@zama-fhe/sdk 2.2.0 → 2.3.0-alpha.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/README.md +1 -1
  2. package/dist/cjs/activity.cjs +1 -1
  3. package/dist/cjs/activity.cjs.map +1 -1
  4. package/dist/cjs/index.cjs +2 -2
  5. package/dist/cjs/index.cjs.map +1 -1
  6. package/dist/cjs/query/index.cjs +1 -1
  7. package/dist/cjs/relayer.cjs +1 -1
  8. package/dist/cjs/relayer.cjs.map +1 -1
  9. package/dist/esm/{activity-CcKSL6Oe.d.ts → activity-BeqE1jb7.d.ts} +89 -8
  10. package/dist/esm/activity-qMhJxqpq.js +2 -0
  11. package/dist/esm/activity-qMhJxqpq.js.map +1 -0
  12. package/dist/esm/cleartext/index.js +1 -1
  13. package/dist/esm/{cleartext-DuOGGACw.js → cleartext-BU7SYjBM.js} +2 -2
  14. package/dist/esm/{cleartext-DuOGGACw.js.map → cleartext-BU7SYjBM.js.map} +1 -1
  15. package/dist/esm/{encryption-CKqGKzHs.js → encryption-UaXE1L_W.js} +2 -2
  16. package/dist/esm/{encryption-CKqGKzHs.js.map → encryption-UaXE1L_W.js.map} +1 -1
  17. package/dist/esm/ethers/index.d.ts +1 -1
  18. package/dist/esm/{index-IhsduS7h.d.ts → index-j4Uv5iQi.d.ts} +176 -2
  19. package/dist/esm/index.d.ts +33 -3
  20. package/dist/esm/index.js +2 -2
  21. package/dist/esm/index.js.map +1 -1
  22. package/dist/esm/node/index.js +1 -1
  23. package/dist/esm/query/index.d.ts +2 -2
  24. package/dist/esm/query/index.js +1 -1
  25. package/dist/esm/relayer-DfjPWTBf.js +2 -0
  26. package/dist/esm/relayer-DfjPWTBf.js.map +1 -0
  27. package/dist/esm/viem/index.d.ts +1 -1
  28. package/package.json +2 -2
  29. package/dist/esm/activity-Ctiuld0m.js +0 -2
  30. package/dist/esm/activity-Ctiuld0m.js.map +0 -1
  31. package/dist/esm/relayer-DxMV-NQT.js +0 -2
  32. package/dist/esm/relayer-DxMV-NQT.js.map +0 -1
@@ -1,2 +1,2 @@
1
- Object.defineProperty(exports,Symbol.toStringTag,{value:`Module`});const e=require(`../relayer.cjs`),t=require(`../activity.cjs`),n=require(`../wrappers-registry.cjs`);let r=require(`viem`);function i(e){if(!a(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!a(n)||!n.hasOwnProperty(`isPrototypeOf`))}function a(e){return Object.prototype.toString.call(e)===`[object Object]`}function o(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:ee,meta:te,query:y,pollingInterval:b,...x}=e;return x}function s(e){return JSON.stringify(e,(e,t)=>i(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const c=e=>e.map(e=>(0,r.getAddress)(e)),l=e=>e===void 0?void 0:(0,r.getAddress)(e),u={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:(0,r.getAddress)(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:(0,r.getAddress)(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:(0,r.getAddress)(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:c(e),...t?{owner:(0,r.getAddress)(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:c(e),...t?{owner:(0,r.getAddress)(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:(0,r.getAddress)(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:(0,r.getAddress)(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:(0,r.getAddress)(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:(0,r.getAddress)(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{},...n?{wrapperAddress:(0,r.getAddress)(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=l(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:(0,r.getAddress)(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:(0,r.getAddress)(e)}],scope:(e,t,n,i)=>[`zama.activityFeed`,{tokenAddress:(0,r.getAddress)(e),...t?{userAddress:(0,r.getAddress)(t)}:{},...n?{logsKey:n}:{},...i===void 0?{}:{decrypt:i}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,i)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{},...t===void 0?{}:{amount:t},...n?{from:(0,r.getAddress)(n)}:{},...i?{to:(0,r.getAddress)(i)}:{}}],unshieldFee:(e,t,n,i)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{},...t===void 0?{}:{amount:t},...n?{from:(0,r.getAddress)(n)}:{},...i?{to:(0,r.getAddress)(i)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:(0,r.getAddress)(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=l(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:(0,r.getAddress)(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:(0,r.getAddress)(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:(0,r.getAddress)(e),tokenAddress:(0,r.getAddress)(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:(0,r.getAddress)(e),confidentialTokenAddress:(0,r.getAddress)(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:(0,r.getAddress)(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:(0,r.getAddress)(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:(0,r.getAddress)(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:(0,r.getAddress)(e),confidentialTokenAddress:(0,r.getAddress)(t)}],listPairs:(e,t,n,i)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:(0,r.getAddress)(e),page:t,pageSize:n,metadata:i}]}};function d(e,t){e.invalidateQueries({queryKey:u.underlyingAllowance.token(t)})}function f(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function p(e,t){e.invalidateQueries({queryKey:u.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:u.confidentialHandles.all}),e.invalidateQueries({queryKey:u.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:u.confidentialBalances.all})}function m(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function h(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function g(e,t){p(e,t),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function _(e,t){d(e,t)}function v(e,t){e.invalidateQueries({queryKey:u.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function ee(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function te(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function y(e){e.invalidateQueries({predicate:te})}function b(e){e.removeQueries({queryKey:u.signerAddress.all}),e.removeQueries({queryKey:u.decryption.all}),e.invalidateQueries({predicate:ee}),y(e)}const x=new WeakMap;let S=1;function C(e){let t=x.get(e);if(t!==void 0)return t;let n=S++;return x.set(e,n),n}function w(e,t){return{...o(t?.query??{}),queryKey:u.signerAddress.scope(C(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function T(e,n,r){let i=u.tokenMetadata.token(n);return{...o(r?.query??{}),queryKey:i,queryFn:async n=>{let[,{tokenAddress:r}]=n.queryKey,[i,a,o]=await Promise.all([e.readContract(t.I(r)),e.readContract(t.L(r)),e.readContract(t.P(r))]);return{name:i,symbol:a,decimals:o}},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function E(e,t,r){let i=u.isConfidential.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.u(r))},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function D(e,t,r){let i=u.isWrapper.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.d(r))},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function O(e,t,r){let i=u.totalSupply.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.D(r))},staleTime:3e4,enabled:r?.query?.enabled!==!1}}function k(e,t){let n=u.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...o(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function A(e,r,i){let a=i.owner,s=i.wrapperAddress,c=i.query?.enabled!==!1,l=u.underlyingAllowance.scope(r,a,s);return{...o(i.query??{}),queryKey:l,queryFn:async r=>{let[,{owner:i,wrapperAddress:a}]=r.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`wrapperAddress is required`);let o=await e.readContract(n.m(a));return e.readContract(t.j(o,i,a))},staleTime:3e4,enabled:!!(a&&s)&&c}}function j(e,t,r){let i=r.holder,a=r.spender,s=r.query?.enabled!==!1,c=u.confidentialIsApproved.scope(t,i,a);return{...o(r.query??{}),queryKey:c,queryFn:async t=>{let[,{tokenAddress:r,holder:i,spender:a}]=t.queryKey;if(!r)throw Error(`tokenAddress is required`);if(!i)throw Error(`holder is required`);if(!a)throw Error(`spender is required`);return e.readContract(n.C(r,i,a))},staleTime:3e4,enabled:!!(t&&i&&a)&&s}}function M(e){return e===void 0?void 0:BigInt(e)}function N(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,s=n.to,c=n.query?.enabled!==!1,l=u.fees.shieldFee(i,r,a,s);return{...o(n.query??{}),queryKey:l,queryFn:async n=>{let[,r]=n.queryKey,i=M(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t.A(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&s)&&c}}function P(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,s=n.to,c=n.query?.enabled!==!1,l=u.fees.unshieldFee(i,r,a,s);return{...o(n.query??{}),queryKey:l,queryFn:async n=>{let[,r]=n.queryKey,i=M(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t.k(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&s)&&c}}function F(e,n,r){let i=r?.query?.enabled!==!1,a=u.fees.batchTransferFee(n);return{...o(r?.query??{}),queryKey:a,queryFn:async n=>{let[,{feeManagerAddress:r}]=n.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(t.D(r))},staleTime:3e4,enabled:!!n&&i}}function I(e,n,r){let i=r?.query?.enabled!==!1,a=u.fees.feeRecipient(n);return{...o(r?.query??{}),queryKey:a,queryFn:async n=>{let[,{feeManagerAddress:r}]=n.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(t.O(r))},staleTime:3e4,enabled:!!n&&i}}function L(e,t){let n=u.publicKey.all;return{...o(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function R(e,t,n){let r=u.publicParams.bits(t);return{...o(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function z(e,t,r){let i=r?.owner,a=r?.query?.enabled!==!1,s=u.confidentialHandle.owner(t,i);return{...o(r?.query??{}),queryKey:s,queryFn:async t=>{let[,{tokenAddress:r,owner:i}]=t.queryKey;if(!i)throw Error(`owner is required`);return await e.readContract(n._(r,i))},enabled:!!i&&a,refetchInterval:r?.pollingInterval??1e4}}function B(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=u.confidentialBalance.owner(e.address,n,r);return{...o(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function V(e,t,r){let i=r?.owner,a=r?.query?.enabled!==!1,s=u.confidentialHandles.tokens(t,i);return{...o(r?.query??{}),queryKey:s,queryFn:async t=>{let[,{tokenAddresses:r,owner:i}]=t.queryKey;if(!i)throw Error(`owner is required`);return Promise.all(r.map(async t=>await e.readContract(n._(t,i))))},enabled:!!(i&&t.length>0)&&a,refetchInterval:r?.pollingInterval??1e4}}function H(n,r){let i=n.map(e=>e.address),a=r?.resultAddresses??i,s=r?.owner,c=r?.handles,l=r?.query?.enabled!==!1,d=Array.isArray(c)&&c.length===n.length&&c.every(e=>!!e),f=u.confidentialBalances.tokens(i,s,c);return{...o(r?.query??{}),queryKey:f,queryFn:async i=>{let[,{owner:o,handles:s}]=i.queryKey;if(!o)throw Error(`owner is required`);if(!s)throw Error(`handles are required`);let c=new Map,l=await t.g.batchDecryptBalances(n,{owner:o,handles:s,maxConcurrency:r?.maxConcurrency,onError:(e,t)=>(c.set(t,e),0n)}),u=new Map,d=new Map;for(let e=0;e<n.length;e++){let t=n[e].address,r=a[e],i=c.get(t);if(i)d.set(r,i);else{let e=l.get(t);e!==void 0&&u.set(r,e)}}if(d.size===n.length&&n.length>0)throw d.values().next().value??new e.r(`All token balance decryptions failed`);return{balances:u,errors:d,isPartialError:d.size>0}},enabled:a.length===n.length&&!!s&&n.length>0&&d&&l,staleTime:1/0}}function U(e){if(e)return s([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function W(e,n,r){let i=n.userAddress,a=n.decrypt??!0,s=n.logs,c=n.logsKey??U(s),l=r?.query?.enabled!==!1,d=u.activityFeed.scope(e.address,i,c,a);return{...o(r?.query??{}),queryKey:d,queryFn:async n=>{let[,{userAddress:r,decrypt:i}]=n.queryKey;if(!r)throw Error(`userAddress is required`);if(!s)throw Error(`logs are required`);let a=t.r(s,r);if(!i)return t.i(a);let o=t.n(a);return o.length===0?t.i(a):t.i(t.t(a,await e.decryptHandles(o,r)))},staleTime:1/0,enabled:!!(i&&s)&&l}}const G=86400*1e3;function K(e,t){let i=!!t.registryAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairs(t.registryAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r}]=t.queryKey;return e.readContract(n.i(r))},staleTime:G,enabled:i}}function q(e,t){let i=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.confidentialTokenAddress(t.registryAddress??r.zeroAddress,t.tokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,tokenAddress:i}]=t.queryKey;return e.readContract(n.t(r,i))},staleTime:G,enabled:i}}function J(e,t){let i=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenAddress(t.registryAddress??r.zeroAddress,t.confidentialTokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,confidentialTokenAddress:i}]=t.queryKey;return e.readContract(n.n(r,i))},staleTime:G,enabled:i}}function Y(e,t){let i=!!t.registryAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairsLength(t.registryAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r}]=t.queryKey;return e.readContract(n.a(r))},staleTime:G,enabled:i}}function X(e,t){let i=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairsSlice(t.registryAddress??r.zeroAddress,String(t.fromIndex??0n),String(t.toIndex??0n));return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,fromIndex:i,toIndex:a}]=t.queryKey;return e.readContract(n.o(r,BigInt(i),BigInt(a)))},staleTime:G,enabled:i}}function Z(e,t){let i=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPair(t.registryAddress??r.zeroAddress,String(t.index??0n));return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,index:i}]=t.queryKey;return e.readContract(n.r(r,BigInt(i)))},staleTime:G,enabled:i}}function Q(e,t){let i=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??r.zeroAddress,t.confidentialTokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,confidentialTokenAddress:i}]=t.queryKey;return e.readContract(n.s(r,i))},staleTime:G,enabled:i}}function ne(e,t){let n=t.page??1,i=t.pageSize??100,a=t.metadata??!1,s=!!t.registryAddress&&t.query?.enabled!==!1,c=u.wrappersRegistry.listPairs(t.registryAddress??r.zeroAddress,n,i,a);return{...o(t.query??{}),queryKey:c,queryFn:async()=>e.listPairs({page:n,pageSize:i,metadata:a}),staleTime:e.ttlMs,enabled:s}}function re(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function ie(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function ae(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function oe(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function se(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function ce(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function le(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function ue(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function de(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function fe(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function pe(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function me(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function he(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function ge(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function _e(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function ve(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function ye(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function be(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(u.decryption.handle(t),n)}}}function $(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function xe(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Se(e,t){return{...o(t.query??{}),queryKey:u.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function Ce(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function we(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function Te(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function Ee(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(u.decryption.handle(t),n)}}}function De(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function Oe(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async n=>t.g.batchDecryptBalancesAs(e,n)}}function ke(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function Ae(e,n){return{...o(n.query??{}),queryKey:u.delegationStatus.scope(n.tokenAddress,n.delegatorAddress,n.delegateAddress),queryFn:async n=>{let[,{tokenAddress:r,delegatorAddress:i,delegateAddress:a}]=n.queryKey;t.R(r,`delegationStatusQueryOptions: tokenAddress`),t.R(i,`delegationStatusQueryOptions: delegatorAddress`),t.R(a,`delegationStatusQueryOptions: delegateAddress`);let o=await e.relayer.getAclAddress(),s=await e.signer.readContract(t.T(o,i,a,r)),c;return c=s===0n?!1:s===t.C?!0:s>await e.signer.getBlockTimestamp(),{isDelegated:c,expiryTimestamp:s}},enabled:!!(n.tokenAddress&&n.delegatorAddress&&n.delegateAddress)&&n.query?.enabled!==!1}}exports.ZERO_HANDLE=`0x0000000000000000000000000000000000000000000000000000000000000000`,exports.ZamaSDKEvents=t.b,exports.activityFeedQueryOptions=W,exports.allowMutationOptions=xe,exports.approveUnderlyingMutationOptions=ce,exports.batchDecryptBalancesAsMutationOptions=Oe,exports.batchTransferFeeQueryOptions=F,exports.confidentialApproveMutationOptions=se,exports.confidentialBalanceQueryOptions=B,exports.confidentialBalancesQueryOptions=H,exports.confidentialHandleQueryOptions=z,exports.confidentialHandlesQueryOptions=V,exports.confidentialIsApprovedQueryOptions=j,exports.confidentialTokenAddressQueryOptions=q,exports.confidentialTransferFromMutationOptions=oe,exports.confidentialTransferMutationOptions=ae,exports.createDelegatedUserDecryptEIP712MutationOptions=ve,exports.createEIP712MutationOptions=_e,exports.decryptBalanceAsMutationOptions=De,exports.delegateDecryptionMutationOptions=Te,exports.delegatedUserDecryptMutationOptions=ye,exports.delegationStatusQueryOptions=Ae,exports.deriveActivityFeedLogsKey=U,exports.encryptMutationOptions=he,exports.feeRecipientQueryOptions=I,exports.filterQueryOptions=o,exports.finalizeUnwrapMutationOptions=me,exports.generateKeypairMutationOptions=ge,exports.hashFn=s,exports.invalidateAfterApprove=v,exports.invalidateAfterApproveUnderlying=_,exports.invalidateAfterShield=m,exports.invalidateAfterTransfer=g,exports.invalidateAfterUnshield=h,exports.invalidateAfterUnwrap=f,exports.invalidateBalanceQueries=p,exports.invalidateWagmiBalanceQueries=y,exports.invalidateWalletLifecycleQueries=b,exports.isAllowedQueryOptions=Se,exports.isConfidentialQueryOptions=E,exports.isConfidentialTokenValidQueryOptions=Q,exports.isWrapperQueryOptions=D,exports.listPairsQueryOptions=ne,exports.publicDecryptMutationOptions=be,exports.publicKeyQueryOptions=L,exports.publicParamsQueryOptions=R,exports.requestZKProofVerificationMutationOptions=$,exports.resumeUnshieldMutationOptions=de,exports.revokeDelegationMutationOptions=ke,exports.revokeMutationOptions=Ce,exports.revokeSessionMutationOptions=we,exports.shieldETHMutationOptions=ie,exports.shieldFeeQueryOptions=N,exports.shieldMutationOptions=re,exports.signerAddressQueryOptions=w,exports.tokenAddressQueryOptions=J,exports.tokenMetadataQueryOptions=T,exports.tokenPairQueryOptions=Z,exports.tokenPairsLengthQueryOptions=Y,exports.tokenPairsQueryOptions=K,exports.tokenPairsSliceQueryOptions=X,exports.totalSupplyQueryOptions=O,exports.underlyingAllowanceQueryOptions=A,exports.unshieldAllMutationOptions=ue,exports.unshieldFeeQueryOptions=P,exports.unshieldMutationOptions=le,exports.unwrapAllMutationOptions=pe,exports.unwrapMutationOptions=fe,exports.userDecryptMutationOptions=Ee,exports.wrapperDiscoveryQueryOptions=k,exports.zamaQueryKeys=u;
1
+ Object.defineProperty(exports,Symbol.toStringTag,{value:`Module`});const e=require(`../relayer.cjs`),t=require(`../activity.cjs`),n=require(`../wrappers-registry.cjs`);let r=require(`viem`);function i(e){if(!a(e))return!1;let t=e.constructor;if(t===void 0)return!0;let n=t.prototype;return!(!a(n)||!n.hasOwnProperty(`isPrototypeOf`))}function a(e){return Object.prototype.toString.call(e)===`[object Object]`}function o(e){let{gcTime:t,staleTime:n,enabled:r,select:i,refetchInterval:a,refetchOnMount:o,refetchOnWindowFocus:s,refetchOnReconnect:c,retry:l,retryDelay:u,retryOnMount:d,queryFn:f,queryKey:p,queryKeyHashFn:m,initialData:h,initialDataUpdatedAt:g,placeholderData:_,structuralSharing:v,throwOnError:ee,meta:te,query:y,pollingInterval:b,...x}=e;return x}function s(e){return JSON.stringify(e,(e,t)=>i(t)?Object.keys(t).toSorted().reduce((e,n)=>(e[n]=t[n],e),{}):typeof t==`bigint`?t.toString():t)}const c=e=>e.map(e=>(0,r.getAddress)(e)),l=e=>e===void 0?void 0:(0,r.getAddress)(e),u={signerAddress:{all:[`zama.signerAddress`],scope:e=>[`zama.signerAddress`,{scope:e}],token:e=>[`zama.signerAddress`,{tokenAddress:(0,r.getAddress)(e)}]},confidentialHandle:{all:[`zama.confidentialHandle`],token:e=>[`zama.confidentialHandle`,{tokenAddress:(0,r.getAddress)(e)}],owner:(e,t)=>[`zama.confidentialHandle`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{}}]},confidentialBalance:{all:[`zama.confidentialBalance`],token:e=>[`zama.confidentialBalance`,{tokenAddress:(0,r.getAddress)(e)}],owner:(e,t,n)=>[`zama.confidentialBalance`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{},...n===void 0?{}:{handle:n}}]},confidentialHandles:{all:[`zama.confidentialHandles`],tokens:(e,t)=>[`zama.confidentialHandles`,{tokenAddresses:c(e),...t?{owner:(0,r.getAddress)(t)}:{}}]},confidentialBalances:{all:[`zama.confidentialBalances`],tokens:(e,t,n)=>[`zama.confidentialBalances`,{tokenAddresses:c(e),...t?{owner:(0,r.getAddress)(t)}:{},...n===void 0?{}:{handles:n}}]},tokenMetadata:{all:[`zama.tokenMetadata`],token:e=>[`zama.tokenMetadata`,{tokenAddress:(0,r.getAddress)(e)}]},isConfidential:{all:[`zama.isConfidential`],token:e=>[`zama.isConfidential`,{tokenAddress:(0,r.getAddress)(e)}]},isWrapper:{all:[`zama.isWrapper`],token:e=>[`zama.isWrapper`,{tokenAddress:(0,r.getAddress)(e)}]},wrapperDiscovery:{all:[`zama.wrapperDiscovery`],token:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.wrapperDiscovery`,{...r?{tokenAddress:r}:{},...i?{erc20Address:i}:{},...a?{registryAddress:a}:{}}]}},underlyingAllowance:{all:[`zama.underlyingAllowance`],token:e=>[`zama.underlyingAllowance`,{tokenAddress:(0,r.getAddress)(e)}],scope:(e,t,n)=>[`zama.underlyingAllowance`,{tokenAddress:(0,r.getAddress)(e),...t?{owner:(0,r.getAddress)(t)}:{},...n?{wrapperAddress:(0,r.getAddress)(n)}:{}}]},confidentialIsApproved:{all:[`zama.confidentialIsApproved`],token:e=>{let t=l(e);return[`zama.confidentialIsApproved`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.confidentialIsApproved`,{...r?{tokenAddress:r}:{},...i?{holder:i}:{},...a?{spender:a}:{}}]}},totalSupply:{all:[`zama.totalSupply`],token:e=>[`zama.totalSupply`,{tokenAddress:(0,r.getAddress)(e)}]},activityFeed:{all:[`zama.activityFeed`],token:e=>[`zama.activityFeed`,{tokenAddress:(0,r.getAddress)(e)}],scope:(e,t,n,i)=>[`zama.activityFeed`,{tokenAddress:(0,r.getAddress)(e),...t?{userAddress:(0,r.getAddress)(t)}:{},...n?{logsKey:n}:{},...i===void 0?{}:{decrypt:i}}]},fees:{all:[`zama.fees`],shieldFee:(e,t,n,i)=>[`zama.fees`,{type:`shield`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{},...t===void 0?{}:{amount:t},...n?{from:(0,r.getAddress)(n)}:{},...i?{to:(0,r.getAddress)(i)}:{}}],unshieldFee:(e,t,n,i)=>[`zama.fees`,{type:`unshield`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{},...t===void 0?{}:{amount:t},...n?{from:(0,r.getAddress)(n)}:{},...i?{to:(0,r.getAddress)(i)}:{}}],batchTransferFee:e=>[`zama.fees`,{type:`batchTransfer`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{}}],feeRecipient:e=>[`zama.fees`,{type:`feeRecipient`,...e?{feeManagerAddress:(0,r.getAddress)(e)}:{}}]},isAllowed:{all:[`zama.isAllowed`],scope:e=>[`zama.isAllowed`,{account:(0,r.getAddress)(e)}]},publicKey:{all:[`zama.publicKey`]},publicParams:{all:[`zama.publicParams`],bits:e=>[`zama.publicParams`,{bits:e}]},delegationStatus:{all:[`zama.delegationStatus`],token:e=>{let t=l(e);return[`zama.delegationStatus`,t?{tokenAddress:t}:{}]},scope:(e,t,n)=>{let r=l(e),i=l(t),a=l(n);return[`zama.delegationStatus`,{...r?{tokenAddress:r}:{},...i?{delegatorAddress:i}:{},...a?{delegateAddress:a}:{}}]}},decryption:{all:[`zama.decryption`],handle:(e,t)=>[`zama.decryption`,{handle:e,...t===void 0?{}:{contractAddress:(0,r.getAddress)(t)}}]},wrappersRegistry:{all:[`zama.wrappersRegistry`],chainId:()=>[`zama.wrappersRegistry`,{type:`chainId`}],tokenPairs:e=>[`zama.wrappersRegistry`,{type:`tokenPairs`,registryAddress:(0,r.getAddress)(e)}],confidentialTokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`confidentialTokenAddress`,registryAddress:(0,r.getAddress)(e),tokenAddress:(0,r.getAddress)(t)}],tokenAddress:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenAddress`,registryAddress:(0,r.getAddress)(e),confidentialTokenAddress:(0,r.getAddress)(t)}],tokenPairsLength:e=>[`zama.wrappersRegistry`,{type:`tokenPairsLength`,registryAddress:(0,r.getAddress)(e)}],tokenPairsSlice:(e,t,n)=>[`zama.wrappersRegistry`,{type:`tokenPairsSlice`,registryAddress:(0,r.getAddress)(e),fromIndex:t,toIndex:n}],tokenPair:(e,t)=>[`zama.wrappersRegistry`,{type:`tokenPair`,registryAddress:(0,r.getAddress)(e),index:t}],isConfidentialTokenValid:(e,t)=>[`zama.wrappersRegistry`,{type:`isConfidentialTokenValid`,registryAddress:(0,r.getAddress)(e),confidentialTokenAddress:(0,r.getAddress)(t)}],listPairs:(e,t,n,i)=>[`zama.wrappersRegistry`,{type:`listPairs`,registryAddress:(0,r.getAddress)(e),page:t,pageSize:n,metadata:i}]}};function d(e,t){e.invalidateQueries({queryKey:u.underlyingAllowance.token(t)})}function f(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function p(e,t){e.invalidateQueries({queryKey:u.confidentialHandle.token(t)}),e.invalidateQueries({queryKey:u.confidentialHandles.all}),e.invalidateQueries({queryKey:u.confidentialBalance.token(t)}),e.invalidateQueries({queryKey:u.confidentialBalances.all})}function m(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function h(e,t){p(e,t),d(e,t),y(e),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function g(e,t){p(e,t),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function _(e,t){d(e,t)}function v(e,t){e.invalidateQueries({queryKey:u.confidentialIsApproved.token(t)}),e.invalidateQueries({queryKey:u.activityFeed.token(t)})}function ee(e){return Array.isArray(e.queryKey)&&typeof e.queryKey[0]==`string`?e.queryKey[0].startsWith(`zama.`):!1}function te(e){return Array.isArray(e.queryKey)&&e.queryKey.some(e=>typeof e!=`object`||!e||!(`functionName`in e)?!1:e.functionName===`balanceOf`)}function y(e){e.invalidateQueries({predicate:te})}function b(e){e.removeQueries({queryKey:u.signerAddress.all}),e.removeQueries({queryKey:u.decryption.all}),e.invalidateQueries({predicate:ee}),y(e)}const x=new WeakMap;let S=1;function C(e){let t=x.get(e);if(t!==void 0)return t;let n=S++;return x.set(e,n),n}function w(e,t){return{...o(t?.query??{}),queryKey:u.signerAddress.scope(C(e)),queryFn:async()=>e.getAddress(),staleTime:3e4,enabled:t?.query?.enabled!==!1}}function T(e,n,r){let i=u.tokenMetadata.token(n);return{...o(r?.query??{}),queryKey:i,queryFn:async n=>{let[,{tokenAddress:r}]=n.queryKey,[i,a,o]=await Promise.all([e.readContract(t.G(r)),e.readContract(t.K(r)),e.readContract(t.U(r))]);return{name:i,symbol:a,decimals:o}},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function E(e,t,r){let i=u.isConfidential.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.u(r))},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function D(e,t,r){let i=u.isWrapper.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.d(r))},staleTime:1/0,enabled:r?.query?.enabled!==!1}}function O(e,t,r){let i=u.totalSupply.token(t);return{...o(r?.query??{}),queryKey:i,queryFn:async t=>{let[,{tokenAddress:r}]=t.queryKey;return e.readContract(n.D(r))},staleTime:3e4,enabled:r?.query?.enabled!==!1}}function k(e,t){let n=u.wrapperDiscovery.token(t.tokenAddress,t.erc20Address,t.registryAddress);return{...o(t.query??{}),queryKey:n,queryFn:async()=>{if(!t.erc20Address)throw Error(`erc20Address is required for wrapper discovery query`);let n=await e.getConfidentialToken(t.erc20Address);return n?n.confidentialTokenAddress:null},staleTime:1/0,enabled:!!(t.tokenAddress&&t.erc20Address&&t.registryAddress)&&t.query?.enabled!==!1}}function A(e,r,i){let a=i.owner,s=i.wrapperAddress,c=i.query?.enabled!==!1,l=u.underlyingAllowance.scope(r,a,s);return{...o(i.query??{}),queryKey:l,queryFn:async r=>{let[,{owner:i,wrapperAddress:a}]=r.queryKey;if(!i)throw Error(`owner is required`);if(!a)throw Error(`wrapperAddress is required`);let o=await e.readContract(n.m(a));return e.readContract(t.B(o,i,a))},staleTime:3e4,enabled:!!(a&&s)&&c}}function j(e,t,r){let i=r.holder,a=r.spender,s=r.query?.enabled!==!1,c=u.confidentialIsApproved.scope(t,i,a);return{...o(r.query??{}),queryKey:c,queryFn:async t=>{let[,{tokenAddress:r,holder:i,spender:a}]=t.queryKey;if(!r)throw Error(`tokenAddress is required`);if(!i)throw Error(`holder is required`);if(!a)throw Error(`spender is required`);return e.readContract(n.C(r,i,a))},staleTime:3e4,enabled:!!(t&&i&&a)&&s}}function M(e){return e===void 0?void 0:BigInt(e)}function N(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,s=n.to,c=n.query?.enabled!==!1,l=u.fees.shieldFee(i,r,a,s);return{...o(n.query??{}),queryKey:l,queryFn:async n=>{let[,r]=n.queryKey,i=M(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t.z(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&s)&&c}}function P(e,n){let r=n.amount?.toString(),i=n.feeManagerAddress,a=n.from,s=n.to,c=n.query?.enabled!==!1,l=u.fees.unshieldFee(i,r,a,s);return{...o(n.query??{}),queryKey:l,queryFn:async n=>{let[,r]=n.queryKey,i=M(r.amount);if(!r.feeManagerAddress)throw Error(`feeManagerAddress is required`);if(i===void 0)throw Error(`amount is required`);if(!r.from)throw Error(`from is required`);if(!r.to)throw Error(`to is required`);return e.readContract(t.R(r.feeManagerAddress,i,r.from,r.to))},staleTime:3e4,enabled:!!(i&&r!==void 0&&a&&s)&&c}}function F(e,n,r){let i=r?.query?.enabled!==!1,a=u.fees.batchTransferFee(n);return{...o(r?.query??{}),queryKey:a,queryFn:async n=>{let[,{feeManagerAddress:r}]=n.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(t.I(r))},staleTime:3e4,enabled:!!n&&i}}function I(e,n,r){let i=r?.query?.enabled!==!1,a=u.fees.feeRecipient(n);return{...o(r?.query??{}),queryKey:a,queryFn:async n=>{let[,{feeManagerAddress:r}]=n.queryKey;if(!r)throw Error(`feeManagerAddress is required`);return e.readContract(t.L(r))},staleTime:3e4,enabled:!!n&&i}}function L(e,t){let n=u.publicKey.all;return{...o(t?.query??{}),queryKey:n,queryFn:async()=>e.relayer.getPublicKey(),staleTime:1/0,enabled:t?.query?.enabled!==!1}}function R(e,t,n){let r=u.publicParams.bits(t);return{...o(n?.query??{}),queryKey:r,queryFn:async t=>{let[,{bits:n}]=t.queryKey;return e.relayer.getPublicParams(n)},staleTime:1/0,enabled:n?.query?.enabled!==!1}}function z(e,t,r){let i=r?.owner,a=r?.query?.enabled!==!1,s=u.confidentialHandle.owner(t,i);return{...o(r?.query??{}),queryKey:s,queryFn:async t=>{let[,{tokenAddress:r,owner:i}]=t.queryKey;if(!i)throw Error(`owner is required`);return await e.readContract(n._(r,i))},enabled:!!i&&a,refetchInterval:r?.pollingInterval??1e4}}function B(e,t){let n=t?.owner,r=t?.handle,i=t?.query?.enabled!==!1,a=u.confidentialBalance.owner(e.address,n,r);return{...o(t?.query??{}),queryKey:a,queryFn:async t=>{let[,{owner:n,handle:r}]=t.queryKey;if(!n)throw Error(`owner is required`);if(!r)throw Error(`handle is required`);return e.decryptBalance(r,n)},enabled:!!(n&&r)&&i,staleTime:1/0}}function V(e,t,r){let i=r?.owner,a=r?.query?.enabled!==!1,s=u.confidentialHandles.tokens(t,i);return{...o(r?.query??{}),queryKey:s,queryFn:async t=>{let[,{tokenAddresses:r,owner:i}]=t.queryKey;if(!i)throw Error(`owner is required`);return Promise.all(r.map(async t=>await e.readContract(n._(t,i))))},enabled:!!(i&&t.length>0)&&a,refetchInterval:r?.pollingInterval??1e4}}function H(n,r){let i=n.map(e=>e.address),a=r?.resultAddresses??i,s=r?.owner,c=r?.handles,l=r?.query?.enabled!==!1,d=Array.isArray(c)&&c.length===n.length&&c.every(e=>!!e),f=u.confidentialBalances.tokens(i,s,c);return{...o(r?.query??{}),queryKey:f,queryFn:async i=>{let[,{owner:o,handles:s}]=i.queryKey;if(!o)throw Error(`owner is required`);if(!s)throw Error(`handles are required`);let c=new Map,l=await t.w.batchDecryptBalances(n,{owner:o,handles:s,maxConcurrency:r?.maxConcurrency,onError:(e,t)=>(c.set(t,e),0n)}),u=new Map,d=new Map;for(let e=0;e<n.length;e++){let t=n[e].address,r=a[e],i=c.get(t);if(i)d.set(r,i);else{let e=l.get(t);e!==void 0&&u.set(r,e)}}if(d.size===n.length&&n.length>0)throw d.values().next().value??new e.r(`All token balance decryptions failed`);return{balances:u,errors:d,isPartialError:d.size>0}},enabled:a.length===n.length&&!!s&&n.length>0&&d&&l,staleTime:1/0}}function U(e){if(e)return s([`zama.activityFeed.logs`,e.map(e=>({topics:[...e.topics],data:e.data,transactionHash:e.transactionHash,blockNumber:e.blockNumber,logIndex:e.logIndex}))])}function W(e,n,r){let i=n.userAddress,a=n.decrypt??!0,s=n.logs,c=n.logsKey??U(s),l=r?.query?.enabled!==!1,d=u.activityFeed.scope(e.address,i,c,a);return{...o(r?.query??{}),queryKey:d,queryFn:async n=>{let[,{userAddress:r,decrypt:i}]=n.queryKey;if(!r)throw Error(`userAddress is required`);if(!s)throw Error(`logs are required`);let a=t.r(s,r);if(!i)return t.i(a);let o=t.n(a);return o.length===0?t.i(a):t.i(t.t(a,await e.decryptHandles(o,r)))},staleTime:1/0,enabled:!!(i&&s)&&l}}const G=86400*1e3;function K(e,t){let i=!!t.registryAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairs(t.registryAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r}]=t.queryKey;return e.readContract(n.i(r))},staleTime:G,enabled:i}}function q(e,t){let i=!!t.registryAddress&&!!t.tokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.confidentialTokenAddress(t.registryAddress??r.zeroAddress,t.tokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,tokenAddress:i}]=t.queryKey;return e.readContract(n.t(r,i))},staleTime:G,enabled:i}}function J(e,t){let i=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenAddress(t.registryAddress??r.zeroAddress,t.confidentialTokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,confidentialTokenAddress:i}]=t.queryKey;return e.readContract(n.n(r,i))},staleTime:G,enabled:i}}function Y(e,t){let i=!!t.registryAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairsLength(t.registryAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r}]=t.queryKey;return e.readContract(n.a(r))},staleTime:G,enabled:i}}function X(e,t){let i=!!t.registryAddress&&t.fromIndex!==void 0&&t.toIndex!==void 0&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPairsSlice(t.registryAddress??r.zeroAddress,String(t.fromIndex??0n),String(t.toIndex??0n));return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,fromIndex:i,toIndex:a}]=t.queryKey;return e.readContract(n.o(r,BigInt(i),BigInt(a)))},staleTime:G,enabled:i}}function Z(e,t){let i=!!t.registryAddress&&t.index!==void 0&&t.query?.enabled!==!1,a=u.wrappersRegistry.tokenPair(t.registryAddress??r.zeroAddress,String(t.index??0n));return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,index:i}]=t.queryKey;return e.readContract(n.r(r,BigInt(i)))},staleTime:G,enabled:i}}function Q(e,t){let i=!!t.registryAddress&&!!t.confidentialTokenAddress&&t.query?.enabled!==!1,a=u.wrappersRegistry.isConfidentialTokenValid(t.registryAddress??r.zeroAddress,t.confidentialTokenAddress??r.zeroAddress);return{...o(t.query??{}),queryKey:a,queryFn:async t=>{let[,{registryAddress:r,confidentialTokenAddress:i}]=t.queryKey;return e.readContract(n.s(r,i))},staleTime:G,enabled:i}}function ne(e,t){let n=t.page??1,i=t.pageSize??100,a=t.metadata??!1,s=!!t.registryAddress&&t.query?.enabled!==!1,c=u.wrappersRegistry.listPairs(t.registryAddress??r.zeroAddress,n,i,a);return{...o(t.query??{}),queryKey:c,queryFn:async()=>e.listPairs({page:n,pageSize:i,metadata:a}),staleTime:e.ttlMs,enabled:s}}function re(e){return{mutationKey:[`zama.shield`,e.address],mutationFn:async({amount:t,fees:n,approvalStrategy:r,to:i,callbacks:a})=>e.shield(t,{fees:n,approvalStrategy:r,to:i,callbacks:a})}}function ie(e){return{mutationKey:[`zama.shieldETH`,e.address],mutationFn:async({amount:t,value:n})=>e.shieldETH(t,n)}}function ae(e){return{mutationKey:[`zama.confidentialTransfer`,e.address],mutationFn:async({to:t,amount:n,callbacks:r})=>e.confidentialTransfer(t,n,r)}}function oe(e){return{mutationKey:[`zama.confidentialTransferFrom`,e.address],mutationFn:async({from:t,to:n,amount:r,callbacks:i})=>e.confidentialTransferFrom(t,n,r,i)}}function se(e){return{mutationKey:[`zama.confidentialApprove`,e.address],mutationFn:async({spender:t,until:n})=>e.approve(t,n)}}function ce(e){return{mutationKey:[`zama.approveUnderlying`,e.address],mutationFn:async({amount:t})=>e.approveUnderlying(t)}}function le(e){return{mutationKey:[`zama.unshield`,e.address],mutationFn:async({amount:t,callbacks:n})=>e.unshield(t,n)}}function ue(e){return{mutationKey:[`zama.unshieldAll`,e.address],mutationFn:async t=>e.unshieldAll(t?.callbacks)}}function de(e){return{mutationKey:[`zama.resumeUnshield`,e.address],mutationFn:async({unwrapTxHash:t,callbacks:n})=>e.resumeUnshield(t,n)}}function fe(e){return{mutationKey:[`zama.unwrap`,e.address],mutationFn:async({amount:t})=>e.unwrap(t)}}function pe(e){return{mutationKey:[`zama.unwrapAll`,e.address],mutationFn:async()=>e.unwrapAll()}}function me(e){return{mutationKey:[`zama.finalizeUnwrap`,e.address],mutationFn:async({burnAmountHandle:t})=>e.finalizeUnwrap(t)}}function he(e){return{mutationKey:[`zama.encrypt`],mutationFn:async t=>e.relayer.encrypt(t)}}function ge(e){return{mutationKey:[`zama.generateKeypair`],mutationFn:async()=>e.relayer.generateKeypair()}}function _e(e){return{mutationKey:[`zama.createEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,startTimestamp:r,durationDays:i})=>e.relayer.createEIP712(t,n,r,i)}}function ve(e){return{mutationKey:[`zama.createDelegatedUserDecryptEIP712`],mutationFn:async({publicKey:t,contractAddresses:n,delegatorAddress:r,startTimestamp:i,durationDays:a})=>e.relayer.createDelegatedUserDecryptEIP712(t,n,r,i,a)}}function ye(e){return{mutationKey:[`zama.delegatedUserDecrypt`],mutationFn:async t=>e.relayer.delegatedUserDecrypt(t)}}function be(e){return{mutationKey:[`zama.publicDecrypt`],mutationFn:async t=>e.relayer.publicDecrypt(t),onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e.clearValues))r.client.setQueryData(u.decryption.handle(t),n)}}}function $(e){return{mutationKey:[`zama.requestZKProofVerification`],mutationFn:async t=>e.relayer.requestZKProofVerification(t)}}function xe(e){return{mutationKey:[`zama.allow`],mutationFn:t=>e.allow(...t)}}function Se(e,t){return{...o(t.query??{}),queryKey:u.isAllowed.scope(t.account),queryFn:()=>e.isAllowed(),staleTime:3e4,enabled:t.query?.enabled!==!1}}function Ce(e){return{mutationKey:[`zama.revoke`],mutationFn:t=>e.revoke(...t)}}function we(e){return{mutationKey:[`zama.revokeSession`],mutationFn:()=>e.revokeSession()}}function Te(e){return{mutationKey:[`zama.delegateDecryption`,e.address],mutationFn:async({delegateAddress:t,expirationDate:n})=>e.delegateDecryption({delegateAddress:t,expirationDate:n})}}function Ee(e,t){return{mutationKey:[`zama.userDecrypt`],mutationFn:async({handles:n})=>{let r=[...new Set(n.map(e=>e.contractAddress))],i=await e.credentials.allow(...r);t?.onCredentialsReady?.();let a=await e.signer.getAddress(),o={},s=new Map;for(let e of n){let t=s.get(e.contractAddress)??[];t.push(e.handle),s.set(e.contractAddress,t)}for(let[t,n]of s){let r=await e.relayer.userDecrypt({handles:n,contractAddress:t,signedContractAddresses:i.contractAddresses,privateKey:i.privateKey,publicKey:i.publicKey,signature:i.signature,signerAddress:a,startTimestamp:i.startTimestamp,durationDays:i.durationDays});Object.assign(o,r)}return t?.onDecrypted?.(o),o},onSuccess:(e,t,n,r)=>{for(let[t,n]of Object.entries(e))r.client.setQueryData(u.decryption.handle(t),n)}}}function De(e){return{mutationKey:[`zama.decryptBalanceAs`,e.address],mutationFn:async({delegatorAddress:t,owner:n})=>e.decryptBalanceAs({delegatorAddress:t,owner:n})}}function Oe(e){return{mutationKey:[`zama.batchDecryptBalancesAs`,...e.map(e=>e.address)],mutationFn:async n=>t.w.batchDecryptBalancesAs(e,n)}}function ke(e){return{mutationKey:[`zama.revokeDelegation`,e.address],mutationFn:async({delegateAddress:t})=>e.revokeDelegation({delegateAddress:t})}}function Ae(e,n){return{...o(n.query??{}),queryKey:u.delegationStatus.scope(n.tokenAddress,n.delegatorAddress,n.delegateAddress),queryFn:async n=>{let[,{tokenAddress:r,delegatorAddress:i,delegateAddress:a}]=n.queryKey;t.q(r,`delegationStatusQueryOptions: tokenAddress`),t.q(i,`delegationStatusQueryOptions: delegatorAddress`),t.q(a,`delegationStatusQueryOptions: delegateAddress`);let o=await e.relayer.getAclAddress(),s=await e.signer.readContract(t.N(o,i,a,r)),c;return c=s===0n?!1:s===t.j?!0:s>await e.signer.getBlockTimestamp(),{isDelegated:c,expiryTimestamp:s}},enabled:!!(n.tokenAddress&&n.delegatorAddress&&n.delegateAddress)&&n.query?.enabled!==!1}}exports.ZERO_HANDLE=`0x0000000000000000000000000000000000000000000000000000000000000000`,exports.ZamaSDKEvents=t.O,exports.activityFeedQueryOptions=W,exports.allowMutationOptions=xe,exports.approveUnderlyingMutationOptions=ce,exports.batchDecryptBalancesAsMutationOptions=Oe,exports.batchTransferFeeQueryOptions=F,exports.confidentialApproveMutationOptions=se,exports.confidentialBalanceQueryOptions=B,exports.confidentialBalancesQueryOptions=H,exports.confidentialHandleQueryOptions=z,exports.confidentialHandlesQueryOptions=V,exports.confidentialIsApprovedQueryOptions=j,exports.confidentialTokenAddressQueryOptions=q,exports.confidentialTransferFromMutationOptions=oe,exports.confidentialTransferMutationOptions=ae,exports.createDelegatedUserDecryptEIP712MutationOptions=ve,exports.createEIP712MutationOptions=_e,exports.decryptBalanceAsMutationOptions=De,exports.delegateDecryptionMutationOptions=Te,exports.delegatedUserDecryptMutationOptions=ye,exports.delegationStatusQueryOptions=Ae,exports.deriveActivityFeedLogsKey=U,exports.encryptMutationOptions=he,exports.feeRecipientQueryOptions=I,exports.filterQueryOptions=o,exports.finalizeUnwrapMutationOptions=me,exports.generateKeypairMutationOptions=ge,exports.hashFn=s,exports.invalidateAfterApprove=v,exports.invalidateAfterApproveUnderlying=_,exports.invalidateAfterShield=m,exports.invalidateAfterTransfer=g,exports.invalidateAfterUnshield=h,exports.invalidateAfterUnwrap=f,exports.invalidateBalanceQueries=p,exports.invalidateWagmiBalanceQueries=y,exports.invalidateWalletLifecycleQueries=b,exports.isAllowedQueryOptions=Se,exports.isConfidentialQueryOptions=E,exports.isConfidentialTokenValidQueryOptions=Q,exports.isWrapperQueryOptions=D,exports.listPairsQueryOptions=ne,exports.publicDecryptMutationOptions=be,exports.publicKeyQueryOptions=L,exports.publicParamsQueryOptions=R,exports.requestZKProofVerificationMutationOptions=$,exports.resumeUnshieldMutationOptions=de,exports.revokeDelegationMutationOptions=ke,exports.revokeMutationOptions=Ce,exports.revokeSessionMutationOptions=we,exports.shieldETHMutationOptions=ie,exports.shieldFeeQueryOptions=N,exports.shieldMutationOptions=re,exports.signerAddressQueryOptions=w,exports.tokenAddressQueryOptions=J,exports.tokenMetadataQueryOptions=T,exports.tokenPairQueryOptions=Z,exports.tokenPairsLengthQueryOptions=Y,exports.tokenPairsQueryOptions=K,exports.tokenPairsSliceQueryOptions=X,exports.totalSupplyQueryOptions=O,exports.underlyingAllowanceQueryOptions=A,exports.unshieldAllMutationOptions=ue,exports.unshieldFeeQueryOptions=P,exports.unshieldMutationOptions=le,exports.unwrapAllMutationOptions=pe,exports.unwrapMutationOptions=fe,exports.userDecryptMutationOptions=Ee,exports.wrapperDiscoveryQueryOptions=k,exports.zamaQueryKeys=u;
2
2
  //# sourceMappingURL=index.cjs.map
@@ -1,2 +1,2 @@
1
- const e={SigningRejected:`SIGNING_REJECTED`,SigningFailed:`SIGNING_FAILED`,EncryptionFailed:`ENCRYPTION_FAILED`,DecryptionFailed:`DECRYPTION_FAILED`,ApprovalFailed:`APPROVAL_FAILED`,TransactionReverted:`TRANSACTION_REVERTED`,KeypairExpired:`KEYPAIR_EXPIRED`,InvalidKeypair:`INVALID_KEYPAIR`,NoCiphertext:`NO_CIPHERTEXT`,RelayerRequestFailed:`RELAYER_REQUEST_FAILED`,Configuration:`CONFIGURATION`,DelegationSelfNotAllowed:`DELEGATION_SELF_NOT_ALLOWED`,DelegationCooldown:`DELEGATION_COOLDOWN`,DelegationNotFound:`DELEGATION_NOT_FOUND`,DelegationExpired:`DELEGATION_EXPIRED`,DelegationNotPropagated:`DELEGATION_NOT_PROPAGATED`};var t=class extends Error{code;constructor(e,t,n){super(t,n),Object.setPrototypeOf(this,new.target.prototype),this.name=`ZamaError`,this.code=e}};function n(e,n){if(e instanceof t){let t=n[e.code];if(t)return t(e)}return n._?.(e)}var r=class extends t{constructor(t,n){super(e.EncryptionFailed,t,n),this.name=`EncryptionFailedError`}},i=class extends t{constructor(t,n){super(e.DecryptionFailed,t,n),this.name=`DecryptionFailedError`}},a=class extends t{statusCode;constructor(t,n,r){super(e.RelayerRequestFailed,t,r),this.name=`RelayerRequestFailedError`,this.statusCode=n}},o=class extends t{constructor(t,n){super(e.Configuration,t,n),this.name=`ConfigurationError`}};Object.defineProperty(exports,`a`,{enumerable:!0,get:function(){return t}}),Object.defineProperty(exports,`i`,{enumerable:!0,get:function(){return r}}),Object.defineProperty(exports,`n`,{enumerable:!0,get:function(){return a}}),Object.defineProperty(exports,`o`,{enumerable:!0,get:function(){return e}}),Object.defineProperty(exports,`r`,{enumerable:!0,get:function(){return i}}),Object.defineProperty(exports,`s`,{enumerable:!0,get:function(){return n}}),Object.defineProperty(exports,`t`,{enumerable:!0,get:function(){return o}});
1
+ const e={SigningRejected:`SIGNING_REJECTED`,SigningFailed:`SIGNING_FAILED`,EncryptionFailed:`ENCRYPTION_FAILED`,DecryptionFailed:`DECRYPTION_FAILED`,ApprovalFailed:`APPROVAL_FAILED`,TransactionReverted:`TRANSACTION_REVERTED`,KeypairExpired:`KEYPAIR_EXPIRED`,InvalidKeypair:`INVALID_KEYPAIR`,NoCiphertext:`NO_CIPHERTEXT`,RelayerRequestFailed:`RELAYER_REQUEST_FAILED`,Configuration:`CONFIGURATION`,DelegationSelfNotAllowed:`DELEGATION_SELF_NOT_ALLOWED`,DelegationCooldown:`DELEGATION_COOLDOWN`,DelegationNotFound:`DELEGATION_NOT_FOUND`,DelegationExpired:`DELEGATION_EXPIRED`,DelegationExpiryUnchanged:`DELEGATION_EXPIRY_UNCHANGED`,DelegationDelegateEqualsContract:`DELEGATION_DELEGATE_EQUALS_CONTRACT`,DelegationContractIsSelf:`DELEGATION_CONTRACT_IS_SELF`,AclPaused:`ACL_PAUSED`,DelegationExpirationTooSoon:`DELEGATION_EXPIRATION_TOO_SOON`,DelegationNotPropagated:`DELEGATION_NOT_PROPAGATED`};var t=class extends Error{code;constructor(e,t,n){super(t,n),Object.setPrototypeOf(this,new.target.prototype),this.name=`ZamaError`,this.code=e}};function n(e,n){if(e instanceof t){let t=n[e.code];if(t)return t(e)}return n._?.(e)}var r=class extends t{constructor(t,n){super(e.EncryptionFailed,t,n),this.name=`EncryptionFailedError`}},i=class extends t{constructor(t,n){super(e.DecryptionFailed,t,n),this.name=`DecryptionFailedError`}},a=class extends t{statusCode;constructor(t,n,r){super(e.RelayerRequestFailed,t,r),this.name=`RelayerRequestFailedError`,this.statusCode=n}},o=class extends t{constructor(t,n){super(e.Configuration,t,n),this.name=`ConfigurationError`}};Object.defineProperty(exports,`a`,{enumerable:!0,get:function(){return t}}),Object.defineProperty(exports,`i`,{enumerable:!0,get:function(){return r}}),Object.defineProperty(exports,`n`,{enumerable:!0,get:function(){return a}}),Object.defineProperty(exports,`o`,{enumerable:!0,get:function(){return e}}),Object.defineProperty(exports,`r`,{enumerable:!0,get:function(){return i}}),Object.defineProperty(exports,`s`,{enumerable:!0,get:function(){return n}}),Object.defineProperty(exports,`t`,{enumerable:!0,get:function(){return o}});
2
2
  //# sourceMappingURL=relayer.cjs.map
@@ -1 +1 @@
1
- {"version":3,"file":"relayer.cjs","names":[],"sources":["../../src/errors/base.ts","../../src/errors/encryption.ts","../../src/errors/relayer.ts"],"sourcesContent":["/**\n * Typed error codes thrown by the SDK.\n * Use `error.code` or `instanceof` to programmatically handle specific failure modes.\n *\n * @example\n * ```ts\n * try {\n * await token.confidentialTransfer(\"0xTo\", 100n);\n * } catch (e) {\n * if (e instanceof SigningRejectedError) {\n * // User rejected the wallet signature\n * }\n * }\n * ```\n */\nexport const ZamaErrorCode = {\n /** User rejected the wallet signature prompt. */\n SigningRejected: \"SIGNING_REJECTED\",\n /** Wallet signature failed for a reason other than rejection. */\n SigningFailed: \"SIGNING_FAILED\",\n /** FHE encryption failed. */\n EncryptionFailed: \"ENCRYPTION_FAILED\",\n /** FHE decryption failed. */\n DecryptionFailed: \"DECRYPTION_FAILED\",\n /** ERC-20 approval transaction failed. */\n ApprovalFailed: \"APPROVAL_FAILED\",\n /** On-chain transaction reverted. */\n TransactionReverted: \"TRANSACTION_REVERTED\",\n /** FHE keypair has expired and needs regeneration. */\n KeypairExpired: \"KEYPAIR_EXPIRED\",\n /** Relayer rejected FHE keypair (stale, expired, or malformed). */\n InvalidKeypair: \"INVALID_KEYPAIR\",\n /** No FHE ciphertext exists for this account (never shielded). */\n NoCiphertext: \"NO_CIPHERTEXT\",\n /** Relayer HTTP request failed. */\n RelayerRequestFailed: \"RELAYER_REQUEST_FAILED\",\n /** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\n Configuration: \"CONFIGURATION\",\n /** Delegation cannot target self (delegate === msg.sender). */\n DelegationSelfNotAllowed: \"DELEGATION_SELF_NOT_ALLOWED\",\n /** Only one delegate/revoke per (delegator, delegate, contract) per block. */\n DelegationCooldown: \"DELEGATION_COOLDOWN\",\n /** No active delegation found for this (delegator, delegate, contract) tuple. */\n DelegationNotFound: \"DELEGATION_NOT_FOUND\",\n /** The delegation has expired. */\n DelegationExpired: \"DELEGATION_EXPIRED\",\n /** Delegation exists on-chain but hasn't propagated to the gateway yet. */\n DelegationNotPropagated: \"DELEGATION_NOT_PROPAGATED\",\n} as const;\n\n/** Union of all {@link ZamaErrorCode} string values. */\nexport type ZamaErrorCode = (typeof ZamaErrorCode)[keyof typeof ZamaErrorCode];\n\n/**\n * Base error thrown by all SDK operations.\n * Carries a {@link ZamaErrorCode} for programmatic error handling.\n * Prefer catching specific subclasses (e.g. {@link EncryptionFailedError}).\n */\nexport class ZamaError extends Error {\n /** Machine-readable error code. */\n readonly code: ZamaErrorCode;\n\n constructor(code: ZamaErrorCode, message: string, options?: ErrorOptions) {\n super(message, options);\n Object.setPrototypeOf(this, new.target.prototype);\n this.name = \"ZamaError\";\n this.code = code;\n }\n}\n\n/**\n * Pattern-match on a {@link ZamaError} by its error code.\n * Falls through to the `_` wildcard handler if no specific handler matches.\n * Returns `undefined` if the error is not a `ZamaError` and no `_` handler is provided.\n *\n * @example\n * ```ts\n * matchZamaError(error, {\n * SIGNING_REJECTED: () => toast(\"Please approve in wallet\"),\n * TRANSACTION_REVERTED: (e) => toast(`Tx failed: ${e.message}`),\n * _: () => toast(\"Unknown error\"),\n * });\n * ```\n */\nexport function matchZamaError<R>(\n error: unknown,\n handlers: Partial<Record<ZamaErrorCode, (error: ZamaError) => R>> & {\n _?: (error: unknown) => R;\n },\n): R | undefined {\n if (error instanceof ZamaError) {\n const handler = handlers[error.code];\n if (handler) {\n return handler(error);\n }\n }\n return handlers._?.(error);\n}\n","import { ZamaError, ZamaErrorCode } from \"./base\";\n\n/** FHE encryption failed. */\nexport class EncryptionFailedError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.EncryptionFailed, message, options);\n this.name = \"EncryptionFailedError\";\n }\n}\n\n/** FHE decryption failed. */\nexport class DecryptionFailedError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.DecryptionFailed, message, options);\n this.name = \"DecryptionFailedError\";\n }\n}\n","import { ZamaError, ZamaErrorCode } from \"./base\";\n\n/** Relayer HTTP request failed. */\nexport class RelayerRequestFailedError extends ZamaError {\n /** HTTP status code from the relayer, if available. */\n readonly statusCode: number | undefined;\n\n constructor(message: string, statusCode?: number, options?: ErrorOptions) {\n super(ZamaErrorCode.RelayerRequestFailed, message, options);\n this.name = \"RelayerRequestFailedError\";\n this.statusCode = statusCode;\n }\n}\n\n/** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\nexport class ConfigurationError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.Configuration, message, options);\n this.name = \"ConfigurationError\";\n }\n}\n"],"mappings":"AAeA,MAAa,EAAgB,CAE3B,gBAAiB,mBAEjB,cAAe,iBAEf,iBAAkB,oBAElB,iBAAkB,oBAElB,eAAgB,kBAEhB,oBAAqB,uBAErB,eAAgB,kBAEhB,eAAgB,kBAEhB,aAAc,gBAEd,qBAAsB,yBAEtB,cAAe,gBAEf,yBAA0B,8BAE1B,mBAAoB,sBAEpB,mBAAoB,uBAEpB,kBAAmB,qBAEnB,wBAAyB,4BAC1B,CAUD,IAAa,EAAb,cAA+B,KAAM,CAEnC,KAEA,YAAY,EAAqB,EAAiB,EAAwB,CACxE,MAAM,EAAS,EAAQ,CACvB,OAAO,eAAe,KAAM,IAAI,OAAO,UAAU,CACjD,KAAK,KAAO,YACZ,KAAK,KAAO,IAkBhB,SAAgB,EACd,EACA,EAGe,CACf,GAAI,aAAiB,EAAW,CAC9B,IAAM,EAAU,EAAS,EAAM,MAC/B,GAAI,EACF,OAAO,EAAQ,EAAM,CAGzB,OAAO,EAAS,IAAI,EAAM,CC7F5B,IAAa,EAAb,cAA2C,CAAU,CACnD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,iBAAkB,EAAS,EAAQ,CACvD,KAAK,KAAO,0BAKH,EAAb,cAA2C,CAAU,CACnD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,iBAAkB,EAAS,EAAQ,CACvD,KAAK,KAAO,0BCXH,EAAb,cAA+C,CAAU,CAEvD,WAEA,YAAY,EAAiB,EAAqB,EAAwB,CACxE,MAAM,EAAc,qBAAsB,EAAS,EAAQ,CAC3D,KAAK,KAAO,4BACZ,KAAK,WAAa,IAKT,EAAb,cAAwC,CAAU,CAChD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,cAAe,EAAS,EAAQ,CACpD,KAAK,KAAO"}
1
+ {"version":3,"file":"relayer.cjs","names":[],"sources":["../../src/errors/base.ts","../../src/errors/encryption.ts","../../src/errors/relayer.ts"],"sourcesContent":["/**\n * Typed error codes thrown by the SDK.\n * Use `error.code` or `instanceof` to programmatically handle specific failure modes.\n *\n * @example\n * ```ts\n * try {\n * await token.confidentialTransfer(\"0xTo\", 100n);\n * } catch (e) {\n * if (e instanceof SigningRejectedError) {\n * // User rejected the wallet signature\n * }\n * }\n * ```\n */\nexport const ZamaErrorCode = {\n /** User rejected the wallet signature prompt. */\n SigningRejected: \"SIGNING_REJECTED\",\n /** Wallet signature failed for a reason other than rejection. */\n SigningFailed: \"SIGNING_FAILED\",\n /** FHE encryption failed. */\n EncryptionFailed: \"ENCRYPTION_FAILED\",\n /** FHE decryption failed. */\n DecryptionFailed: \"DECRYPTION_FAILED\",\n /** ERC-20 approval transaction failed. */\n ApprovalFailed: \"APPROVAL_FAILED\",\n /** On-chain transaction reverted. */\n TransactionReverted: \"TRANSACTION_REVERTED\",\n /** FHE keypair has expired and needs regeneration. */\n KeypairExpired: \"KEYPAIR_EXPIRED\",\n /** Relayer rejected FHE keypair (stale, expired, or malformed). */\n InvalidKeypair: \"INVALID_KEYPAIR\",\n /** No FHE ciphertext exists for this account (never shielded). */\n NoCiphertext: \"NO_CIPHERTEXT\",\n /** Relayer HTTP request failed. */\n RelayerRequestFailed: \"RELAYER_REQUEST_FAILED\",\n /** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\n Configuration: \"CONFIGURATION\",\n /** Delegation cannot target self (delegate === msg.sender). */\n DelegationSelfNotAllowed: \"DELEGATION_SELF_NOT_ALLOWED\",\n /** Only one delegate/revoke per (delegator, delegate, contract) per block. */\n DelegationCooldown: \"DELEGATION_COOLDOWN\",\n /** No active delegation found for this (delegator, delegate, contract) tuple. */\n DelegationNotFound: \"DELEGATION_NOT_FOUND\",\n /** The delegation has expired. */\n DelegationExpired: \"DELEGATION_EXPIRED\",\n /** The new expiration date equals the current one — no on-chain change needed. */\n DelegationExpiryUnchanged: \"DELEGATION_EXPIRY_UNCHANGED\",\n /** Delegate address cannot be the contract address. */\n DelegationDelegateEqualsContract: \"DELEGATION_DELEGATE_EQUALS_CONTRACT\",\n /** Contract address cannot be the sender address. */\n DelegationContractIsSelf: \"DELEGATION_CONTRACT_IS_SELF\",\n /** The ACL contract is paused. */\n AclPaused: \"ACL_PAUSED\",\n /** Expiration date is too soon (must be at least 1 hour in the future). */\n DelegationExpirationTooSoon: \"DELEGATION_EXPIRATION_TOO_SOON\",\n /** Delegation exists on-chain but hasn't propagated to the gateway yet. */\n DelegationNotPropagated: \"DELEGATION_NOT_PROPAGATED\",\n} as const;\n\n/** Union of all {@link ZamaErrorCode} string values. */\nexport type ZamaErrorCode = (typeof ZamaErrorCode)[keyof typeof ZamaErrorCode];\n\n/**\n * Base error thrown by all SDK operations.\n * Carries a {@link ZamaErrorCode} for programmatic error handling.\n * Prefer catching specific subclasses (e.g. {@link EncryptionFailedError}).\n */\nexport class ZamaError extends Error {\n /** Machine-readable error code. */\n readonly code: ZamaErrorCode;\n\n constructor(code: ZamaErrorCode, message: string, options?: ErrorOptions) {\n super(message, options);\n Object.setPrototypeOf(this, new.target.prototype);\n this.name = \"ZamaError\";\n this.code = code;\n }\n}\n\n/**\n * Pattern-match on a {@link ZamaError} by its error code.\n * Falls through to the `_` wildcard handler if no specific handler matches.\n * Returns `undefined` if the error is not a `ZamaError` and no `_` handler is provided.\n *\n * @example\n * ```ts\n * matchZamaError(error, {\n * SIGNING_REJECTED: () => toast(\"Please approve in wallet\"),\n * TRANSACTION_REVERTED: (e) => toast(`Tx failed: ${e.message}`),\n * _: () => toast(\"Unknown error\"),\n * });\n * ```\n */\nexport function matchZamaError<R>(\n error: unknown,\n handlers: Partial<Record<ZamaErrorCode, (error: ZamaError) => R>> & {\n _?: (error: unknown) => R;\n },\n): R | undefined {\n if (error instanceof ZamaError) {\n const handler = handlers[error.code];\n if (handler) {\n return handler(error);\n }\n }\n return handlers._?.(error);\n}\n","import { ZamaError, ZamaErrorCode } from \"./base\";\n\n/** FHE encryption failed. */\nexport class EncryptionFailedError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.EncryptionFailed, message, options);\n this.name = \"EncryptionFailedError\";\n }\n}\n\n/** FHE decryption failed. */\nexport class DecryptionFailedError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.DecryptionFailed, message, options);\n this.name = \"DecryptionFailedError\";\n }\n}\n","import { ZamaError, ZamaErrorCode } from \"./base\";\n\n/** Relayer HTTP request failed. */\nexport class RelayerRequestFailedError extends ZamaError {\n /** HTTP status code from the relayer, if available. */\n readonly statusCode: number | undefined;\n\n constructor(message: string, statusCode?: number, options?: ErrorOptions) {\n super(ZamaErrorCode.RelayerRequestFailed, message, options);\n this.name = \"RelayerRequestFailedError\";\n this.statusCode = statusCode;\n }\n}\n\n/** SDK configuration is invalid (e.g. forbidden chain ID, unsupported type). */\nexport class ConfigurationError extends ZamaError {\n constructor(message: string, options?: ErrorOptions) {\n super(ZamaErrorCode.Configuration, message, options);\n this.name = \"ConfigurationError\";\n }\n}\n"],"mappings":"AAeA,MAAa,EAAgB,CAE3B,gBAAiB,mBAEjB,cAAe,iBAEf,iBAAkB,oBAElB,iBAAkB,oBAElB,eAAgB,kBAEhB,oBAAqB,uBAErB,eAAgB,kBAEhB,eAAgB,kBAEhB,aAAc,gBAEd,qBAAsB,yBAEtB,cAAe,gBAEf,yBAA0B,8BAE1B,mBAAoB,sBAEpB,mBAAoB,uBAEpB,kBAAmB,qBAEnB,0BAA2B,8BAE3B,iCAAkC,sCAElC,yBAA0B,8BAE1B,UAAW,aAEX,4BAA6B,iCAE7B,wBAAyB,4BAC1B,CAUD,IAAa,EAAb,cAA+B,KAAM,CAEnC,KAEA,YAAY,EAAqB,EAAiB,EAAwB,CACxE,MAAM,EAAS,EAAQ,CACvB,OAAO,eAAe,KAAM,IAAI,OAAO,UAAU,CACjD,KAAK,KAAO,YACZ,KAAK,KAAO,IAkBhB,SAAgB,EACd,EACA,EAGe,CACf,GAAI,aAAiB,EAAW,CAC9B,IAAM,EAAU,EAAS,EAAM,MAC/B,GAAI,EACF,OAAO,EAAQ,EAAM,CAGzB,OAAO,EAAS,IAAI,EAAM,CCvG5B,IAAa,EAAb,cAA2C,CAAU,CACnD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,iBAAkB,EAAS,EAAQ,CACvD,KAAK,KAAO,0BAKH,EAAb,cAA2C,CAAU,CACnD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,iBAAkB,EAAS,EAAQ,CACvD,KAAK,KAAO,0BCXH,EAAb,cAA+C,CAAU,CAEvD,WAEA,YAAY,EAAiB,EAAqB,EAAwB,CACxE,MAAM,EAAc,qBAAsB,EAAS,EAAQ,CAC3D,KAAK,KAAO,4BACZ,KAAK,WAAa,IAKT,EAAb,cAAwC,CAAU,CAChD,YAAY,EAAiB,EAAwB,CACnD,MAAM,EAAc,cAAe,EAAS,EAAQ,CACpD,KAAK,KAAO"}
@@ -1,5 +1,5 @@
1
1
  import { C as TransactionResult, _ as StoredCredentials, b as SignerLifecycleCallbacks, g as DelegatedStoredCredentials, h as UnshieldCallbacks, m as TransferCallbacks, o as Handle, p as ShieldCallbacks, v as GenericStorage, x as RawLog, y as GenericSigner } from "./relayer-sdk.types-D7rylLS4.js";
2
- import { n as TokenWrapperPair, r as TokenWrapperPairWithMetadata, t as PaginatedResult } from "./index-IhsduS7h.js";
2
+ import { n as TokenWrapperPair, r as TokenWrapperPairWithMetadata, t as PaginatedResult } from "./index-j4Uv5iQi.js";
3
3
  import { t as RelayerSDK } from "./relayer-sdk-CcIghrEq.js";
4
4
  import { Address, Hex } from "viem";
5
5
 
@@ -277,7 +277,7 @@ interface CredentialsConfig {
277
277
  storage: GenericStorage;
278
278
  /** Storage for session signatures (shorter-lived than credentials). */
279
279
  sessionStorage: GenericStorage;
280
- /** FHE keypair lifetime in seconds. Defaults to `86400` (1 day). */
280
+ /** FHE keypair lifetime in seconds. Defaults to `2592000` (30 days). */
281
281
  keypairTTL?: number;
282
282
  /** Session signature lifetime. `0` = always re-sign, `"infinite"` = never expire. Defaults to `2592000` (30 days). */
283
283
  sessionTTL?: number | "infinite";
@@ -885,7 +885,12 @@ declare const ZamaErrorCode: {
885
885
  readonly DelegationSelfNotAllowed: "DELEGATION_SELF_NOT_ALLOWED"; /** Only one delegate/revoke per (delegator, delegate, contract) per block. */
886
886
  readonly DelegationCooldown: "DELEGATION_COOLDOWN"; /** No active delegation found for this (delegator, delegate, contract) tuple. */
887
887
  readonly DelegationNotFound: "DELEGATION_NOT_FOUND"; /** The delegation has expired. */
888
- readonly DelegationExpired: "DELEGATION_EXPIRED"; /** Delegation exists on-chain but hasn't propagated to the gateway yet. */
888
+ readonly DelegationExpired: "DELEGATION_EXPIRED"; /** The new expiration date equals the current one no on-chain change needed. */
889
+ readonly DelegationExpiryUnchanged: "DELEGATION_EXPIRY_UNCHANGED"; /** Delegate address cannot be the contract address. */
890
+ readonly DelegationDelegateEqualsContract: "DELEGATION_DELEGATE_EQUALS_CONTRACT"; /** Contract address cannot be the sender address. */
891
+ readonly DelegationContractIsSelf: "DELEGATION_CONTRACT_IS_SELF"; /** The ACL contract is paused. */
892
+ readonly AclPaused: "ACL_PAUSED"; /** Expiration date is too soon (must be at least 1 hour in the future). */
893
+ readonly DelegationExpirationTooSoon: "DELEGATION_EXPIRATION_TOO_SOON"; /** Delegation exists on-chain but hasn't propagated to the gateway yet. */
889
894
  readonly DelegationNotPropagated: "DELEGATION_NOT_PROPAGATED";
890
895
  };
891
896
  /** Union of all {@link ZamaErrorCode} string values. */
@@ -1245,7 +1250,7 @@ interface WrappersRegistryConfig {
1245
1250
  registryAddresses?: Record<number, Address>;
1246
1251
  /**
1247
1252
  * How long cached registry results remain valid, in seconds.
1248
- * Default: `86400` (24 hours). Consistent with `keypairTTL`/`sessionTTL`.
1253
+ * Default: `2592000` (30 days). Consistent with `keypairTTL`/`sessionTTL`.
1249
1254
  */
1250
1255
  registryTTL?: number;
1251
1256
  }
@@ -1440,7 +1445,7 @@ interface ZamaSDKConfig {
1440
1445
  sessionStorage?: GenericStorage;
1441
1446
  /**
1442
1447
  * How long the ML-KEM re-encryption keypair remains valid, in seconds.
1443
- * Default: `86400` (1 day). Must be a positive number — `0` is rejected
1448
+ * Default: `2592000` (30 days). Must be a positive number — `0` is rejected
1444
1449
  * because the keypair is required to establish the relayer connection.
1445
1450
  */
1446
1451
  keypairTTL?: number;
@@ -1461,7 +1466,7 @@ interface ZamaSDKConfig {
1461
1466
  registryAddresses?: Record<number, Address>;
1462
1467
  /**
1463
1468
  * How long cached registry results remain valid, in seconds.
1464
- * Default: `86400` (24 hours). Consistent with `keypairTTL`/`sessionTTL`.
1469
+ * Default: `2592000` (30 days). Consistent with `keypairTTL`/`sessionTTL`.
1465
1470
  */
1466
1471
  registryTTL?: number;
1467
1472
  /** Optional signer lifecycle callbacks composed with the SDK's internal session handling. */
@@ -1743,6 +1748,82 @@ declare function findWrapped(logs: readonly RawLog[]): WrappedEvent | null;
1743
1748
  * all confidential token events in a single RPC call.
1744
1749
  */
1745
1750
  declare const TOKEN_TOPICS: readonly ["0x67500e8d0ed826d2194f514dd0d8124f35648ab6e3fb5e6ed867134cffe661e9", "0x1f7907f4d84043abe0fb7c74e8865ee5fe93fe4f691c54a7b8fa9d6fb17c7cba", "0x77d02d353c5629272875d11f1b34ec4c65d7430b075575b78cd2502034c469ee", "0xc64e7c81b18b674fc5b037d8a0041bfe3332d86c780a4688f404ee01fbabb152", "0x3838891d4843c6d7f9f494570b6fd8843f4e3c3ddb817c1411760bd31b819806"];
1751
+ /**
1752
+ * ACL delegation event topic0 constants (keccak256 of the canonical Solidity signature).
1753
+ * These are ACL events, NOT token events — they are emitted by the ACL contract.
1754
+ */
1755
+ declare const AclTopics: {
1756
+ /** `DelegatedForUserDecryption(address indexed delegator, address indexed delegate, address contractAddress, uint64 delegationCounter, uint64 oldExpirationDate, uint64 newExpirationDate)` */readonly DelegatedForUserDecryption: "0x527b025d7ff06689c1ab9d32dfd7881c964cce72ce8ac5b2fe1d3be8cfda5bfc"; /** `RevokedDelegationForUserDecryption(address indexed delegator, address indexed delegate, address contractAddress, uint64 delegationCounter, uint64 oldExpirationDate)` */
1757
+ readonly RevokedDelegationForUserDecryption: "0x7aca80b6b7928b9038f186e3d9922a0fc5d52c398fbf144725c142c52a5277e4";
1758
+ };
1759
+ /** Decoded `DelegatedForUserDecryption` event — a delegation was created or renewed. */
1760
+ interface DelegatedForUserDecryptionEvent {
1761
+ readonly eventName: "DelegatedForUserDecryption";
1762
+ /** Address of the delegator (the account granting access). */
1763
+ readonly delegator: Address;
1764
+ /** Address of the delegate (the account receiving access). */
1765
+ readonly delegate: Address;
1766
+ /** Contract address the delegation applies to. */
1767
+ readonly contractAddress: Address;
1768
+ /** Monotonic delegation counter. */
1769
+ readonly delegationCounter: bigint;
1770
+ /** Previous expiration timestamp (0 if first delegation). */
1771
+ readonly oldExpirationDate: bigint;
1772
+ /** New expiration timestamp. */
1773
+ readonly newExpirationDate: bigint;
1774
+ }
1775
+ /** Decoded `RevokedDelegationForUserDecryption` event — a delegation was revoked. */
1776
+ interface RevokedDelegationForUserDecryptionEvent {
1777
+ readonly eventName: "RevokedDelegationForUserDecryption";
1778
+ /** Address of the delegator. */
1779
+ readonly delegator: Address;
1780
+ /** Address of the delegate. */
1781
+ readonly delegate: Address;
1782
+ /** Contract address the revocation applies to. */
1783
+ readonly contractAddress: Address;
1784
+ /** Monotonic delegation counter. */
1785
+ readonly delegationCounter: bigint;
1786
+ /** Expiration date that was active before revocation. */
1787
+ readonly oldExpirationDate: bigint;
1788
+ }
1789
+ /** Union of all decoded ACL delegation event types. */
1790
+ type AclEvent = DelegatedForUserDecryptionEvent | RevokedDelegationForUserDecryptionEvent;
1791
+ /**
1792
+ * DelegatedForUserDecryption(address indexed delegator, address indexed delegate,
1793
+ * address contractAddress, uint64 delegationCounter, uint64 oldExpirationDate, uint64 newExpirationDate)
1794
+ * Indexed: delegator (topics[1]), delegate (topics[2])
1795
+ * Data: contractAddress, delegationCounter, oldExpirationDate, newExpirationDate
1796
+ */
1797
+ declare function decodeDelegatedForUserDecryption(log: RawLog): DelegatedForUserDecryptionEvent | null;
1798
+ /**
1799
+ * RevokedDelegationForUserDecryption(address indexed delegator, address indexed delegate,
1800
+ * address contractAddress, uint64 delegationCounter, uint64 oldExpirationDate)
1801
+ * Indexed: delegator (topics[1]), delegate (topics[2])
1802
+ * Data: contractAddress, delegationCounter, oldExpirationDate
1803
+ */
1804
+ declare function decodeRevokedDelegationForUserDecryption(log: RawLog): RevokedDelegationForUserDecryptionEvent | null;
1805
+ /**
1806
+ * Try all ACL delegation decoders on a single log and return the first match, or `null`.
1807
+ */
1808
+ declare function decodeAclEvent(log: RawLog): AclEvent | null;
1809
+ /**
1810
+ * Batch-decode an array of logs for ACL delegation events, skipping unrecognized entries.
1811
+ */
1812
+ declare function decodeAclEvents(logs: readonly RawLog[]): AclEvent[];
1813
+ /**
1814
+ * Find the first {@link DelegatedForUserDecryptionEvent} in a logs array.
1815
+ */
1816
+ declare function findDelegatedForUserDecryption(logs: readonly RawLog[]): DelegatedForUserDecryptionEvent | null;
1817
+ /**
1818
+ * Find the first {@link RevokedDelegationForUserDecryptionEvent} in a logs array.
1819
+ */
1820
+ declare function findRevokedDelegationForUserDecryption(logs: readonly RawLog[]): RevokedDelegationForUserDecryptionEvent | null;
1821
+ /**
1822
+ * Both ACL delegation event topic0 hashes.
1823
+ * Pass to `getLogs({ topics: [ACL_TOPICS] })` to fetch
1824
+ * all delegation events in a single RPC call.
1825
+ */
1826
+ declare const ACL_TOPICS: readonly ["0x527b025d7ff06689c1ab9d32dfd7881c964cce72ce8ac5b2fe1d3be8cfda5bfc", "0x7aca80b6b7928b9038f186e3d9922a0fc5d52c398fbf144725c142c52a5277e4"];
1746
1827
  //#endregion
1747
1828
  //#region src/activity.d.ts
1748
1829
  /** Direction of an activity item relative to the connected wallet. */
@@ -1811,5 +1892,5 @@ declare function applyDecryptedValues(items: readonly ActivityItem[], decryptedM
1811
1892
  */
1812
1893
  declare function sortByBlockNumber(items: readonly ActivityItem[]): ActivityItem[];
1813
1894
  //#endregion
1814
- export { CredentialsCreatedEvent as $, ListPairsOptions as A, ReadonlyToken as B, decodeUnwrappedStarted as C, ZamaSDKEvent as Ct, ZamaSDK as D, ZamaSDKEvents as Dt, findWrapped as E, ZamaSDKEventType as Et, ZamaError as F, CredentialsManager as G, ZERO_HANDLE as H, ZamaErrorCode as I, ApproveUnderlyingSubmittedEvent as J, CredentialsManagerConfig as K, matchZamaError as L, WrappersRegistryConfig as M, Token as N, ZamaSDKConfig as O, TokenConfig as P, CredentialsCorruptedEvent as Q, BatchDecryptAsOptions as R, decodeUnwrappedFinalized as S, UnwrapSubmittedEvent as St, findUnwrapRequested as T, ZamaSDKEventListener as Tt, DelegatedCredentialsManager as U, ReadonlyTokenConfig as V, DelegatedCredentialsManagerConfig as W, CredentialsAllowedEvent as X, BaseEvent as Y, CredentialsCachedEvent as Z, WrappedEvent as _, TransferFromSubmittedEvent as _t, ActivityType as a, DecryptEndEvent as at, decodeOnChainEvents as b, UnshieldPhase2StartedEvent as bt, parseActivityFeed as c, DelegationSubmittedEvent as ct, OnChainEvent as d, EncryptStartEvent as dt, CredentialsCreatingEvent as et, TOKEN_TOPICS as f, FinalizeUnwrapSubmittedEvent as ft, UnwrappedStartedEvent as g, TransactionErrorEvent as gt, UnwrappedFinalizedEvent as h, ShieldSubmittedEvent as ht, ActivityLogMetadata as i, CredentialsRevokedEvent as it, WrappersRegistry as j, DefaultRegistryAddresses as k, sortByBlockNumber as l, EncryptEndEvent as lt, UnwrapRequestedEvent as m, SessionExpiredEvent as mt, ActivityDirection as n, CredentialsLoadingEvent as nt, applyDecryptedValues as o, DecryptErrorEvent as ot, Topics as p, RevokeDelegationSubmittedEvent as pt, ApproveSubmittedEvent as q, ActivityItem as r, CredentialsPersistFailedEvent as rt, extractEncryptedHandles as s, DecryptStartEvent as st, ActivityAmount as t, CredentialsExpiredEvent as tt, ConfidentialTransferEvent as u, EncryptErrorEvent as ut, decodeConfidentialTransfer as v, TransferSubmittedEvent as vt, decodeWrapped as w, ZamaSDKEventInput as wt, decodeUnwrapRequested as x, UnshieldPhase2SubmittedEvent as xt, decodeOnChainEvent as y, UnshieldPhase1SubmittedEvent as yt, BatchDecryptOptions as z };
1815
- //# sourceMappingURL=activity-CcKSL6Oe.d.ts.map
1895
+ export { ZERO_HANDLE as $, decodeUnwrapRequested as A, UnshieldPhase1SubmittedEvent as At, DefaultRegistryAddresses as B, decodeAclEvent as C, FinalizeUnwrapSubmittedEvent as Ct, decodeOnChainEvent as D, TransactionErrorEvent as Dt, decodeDelegatedForUserDecryption as E, ShieldSubmittedEvent as Et, findRevokedDelegationForUserDecryption as F, ZamaSDKEventInput as Ft, TokenConfig as G, WrappersRegistry as H, findUnwrapRequested as I, ZamaSDKEventListener as It, matchZamaError as J, ZamaError as K, findWrapped as L, ZamaSDKEventType as Lt, decodeUnwrappedStarted as M, UnshieldPhase2SubmittedEvent as Mt, decodeWrapped as N, UnwrapSubmittedEvent as Nt, decodeOnChainEvents as O, TransferFromSubmittedEvent as Ot, findDelegatedForUserDecryption as P, ZamaSDKEvent as Pt, ReadonlyTokenConfig as Q, ZamaSDK as R, ZamaSDKEvents as Rt, WrappedEvent as S, EncryptStartEvent as St, decodeConfidentialTransfer as T, SessionExpiredEvent as Tt, WrappersRegistryConfig as U, ListPairsOptions as V, Token as W, BatchDecryptOptions as X, BatchDecryptAsOptions as Y, ReadonlyToken as Z, TOKEN_TOPICS as _, DecryptErrorEvent as _t, ActivityType as a, ApproveUnderlyingSubmittedEvent as at, UnwrappedFinalizedEvent as b, EncryptEndEvent as bt, parseActivityFeed as c, CredentialsCachedEvent as ct, AclEvent as d, CredentialsCreatingEvent as dt, DelegatedCredentialsManager as et, AclTopics as f, CredentialsExpiredEvent as ft, RevokedDelegationForUserDecryptionEvent as g, DecryptEndEvent as gt, OnChainEvent as h, CredentialsRevokedEvent as ht, ActivityLogMetadata as i, ApproveSubmittedEvent as it, decodeUnwrappedFinalized as j, UnshieldPhase2StartedEvent as jt, decodeRevokedDelegationForUserDecryption as k, TransferSubmittedEvent as kt, sortByBlockNumber as l, CredentialsCorruptedEvent as lt, DelegatedForUserDecryptionEvent as m, CredentialsPersistFailedEvent as mt, ActivityDirection as n, CredentialsManager as nt, applyDecryptedValues as o, BaseEvent as ot, ConfidentialTransferEvent as p, CredentialsLoadingEvent as pt, ZamaErrorCode as q, ActivityItem as r, CredentialsManagerConfig as rt, extractEncryptedHandles as s, CredentialsAllowedEvent as st, ActivityAmount as t, DelegatedCredentialsManagerConfig as tt, ACL_TOPICS as u, CredentialsCreatedEvent as ut, Topics as v, DecryptStartEvent as vt, decodeAclEvents as w, RevokeDelegationSubmittedEvent as wt, UnwrappedStartedEvent as x, EncryptErrorEvent as xt, UnwrapRequestedEvent as y, DelegationSubmittedEvent as yt, ZamaSDKConfig as z };
1896
+ //# sourceMappingURL=activity-BeqE1jb7.d.ts.map
@@ -0,0 +1,2 @@
1
+ import{i as e,n as t,r as n,t as r}from"./relayer-DfjPWTBf.js";import{t as i}from"./encryption-UaXE1L_W.js";import{r as a,t as o}from"./memory-storage-DNvc-6oK.js";import{a as s,i as c,n as l,t as u}from"./assertions-CASetdUe.js";import{t as d}from"./hex-CVGYqDKx.js";import{_ as f,c as p,f as m,l as h,m as g}from"./wrappers-registry-DqPr_JG2.js";import{erc20Abi as _,getAddress as v,isAddress as y}from"viem";var b=class extends n{constructor(t,n){super(e.SigningRejected,t,n),this.name=`SigningRejectedError`}},x=class extends n{constructor(t,n){super(e.SigningFailed,t,n),this.name=`SigningFailedError`}};function ee(e,t){let n=typeof e==`object`&&!!e&&`code`in e&&e.code===4001,r=e instanceof Error?e.message:String(e),i=r.toLowerCase().includes(`user rejected`)||r.toLowerCase().includes(`user denied`),a=`${t}: ${r}`;throw n||i?new b(a,{cause:e}):new x(a,{cause:e})}var te=class extends n{constructor(t,n){super(e.KeypairExpired,t,n),this.name=`KeypairExpiredError`}},ne=class extends n{constructor(t,n){super(e.InvalidKeypair,t,n),this.name=`InvalidKeypairError`}},S=class extends n{constructor(t,n){super(e.NoCiphertext,t,n),this.name=`NoCiphertextError`}},re=class extends n{constructor(t,n){super(e.DelegationSelfNotAllowed,t,n),this.name=`DelegationSelfNotAllowedError`}},ie=class extends n{constructor(t,n){super(e.DelegationCooldown,t,n),this.name=`DelegationCooldownError`}},C=class extends n{constructor(t,n){super(e.DelegationNotFound,t,n),this.name=`DelegationNotFoundError`}},w=class extends n{constructor(t,n){super(e.DelegationExpired,t,n),this.name=`DelegationExpiredError`}},ae=class extends n{constructor(t,n){super(e.DelegationExpiryUnchanged,t,n),this.name=`DelegationExpiryUnchangedError`}},oe=class extends n{constructor(t,n){super(e.DelegationDelegateEqualsContract,t,n),this.name=`DelegationDelegateEqualsContractError`}},se=class extends n{constructor(t,n){super(e.DelegationContractIsSelf,t,n),this.name=`DelegationContractIsSelfError`}},ce=class extends n{constructor(t,n){super(e.AclPaused,t,n),this.name=`AclPausedError`}},le=class extends n{constructor(t,n){super(e.DelegationExpirationTooSoon,t,n),this.name=`DelegationExpirationTooSoonError`}},T=class extends n{constructor(t,n){super(e.DelegationNotPropagated,t,n),this.name=`DelegationNotPropagatedError`}};function ue(e){return{address:e,abi:_,functionName:`name`,args:[]}}function de(e){return{address:e,abi:_,functionName:`symbol`,args:[]}}function fe(e){return{address:e,abi:_,functionName:`decimals`,args:[]}}function pe(e){return{address:e,abi:_,functionName:`totalSupply`,args:[]}}function me(e,t){return{address:e,abi:_,functionName:`balanceOf`,args:[t]}}function he(e,t,n){return{address:e,abi:_,functionName:`allowance`,args:[t,n]}}function ge(e,t,n){return{address:e,abi:_,functionName:`approve`,args:[t,n]}}const E=[{inputs:[{internalType:`uint64`,name:`wrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`unwrapFeeBasisPoints_`,type:`uint64`},{internalType:`uint64`,name:`deployFee_`,type:`uint64`},{internalType:`uint64`,name:`batchTransferFee_`,type:`uint64`},{internalType:`address`,name:`feeRecipient_`,type:`address`}],stateMutability:`nonpayable`,type:`constructor`},{inputs:[],name:`AccessControlBadConfirmation`,type:`error`},{inputs:[{internalType:`address`,name:`account`,type:`address`},{internalType:`bytes32`,name:`neededRole`,type:`bytes32`}],name:`AccessControlUnauthorizedAccount`,type:`error`},{inputs:[],name:`FeeExceedsMaximum`,type:`error`},{inputs:[],name:`ZeroAddressFeeRecipient`,type:`error`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldBatchTransferFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`BatchTransferFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldDeployFee`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`DeployFeeUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`address`,name:`oldRecipient`,type:`address`},{indexed:!0,internalType:`address`,name:`newRecipient`,type:`address`}],name:`FeeRecipientUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`previousAdminRole`,type:`bytes32`},{indexed:!0,internalType:`bytes32`,name:`newAdminRole`,type:`bytes32`}],name:`RoleAdminChanged`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleGranted`,type:`event`},{anonymous:!1,inputs:[{indexed:!0,internalType:`bytes32`,name:`role`,type:`bytes32`},{indexed:!0,internalType:`address`,name:`account`,type:`address`},{indexed:!0,internalType:`address`,name:`sender`,type:`address`}],name:`RoleRevoked`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`bool`,name:`active`,type:`bool`}],name:`SwapperFeeWaiverUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`UnwrapFeeBasisPointsUpdated`,type:`event`},{anonymous:!1,inputs:[{indexed:!1,internalType:`uint64`,name:`oldFeeBasisPoints`,type:`uint64`},{indexed:!1,internalType:`uint64`,name:`newFeeBasisPoints`,type:`uint64`}],name:`WrapFeeBasisPointsUpdated`,type:`event`},{inputs:[],name:`DEFAULT_ADMIN_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`FEE_MANAGER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`MAX_BASIS_POINTS`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`SWAPPER_ROLE`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[],name:`batchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`deployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`feeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getBatchTransferFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`address`,name:`deployer`,type:`address`}],name:`getDeployFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`getFeeRecipient`,outputs:[{internalType:`address`,name:``,type:`address`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`}],name:`getRoleAdmin`,outputs:[{internalType:`bytes32`,name:``,type:`bytes32`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint64`,name:`amount`,type:`uint64`},{internalType:`address`,name:`unwrapFrom`,type:`address`},{internalType:`address`,name:`unwrapTo`,type:`address`}],name:`getUnwrapFee`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`uint256`,name:`amount`,type:`uint256`},{internalType:`address`,name:`wrapFrom`,type:`address`},{internalType:`address`,name:`wrapTo`,type:`address`}],name:`getWrapFee`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`grantRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`hasRole`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`protocolId`,outputs:[{internalType:`uint256`,name:``,type:`uint256`}],stateMutability:`pure`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`callerConfirmation`,type:`address`}],name:`renounceRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes32`,name:`role`,type:`bytes32`},{internalType:`address`,name:`account`,type:`address`}],name:`revokeRole`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newBatchTransferFee`,type:`uint64`}],name:`setBatchTransferFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`newDeployFee`,type:`uint64`}],name:`setDeployFee`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`recipient`,type:`address`}],name:`setFeeRecipient`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bool`,name:`active`,type:`bool`}],name:`setSwapperFeeWaiverActive`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setUnwrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`uint64`,name:`feeBasisPoints`,type:`uint64`}],name:`setWrapFeeBasisPoints`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`bytes4`,name:`interfaceId`,type:`bytes4`}],name:`supportsInterface`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`swapperFeeWaiverActive`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`},{inputs:[],name:`unwrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[],name:`wrapFeeBasisPoints`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`}];function _e(e,t,n,r){return{address:e,abi:E,functionName:`getWrapFee`,args:[t,n,r]}}function ve(e,t,n,r){return{address:e,abi:E,functionName:`getUnwrapFee`,args:[t,n,r]}}function ye(e){return{address:e,abi:E,functionName:`getBatchTransferFee`,args:[]}}function be(e){return{address:e,abi:E,functionName:`getFeeRecipient`,args:[]}}const D=[{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`},{internalType:`uint64`,name:`expirationDate`,type:`uint64`}],name:`delegateForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`revokeDelegationForUserDecryption`,outputs:[],stateMutability:`nonpayable`,type:`function`},{inputs:[{internalType:`address`,name:`delegator`,type:`address`},{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`}],name:`getUserDecryptionDelegationExpirationDate`,outputs:[{internalType:`uint64`,name:``,type:`uint64`}],stateMutability:`view`,type:`function`},{inputs:[{internalType:`address`,name:`delegator`,type:`address`},{internalType:`address`,name:`delegate`,type:`address`},{internalType:`address`,name:`contractAddress`,type:`address`},{internalType:`bytes32`,name:`handle`,type:`bytes32`}],name:`isHandleDelegatedForUserDecryption`,outputs:[{internalType:`bool`,name:``,type:`bool`}],stateMutability:`view`,type:`function`}];function xe(e,t,n,r){return{address:e,abi:D,functionName:`delegateForUserDecryption`,args:[t,n,r]}}function Se(e,t,n){return{address:e,abi:D,functionName:`revokeDelegationForUserDecryption`,args:[t,n]}}function O(e,t,n,r){return{address:e,abi:D,functionName:`getUserDecryptionDelegationExpirationDate`,args:[t,n,r]}}function Ce(e,t,n,r,i){return{address:e,abi:D,functionName:`isHandleDelegatedForUserDecryption`,args:[t,n,r,i]}}const k=2n**64n-1n,A={CredentialsLoading:`credentials:loading`,CredentialsCached:`credentials:cached`,CredentialsExpired:`credentials:expired`,CredentialsCreating:`credentials:creating`,CredentialsCreated:`credentials:created`,CredentialsRevoked:`credentials:revoked`,CredentialsPersistFailed:`credentials:persist_failed`,CredentialsAllowed:`credentials:allowed`,CredentialsCorrupted:`credentials:corrupted`,SessionExpired:`session:expired`,EncryptStart:`encrypt:start`,EncryptEnd:`encrypt:end`,EncryptError:`encrypt:error`,DecryptStart:`decrypt:start`,DecryptEnd:`decrypt:end`,DecryptError:`decrypt:error`,TransactionError:`transaction:error`,ShieldSubmitted:`shield:submitted`,TransferSubmitted:`transfer:submitted`,TransferFromSubmitted:`transferFrom:submitted`,ApproveSubmitted:`approve:submitted`,ApproveUnderlyingSubmitted:`approveUnderlying:submitted`,UnwrapSubmitted:`unwrap:submitted`,FinalizeUnwrapSubmitted:`finalizeUnwrap:submitted`,DelegationSubmitted:`delegation:submitted`,RevokeDelegationSubmitted:`revokeDelegation:submitted`,UnshieldPhase1Submitted:`unshield:phase1_submitted`,UnshieldPhase2Started:`unshield:phase2_started`,UnshieldPhase2Submitted:`unshield:phase2_submitted`};var we=class{#e=null;#t=null;clearCache(){this.#e=null,this.#t=null}async encrypt(e,t,n){let r=await this.#n(t,n),i=crypto.getRandomValues(new Uint8Array(12)),a=new TextEncoder,o=await crypto.subtle.encrypt({name:`AES-GCM`,iv:i},r,a.encode(e));return{iv:btoa(String.fromCharCode(...i)),ciphertext:btoa(String.fromCharCode(...new Uint8Array(o)))}}async decrypt(e,t,n){let r=await this.#n(t,n),i=Uint8Array.from(atob(e.iv),e=>e.charCodeAt(0)),a=Uint8Array.from(atob(e.ciphertext),e=>e.charCodeAt(0)),o=await crypto.subtle.decrypt({name:`AES-GCM`,iv:i},r,a);return d(new TextDecoder().decode(o))}async#n(e,t){let n=`${e}:${t}`;if(this.#e&&this.#t===n)return this.#e;let r=new TextEncoder,i=await crypto.subtle.importKey(`raw`,r.encode(e),`PBKDF2`,!1,[`deriveKey`]),a=await crypto.subtle.deriveKey({name:`PBKDF2`,salt:r.encode(t),iterations:6e5,hash:`SHA-256`},i,{name:`AES-GCM`,length:256},!1,[`encrypt`,`decrypt`]);return this.#t=n,this.#e=a,a}};function j(e){c(e,`Stored credentials`),s(e.publicKey,`credentials.publicKey`),u(e.contractAddresses,`credentials.contractAddresses`);for(let t of e.contractAddresses)l(typeof t==`string`&&y(t,{strict:!1}),`Expected each contractAddress to be a valid hex address`);c(e.encryptedPrivateKey,`credentials.encryptedPrivateKey`),s(e.encryptedPrivateKey.iv,`encryptedPrivateKey.iv`),s(e.encryptedPrivateKey.ciphertext,`encryptedPrivateKey.ciphertext`),l(typeof e.startTimestamp==`number`,`Expected credentials.startTimestamp to be a number`),l(typeof e.durationDays==`number`,`Expected credentials.durationDays to be a number`)}function Te(e){j(e);let t=e;l(typeof t.delegatorAddress==`string`&&y(t.delegatorAddress,{strict:!1}),`Expected credentials.delegatorAddress to be a valid address`),l(typeof t.delegateAddress==`string`&&y(t.delegateAddress,{strict:!1}),`Expected credentials.delegateAddress to be a valid address`),l(typeof t.startTimestamp==`number`,`Expected startTimestamp to be a number`),l(typeof t.durationDays==`number`,`Expected durationDays to be a number`)}function M(e){return Math.floor(Date.now()/1e3)<e.startTimestamp+e.durationDays*86400}function N(e,t){let n=new Set(t.map(e=>v(e))),r=new Set(e.map(e=>v(e)));return n.isSubsetOf(r)}function Ee(e,t){return M(e)?N(e.contractAddresses,t):!1}function P(e){return[...new Set(e.map(e=>v(e)))].toSorted()}async function De(...e){let t=await crypto.subtle.digest(`SHA-256`,new TextEncoder().encode(e.map(String).join(`:`)));return Array.from(new Uint8Array(t)).map(e=>e.toString(16).padStart(2,`0`)).join(``).slice(0,32)}var Oe=class{#e;constructor(e){this.#e=e}#t(e){c(e,`Session entry`),s(e.signature,`session.signature`),l(typeof e.createdAt==`number`,`Expected session.createdAt to be a number`),l(typeof e.ttl==`number`||e.ttl===`infinite`,`Expected session.ttl to be a number or "infinite"`)}async get(e){let t=await this.#e.get(e);return t===null?null:(this.#t(t),t)}async set(e){let t={signature:e.signature,createdAt:Math.floor(Date.now()/1e3),ttl:e.ttl};await this.#e.set(e.key,t)}async delete(e){await this.#e.delete(e)}isExpired(e){return e.ttl===`infinite`?!1:e.ttl===0?!0:Math.floor(Date.now()/1e3)-e.createdAt>=e.ttl}},ke=class{signer;storage;sessionSignatures;crypto;keypairTTL;sessionTTL;#e;#t=null;#n=null;#r=null;constructor(e){if(this.signer=e.signer,this.storage=e.storage,this.sessionSignatures=new Oe(e.sessionStorage),this.crypto=new we,this.keypairTTL=e.keypairTTL??2592e3,this.sessionTTL=e.sessionTTL??2592e3,this.#e=e.onEvent??(()=>{}),typeof this.keypairTTL==`number`&&this.keypairTTL<0)throw Error(`keypairTTL must be >= 0`);if(typeof this.sessionTTL==`number`&&this.sessionTTL<0)throw Error(`sessionTTL must be >= 0`);typeof this.sessionTTL==`number`&&this.sessionTTL>this.keypairTTL&&(this.sessionTTL=this.keypairTTL,console.warn(`[zama-sdk] sessionTTL was clamped to keypairTTL (${this.keypairTTL}s). A session that outlives the keypair causes isAllowed() to return true after the keypair expires, leading to unexpected wallet prompts.`))}emit(e){this.#e({...e,timestamp:Date.now()})}async resolveCredentials({key:e,contracts:t,createKey:n,createFn:r}){this.emit({type:A.CredentialsLoading,contractAddresses:t});try{let n=await this.storage.get(e);if(n){this.assertEncrypted(n);let r=await this.sessionSignatures.get(e);if(r)if(this.sessionSignatures.isExpired(r))await this.sessionSignatures.delete(e),this.emit({type:A.SessionExpired,reason:`ttl`});else{let i=await this.decryptCredentials(n,r.signature);if(Ee(i,t))return this.emit({type:A.CredentialsCached,contractAddresses:t}),this.emit({type:A.CredentialsAllowed,contractAddresses:t}),i;if(M(i))return this.#i({key:e,credentials:i,requiredContracts:t});this.emit({type:A.CredentialsExpired,contractAddresses:t})}if(M(n)){if(N(n.contractAddresses,t)){let r=await this.signForContracts(n,n.contractAddresses);await this.sessionSignatures.set({key:e,signature:r,ttl:this.sessionTTL});let i=await this.decryptCredentials(n,r);return this.emit({type:A.CredentialsCached,contractAddresses:t}),this.emit({type:A.CredentialsAllowed,contractAddresses:t}),i}let r=await this.signForContracts(n,n.contractAddresses),i=await this.decryptCredentials(n,r);return this.#i({key:e,credentials:i,requiredContracts:t})}this.emit({type:A.CredentialsExpired,contractAddresses:t})}}catch(t){if(t instanceof b||t instanceof x)throw t;console.warn(`[zama-sdk] Credential resolution failed, recreating:`,t),this.emit({type:A.CredentialsCorrupted,error:a(t)}),await this.#o(e)}return(!this.#t||this.#n!==n)&&(this.#n=n,this.#t=r().then(e=>(this.emit({type:A.CredentialsAllowed,contractAddresses:t}),e)).finally(()=>{this.#t=null,this.#n=null})),this.#t}async checkExpired(e,t){try{let n=await this.storage.get(e);return n?(this.assertEncrypted(n),!Ee(n,t?[t]:[])):!1}catch(e){return console.warn(`[zama-sdk] isExpired check failed, treating as expired:`,e),!0}}async revokeSession(e,t){await this.sessionSignatures.delete(e),this.clearCaches(),this.emit({type:A.CredentialsRevoked,...t?{contractAddresses:t}:{}})}async checkAllowed(e){let t=await this.sessionSignatures.get(e);return t===null?!1:!this.sessionSignatures.isExpired(t)}async clearAll(e){await this.sessionSignatures.delete(e),this.clearCaches(),await this.#o(e)}clearCaches(){this.crypto.clearCache()}async createCredentials({key:e,contractAddresses:t,createFn:n,errorContext:r}){this.emit({type:A.CredentialsCreating,contractAddresses:t});try{let r=await n();return await this.persistCredentials(e,r),await this.sessionSignatures.set({key:e,signature:r.signature,ttl:this.sessionTTL}),this.emit({type:A.CredentialsCreated,contractAddresses:t}),r}catch(e){ee(e,r)}}async#i({key:e,credentials:t,requiredContracts:n}){if(this.#r){let e=await this.#r;if(N(e.contractAddresses,n))return this.emit({type:A.CredentialsAllowed,contractAddresses:n}),e;t=e}let r=this.#a({key:e,credentials:t,requiredContracts:n});this.#r=r;try{return await r}finally{this.#r===r&&(this.#r=null)}}async#a({key:e,credentials:t,requiredContracts:n}){let r=P([...t.contractAddresses,...n]),i=await this.signForContracts(t,r),a={...t,contractAddresses:r,signature:i};return await this.persistCredentials(e,a),await this.sessionSignatures.set({key:e,signature:i,ttl:this.sessionTTL}),this.emit({type:A.CredentialsAllowed,contractAddresses:n}),a}async persistCredentials(e,t){try{let n=await this.encryptCredentials(t);await this.storage.set(e,n)}catch(e){console.warn(`[zama-sdk] Failed to encrypt credentials for persistence:`,e),this.emit({type:A.CredentialsPersistFailed,error:a(e)})}}async#o(e){try{await this.storage.delete(e)}catch(e){console.warn(`[zama-sdk] Failed to delete credentials:`,e),this.emit({type:A.CredentialsPersistFailed,error:a(e)})}}};function Ae(e){if(typeof e!=`object`||!e)return!1;let t=Reflect.get(e,`runtime`);return typeof t!=`object`||!t?!1:typeof Reflect.get(t,`id`)==`string`}var je=class e extends ke{#e;#t=null;#n=null;static async computeStoreKey(e,t){return De(v(e),t)}constructor(e){super(e),this.#e=e.relayer,Ae(typeof globalThis<`u`?Reflect.get(globalThis,`chrome`):void 0)&&e.sessionStorage instanceof o&&console.warn(`[zama-sdk] Detected Chrome extension context with in-memory session storage. Session signatures will be lost on service worker restart and won't be shared across contexts. Consider using chromeSessionStorage instead. `)}async allow(...e){let t=P(e),n=await this.#r();return this.resolveCredentials({key:n,contracts:t,createKey:t.join(`,`),createFn:()=>this.create(t)})}async isExpired(e){return this.checkExpired(await this.#r(),e)}async revoke(...e){await this.revokeSession(await this.#r(),e.length>0?e:void 0)}async revokeByKey(e){await this.revokeSession(e)}async isAllowed(){return this.checkAllowed(await this.#r())}async clear(){await this.clearAll(await this.#r())}async create(e){let t=P(e),n=await this.#r();return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let e=await this.#e.generateKeypair(),n=Math.floor(Date.now()/1e3),r=Math.ceil(this.keypairTTL/86400),i=await this.#e.createEIP712(e.publicKey,t,n,r),a=await this.signer.signTypedData(i);return{publicKey:e.publicKey,privateKey:e.privateKey,signature:a,contractAddresses:t,startTimestamp:n,durationDays:r}},errorContext:`Failed to create decrypt credentials`})}assertEncrypted(e){j(e)}async signForContracts(e,t){let n=await this.#e.createEIP712(e.publicKey,t,e.startTimestamp,e.durationDays);return this.signer.signTypedData(n)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#r(){let t=await this.signer.getAddress(),n=await this.signer.getChainId(),r=`${v(t)}:${n}`;if(this.#t&&this.#n===r)return this.#t;let i=await e.computeStoreKey(t,n);return this.#n=r,this.#t=i,i}},Me=class e extends ke{#e;#t=null;#n=null;static async computeStoreKey(e,t,n){return De(v(e),v(t),n)}constructor(e){super(e),this.#e=e.relayer}async allow(e,...t){let n=v(e),r=P(t),i=await this.#i(n);return this.resolveCredentials({key:i,contracts:r,createKey:`${n}:${r.join(`,`)}`,createFn:()=>this.#r(n,r)})}async isExpired(e,t){return this.checkExpired(await this.#i(v(e)),t)}async revoke(e){await this.revokeSession(await this.#i(v(e)))}async isAllowed(e){return this.checkAllowed(await this.#i(v(e)))}async clear(e){await this.clearAll(await this.#i(v(e)))}async#r(e,t){let n=await this.#i(e);return this.createCredentials({key:n,contractAddresses:t,createFn:async()=>{let n=await this.#e.generateKeypair(),r=await this.signer.getAddress(),i=Math.floor(Date.now()/1e3),a=Math.ceil(this.keypairTTL/86400),o={publicKey:n.publicKey,startTimestamp:i,durationDays:a,delegatorAddress:e},s=await this.#a(o,t);return{publicKey:n.publicKey,privateKey:n.privateKey,signature:s,contractAddresses:t,startTimestamp:i,durationDays:a,delegatorAddress:e,delegateAddress:r}},errorContext:`Failed to create delegated decrypt credentials`})}assertEncrypted(e){Te(e)}async signForContracts(e,t){return this.#a(e,t)}async encryptCredentials(e){let t=await this.signer.getAddress(),n=await this.crypto.encrypt(e.privateKey,e.signature,t),{privateKey:r,signature:i,...a}=e;return{...a,encryptedPrivateKey:n}}async decryptCredentials(e,t){let n=await this.signer.getAddress(),r=await this.crypto.decrypt(e.encryptedPrivateKey,t,n),{encryptedPrivateKey:i,...a}=e;return{...a,privateKey:r,signature:t}}clearCaches(){this.#t=null,this.#n=null,super.clearCaches()}async#i(t){let n=await this.signer.getAddress(),r=await this.signer.getChainId(),i=`${v(n)}:${v(t)}:${r}`;if(this.#t&&this.#n===i)return this.#t;let a=await e.computeStoreKey(n,t,r);return this.#n=i,this.#t=a,a}async#a(e,t){let n=await this.#e.createDelegatedUserDecryptEIP712(e.publicKey,t,e.delegatorAddress,e.startTimestamp,e.durationDays);return this.signer.signTypedData({domain:{...n.domain,chainId:Number(n.domain.chainId)},types:n.types,message:{...n.message,startTimestamp:BigInt(n.message.startTimestamp),durationDays:BigInt(n.message.durationDays)}})}};const Ne=`zama:balances`;function Pe(e,t,n){return`zama:balance:${v(e)}:${v(t)}:${n.toLowerCase()}`}async function F({storage:e,tokenAddress:t,owner:n,handle:r}){try{let i=await e.get(Pe(t,n,r));return i===null?null:BigInt(i)}catch(e){return console.warn(`[zama-sdk] Balance cache read failed:`,e),null}}async function I(e){let{storage:t,tokenAddress:n,owner:r,handle:i,value:a}=e,o=Pe(n,r,i);try{await t.set(o,a.toString()),await Ie(t,o)}catch{}}const Fe=new WeakMap;async function Ie(e,t){let n=(Fe.get(e)??Promise.resolve()).then(async()=>{let n=await e.get(Ne),r=n?JSON.parse(n):[];r.includes(t)||(r.push(t),await e.set(Ne,JSON.stringify(r)))});return Fe.set(e,n.catch(()=>{})),n}async function Le(e,t=1/0){if(Number.isFinite(t)&&t<=0)throw Error(`maxConcurrency must be a positive number`);if(!Number.isFinite(t)||t>=e.length)return Promise.all(e.map(e=>e()));let n=Array.from({length:e.length}),r=0;async function i(){for(;r<e.length;){let t=r++;e[t]&&(n[t]=await e[t]())}}return await Promise.all(Array.from({length:t},i)),n}const Re=`0x0000000000000000000000000000000000000000000000000000000000000000`;var ze=class e{credentials;delegatedCredentials;relayer;signer;address;storage;#e;constructor(e){let t={relayer:e.relayer,signer:e.signer,storage:e.storage,sessionStorage:e.sessionStorage,keypairTTL:e.keypairTTL??2592e3,sessionTTL:e.sessionTTL??2592e3,onEvent:e.onEvent};this.credentials=e.credentials??new je(t),this.delegatedCredentials=e.delegatedCredentials??new Me(t),this.relayer=e.relayer,this.signer=e.signer,this.address=v(e.address),this.storage=e.storage,this.#e=e.onEvent}emit(e){this.#e?.({...e,tokenAddress:this.address,timestamp:Date.now()})}async balanceOf(e){let t=e?v(e):await this.signer.getAddress(),n=await this.readConfidentialBalanceOf(t);return this.decryptBalance(n,t)}async confidentialBalanceOf(e){let t=e?v(e):await this.signer.getAddress();return this.readConfidentialBalanceOf(t)}async isConfidential(){return await this.signer.readContract(m(this.address,p))}async isWrapper(){return await this.signer.readContract(m(this.address,h))}static async batchDecryptBalances(t,n){if(t.length===0)return new Map;let{handles:r,owner:i,onError:a,maxConcurrency:o}=n??{},s=t[0],c=e.assertSameRelayer(t),l=i??await s.signer.getAddress();return e.#t({tokens:t,handles:r,ownerAddress:l,onError:a,maxConcurrency:o,obtainCreds:e=>s.credentials.allow(...e),decrypt:(e,t,n)=>c.userDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,signerAddress:l,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch decryption`})}static async batchDecryptBalancesAs(t,n){if(t.length===0)return new Map;let{delegatorAddress:r,handles:i,owner:a,onError:o,maxConcurrency:s}=n,c=a??r,l=t[0];return e.assertSameRelayer(t),e.#t({tokens:t,handles:i,ownerAddress:c,onError:o,maxConcurrency:s,preFlightCheck:()=>l.#n(r),obtainCreds:e=>l.delegatedCredentials.allow(r,...e),decrypt:(e,t,n)=>l.relayer.delegatedUserDecrypt({handles:[t],contractAddress:n,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays}),errorPrefix:`Batch delegated decryption`})}static async#t(e){let{tokens:t,handles:n,ownerAddress:r,onError:o,maxConcurrency:s,obtainCreds:c,decrypt:l,errorPrefix:u}=e,d=t[0],f=n??await Promise.all(t.map(e=>e.readConfidentialBalanceOf(r)));if(t.length!==f.length)throw new i(`tokens.length (${t.length}) must equal handles.length (${f.length})`);let p=d.storage,m=new Map,h=[],g=await Promise.all(t.map((e,t)=>{let n=f[t];return e.isZeroHandle(n)?0n:F({storage:p,tokenAddress:e.address,owner:r,handle:n})}));for(let e=0;e<t.length;e++){let n=t[e],r=f[e],i=g[e];if(i!=null){m.set(n.address,i);continue}h.push({token:n,handle:r})}if(h.length===0)return m;e.preFlightCheck&&await e.preFlightCheck();let _=await c(h.map(e=>e.token.address)),v=[],y=[];for(let{token:e,handle:t}of h)y.push(()=>l(_,t,e.address).then(async n=>{let a=n[t];if(a===void 0)throw new i(`${u} returned no value for handle ${t} on token ${e.address}`);m.set(e.address,a);try{await I({storage:p,tokenAddress:e.address,owner:r,handle:t,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}}).catch(t=>{let n=a(t);if(o)try{m.set(e.address,o(n,e.address))}catch(t){v.push({address:e.address,error:a(t)})}else v.push({address:e.address,error:n})}));if(await Le(y,s),v.length>0){let e=v.map(e=>`${e.address}: ${e.error.message}`).join(`; `);throw new i(`${u} failed for ${v.length} token(s): ${e}`)}return m}async underlyingToken(){return this.signer.readContract(g(this.address))}async allowance(e,t){let n=v(e),r=await this.signer.readContract(g(n)),i=t?v(t):await this.signer.getAddress();return this.signer.readContract(he(r,i,n))}async name(){return this.signer.readContract(ue(this.address))}async symbol(){return this.signer.readContract(de(this.address))}async decimals(){return this.signer.readContract(fe(this.address))}async allow(){await this.credentials.allow(this.address)}async isAllowed(){return this.credentials.isAllowed()}async revoke(...e){await this.credentials.revoke(...e)}static async allow(...e){if(e.length===0)return;let t=e.map(e=>e.address);await e[0].credentials.allow(...t)}async getAclAddress(){return this.relayer.getAclAddress()}async isDelegated(e){let t=await this.getDelegationExpiry(e);return t===0n?!1:t===k?!0:t>await this.signer.getBlockTimestamp()}async getDelegationExpiry({delegatorAddress:e,delegateAddress:t}){let n=await this.getAclAddress();return this.signer.readContract(O(n,v(e),v(t),this.address))}async#n(e){let t=await this.signer.getAddress(),n=await this.getDelegationExpiry({delegatorAddress:e,delegateAddress:t});if(n===0n)throw new C(`No active delegation from ${e} to ${t} for ${this.address}`);if(n!==k&&n<=await this.signer.getBlockTimestamp())throw new w(`Delegation from ${e} to ${t} for ${this.address} has expired`)}async readConfidentialBalanceOf(e){return await this.signer.readContract(f(this.address,e))}isZeroHandle(e){return e===`0x0000000000000000000000000000000000000000000000000000000000000000`||e===`0x`}async decryptBalanceAs({delegatorAddress:e,owner:t}){let n=v(e),r=t?v(t):n,o=await this.readConfidentialBalanceOf(r);if(this.isZeroHandle(o))return 0n;let s=await F({storage:this.storage,tokenAddress:this.address,owner:r,handle:o});if(s!==null)return s;await this.#n(n);let c=Date.now();try{this.emit({type:A.DecryptStart});let e=await this.delegatedCredentials.allow(n,this.address),t=await this.relayer.delegatedUserDecrypt({handles:[o],contractAddress:this.address,signedContractAddresses:e.contractAddresses,privateKey:e.privateKey,publicKey:e.publicKey,signature:e.signature,delegatorAddress:e.delegatorAddress,delegateAddress:e.delegateAddress,startTimestamp:e.startTimestamp,durationDays:e.durationDays});this.emit({type:A.DecryptEnd,durationMs:Date.now()-c});let a=t[o];if(a===void 0)throw new i(`Delegated decryption returned no value for handle ${o}`);try{await I({storage:this.storage,tokenAddress:this.address,owner:r,handle:o,value:a})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return a}catch(e){throw this.emit({type:A.DecryptError,error:a(e),durationMs:Date.now()-c}),L(e,`Failed to decrypt delegated balance`,!0)}}async decryptBalance(e,t){if(this.isZeroHandle(e))return 0n;let n=t??await this.signer.getAddress(),r=await F({storage:this.storage,tokenAddress:this.address,owner:n,handle:e});if(r!==null)return r;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:A.DecryptStart});let t=await this.relayer.userDecrypt({handles:[e],contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:n,startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:A.DecryptEnd,durationMs:Date.now()-s});let r=t[e];if(r===void 0)throw new i(`Decryption returned no value for handle ${e}`);try{await I({storage:this.storage,tokenAddress:this.address,owner:n,handle:e,value:r})}catch(e){console.warn(`[zama-sdk] Cache write failed (non-blocking):`,e)}return r}catch(e){throw this.emit({type:A.DecryptError,error:a(e),durationMs:Date.now()-s}),L(e,`Failed to decrypt balance`)}}async decryptHandles(e,t){let n=new Map,r=[];for(let t of e)this.isZeroHandle(t)?n.set(t,0n):r.push(t);if(r.length===0)return n;let o=await this.credentials.allow(this.address),s=Date.now();try{this.emit({type:A.DecryptStart});let e=await this.relayer.userDecrypt({handles:r,contractAddress:this.address,signedContractAddresses:o.contractAddresses,privateKey:o.privateKey,publicKey:o.publicKey,signature:o.signature,signerAddress:t??await this.signer.getAddress(),startTimestamp:o.startTimestamp,durationDays:o.durationDays});this.emit({type:A.DecryptEnd,durationMs:Date.now()-s});for(let t of r){let r=e[t];if(r===void 0)throw new i(`Decryption returned no value for handle ${t}`);n.set(t,r)}}catch(e){throw this.emit({type:A.DecryptError,error:a(e),durationMs:Date.now()-s}),L(e,`Failed to decrypt handles`)}return n}static assertSameRelayer(e){let t=e[0].relayer;for(let n=1;n<e.length;n++)if(e[n].relayer!==t)throw new r(`All tokens in a batch operation must share the same relayer instance`);return t}};function L(e,n,r=!1){if(e instanceof i||e instanceof S||e instanceof t||e instanceof T||e instanceof b||e instanceof x)return e;let a=typeof e==`object`&&e&&`statusCode`in e&&typeof e.statusCode==`number`?e.statusCode:void 0;return a===400?new S(e instanceof Error?e.message:`No ciphertext for this account`,{cause:e}):r&&a===500?new T(`Delegated decryption failed with a server error. This is most commonly caused by the delegation not having propagated to the gateway yet — after granting delegation, allow 1–2 minutes for cross-chain synchronization before retrying. If the error persists, the gateway or relayer may be experiencing an unrelated issue.`,{cause:e}):a===void 0?new i(n,{cause:e}):new t(e instanceof Error?e.message:n,a,{cause:e})}const R={ConfidentialTransfer:`0x67500e8d0ed826d2194f514dd0d8124f35648ab6e3fb5e6ed867134cffe661e9`,Wrapped:`0x1f7907f4d84043abe0fb7c74e8865ee5fe93fe4f691c54a7b8fa9d6fb17c7cba`,UnwrapRequested:`0x77d02d353c5629272875d11f1b34ec4c65d7430b075575b78cd2502034c469ee`,UnwrappedFinalized:`0xc64e7c81b18b674fc5b037d8a0041bfe3332d86c780a4688f404ee01fbabb152`,UnwrappedStarted:`0x3838891d4843c6d7f9f494570b6fd8843f4e3c3ddb817c1411760bd31b819806`};function z(e){return v(d(e.slice(-40)))}function B(e){return BigInt(e)}function Be(e){return e}function V(e,t){let n=2+t*64,r=e.slice(n,n+64);return r.length===64?r:r.padEnd(64,`0`)}function H(e,t){return v(d(V(e,t).slice(-40)))}function U(e,t){return BigInt(`0x`+V(e,t))}function W(e,t){return BigInt(`0x`+V(e,t))!==0n}function G(e,t){return d(V(e,t))}function Ve(e){return e.topics[0]!==R.ConfidentialTransfer||e.topics.length<4?null:{eventName:`ConfidentialTransfer`,from:z(e.topics[1]),to:z(e.topics[2]),encryptedAmountHandle:Be(e.topics[3])}}function K(e){return e.topics[0]!==R.Wrapped||e.topics.length<3?null:{eventName:`Wrapped`,to:z(e.topics[1]),mintTxId:B(e.topics[2]),mintAmount:U(e.data,0),amountIn:U(e.data,1),feeAmount:U(e.data,2)}}function q(e){return e.topics[0]!==R.UnwrapRequested||e.topics.length<2?null:{eventName:`UnwrapRequested`,receiver:z(e.topics[1]),encryptedAmount:G(e.data,0)}}function He(e){return e.topics[0]!==R.UnwrappedFinalized||e.topics.length<3?null:{eventName:`UnwrappedFinalized`,burntAmountHandle:Be(e.topics[1]),nextTxId:B(e.topics[2]),finalizeSuccess:W(e.data,0),feeTransferSuccess:W(e.data,1),burnAmount:U(e.data,2),unwrapAmount:U(e.data,3),feeAmount:U(e.data,4)}}function Ue(e){return e.topics[0]!==R.UnwrappedStarted||e.topics.length<4?null:{eventName:`UnwrappedStarted`,requestId:B(e.topics[1]),txId:B(e.topics[2]),to:z(e.topics[3]),returnVal:W(e.data,0),refund:H(e.data,1),requestedAmount:G(e.data,2),burnAmount:G(e.data,3)}}function J(e){return Ve(e)??K(e)??q(e)??He(e)??Ue(e)}function We(e){let t=[];for(let n of e){let e=J(n);e&&t.push(e)}return t}function Ge(e){for(let t of e){let e=q(t);if(e)return e}return null}function Ke(e){for(let t of e){let e=K(t);if(e)return e}return null}const qe=[R.ConfidentialTransfer,R.Wrapped,R.UnwrapRequested,R.UnwrappedFinalized,R.UnwrappedStarted],Y={DelegatedForUserDecryption:`0x527b025d7ff06689c1ab9d32dfd7881c964cce72ce8ac5b2fe1d3be8cfda5bfc`,RevokedDelegationForUserDecryption:`0x7aca80b6b7928b9038f186e3d9922a0fc5d52c398fbf144725c142c52a5277e4`};function X(e){return e.topics[0]!==Y.DelegatedForUserDecryption||e.topics.length<3?null:{eventName:`DelegatedForUserDecryption`,delegator:z(e.topics[1]),delegate:z(e.topics[2]),contractAddress:H(e.data,0),delegationCounter:U(e.data,1),oldExpirationDate:U(e.data,2),newExpirationDate:U(e.data,3)}}function Z(e){return e.topics[0]!==Y.RevokedDelegationForUserDecryption||e.topics.length<3?null:{eventName:`RevokedDelegationForUserDecryption`,delegator:z(e.topics[1]),delegate:z(e.topics[2]),contractAddress:H(e.data,0),delegationCounter:U(e.data,1),oldExpirationDate:U(e.data,2)}}function Je(e){return X(e)??Z(e)}function Ye(e){let t=[];for(let n of e){let e=Je(n);e&&t.push(e)}return t}function Xe(e){for(let t of e){let e=X(t);if(e)return e}return null}function Ze(e){for(let t of e){let e=Z(t);if(e)return e}return null}const Qe=[Y.DelegatedForUserDecryption,Y.RevokedDelegationForUserDecryption];function Q(e,t){return e.toLowerCase()===t.toLowerCase()}function $(e,t,n){let r=t!==void 0&&Q(e,t),i=n!==void 0&&Q(e,n);return r&&i?`self`:r?`outgoing`:`incoming`}function $e(e,t,n){switch(e.eventName){case`ConfidentialTransfer`:return et(e,t,n);case`Wrapped`:return tt(e,t,n);case`UnwrapRequested`:return nt(e,t,n);case`UnwrappedStarted`:return rt(e,t,n);case`UnwrappedFinalized`:return it(e,n)}}function et(e,t,n){return{type:`transfer`,direction:$(t,e.from,e.to),amount:{type:`encrypted`,handle:e.encryptedAmountHandle},from:e.from,to:e.to,metadata:n,rawEvent:e}}function tt(e,t,n){return{type:`shield`,direction:$(t,void 0,e.to),amount:{type:`clear`,value:e.amountIn},to:e.to,fee:e.feeAmount,metadata:n,rawEvent:e}}function nt(e,t,n){return{type:`unshield_requested`,direction:$(t,void 0,e.receiver),amount:{type:`encrypted`,handle:e.encryptedAmount},to:e.receiver,metadata:n,rawEvent:e}}function rt(e,t,n){return{type:`unshield_started`,direction:$(t,void 0,e.to),amount:{type:`encrypted`,handle:e.requestedAmount},to:e.to,success:e.returnVal,metadata:n,rawEvent:e}}function it(e,t){return{type:`unshield_finalized`,direction:`incoming`,amount:{type:`clear`,value:e.unwrapAmount},fee:e.feeAmount,success:e.finalizeSuccess,metadata:t,rawEvent:e}}function at(e,t){let n=[];for(let r of e){let e=J(r);if(!e)continue;let i={transactionHash:r.transactionHash,blockNumber:r.blockNumber,logIndex:r.logIndex};n.push($e(e,t,i))}return n}function ot(e){let t=new Set;for(let n of e)if(n.amount.type===`encrypted`&&n.amount.decryptedValue===void 0){let e=n.amount.handle;e!==`0x`&&e!==`0x0000000000000000000000000000000000000000000000000000000000000000`&&t.add(e)}return[...t]}function st(e,t){return e.map(e=>{if(e.amount.type!==`encrypted`)return e;let n=t.get(e.amount.handle);return n===void 0?e:{...e,amount:{type:`encrypted`,handle:e.amount.handle,decryptedValue:n}}})}function ct(e){return[...e].toSorted((e,t)=>{let n=e.metadata.blockNumber,r=t.metadata.blockNumber;if(n===void 0&&r===void 0)return 0;if(n===void 0)return-1;if(r===void 0)return 1;let i=typeof n==`bigint`?n:BigInt(n),a=typeof r==`bigint`?r:BigInt(r);if(a>i)return 1;if(a<i)return-1;let o=e.metadata.logIndex??0;return(t.metadata.logIndex??0)-o})}export{T as $,xe as A,me as B,Ke as C,je as D,Me as E,be as F,ce as G,pe as H,ve as I,oe as J,se as K,_e as L,Ce as M,Se as N,A as O,ye as P,C as Q,he as R,Ge as S,Re as T,ue as U,fe as V,de as W,w as X,le as Y,ae as Z,He as _,Qe as a,b as at,Xe as b,R as c,Ve as d,re as et,X as f,q as g,Z as h,ct as i,x as it,O as j,k,Je as l,We as m,ot as n,te as nt,Y as o,J as p,ie as q,at as r,S as rt,qe as s,st as t,ne as tt,Ye as u,Ue as v,ze as w,Ze as x,K as y,ge as z};
2
+ //# sourceMappingURL=activity-qMhJxqpq.js.map