllowed,contractAddresses:n}),a}async persistCredentials(e,t){try{let n=await this.encryptCredentials(t);await this.storage.set(e,n)}catch(e){console.warn(`[zama-sdk] Failed to encrypt credentials for persistence:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}async#o(e){try{await this.storage.delete(e)}catch(e){console.warn(`[zama-sdk] Failed to delete credentials:`,e),this.emit({type:M.CredentialsPersistFailed,error:a(e)})}}};function be(e){if(typeof e!=`object`||!e)return!1;let t=Reflect.get(e,`runtime`);return typeof t!=`object`||!t?!1:typeof Reflect.get(t,`id`)==`string`}var xe=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t){return R(v(e),t)}constructor(e){super(e),this.#e=e.relayer,be(typeof globalThis<`u`?Reflect.get(globalThis,`chrome`):void 0)&&e.sessionStorage instanceof o&&console.warn(`[zama-sdk] Detected Chrome extension context with in-memory session storage. Session signatures will be lost on service worker restart and won't be shared across contexts. Consider using chromeSessionStorage instead. `)}async allow(...e){let t=L(e),n=await this.#r();return this.resolveCredentials({key:n,contracts:t,createKey:t.join(`,`),createFn:()=>this.create(t)})}async isExpired(e){return this.checkExpired(await this.#r(),e)}async revoke(...e){await this.revokeSession(await this.#r(),e.length>0?e:void 0)}async revokeByKey(e){await this.revokeSession(e)}async isAllowed(){return this.checkAllowed(await this.#r())}async clear(){await this.clearAll(await this.#r())}async create(e){let t=L(e),n=await this.#r();return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let e=await this.#e.generateKeypair(),n=Math.floor(Date.now()/1e3),r=Math.ceil(this.keypairTTL/86400),i=await this.#e.createEIP712(e.publicKey,t,n,r),a=await this.signer.signTypedData(i);return{publicKey:e.publicKey,privateKey:e.privateKey,signature:a,contractAddresses:t,startTimestamp:n,durationDays:r}},errorContext:`Failed to create decrypt credentials`})}assertEncrypted(e){N(e)}async signForContracts(e,t){let n=await this.#e.createEIP712(e.publicKey,t,e.startTimestamp,e.durationDays);return this.signer.signTypedData(n)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#r(){let t=await this.signer.getAddress(),n=await this.signer.getChainId(),r=`${v(t)}:${n}`;if(this.#t&&this.#n===r)return this.#t;let i=await e.computeStoreKey(t,n);return this.#n=r,this.#t=i,i}},Se=class e extends ye{#e;#t=null;#n=null;static async computeStoreKey(e,t,n){return R(v(e),v(t),n)}constructor(e){super(e),this.#e=e.relayer}async allow(e,...t){let n=v(e),r=L(t),i=await this.#i(n);return this.resolveCredentials({key:i,contracts:r,createKey:`${n}:${r.join(`,`)}`,createFn:()=>this.#r(n,r)})}async isExpired(e,t){return this.checkExpired(await this.#i(v(e)),t)}async revoke(e){await this.revokeSession(await this.#i(v(e)))}async isAllowed(e){return this.checkAllowed(await this.#i(v(e)))}async clear(e){await this.clearAll(await this.#i(v(e)))}async#r(e,t){let n=await this.#i(e);return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let n=await this.#e.generateKeypair(),r=await this.signer.getAddress(),i=Math.floor(Date.now()/1e3),a=Math.ceil(this.keypairTTL/86400),o={publicKey:n.publicKey,startTimestamp:i,durationDays:a,delegatorAddress:e},s=await this.#a(o,t);return{publicKey:n.publicKey,privateKey:n.privateKey,signature:s,contractAddresses:t,startTimestamp:i,durationDays:a,delegatorAddress:e,delegateAddress:r}},errorContext:`Failed to create delegated decrypt credentials`})}assertEncrypted(e){_e(e)}async signForContracts(e,t){return this.#a(e,t)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#i(t){let n=await this.signer.getAddress(),r=await this.signer.getChainId(),i=`${v(n)}:${v(t)}:${r}`;if(this.#t&&this.#n===i)return this.#t;let a=await e.computeStoreKey(n,t,r);return this.#n=i,this.#t=a,a}async#a(e,t){let n=await this.#e.createDelegatedUserDecryptEIP712(e.publicKey,t,e.delegatorAddress,e.startTimestamp,e.durationDays);return this.signer.signTypedData({domain:{...n.domain,chainId:Number(n.domain.chainId)},types:n.types,message:{...n.message,startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays)}})}};const Ce=`zama:balances`;function we(e,t,n){return`zama:balance:${v(e)}:${v(t)}:${n.toLowerCase()}`}async function z({storage:e,tokenAddress:t,owner:n,handle:r}){try{let i=await e.get(we(t,n,r));return i===null?null:BigInt(i)}catch(e){return console.warn(`[zama-sdk] Balance cache read failed:`,e),null}}async function B(e){let{storage:t,tokenAddress:n,owner:r,handle:i,value:a}=e,o=we(n,r,i);try{await t.set(o,a.toString()),await Te(t,o)}catch{}}const V=new WeakMap;async function Te(e,t){let n=(V.get(e)??Promise.resolve()).then(async()=>{let n=await e.get(Ce),r=n?JSON.parse(n):[];r.includes(t)||(r.push(t),await e.set(Ce,JSON.stringify(r)))});return V.set(e,n.catch(()=>{})),n}async function Ee(e,t=1/0){if(Number.isFinite(t)&&t<=0)throw Error(`maxConcurrency must be a positive number`);if(!Number.isFinite(t)||t>=e.length)return Promise.all(e.map(e=>e()));let n=Array.from({length:e.length}),r=0;async function i(){for(;r<e.length;){let t=r++;e[t]&&(n[t]=await e[t]())}}return await Promise.all(Array.from({length:t},i)),n}const De=`0x0000000000000000000000000000000000000000000000000000000000000000`;var Oe=class e{credentials;delegatedCredentials;relayer;signer;address;storage;#e;constructor(e){let t={relayer:e.relayer,signer:e.signer,storage:e.storage,sessionStorage:e.sessionStorage,keypairTTL:e.keypairTTL??86400,sessionTTL:e.sessionTTL??2592e3,onEvent:e.onEvent};this.credentials=e.credentials??new xe(t),this.delegatedCredentials=e.delegatedCredentials??new Se(t),this.relayer=e.relayer,this.signer=e.signer,this.address=v(e.address),this.storage=e.storage,this.#e=e.onEvent}emit(e){this.#e?.({...e,tokenAddress:this.address,timestamp:Date.now()})}async balanceOf(e){let t=e?v(e):await this.signer.getAddress(),n=await this.readConfidentialBalanceOf(t);return this.decryptBalance(n,t)}async confidentialBalanceOf(e){let t=e?v(e):await this.signer.getAddress();return this.readConfidentialBalanceOf(t)}async isConfidential(){return await this.signer.readContract(m(this.address,p))}async isWrapper(){return await this.signer.readContract(m(this.address,h))}static async batchDecryptBalances(t,n){if(t.length===0)return new Map;let{handles:r,owner:i,onError:a,maxConcurrency:o}=n??{},s=t[0],c=e.assertSameRelayer(t),l=i??await s.signer.getAddress();return e.#t({tokens:t,handles:r,ownerAddress:l,onError:a,maxConcurrency:o,obtainCreds:e=>s.credentials.allow(...e),decrypt:(e,t,n)=>c.userDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,signerAddress:l,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch decryption`})}static async batchDecryptBalancesAs(t,n){if(t.length===0)return new Map;let{delegatorAddress:r,handles:i,owner:a,onError:o,maxConcurrency:s}=n,c=a??r,l=t[0];return e.assertSameRelayer(t),e.#t({tokens:t,handles:i,ownerAddress:c,onError:o,maxConcurrency:s,preFlightCheck:()=>l.#n(r),obtainCreds:e=>l.delegatedCredentials.allow(r,...e),decrypt:(e,t,n)=>l.relayer.delegatedUserDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch delegated decryption`})}static async#t(e){let{tokens:t,handles:n,ownerAddress:r,onError:o,maxConcurrency:s,obtainCreds:c,decrypt:l,errorPrefix:u}=e,d=t[0],f=n??await Promise.all(t.map(e=>e.readConfidentialBalanceOf(r)));if(t.length!==f.length)throw new i(`tokens.length (${t.length}) must equal handles.length (${f.length})`);let p=d.storage,m=new Map,h=[],g=await Promise.all(t.map((e,t)=>{let n=f[t];return e.isZeroHandle(n)?0n:z({storage:p,tokenAddress:e.address,owner:r,handle:n})}));for(let e=0;e<t.length;e++){let n=t[e],r=f[e],i=g[e];if(i!=null){m.set(n.address,i);continue}h.push({token:n,handle:r})}if(h.length===0)return m;e.preFlightCheck&&await e.preFlightCheck();let _=await c(h.map(e=>e.token.address)),v=[],y=[];for(let{token:e,handle:t}of h)y.push(()=>l(_,t,e.address).then(async n=>{let a=n[t];if(a===void 0)throw new i(`${u} returned no value for handle ${t} on token ${e.address}`);m.set(e.address,a);try{await B({storage:p,tokenAddress:e.address,owner:r,handle:t,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}}).catch(t=>{let n=a(t);if(o)try{m.set(e.address,o(n,e.address))}catch(t){v.push({address:e.address,error:a(t)})}else v.push({address:e.address,error:n})}));if(await Ee(y,s),v.length>0){let e=v.map(e=>`${e.address}: ${e.error.message}`).join(`; `);throw new i(`${u} failed for ${v.length} token(s): ${e}`)}return m}async underlyingToken(){return this.signer.readContract(g(this.address))}async allowance(e,t){let n=v(e),r=await this.signer.readContract(g(n)),i=t?v(t):await this.signer.getAddress();return this.signer.readContract(D(r,i,n))}async name(){return this.signer.readContract(ae(this.address))}async symbol(){return this.signer.readContract(oe(this.address))}async decimals(){return this.signer.readContract(E(this.address))}async allow(){await this.credentials.allow(this.address)}async isAllowed(){return this.credentials.isAllowed()}async revoke(...e){await this.credentials.revoke(...e)}static async allow(...e){if(e.length===0)return;let t=e.map(e=>e.address);await e[0].credentials.allow(...t)}async getAclAddress(){return this.relayer.getAclAddress()}async isDelegated(e){let t=await this.getDelegationExpiry(e);return t===0n?!1:t===j?!0:t>await this.signer.getBlockTimestamp()}async getDelegationExpiry({delegatorAddress:e,delegateAddress:t}){let n=await this.getAclAddress();return this.signer.readContract(A(n,v(e),v(t),this.address))}async#n(e){let t=await this.signer.getAddress(),n=await this.getDelegationExpiry({delegatorAddress:e,delegateAddress:t});if(n===0n)throw new C(`No active delegation from ${e} to ${t} for ${this.address}`);if(n!==j&&n<=await this.signer.getBlockTimestamp())throw new w(`Delegation from ${e} to ${t} for ${this.address} has expired`)}async readConfidentialBalanceOf(e){return await this.signer.readContract(f(this.address,e))}isZeroHandle(e){return e===`0x0000000000000000000000000000000000000000000000000000000000000000`||e===`0x`}async decryptBalanceAs({delegatorAddress:e,owner:t}){let n=v(e),r=t?v(t):n,o=await this.readConfidentialBalanceOf(r);if(this.isZeroHandle(o))return 0n;let s=await z({storage:this.storage,tokenAddress:this.address,owner:r,handle:o});if(s!==null)return s;await this.#n(n);let c=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.delegatedCredentials.allow(n,this.address),t=await this.relayer.delegatedUserDecrypt({handles:[o],contractAddress:this.address,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-c});let a=t[o];if(a===void 0)throw new i(`Delegated decryption returned no value for handle ${o}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:r,handle:o,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return a}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-c}),H(e,`Failed to decrypt delegated balance`,!0)}}async decryptBalance(e,t){if(this.isZeroHandle(e))return 0n;let n=t??await this.signer.getAddress(),r=await z({storage:this.storage,tokenAddress:this.address,owner:n,handle:e});if(r!==null)return r;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let t=await this.relayer.userDecrypt({handles:[e],contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:n,startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});let r=t[e];if(r===void 0)throw new i(`Decryption returned no value for handle ${e}`);try{await B({storage:this.storage,tokenAddress:this.address,owner:n,handle:e,value:r})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return r}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt balance`)}}async decryptHandles(e,t){let n=new Map,r=[];for(let t of e)this.isZeroHandle(t)?n.set(t,0n):r.push(t);if(r.length===0)return n;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:M.DecryptStart});let e=await this.relayer.userDecrypt({handles:r,contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:t??await this.signer.getAddress(),startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:M.DecryptEnd,durationMs:Date.now()-s});for(let t of r){let r=e[t];if(r===void 0)throw new i(`Decryption returned no value for handle ${t}`);n.set(t,r)}}catch(e){throw this.emit({type:M.DecryptError,error:a(e),durationMs:Date.now()-s}),H(e,`Failed to decrypt handles`)}return n}static assertSameRelayer(e){let t=e[0].relayer;for(let n=1;n<e.length;n++)if(e[n].relayer!==t)throw new r(`All tokens in a batch operation must share the same relayer instance`);return t}};function H(e,n,r=!1){if(e instanceof i||e instanceof S||e instanceof t||e instanceof T||e instanceof b||e instanceof x)return e;let a=typeof e==`object`&&e&&`statusCode`in e&&typeof e.statusCode==`number`?e.statusCode:void 0;return a===400?new S(e instanceof Error?e.message:`No ciphertext for this account`,{cause:e}):r&&a===500?new T(`Delegated decryption failed with a server error. This is most commonly caused by the delegation not having propagated to the gateway yet — after granting delegation, allow 1–2 minutes for cross-chain synchronization before retrying. If the error persists, the gateway or relayer may be experiencing an unrelated issue.`,{cause:e}):a===void 0?new i(n,{cause:e}):new t(e instanceof Error?e.message:n,a,{cause:e})}const U={ConfidentialTransfer:`0x67500e8d0ed826d2194f514dd0d8124f35648ab6e3fb5e6ed867134cffe661e9`,Wrapped:`0x1f7907f4d84043abe0fb7c74e8865ee5fe93fe4f691c54a7b8fa9d6fb17c7cba`,UnwrapRequested:`0x77d02d353c5629272875d11f1b34ec4c65d7430b075575b78cd2502034c469ee`,UnwrappedFinalized:`0xc64e7c81b18b674fc5b037d8a0041bfe3332d86c780a4688f404ee01fbabb152`,UnwrappedStarted:`0x3838891d4843c6d7f9f494570b6fd8843f4e3c3ddb817c1411760bd31b819806`};function W(e){return v(d(e.slice(-40)))}function G(e){return BigInt(e)}function ke(e){return e}function K(e,t){let n=2+t*64,r=e.slice(n,n+64);return r.length===64?r:r.padEnd(64,`0`)}function Ae(e,t){return v(d(K(e,t).slice(-40)))}function q(e,t){return BigInt(`0x`+K(e,t))}function J(e,t){return BigInt(`0x`+K(e,t))!==0n}function Y(e,t){return d(K(e,t))}function je(e){return e.topics[0]!==U.ConfidentialTransfer||e.topics.length<4?null:{eventName:`ConfidentialTransfer`,from:W(e.topics[1]),to:W(e.topics[2]),encryptedAmountHandle:ke(e.topics[3])}}function X(e){return e.topics[0]!==U.Wrapped||e.topics.length<3?null:{eventName:`Wrapped`,to:W(e.topics[1]),mintTxId:G(e.topics[2]),mintAmount:q(e.data,0),amountIn:q(e.data,1),feeAmount:q(e.data,2)}}function Z(e){return e.topics[0]!==U.UnwrapRequested||e.topics.length<2?null:{eventName:`UnwrapRequested`,receiver:W(e.topics[1]),encryptedAmount:Y(e.data,0)}}function Me(e){return e.topics[0]!==U.UnwrappedFinalized||e.topics.length<3?null:{eventName:`UnwrappedFinalized`,burntAmountHandle:ke(e.topics[1]),nextTxId:G(e.topics[2]),finalizeSuccess:J(e.data,0),feeTransferSuccess:J(e.data,1),burnAmount:q(e.data,2),unwrapAmount:q(e.data,3),feeAmount:q(e.data,4)}}function Ne(e){return e.topics[0]!==U.UnwrappedStarted||e.topics.length<4?null:{eventName:`UnwrappedStarted`,requestId:G(e.topics[1]),txId:G(e.topics[2]),to:W(e.topics[3]),returnVal:J(e.data,0),refund:Ae(e.data,1),requestedAmount:Y(e.data,2),burnAmount:Y(e.data,3)}}function Q(e){return je(e)??X(e)??Z(e)??Me(e)??Ne(e)}function Pe(e){let t=[];for(let n of e){let e=Q(n);e&&t.push(e)}return t}function Fe(e){for(let t of e){let e=Z(t);if(e)return e}return null}function Ie(e){for(let t of e){let e=X(t);if(e)return e}return null}const Le=[U.ConfidentialTransfer,U.Wrapped,U.UnwrapRequested,U.UnwrappedFinalized,U.UnwrappedStarted];function Re(e,t){return e.toLowerCase()===t.toLowerCase()}function $(e,t,n){let r=t!==void 0&&Re(e,t),i=n!==void 0&&Re(e,n);return r&&i?`self`:r?`outgoing`:`incoming`}function ze(e,t,n){switch(e.eventName){case`ConfidentialTransfer`:return Be(e,t,n);case`Wrapped`:return Ve(e,t,n);case`UnwrapRequested`:return He(e,t,n);case`UnwrappedStarted`:return Ue(e,t,n);case`UnwrappedFinalized`:return We(e,n)}}function Be(e,t,n){return{type:`transfer`,direction:$(t,e.from,e.to),amount:{type:`encrypted`,handle:e.encryptedAmountHandle},from:e.from,to:e.to,metadata:n,rawEvent:e}}function Ve(e,t,n){return{type:`shield`,direction:$(t,void 0,e.to),amount:{type:`clear`,value:e.amountIn},to:e.to,fee:e.feeAmount,metadata:n,rawEvent:e}}function He(e,t,n){return{type:`unshield_requested`,direction:$(t,void 0,e.receiver),amount:{type:`encrypted`,handle:e.encryptedAmount},to:e.receiver,metadata:n,rawEvent:e}}function Ue(e,t,n){return{type:`unshield_started`,direction:$(t,void 0,e.to),amount:{type:`encrypted`,handle:e.requestedAmount},to:e.to,success:e.returnVal,metadata:n,rawEvent:e}}function We(e,t){return{type:`unshield_finalized`,direction:`incoming`,amount:{type:`clear`,value:e.unwrapAmount},fee:e.feeAmount,success:e.finalizeSuccess,metadata:t,rawEvent:e}}function Ge(e,t){let n=[];for(let r of e){let e=Q(r);if(!e)continue;let i={transactionHash:r.transactionHash,blockNumber:r.blockNumber,logIndex:r.logIndex};n.push(ze(e,t,i))}return n}function Ke(e){let t=new Set;for(let n of e)if(n.amount.type===`encrypted`&&n.amount.decryptedValue===void 0){let e=n.amount.handle;e!==`0x`&&e!==`0x0000000000000000000000000000000000000000000000000000000000000000`&&t.add(e)}return[...t]}function qe(e,t){return e.map(e=>{if(e.amount.type!==`encrypted`)return e;let n=t.get(e.amount.handle);return n===void 0?e:{...e,amount:{type:`encrypted`,handle:e.amount.handle,decryptedValue:n}}})}function Je(e){return[...e].toSorted((e,t)=>{let n=e.metadata.blockNumber,r=t.metadata.blockNumber;if(n===void 0&&r===void 0)return 0;if(n===void 0)return-1;if(r===void 0)return 1;let i=typeof n==`bigint`?n:BigInt(n),a=typeof r==`bigint`?r:BigInt(r);if(a>i)return 1;if(a<i)return-1;let o=e.metadata.logIndex??0;return(t.metadata.logIndex??0)-o})}export{le as A,re as B,A as C,de as D,pe as E,oe as F,b as G,te as H,ie as I,w as L,E as M,se as N,ue as O,ae as P,C as R,me as S,fe as T,S as U,ne as V,x as W,De as _,Le as a,M as b,Q as c,Me as d,Ne as f,Oe as g,Ie as h,Je as i,ce as j,D as k,Pe as l,Fe as m,Ke as n,U as o,X as p,Ge as r,je as s,qe as t,Z as u,Se as v,he as w,j as x,xe as y,T as z};
2
- //# sourceMappingURL=activity-Ctiuld0m.js.map