diff --git a/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js b/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js deleted file mode 100644 index 3a14fd8..0000000 --- a/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js +++ /dev/null @@ -1,3 +0,0 @@ -/*! For license information please see bundle.2ddbc9eacea08f1f698a.js.LICENSE.txt */ -(()=>{var e,t,r,n,o,a={560:(e,t,r)=>{"use strict";var n=r(598),o=r(443),a=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,o,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,o,"GeneratorFunction"),l(p),l(p,o,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function l(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}l=function(e,t,r,n){function a(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function S(){return(S=b(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function O(){return(O=b(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!E()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,P();case 2:if(null!==e.v){e.n=4;break}return e.n=3,k();case 3:x(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function k(){return j.apply(this,arguments)}function j(){return(j=b(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function P(){var e=T(m);return e?JSON.parse(e):null}function x(e){_(m,JSON.stringify(e),1728e5)}function _(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function T(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function I(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function A(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function D(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function N(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function R(e){return M.apply(this,arguments)}function M(){return(M=b(f().m(function e(t){var r,n,o,a;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return o=e.v,e.n=3,r.exportKey("raw",o);case 3:return a=e.v,e.a(2,new Uint8Array(a))}},e)}))).apply(this,arguments)}function K(e){for(var t="",r=[0],n=0;n0;)r.push(o%58),o=o/58|0}for(var i=0;i0;){var c=r[i];a=(c=void 0===c?a:58*c+a)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function G(){return(G=b(f().m(function e(t,r,n){var o,a;return f().w(function(e){for(;;)switch(e.n){case 0:a=r,e.n="SOLANA"===a?1:"HEXADECIMAL"===a?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(o=new Uint8Array(64)).set(t,0),o.set(n,32),e.a(2,K(o));case 5:return e.a(2,"0x"+A(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+A(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function C(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return B(s,"_invoke",function(r,n,o){var a,c,u,s=0,f=o||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return a=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(B(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,B(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,B(l,"constructor",s),B(s,"constructor",u),u.displayName="GeneratorFunction",B(s,o,"GeneratorFunction"),B(l),B(l,o,"Generator"),B(l,n,function(){return this}),B(l,"toString",function(){return"[object Generator]"}),(C=function(){return{w:a,m:d}})()}function B(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}B=function(e,t,r,n){function a(t,r){B(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},B(e,t,r,n)}function L(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(t,o)||p(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],c=a[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=n[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=l}),r},q=E,W=function(e){return S.apply(this,arguments)};function X(){return(X=H(C().m(function e(){return C().w(function(e){for(;;)switch(e.n){case 0:if(!q()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,Y();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function V(){return(V=H(C().m(function e(t,r,n){var o,i,c,u,s,f,l,d;return C().w(function(e){for(;;)switch(e.n){case 0:if(o={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=o[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(t===u){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(J(u)),e.n=3,W(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,a.g8)(r),d=J(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var Q={initEmbeddedKey:function(){return X.apply(this,arguments)},generateTargetKey:k,setItemWithExpiry:_,getItemWithExpiry:T,getEmbeddedKey:P,setEmbeddedKey:x,onResetEmbeddedKey:function(){window.localStorage.removeItem(m),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:R,base58Encode:K,base58Decode:U,encodeKey:function(e,t,r){return G.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};r&&(n.requestId=r),h?h.postMessage(n):window.parent!==window&&window.parent.postMessage({type:e,value:t},"*"),N("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:N,uint8arrayFromHexString:J,uint8arrayToHexString:A,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(ae(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,ae(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,ae(l,"constructor",s),ae(s,"constructor",u),u.displayName="GeneratorFunction",ae(s,o,"GeneratorFunction"),ae(l),ae(l,o,"Generator"),ae(l,n,function(){return this}),ae(l,"toString",function(){return"[object Generator]"}),(oe=function(){return{w:a,m:d}})()}function ae(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}ae=function(e,t,r,n){function a(t,r){ae(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},ae(e,t,r,n)}function ie(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return ce(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?ce(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function ce(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(c.organizationId&&c.organizationId===r){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(c.organizationId,"."));case 9:if(c.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(c.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return o=Q.uint8arrayFromHexString(c.encappedPublic),a=Q.uint8arrayFromHexString(c.ciphertext),e.a(3,13);case 12:throw new Error("unsupported version: ".concat(i.version));case 13:return e.n=14,Q.getEmbeddedKey();case 14:return u=e.v,e.n=15,n({ciphertextBuf:a,encappedKeyBuf:o,receiverPrivJwk:u});case 15:return e.a(2,e.v)}},e)})),ye.apply(this,arguments)}function ve(e){return be.apply(this,arguments)}function be(){return(be=se(oe().m(function e(t){var r,n,o;return oe().w(function(e){for(;;)switch(e.n){case 0:if(r=Q.getEmbeddedKey()){e.n=1;break}return Q.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,Q.p256JWKPrivateToPublic(r);case 2:n=e.v,o=Q.uint8arrayToHexString(n),Q.sendMessageUp("EMBEDDED_PUBLIC_KEY",o,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function me(e,t,r,n,o,a){return ge.apply(this,arguments)}function ge(){return ge=se(oe().m(function e(t,r,n,o,a,i){var c,u,s,f,l,d,p;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,pe(n,r,i);case 1:if(c=e.v,s=new Uint8Array(c),"SOLANA"!==o){e.n=3;break}return f=Q.uint8arrayToHexString(s.subarray(0,32)),l=Q.getEd25519PublicKey(f),e.n=2,Q.encodeKey(s,o,l);case 2:u=e.v,e.n=5;break;case 3:return e.n=4,Q.encodeKey(s,o);case 4:u=e.v;case 5:if(d=a||"default","SOLANA"!==o){e.n=6;break}p=Z.AX.fromSecretKey(Q.base58Decode(u)),e.n=8;break;case 6:if("HEXADECIMAL"!==o){e.n=8;break}return e.n=7,xe(Array.from(Q.uint8arrayFromHexString(u)));case 7:p=e.v;case 8:fe=re(re({},fe),{},ne({},d,{organizationId:r,privateKey:u,format:o,expiry:(new Date).getTime()+864e5,keypair:p})),Q.sendMessageUp("BUNDLE_INJECTED",!0,t);case 9:return e.a(2)}},e)})),ge.apply(this,arguments)}function he(e,t){return we.apply(this,arguments)}function we(){return(we=se(oe().m(function e(t,r){var n;return oe().w(function(e){for(;;)switch(e.n){case 0:n=Q.applySettings(t),Q.setSettings(n),Q.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function Ee(e,t,r){return Se.apply(this,arguments)}function Se(){return(Se=se(oe().m(function e(t,r,n){var o,a,i,c,u,s,f,l,d;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Ie(a=fe[o=n||"default"],o)){e.n=1;break}return e.a(2);case 1:return e.n=2,Ae(a);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=Q.uint8arrayFromHexString(u),(l=Z.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=Q.uint8arrayToHexString(s),Q.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function Oe(e,t,r){return ke.apply(this,arguments)}function ke(){return ke=se(oe().m(function e(t,r,a){var i,c,u,s,f,l,d,p,y,v;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Ie(c=fe[i=a||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=le.encode(s),e.n=2,Ae(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return o.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32),v=n._S(l,y),d=Q.uint8arrayToHexString(v),e.n=4;break;case 3:return Q.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:Q.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),ke.apply(this,arguments)}function je(e,t){return Pe.apply(this,arguments)}function Pe(){return(Pe=se(oe().m(function e(t,r){return oe().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}return fe={},Q.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t),e.a(2);case 1:if(fe[r]){e.n=2;break}return Q.sendMessageUp("ERROR",new Error("key not found for address ".concat(r,". Note that address is case sensitive.")).toString(),t),e.a(2);case 2:delete fe[r],Q.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function xe(e){return _e.apply(this,arguments)}function _e(){return(_e=se(oe().m(function e(t){var r,n;return oe().w(function(e){for(;;)switch(e.n){case 0:if(32!==(r=Q.parsePrivateKey(t)).length){e.n=1;break}n=Z.AX.fromSeed(r),e.n=3;break;case 1:if(64!==r.length){e.n=2;break}n=Z.AX.fromSecretKey(r),e.n=3;break;case 2:throw new Error("Invalid private key length: ".concat(r.length,". Expected 32 or 64 bytes."));case 3:return e.a(2,n)}},e)}))).apply(this,arguments)}function Te(e){fe[e]&&delete fe[e]}function Ie(e,t){if(!e)throw new Error("key bytes not found. Please re-inject export bundle for address ".concat(t," into iframe. Note that address is case sensitive.")).toString();if((new Date).getTime()>=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(fe);r=i.expiry&&t.push(a)}for(var c=0,u=t;c3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(Ue(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,Ue(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,Ue(l,"constructor",s),Ue(s,"constructor",u),u.displayName="GeneratorFunction",Ue(s,o,"GeneratorFunction"),Ue(l),Ue(l,o,"Generator"),Ue(l,n,function(){return this}),Ue(l,"toString",function(){return"[object Generator]"}),(Ke=function(){return{w:a,m:d}})()}function Ue(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}Ue=function(e,t,r,n){function a(t,r){Ue(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},Ue(e,t,r,n)}function Ge(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function Ce(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):($e(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,$e(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,$e(l,"constructor",s),$e(s,"constructor",u),u.displayName="GeneratorFunction",$e(s,o,"GeneratorFunction"),$e(l),$e(l,o,"Generator"),$e(l,n,function(){return this}),$e(l,"toString",function(){return"[object Generator]"}),(Je=function(){return{w:a,m:d}})()}function $e(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}$e=function(e,t,r,n){function a(t,r){$e(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},$e(e,t,r,n)}function ze(e,t,r,n,o,a,i){try{var c=e[a](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,o)}function qe(e){return function(){var t=this,r=arguments;return new Promise(function(n,o){var a=e.apply(t,r);function i(e){ze(a,n,o,i,c,"next",e)}function c(e){ze(a,n,o,i,c,"throw",e)}i(void 0)})}}window.TKHQ=Q,document.addEventListener("DOMContentLoaded",qe(Je().m(function e(){var t,r,n,o;return Je().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,Q.initEmbeddedKey();case 1:return e.n=2,Q.getEmbeddedKey();case 2:return t=e.v,e.n=3,Q.p256JWKPrivateToPublic(t);case 3:r=e.v,n=Q.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,Ne(He),(o=Q.getSettings())&&Q.applySettings(o),Q.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return a[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=a,e=[],c.O=(t,r,n,o)=>{if(!r){var a=1/0;for(f=0;f=o)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,o0&&e[f-1][2]>o;f--)e[f]=e[f-1];e[f]=[r,n,o]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var o=Object.create(null);c.r(o);var a={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>a[t]=()=>e[t]);return a.default=()=>e,c.d(o,a),o},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},o="export-and-sign:",c.l=(e,t,r,a)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var o=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),o&&o.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise((r,o)=>n=e[t]=[r,o]);r.push(n[2]=o);var a=c.p+c.u(t),i=new Error;c.l(a,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",i.name="ChunkLoadError",i.type=o,i.request=a,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,o,[a,i,u]=r,s=0;if(a.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); -//# sourceMappingURL=bundle.2ddbc9eacea08f1f698a.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js.map b/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js.map deleted file mode 100644 index 8a92319..0000000 --- a/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"bundle.2ddbc9eacea08f1f698a.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OAOA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAKrBC,EAAgC,KAMpC,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBvD,OAAS,EAEzCkD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAApB,EAAA1B,IAAAE,EAjBA,SAAA6C,EAA6BC,GAAY,IAAAX,EAAA,OAAArC,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACP,GAA1BqE,EAASH,IACF,CAAFe,EAAAjF,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAD,EAAAjF,EAAA,EAE3CqE,EAAOc,UAClB,MACAH,EACA,CACE5B,KAAM,QACNgC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACFnB,MAAA,KAAAD,UAAA,CAuCD,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAZA,SAAAoD,IAAA,OAAAtD,IAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,WACMwE,IAAmB,CAAFe,EAAAvF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAK,EAAAvF,EAAA,EAERwF,IAAgB,OAAzB,GACG,OADHD,EAAAvE,EACO,CAAAuE,EAAAvF,EAAA,eAAAuF,EAAAvF,EAAA,EACCyF,IAAmB,OAC3CC,EADeH,EAAAvE,GACW,cAAAuE,EAAAtE,EAAA,KAAAqE,EAAA,KAG7B1B,MAAA,KAAAD,UAAA,UAKc8B,IAAiB,OAAAE,EAAA/B,MAAC,KAADD,UAAA,CAiBhC,SAAAgC,IAFC,OAEDA,EAAAjC,EAAA1B,IAAAE,EAjBA,SAAA0D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA7D,IAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACkC,GAA1BqE,EAASH,IACF,CAAF4B,EAAA9F,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAY,EAAA9F,EAAA,EAElCqE,EAAO0B,YAC3B,CACE3C,KAAM,OACNgC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA9E,EAAA8E,EAAA9F,EAAG,EASHqE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA7E,EAAA,EAAA6E,EAAA9E,GAAA,EAAA4E,EAAA,KACzDhC,MAAA,KAAAD,UAAA,CAKD,SAAS6B,IACP,IAAMU,EAASC,EAAkBpC,GACjC,OAAOmC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACExC,EACAqC,KAAKI,UAAUF,GAjJwB,OAoJ3C,CA8DA,SAASC,EAAkBE,EAAKhF,EAAOiF,GACrC,IACMC,EAAO,CACXlF,MAAOA,EACPmF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGxG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,WAC3ClG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKlF,OARV6C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUpE,MAAM,GAChBoE,EAGN,GAAIC,EAAiBnG,OAAS,GAAK,IADpB,iBACmCiC,KAAKkE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOvF,EAAIuF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE/E,SAAS,IAAIgF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI7F,MAAMI,KAAK,IAAI4E,WAAWW,IAC9BtI,EAAI2C,MAAMI,KAAK,IAAI4E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMxI,GAClC,CAkJA,SAAS0I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAvF,MAAC,KAADD,UAAA,CAsBrC,SAAAwF,IAFC,OAEDA,EAAAzF,EAAA1B,IAAAE,EAtBA,SAAAkH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAA/F,IAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAAxJ,GAAA,OACd,GAA1BqE,EAASH,IACF,CAAFsF,EAAAxJ,EAAA,cACH,IAAIkF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENnI,EACtBoI,EAAeI,QAAU,CAAC,UAAUF,EAAAxJ,EAAA,EAEZqE,EAAOc,UAC7B,MACAmE,EACA,CAAElG,KAAM,QAASgC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAxI,EAAAwI,EAAAxJ,EAAG,EAOGqE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAxI,EAAAwI,EAAAvI,EAAA,EACL,IAAIwG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BxF,MAAA,KAAAD,UAAA,CAOD,SAASgG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL1J,EAAI,EAAGA,EAAIwJ,EAAMxI,OAAQhB,IAAK,CAErC,IADA,IAAI2J,EAAQH,EAAMxJ,GACT4J,EAAI,EAAGA,EAAIF,EAAO1I,SAAU4I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO1I,OAAQ8I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAIzJ,EAAI,EAAgB,IAAbwJ,EAAMxJ,IAAYA,EAAIwJ,EAAMxI,OAAS,EAAGhB,IACtDyJ,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVlK,EAAI,EAAGA,EAAIkI,EAAElH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BgK,EAASG,QAAQjC,EAAElI,IACrB,MAAM,IAAI8E,MAAM,yBAADqD,OAA0BD,EAAElI,GAAE,6BAE/C,IAAI2J,EAAQK,EAASG,QAAQjC,EAAElI,IAKlB,GAAT2J,GAAc3J,IAAMkK,EAAalJ,QACnCkJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAajJ,QAAU2I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAhH,EAAA1B,IAAAE,EAnCA,SAAAyI,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAhJ,IAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OAAAgL,EACzDH,EAASI,EAAAjL,EACV,WADUgL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAjL,EAAA,cACX,IAAIkF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBxJ,OAAa,CAAA6J,EAAAjL,EAAA,cACzB,IAAIkF,MAAM,sDAADqD,OACyCqC,EAAgBxJ,OAAM,MAC7E,UAE2B,KAA1B0J,EAAe1J,OAAa,CAAA6J,EAAAjL,EAAA,cACxB,IAAIkF,MAAM,qDAADqD,OACwCuC,EAAe1J,OAAM,MAC3E,OAKyC,OAFpC2J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAhK,EAAA,EACnC0I,EAAaoB,IAAkB,cAAAE,EAAAhK,EAAA,EAGjC,KAAO6G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAhK,EAAA,EACK,KAAO6G,EAAsB8C,IAAgB,cAAAK,EAAAhK,EAAA,KAAA0J,EAAA,KAEzD/G,MAAA,KAAAD,UAAA,C,aCxxBD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAIA,IACmBwH,EDmGlB,WAK6B,OAAAhG,EAAAzB,MAAC,KAADD,UAAA,EC3F5B0D,EAWEiE,EAPFnD,EAOEmD,EAHFC,EDsyBF,SAAwBC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAxM,OAAOyM,QAAQ1B,GAAQ2B,QAAQ,SAAAC,GAAuB,IAp2BxDtN,EAAAF,EAo2BwDyN,GAp2BxDzN,EAo2BwD,EAp2BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EAo2BwDsN,IAp2BxD,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IAo2BmCC,EAAQL,EAAA,GAAE5L,EAAK4L,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcvM,OAChB,MAAM,IAAI8D,MAAM,sCAElB,IAAM2I,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAI3I,MAAM,+CAADqD,OACkCoF,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAavM,EAAMmM,OACzB,GAAyB,GAArBI,EAAW5M,OACb,MAAM,IAAI8D,MAAM,kBAADqD,OAAmBoF,EAAa,eAGjD,IADqBG,EAAWzK,KAAK2K,GAEnC,MAAM,IAAI9I,MAAM,yCAADqD,OAC4BoF,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECn2BElH,EAEE8G,EADF2C,EDoCF,SAG4BC,GAAA,OAAApJ,EAAAlB,MAAC,KAADD,UAAA,EC1B5B,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAPA,SAAA6C,IAAA,OAAA/C,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,WACMwE,IAAmB,CAAFS,EAAAjF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAD,EAAAjF,EAAA,EAEtBqL,IAAuB,cAAApG,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACrCnB,MAAA,KAAAD,UAAA,CAuED,SAAAwK,IAFC,OAEDA,EAAAzK,EAAA1B,IAAAE,EA/DA,SAAAkM,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA/M,IAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OA2B6B,GAxBjCwO,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAb9F,WACH+F,EAAO/F,SAASwG,cACpB,6CAIAT,EAAKjG,SACY,mCAAjBiG,EAAKjG,UAELgG,EAAcC,EAAKjG,SAGlBgG,GAAiC,oBAAXnK,SACzBmK,EAAcnK,OAAO8K,qCAK0B3K,KAH3CkK,EACJH,EAAyBC,IAE+B,CAAAO,EAAAhP,EAAA,cAClD,IAAIkF,MAAM,8EAEf,UAGCmJ,IAAwBM,EAAwC,CAAAK,EAAAhP,EAAA,cAC5D,IAAIkF,MAAM,2EAADqD,OAC8DoG,EAAwC,cAAApG,OAAa8F,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAInH,WACpCJ,EAAwBsH,IACzBK,EAAAhP,EAAA,EACuBiO,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAAhO,EACC,CAAFgO,EAAAhP,EAAA,cACN,IAAIkF,MAAM,6BAA4B,OAKW,OADnD4J,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgB1H,EAAwBkH,GAAWS,EAAAhP,EAAA,EAC5CoE,OAAOC,OAAOiL,OACzB,CAAElM,KAAM,QAASmM,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA/N,EAAA,EAAA+N,EAAAhO,GAAA,EAAAoN,EAAA,KACFxK,MAAA,KAAAD,UAAA,CA2CM,IAAM6L,EAAO,CAClBC,gBAzHF,WAG8B,OAAApK,EAAAzB,MAAC,KAADD,UAAA,EAuH5B8B,kBA5HE6F,EA6HF/E,kBA7HE+E,EA8HFnF,kBA9HEmF,EA+HF9F,eA/HE8F,EAgIF5F,eAhIE4F,EAiIFoE,mBDyBF,WACEpL,OAAOyC,aAAaK,WAAWrD,GAC/BO,OAAOyC,aAAaK,WA7Kc,8BA8KpC,EC3BE6B,uBAlIEqC,EAmIF3B,aAnIE2B,EAoIFnB,aApIEmB,EAqIFqE,UD6kBD,SASuBC,EAAAC,EAAAC,GAAA,OAAApF,EAAA9G,MAAC,KAADD,UAAA,ECrlBtBoM,cD6RF,SAAuBC,EAAMvO,EAAOwO,GAClC,IAAMpH,EAAU,CACdmH,KAAMA,EACNvO,MAAOA,GAILwO,IACFpH,EAAQoH,UAAYA,GAGlBhM,EACFA,EAA8BiM,YAAYrH,GACjCvE,OAAOM,SAAWN,QAC3BA,OAAOM,OAAOsL,YACZ,CACEF,KAAMA,EACNvO,MAAOA,GAET,KAGJ+G,EAAW,mBAADD,OAAoByH,EAAI,MAAAzH,OAAK9G,GACzC,ECnTE+G,WAvIE8C,EAwIFjE,wBAAAA,EACAS,sBAzIEwD,EA0IF6E,iCD4BF,SAA0CC,GACxCnM,EAAgCmM,CAClC,EC7BEC,iBD8HF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUlP,OAG/C,GAAIoP,EAAgB,EAAG,CACrB,IAAM5E,EAAU,IAAInE,WAAW+I,GAAeC,KAAK,GACnD,OAAO,IAAIhJ,WAAW,GAADc,OAAA/F,EAAKoJ,GAAOpJ,EAAK8N,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPvQ,EAAI,EAAGA,EAAIsQ,GAAqBtQ,EAAIkQ,EAAUlP,OAAQhB,IACxC,IAAjBkQ,EAAUlQ,IACZuQ,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIxL,MAAM,iEAADqD,OACoDmI,EAAiB,aAAAnI,OAAYoI,EAAS,MAG3G,OAAOL,EAAUpN,MAAMwN,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECxJEjB,iBAAAA,EAAAA,GACAlH,yBAAAA,EACAyI,uBApID,SAQoC1C,EAAA2C,EAAAC,GAAA,OAAA3C,EAAAvK,MAAC,KAADD,UAAA,EA6HnCoN,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EACjDsN,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAOnL,KAAKI,UAAUgL,GAExB,IAAMC,EAAcrL,KAAKC,MAAMkL,GAC/B,GAAIE,EAAYjG,OAAQ,CAEtB,IAAMkG,EAAiB/I,SAASC,eAAe,WAC/C,IAAK8I,EACH,MAAM,IAAIxM,MAAM,uDAIlB,IAAMwG,EAAcH,EAAekG,EAAYjG,QAC/C/K,OAAOyM,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IA7I1DtN,EAAAF,EA6I0DyN,GA7I1DzN,EA6I0D,EA7I1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EA6I0DsN,IA7I1D,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IA6I0ChH,EAAG4G,EAAA,GAAE5L,EAAK4L,EAAA,GAC9CqE,EAAeC,MAAMlL,GAAOhF,CAC9B,GAEA+P,EAAsB,OAAI9F,CAC5B,CAEA,OAAOtF,KAAKI,UAAUgL,EACxB,EAyBEjG,eAAAA,EACAqG,YD2BF,WACE,IAAML,EAAWjN,OAAOyC,aAAaG,QAAQlD,GAC7C,OAAOuN,EAAWnL,KAAKC,MAAMkL,GAAY,IAC3C,EC7BEM,YDmCF,SAAqBN,GACnBjN,OAAOyC,aAAaC,QAAQhD,EAAkBoC,KAAKI,UAAU+K,GAC/D,ECpCEO,gBD2mBF,SAAyB7L,GACvB,GAAIxD,MAAMC,QAAQuD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAW/C,MAAM,IAIN,KAAtB+C,EAAW7E,QAAiB,iBAAiBiC,KAAK4C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO8L,GACP,MAAM,IAAI7M,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,G,+sCEvzBA,IAAAtF,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAmS,GAAAlS,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,EAAA,UAAA9K,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAKA,IAAIoO,GAAe,CAAC,EAKdC,GAAc,IAAIC,YAClBC,GAAc,IAAIC,YAExB,SAQeC,GAAapE,EAAA2C,EAAAC,GAAA,OAAAyB,GAAA3O,MAAC,KAADD,UAAA,CA8E5B,SAAA4O,KAFC,OAEDA,GAAA7O,GAAA1B,KAAAE,EA9EA,SAAAsQ,EAA6BC,EAAQC,EAAgBC,GAAW,IAAAC,EAAAC,EAAAC,EAAAvE,EAAAwE,EAAAC,EAAA,OAAAhR,KAAAC,EAAA,SAAAgR,GAAA,cAAAA,EAAAjT,GAAA,OAMxD8S,EAAY1M,KAAKC,MAAMoM,GAAOO,EAC5BF,EAAUI,QAAOD,EAAAjT,EAClB,WADkBgT,EACV,qBAENF,EAAUK,KAAM,CAAFF,EAAAjT,EAAA,cACX,IAAIkF,MAAM,4BAA2B,UAExC4N,EAAUM,cAAe,CAAFH,EAAAjT,EAAA,cACpB,IAAIkF,MAAM,qCAAoC,UAEjD4N,EAAUzE,oBAAqB,CAAF4E,EAAAjT,EAAA,cAC1B,IAAIkF,MAAM,2CAA0C,UAIvDsK,EAAKoB,uBAAwB,CAAFqC,EAAAjT,EAAA,cACxB,IAAIkF,MAAM,qBAAoB,cAAA+N,EAAAjT,EAAA,EAErBwP,EAAKoB,uBACpBkC,EAAUzE,oBACVyE,EAAUM,cACVN,EAAUK,MACX,OAJO,GAAAF,EAAAjS,EAKO,CAAFiS,EAAAjT,EAAA,cACL,IAAIkF,MAAM,uCAADqD,OAAwCkK,IAAS,OAShE,GAJMlE,EAAanI,KAAKC,MACtB+L,GAAYiB,OAAO7D,EAAKnI,wBAAwByL,EAAUK,QAIvDT,EAAgB,CAAFO,EAAAjT,EAAA,cACX,IAAIkF,MAAM,8IAEf,UAEAqJ,EAAWmE,gBACZnE,EAAWmE,iBAAmBA,EAAc,CAAAO,EAAAjT,EAAA,cAEtC,IAAIkF,MAAM,4DAADqD,OAC+CmK,EAAc,aAAAnK,OAAYgG,EAAWmE,eAAc,MAChH,UAGEnE,EAAW+E,eAAgB,CAAFL,EAAAjT,EAAA,eACtB,IAAIkF,MAAM,kDAAiD,WAE9DqJ,EAAWgF,WAAY,CAAFN,EAAAjT,EAAA,eAClB,IAAIkF,MAAM,8CAA6C,QAKK,OAHpE0N,EAAiBpD,EAAKnI,wBACpBkH,EAAW+E,gBAEbT,EAAgBrD,EAAKnI,wBAAwBkH,EAAWgF,YAAYN,EAAAhS,EAAA,oBAIhE,IAAIiE,MAAM,wBAADqD,OAAyBuK,EAAUI,UAAU,eAAAD,EAAAjT,EAAA,GAInCwP,EAAKhK,iBAAgB,QAA9B,OAAduN,EAAcE,EAAAjS,EAAAiS,EAAAjT,EAAG,GACV2S,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAY,gBAAiBT,IACjB,eAAAE,EAAAhS,EAAA,EAAAgS,EAAAjS,GAAA,EAAAwR,EAAA,IACHD,GAAA3O,MAAA,KAAAD,UAAA,UAMc8P,GAAsBC,GAAA,OAAAC,GAAA/P,MAAC,KAADD,UAAA,CAgBrC,SAAAgQ,KAFC,OAEDA,GAAAjQ,GAAA1B,KAAAE,EAhBA,SAAAyI,EAAsCsF,GAAS,IAAA8C,EAAAa,EAAAC,EAAA,OAAA7R,KAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OACD,GAAtC+S,EAAiBvD,EAAKhK,iBAEP,CAAFyF,EAAAjL,EAAA,QACyC,OAA1DwP,EAAKO,cAAc,sBAAuB,GAAIE,GAAYhF,EAAAhK,EAAA,iBAAAgK,EAAAjL,EAAA,EAKjCwP,EAAKvG,uBAAuB8J,GAAe,OAAhEa,EAAY3I,EAAAjK,EACZ6S,EAAerE,EAAK1H,sBAAsB8L,GAGhDpE,EAAKO,cAAc,sBAAuB8D,EAAc5D,GAAW,cAAAhF,EAAAhK,EAAA,KAAA0J,EAAA,KACpE/G,MAAA,KAAAD,UAAA,UAWcmQ,GAAiBC,EAAA7K,EAAA8K,EAAAC,EAAAC,EAAAtE,GAAA,OAAAuE,GAAAvQ,MAAC,KAADD,UAAA,CAsDhC,SAAAwQ,KAFC,OAEDA,GAAAzQ,GAAA1B,KAAAE,EAtDA,SAAAkS,EACEnE,EACAyC,EACAD,EACA5H,EACAwJ,EACA1B,GAAW,IAAA2B,EAAA7N,EAAAmE,EAAAoG,EAAAlG,EAAAyJ,EAAAC,EAAA,OAAAxS,KAAAC,EAAA,SAAAwS,GAAA,cAAAA,EAAAzU,GAAA,cAAAyU,EAAAzU,EAAA,EAGYsS,GAAcG,EAAQC,EAAgBC,GAAY,OAIzB,GAJ1C2B,EAAQG,EAAAzT,EAIR4J,EAAkB,IAAInD,WAAW6M,GAErB,WAAdzJ,EAAsB,CAAA4J,EAAAzU,EAAA,QAIsC,OAHxDgR,EAAgBxB,EAAK1H,sBACzB8C,EAAgB8J,SAAS,EAAG,KAExB5J,EAAiB0E,EAAKuB,oBAAoBC,GAAcyD,EAAAzU,EAAA,EAClDwP,EAAKG,UAAU/E,EAAiBC,EAAWC,GAAe,OAAtErE,EAAGgO,EAAAzT,EAAAyT,EAAAzU,EAAG,EAAH,oBAAAyU,EAAAzU,EAAG,EAEMwP,EAAKG,UAAU/E,EAAiBC,GAAU,OAAtDpE,EAAGgO,EAAAzT,EAAA,OAOL,GAFMuT,EAAaF,GAAW,UAIZ,WAAdxJ,EAAsB,CAAA4J,EAAAzU,EAAA,QACxBwU,EAAgBG,EAAAA,GAAQC,cAAcpF,EAAKrF,aAAa1D,IAAMgO,EAAAzU,EAAA,kBACvC,gBAAd6K,EAA2B,CAAA4J,EAAAzU,EAAA,eAAAyU,EAAAzU,EAAA,EACd6U,GACpBpS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,KACzC,OAFD+N,EAAaC,EAAAzT,EAAA,OAKfiR,GAAYxI,GAAAA,GAAA,GACPwI,IAAY,GAAA6C,GAAA,GACdP,EAAa,CACZ7B,eAAAA,EACAzM,WAAYQ,EACZsO,OAAQlK,EACRjE,QAAQ,IAAIC,MAAOC,UAtKe,MAuKlCkO,QAASR,KAKbhF,EAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAAwE,EAAAxT,EAAA,KAAAmT,EAAA,IACxDD,GAAAvQ,MAAA,KAAAD,UAAA,UAUcsR,GAAepF,EAAAC,GAAA,OAAAoF,GAAAtR,MAAC,KAADD,UAAA,CAW9B,SAAAuR,KAFC,OAEDA,GAAAxR,GAAA1B,KAAAE,EAXA,SAAAiT,EAA+B5D,EAAUtB,GAAS,IAAAuB,EAAA,OAAAxP,KAAAC,EAAA,SAAAmT,GAAA,cAAAA,EAAApV,GAAA,OAE1CwR,EAAgBhC,EAAK8B,cAAcC,GAGzC/B,EAAKqC,YAAYL,GAGjBhC,EAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAAmF,EAAAnU,EAAA,KAAAkU,EAAA,KACzDvR,MAAA,KAAAD,UAAA,UAQc0R,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAA7R,MAAC,KAADD,UAAA,CAmChC,SAAA8R,KAFC,OAEDA,GAAA/R,GAAA1B,KAAAE,EAnCA,SAAAwT,EAAiCzF,EAAW0F,EAAuBtB,GAAO,IAAAE,EAAA9N,EAAAuO,EAAAY,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAjU,KAAAC,EAAA,SAAAiU,GAAA,cAAAA,EAAAlW,GAAA,OAKxE,GACKmW,GAHC1P,EAAMwL,GADNsC,EAAaF,GAAW,WAIRE,GAAwB,CAAF2B,EAAAlW,EAAA,eAAAkW,EAAAjV,EAAA,iBAAAiV,EAAAlW,EAAA,EAKtBoW,GAAmB3P,GAAI,OAIE,GAJzCuO,EAAOkB,EAAAlV,EAEP4U,EAAqBxP,KAAKC,MAAMsP,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmB5F,KAIX,CAAAkG,EAAAlW,EAAA,QAExB+V,EAAmBvG,EAAKnI,wBAAwBwO,IAChDG,EAAcK,EAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAACvB,IAElBc,EAAoBE,EAAYQ,YAAYN,EAAAlW,EAAA,qBAEtC,IAAIkF,MAAM,gCAA+B,OAG3C+Q,EAAuBzG,EAAK1H,sBAAsBgO,GAExDtG,EAAKO,cAAc,qBAAsBkG,EAAsBhG,GAAW,cAAAiG,EAAAjV,EAAA,KAAAyU,EAAA,KAC3E9R,MAAA,KAAAD,UAAA,UAQc8S,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAjT,MAAC,KAADD,UAAA,CA4C5B,SAAAkT,KAFC,OAEDA,GAAAnT,GAAA1B,KAAAE,EA5CA,SAAA4U,EAA6B7G,EAAW8G,EAAmB1C,GAAO,IAAAE,EAAA9N,EAAAuQ,EAAAC,EAAAC,EAAAC,EAAAC,EAAApC,EAAA/O,EAAAoR,EAAA,OAAArV,KAAAC,EAAA,SAAAqV,GAAA,cAAAA,EAAAtX,GAAA,OAKhE,GACKmW,GAHC1P,EAAMwL,GADNsC,EAAaF,GAAW,WAIRE,GAAwB,CAAF+C,EAAAtX,EAAA,eAAAsX,EAAArW,EAAA,UAOU,OAHhD+V,EAAiB5Q,KAAKC,MAAM0Q,GAC5BE,EAAgBD,EAAenO,QAC/BqO,EAAcF,EAAehH,KAC7BmH,EAAejF,GAAYqF,OAAON,GAAcK,EAAAtX,EAAA,EAKhCoW,GAAmB3P,GAAI,OAAhC,GAAPuO,EAAOsC,EAAAtW,EAEO,WAAhBkW,EAAwB,CAAAI,EAAAtX,EAAA,QAE1BiR,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EAIlDsC,EAAa+O,EAAQwC,UAAUtU,MAAM,EAAG,IAExCmU,EAAYpG,EAAAA,GAAkBkG,EAAclR,GAKlDmR,EAAe5H,EAAK1H,sBAAsBuP,GAAWC,EAAAtX,EAAA,eAEc,OAAnEwP,EAAKO,cAAc,QAAS,2BAA4BE,GAAWqH,EAAArW,EAAA,UAKrEuO,EAAKO,cAAc,iBAAkBqH,EAAcnH,GAAW,cAAAqH,EAAArW,EAAA,KAAA6V,EAAA,IAC/DD,GAAAjT,MAAA,KAAAD,UAAA,UAOc8T,GAAyBC,EAAAC,GAAA,OAAAC,GAAAhU,MAAC,KAADD,UAAA,CA4BxC,SAAAiU,KAFC,OAEDA,GAAAlU,GAAA1B,KAAAE,EA5BA,SAAA2V,EAAyC5H,EAAWoE,GAAO,OAAArS,KAAAC,EAAA,SAAA6V,GAAA,cAAAA,EAAA9X,GAAA,UAEpDqU,EAAS,CAAFyD,EAAA9X,EAAA,QAE0D,OADpEiS,GAAe,CAAC,EAChBzC,EAAKO,cAAc,gCAAgC,EAAME,GAAW6H,EAAA7W,EAAA,aAMjEgR,GAAaoC,GAAU,CAAFyD,EAAA9X,EAAA,QAOtB,OANFwP,EAAKO,cACH,QACA,IAAI7K,MAAM,6BAADqD,OACsB8L,EAAO,2CACpCpR,WACFgN,GACA6H,EAAA7W,EAAA,iBAMGgR,GAAaoC,GAEpB7E,EAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAA6H,EAAA7W,EAAA,KAAA4W,EAAA,KACrEjU,MAAA,KAAAD,UAAA,UAGckR,GAAmBkD,GAAA,OAAAC,GAAApU,MAAC,KAADD,UAAA,CAmBlC,SAAAqU,KAFC,OAEDA,GAAAtU,GAAA1B,KAAAE,EAnBA,SAAA+V,EAAmChS,GAAU,IAAA2E,EAAAoK,EAAA,OAAAhT,KAAAC,EAAA,SAAAiW,GAAA,cAAAA,EAAAlY,GAAA,OACa,GAGzB,MAHzB4K,EAAkB4E,EAAKsC,gBAAgB7L,IAGzB7E,OAAa,CAAA8W,EAAAlY,EAAA,QAE/BgV,EAAUL,EAAAA,GAAQwD,SAASvN,GAAiBsN,EAAAlY,EAAA,kBACR,KAA3B4K,EAAgBxJ,OAAa,CAAA8W,EAAAlY,EAAA,QAEtCgV,EAAUL,EAAAA,GAAQC,cAAchK,GAAiBsN,EAAAlY,EAAA,qBAE3C,IAAIkF,MAAM,+BAADqD,OACkBqC,EAAgBxJ,OAAM,+BACtD,cAAA8W,EAAAjX,EAAA,EAGI+T,GAAO,EAAAiD,EAAA,KACfrU,MAAA,KAAAD,UAAA,CAgBD,SAASyU,GAAgB7D,GACnBtC,GAAasC,WACRtC,GAAasC,EAExB,CA6BA,SAAS4B,GAAY1P,EAAK8N,GACxB,IAAK9N,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsDgM,EAAU,uDAC7EtR,WAIJ,IADY,IAAI4D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAMyR,GAAM,IAAIxR,MAAOC,UACjBwR,EAAoB,GAE1BC,EAAA,EAAAC,EAA6B/X,OAAOyM,QAAQ+E,IAAasG,EAAAC,EAAApX,OAAAmX,IAAE,CAAtD,IAAAE,EAAAzG,GAAAwG,EAAAD,GAAA,GAAOlE,EAAOoE,EAAA,GAAEhS,EAAGgS,EAAA,GAClBhS,EAAIG,QAAUyR,GAAO5R,EAAIG,QAC3B0R,EAAkBrO,KAAKoK,EAE3B,CAEA,IAAK,IAALqE,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAAvX,OAAAsX,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAI1T,MArDP,SAAoCqP,GACzC,MAAO,sEAAPhM,OAA6EgM,EAAU,qDACzF,CAmDoBsE,CAA2BtE,IAAatR,WAG1D,OAAO,CACT,CAEA,SAMemT,GAAkB0C,GAAA,OAAAC,GAAAnV,MAAC,KAADD,UAAA,CAcjC,SAAAoV,KAFC,OAEDA,GAAArV,GAAA1B,KAAAE,EAdA,SAAA8W,EAAkCvS,GAAG,OAAAzE,KAAAC,EAAA,SAAAgX,GAAA,cAAAA,EAAAjZ,GAAA,WAC/ByG,EAAIuO,QAAS,CAAFiE,EAAAjZ,EAAA,eAAAiZ,EAAAhY,EAAA,EACNwF,EAAIuO,SAAO,UAGD,WAAfvO,EAAIsO,OAAmB,CAAAkE,EAAAjZ,EAAA,eAAAiZ,EAAAhY,EAAA,EAClB0T,EAAAA,GAAQC,cAAcpF,EAAKrF,aAAa1D,EAAIR,cAAY,cAAAgT,EAAAjZ,EAAA,EAElD6U,GACXpS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,EAAIR,cAC7C,cAAAgT,EAAAhY,EAAA,EAAAgY,EAAAjY,GAAA,cAAAiY,EAAAhY,EAAA,KAAA+X,EAAA,KAEJpV,MAAA,KAAAD,UAAA,CAoLM,SAASuV,GAAkBvG,GAChC,IAAMwG,EA1GR,SAAkCxG,GAChC,sBAAAyG,EAAA1V,GAAA1B,KAAAE,EAAO,SAAAkH,EAAoCiQ,GAAK,IAAAC,EAAAtO,EAAAuO,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA3X,KAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAA3I,EAAA2I,EAAAxJ,GAAA,WAC1CqZ,EAAMlG,MAA8B,4BAAtBkG,EAAMlG,KAAW,KAA+B,CAAA3J,EAAAxJ,EAAA,QAG9D,OAFFwP,EAAKhH,WAAW,uBAADD,OACU8Q,EAAMlG,KAAW,KAAC,MAAA5K,OAAK8Q,EAAMlG,KAAY,MAAC,MAAA5K,OAAK8Q,EAAMlG,KAAgB,UAAC,MAAA5K,OAAK8Q,EAAMlG,KAAqB,iBAC7H3J,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEM8T,GACJuF,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAqB,eAC3BkG,EAAMlG,KAAY,MAClBkG,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAc,QACpBR,GACD,OAAAnJ,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAyY,EAAA9P,EAAAxI,EAEDwO,EAAKO,cAAc,QAASuJ,EAAErW,WAAYoW,EAAMlG,KAAgB,WAAG,WAGnEkG,EAAMlG,MAA8B,+BAAtBkG,EAAMlG,KAAW,KAAkC,CAAA3J,EAAAxJ,EAAA,QAGjE,OAFFwP,EAAKhH,WAAW,uBAADD,OACU8Q,EAAMlG,KAAW,KAAC,MAAA5K,OAAK8Q,EAAMlG,KAAY,MAAC,MAAA5K,OAAK8Q,EAAMlG,KAAqB,iBACjG3J,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEM8T,GACJuF,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAqB,eAC3BkG,EAAMlG,KAAY,WAClB1O,OACAA,EACAkO,GACD,OAAAnJ,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAmK,EAAAxB,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS/E,EAAE/H,WAAYoW,EAAMlG,KAAgB,WAAG,WAGnEkG,EAAMlG,MAA8B,kBAAtBkG,EAAMlG,KAAW,KAAqB,CAAA3J,EAAAxJ,EAAA,gBAAAwJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,GAE9CiV,GAAgBoE,EAAMlG,KAAY,MAAGkG,EAAMlG,KAAgB,WAAE,QAAA3J,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA0Y,EAAA/P,EAAAxI,EAEnEwO,EAAKO,cAAc,QAASwJ,EAAEtW,WAAYoW,EAAMlG,KAAgB,WAAG,QAGvE,GAAIkG,EAAMlG,MAA8B,sBAAtBkG,EAAMlG,KAAW,KAA2B,CAC5D3D,EAAKhH,WAAW,uBAADD,OAAwB8Q,EAAMlG,KAAW,OACxD,IACE3D,EAAKE,oBACP,CAAE,MAAO9P,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAChC,CACF,CAAC,IACGoW,EAAMlG,MAA8B,oBAAtBkG,EAAMlG,KAAW,KAAuB,CAAA3J,EAAAxJ,EAAA,SAGtD,OAFFwP,EAAKhH,WAAW,uBAADD,OACU8Q,EAAMlG,KAAW,KAAC,MAAA5K,OAAK8Q,EAAMlG,KAAY,QAChE3J,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMqV,GACJgE,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAY,MAClBkG,EAAMlG,KAAc,SACrB,QAAA3J,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA2Y,EAAAhQ,EAAAxI,EAEDwO,EAAKO,cAAc,QAASyJ,EAAEvW,WAAYoW,EAAMlG,KAAgB,WAAG,YAGnEkG,EAAMlG,MAA8B,gBAAtBkG,EAAMlG,KAAW,KAAmB,CAAA3J,EAAAxJ,EAAA,SAGlD,OAFFwP,EAAKhH,WAAW,uBAADD,OACU8Q,EAAMlG,KAAW,KAAC,MAAA5K,OAAK8Q,EAAMlG,KAAY,QAChE3J,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMyW,GACJ4C,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAY,MAClBkG,EAAMlG,KAAc,SACrB,QAAA3J,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA4Y,EAAAjQ,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS0J,EAAExW,WAAYoW,EAAMlG,KAAgB,WAAG,YAGnEkG,EAAMlG,MAA8B,8BAAtBkG,EAAMlG,KAAW,KAAiC,CAAA3J,EAAAxJ,EAAA,SACL,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwB8Q,EAAMlG,KAAW,OAAK3J,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDyX,GACJ4B,EAAMlG,KAAgB,UACtBkG,EAAMlG,KAAc,SACrB,QAAA3J,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA6Y,EAAAlQ,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS2J,EAAEzW,WAAYoW,EAAMlG,KAAgB,WAAG,YAGnEkG,EAAMlG,MAA8B,2BAAtBkG,EAAMlG,KAAW,KAA8B,CAAA3J,EAAAxJ,EAAA,SACF,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwB8Q,EAAMlG,KAAW,OAAK3J,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDyT,GAAuB4F,EAAMlG,KAAgB,WAAE,QAAA3J,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA8Y,EAAAnQ,EAAAxI,EAErDwO,EAAKO,cAAc,QAAS4J,EAAE1W,WAAYoW,EAAMlG,KAAgB,WAAG,eAAA3J,EAAAvI,EAAA,KAAAmI,EAAA,8DA9F/B,OAiGzC,SAjGyCwQ,GAAA,OAAAR,EAAAxV,MAAC,KAADD,UAAA,EAA1C,EAkGF,CAO+BkW,CAAyBlH,GAGhDmH,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAiDlC,OAnOF,WAEEpR,SAASC,eAAe,cAAcqR,iBACpC,QAAO,eAAA7M,EAAA1J,GAAA1B,KAAAE,EACP,SAAA6C,EAAOnF,GAAC,OAAAoC,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACNJ,EAAEsa,iBACF5V,OAAO4L,YAAY,CACjBF,KAAM,2BACNvO,MAAOkH,SAASC,eAAe,qBAAqBnH,MACpDoJ,UAAWlC,SAASC,eAAe,qBAAqBnH,MACxDiR,eAAgB/J,SAASC,eAAe,uBAAuBnH,QAC9D,cAAAwD,EAAAhE,EAAA,KAAA8D,EAAA,IACJ,gBAAAoV,GAAA,OAAA/M,EAAAxJ,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFgF,SAASC,eAAe,oBAAoBqR,iBAC1C,QAAO,eAAA5M,EAAA3J,GAAA1B,KAAAE,EACP,SAAAkM,EAAOxO,GAAC,OAAAoC,KAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OACNJ,EAAEsa,iBACF5V,OAAO4L,YAAY,CACjBF,KAAM,mBACNvO,MAAOkH,SAASC,eAAe,uBAAuBnH,QACrD,cAAAuN,EAAA/N,EAAA,KAAAmN,EAAA,IACJ,gBAAAgM,GAAA,OAAA/M,EAAAzJ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,gBAAgBqR,iBACtC,QAAO,eAAAI,EAAA3W,GAAA1B,KAAAE,EACP,SAAAoD,EAAO1F,GAAC,OAAAoC,KAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,OACNJ,EAAEsa,iBACF5V,OAAO4L,YAAY,CACjBF,KAAM,eACNvO,MAAOkH,SAASC,eAAe,mBAAmBnH,QACjD,cAAA8D,EAAAtE,EAAA,KAAAqE,EAAA,IACJ,gBAAAgV,GAAA,OAAAD,EAAAzW,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,SAASqR,iBAC/B,QAAO,eAAAM,EAAA7W,GAAA1B,KAAAE,EACP,SAAA0D,EAAOhG,GAAC,OAAAoC,KAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACNJ,EAAEsa,iBACF5V,OAAO4L,YAAY,CAAEF,KAAM,uBAAwB,cAAAlK,EAAA7E,EAAA,KAAA2E,EAAA,IACpD,gBAAA4U,GAAA,OAAAD,EAAA3W,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAM8W,EAAkB9R,SAASC,eAAe,iBAC5C6R,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAAhX,GAAA1B,KAAAE,EACP,SAAAyY,EAAO/a,GAAC,OAAAoC,KAAAC,EAAA,SAAA2Y,GAAA,cAAAA,EAAA5a,GAAA,OACNJ,EAAEsa,iBACF5V,OAAO4L,YAAY,CACjBF,KAAM,8BACNvO,MAAOkH,SAASC,eAAe,wBAAwBnH,MACvDiR,eAAgB/J,SAASC,eAAe,0BACrCnH,QACF,cAAAmZ,EAAA3Z,EAAA,KAAA0Z,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAA9W,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CAsHEmX,GAGAxW,OAAO2V,iBAAiB,UAAWd,EAAsB,CACvD4B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpC1W,OAAO2V,iBACL,UAAS,eAAAgB,EAAAvX,GAAA1B,KAAAE,EACT,SAAAgZ,EAAgB7B,GAAK,IAAA8B,EAAAC,EAAArI,EAAAa,EAAAC,EAAA,OAAA7R,KAAAC,EAAA,SAAAoZ,GAAA,cAAAA,EAAArb,GAAA,WAQjBqZ,EAAMlG,MACgB,gCAAtBkG,EAAMlG,KAAW,MACN,QADyCgI,EACpD9B,EAAMiC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAArb,EAAA,QAQyC,OALzD8Z,EAA0ByB,SAEpBH,EAAoB/B,EAAMiC,MAAM,IACpBE,UAAYrC,EAE9B3J,EAAKW,iCAAiCiL,GAAmBC,EAAArb,EAAA,EAEnDwP,EAAKC,gBAAgB4J,EAAMoC,QAAO,cAAAJ,EAAArb,EAAA,EACbwP,EAAKhK,iBAAgB,OAA9B,OAAduN,EAAcsI,EAAAra,EAAAqa,EAAArb,EAAG,EACIwP,EAAKvG,uBAAuB8J,GAAe,OAAhEa,EAAYyH,EAAAra,EACZ6S,EAAerE,EAAK1H,sBAAsB8L,GAC9CjL,SAASC,eAAe,gBAAgBnH,MAAQoS,EAEhDrE,EAAKO,cAAc,mBAAoB8D,GAGvCmG,EAAsBuB,QAAQ,cAAAF,EAAApa,EAAA,KAAAia,EAAA,IAEjC,gBAAAQ,GAAA,OAAAT,EAAArX,MAAA,KAAAD,UAAA,EAhCQ,GAiCT,CAAEqX,OAAQhB,EAAsBgB,SAG3B,CAAE7B,qBAAAA,EACX,C,qQCtpBA,IAAAvZ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8b,GAAA/b,EAAAE,GAAA,IAAAD,EAAAY,OAAAmb,KAAAhc,GAAA,GAAAa,OAAAob,sBAAA,KAAA3b,EAAAO,OAAAob,sBAAAjc,GAAAE,IAAAI,EAAAA,EAAA4b,OAAA,SAAAhc,GAAA,OAAAW,OAAAsb,yBAAAnc,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAoK,KAAArG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA4J,GAAA7J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAA6b,GAAAlb,OAAAZ,IAAA,GAAAsN,QAAA,SAAArN,GAAAgV,GAAAlV,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAAub,0BAAAvb,OAAAwb,iBAAArc,EAAAa,OAAAub,0BAAAnc,IAAA8b,GAAAlb,OAAAZ,IAAAsN,QAAA,SAAArN,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAAsb,yBAAAlc,EAAAC,GAAA,UAAAF,CAAA,UAAAkV,GAAAlV,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAAqc,GAAArc,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAoc,aAAA,YAAAvc,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAoc,GAAA9b,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAA8a,OAAAvc,EAAA,CAAAwc,CAAAxc,GAAA,gBAAAqc,GAAA9b,GAAAA,EAAAA,EAAA,GAAAkc,CAAAxc,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAMqc,IAAoB,IAAIpK,aAAcoF,OAAO,gBAM5C,SAAe5E,GAAWzE,GAAA,OAAAsO,GAAA5Y,MAAC,KAADD,UAAA,CAsCjC,SAAA6Y,KAFC,OA3DDxc,EA6DAgC,KAAAE,EAtCO,SAAA6C,EAAAqI,GAAA,IAAAyF,EAAAD,EAAAY,EAAAiJ,EAAAC,EAAAC,EAAAC,EAAAvU,EAAAwU,EAAAC,EAAAxD,EAAA,OAAAtX,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAApE,EAAAoE,EAAAjF,GAAA,OAKuC,OAJ5C6S,EAAazF,EAAbyF,cACAD,EAAcxF,EAAdwF,eACAY,EAAepG,EAAfoG,gBAEMiJ,EAAa,IAAIM,GAAAA,GAAqB9X,EAAAjF,EAAA,EACnByc,EAAWtX,UAClC,MAAKsE,GAAA,GACA+J,IACL,GACD,OAMC,OAVEkJ,EAAYzX,EAAAjE,EAMZ2b,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACVpY,EAAAjF,EAAA,EAEuB2c,EAAMW,uBAAuB,CACpDC,aAAcb,EACdc,IAAK5K,EACL6K,KAAMlB,KACN,OAJc,OAAZK,EAAY3X,EAAAjE,EAAAiE,EAAAjF,EAAG,EAMQiJ,EAAuBuK,GAAgB,OACA,OAD9DnL,EAAcpD,EAAAjE,EACd6b,EAAM1U,EAAyByK,EAAgBvK,GAAepD,EAAApE,EAAA,EAAAoE,EAAAjF,EAAA,EAGpD4c,EAAac,KAAK7K,EAAegK,GAAI,OAAjDC,EAAG7X,EAAAjE,EAAAiE,EAAAjF,EAAG,EAAH,mBAAAiF,EAAApE,EAAG,EAAHyY,EAAArU,EAAAjE,EAEG,IAAIkE,MACR,gGACEoU,EAAErW,YACL,cAAAgC,EAAAhE,EAAA,EAEI6b,GAAG,EAAA/X,EAAA,gBAGZyX,GA7DA,eAAA3c,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAS,OAAOkL,KAAOA,EAGd7G,SAASsR,iBAAiB,mBAAkBvW,GAAA1B,KAAAE,EAAE,SAAA6C,IAAA,IAAAgO,EAAAa,EAAAC,EAAA8J,EAAA,OAAA3b,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,cAAAiF,EAAAjF,EAAA,EACtCwP,EAAKC,kBAAiB,cAAAxK,EAAAjF,EAAA,EACCwP,EAAKhK,iBAAgB,OAA9B,OAAduN,EAAc9N,EAAAjE,EAAAiE,EAAAjF,EAAG,EACIwP,EAAKvG,uBAAuB8J,GAAe,OAAhEa,EAAY3O,EAAAjE,EACZ6S,EAAerE,EAAK1H,sBAAsB8L,GAChDjL,SAASC,eAAe,gBAAgBnH,MAAQoS,EAEhDqF,GAAkBvG,KAGZgL,EAAgBnO,EAAKoC,gBAEzBpC,EAAK8B,cAAcqM,GAGrBnO,EAAKO,cAAc,mBAAoB8D,GAAc,cAAA5O,EAAAhE,EAAA,KAAA8D,EAAA,I,kCC3BvD6Y,EAAOC,QAAUzZ,M,GCCb0Z,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBvZ,IAAjBwZ,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAUzc,KAAKqc,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoB7b,EAAIkc,ET5BpB7e,EAAW,GACfwe,EAAoBM,EAAI,CAACxU,EAAQyU,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASte,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKke,EAAUC,EAAIC,GAAYjf,EAASa,GACpCue,GAAY,EACP3U,EAAI,EAAGA,EAAIsU,EAASld,OAAQ4I,MACpB,EAAXwU,GAAsBC,GAAgBD,IAAa/d,OAAOmb,KAAKmC,EAAoBM,GAAGO,MAAOnY,GAASsX,EAAoBM,EAAE5X,GAAK6X,EAAStU,KAC9IsU,EAASO,OAAO7U,IAAK,IAErB2U,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbpf,EAASsf,OAAOze,IAAK,GACrB,IAAIN,EAAIye,SACE9Z,IAAN3E,IAAiB+J,EAAS/J,EAC/B,CACD,CACA,OAAO+J,CAnBP,CAJC2U,EAAWA,GAAY,EACvB,IAAI,IAAIpe,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKoe,EAAUpe,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACke,EAAUC,EAAIC,IUJ/BT,EAAoB/d,EAAK4d,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoB7c,EAAE4d,EAAQ,CAAE7d,EAAG6d,IAC5BA,GTNJrf,EAAWgB,OAAOmB,eAAkBod,GAASve,OAAOmB,eAAeod,GAASA,GAASA,EAAa,UAQtGjB,EAAoBle,EAAI,SAAS4B,EAAOwd,GAEvC,GADU,EAAPA,IAAUxd,EAAQyd,KAAKzd,IAChB,EAAPwd,EAAU,OAAOxd,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAPwd,GAAaxd,EAAMsd,WAAY,OAAOtd,EAC1C,GAAW,GAAPwd,GAAoC,mBAAfxd,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAI0d,EAAK1e,OAAOC,OAAO,MACvBqd,EAAoBje,EAAEqf,GACtB,IAAIC,EAAM,CAAC,EACX5f,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAI4f,EAAiB,EAAPJ,GAAYxd,GAA0B,iBAAX4d,GAAyC,mBAAXA,MAA4B7f,EAAe+K,QAAQ8U,GAAUA,EAAU5f,EAAS4f,GAC1J5e,OAAO6e,oBAAoBD,GAASlS,QAAS1G,GAAS2Y,EAAI3Y,GAAO,IAAOhF,EAAMgF,IAI/E,OAFA2Y,EAAa,QAAI,IAAM,EACvBrB,EAAoB7c,EAAEie,EAAIC,GACnBD,CACR,EUxBApB,EAAoB7c,EAAI,CAAC2c,EAAS0B,KACjC,IAAI,IAAI9Y,KAAO8Y,EACXxB,EAAoB7d,EAAEqf,EAAY9Y,KAASsX,EAAoB7d,EAAE2d,EAASpX,IAC5EhG,OAAO0B,eAAe0b,EAASpX,EAAK,CAAEpE,YAAY,EAAMmd,IAAKD,EAAW9Y,MCJ3EsX,EAAoBnd,EAAI,CAAC,EAGzBmd,EAAoBne,EAAK6f,GACjBlc,QAAQmc,IAAIjf,OAAOmb,KAAKmC,EAAoBnd,GAAG+e,OAAO,CAACC,EAAUnZ,KACvEsX,EAAoBnd,EAAE6F,GAAKgZ,EAASG,GAC7BA,GACL,KCNJ7B,EAAoBvd,EAAKif,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAf3b,WAAyB,OAAOA,WAC3C,IACC,OAAO+a,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOngB,GACR,GAAsB,iBAAX0E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxByZ,EAAoB7d,EAAI,CAAC8e,EAAKgB,IAAUvf,OAAOH,UAAU6G,eAAe5F,KAAKyd,EAAKgB,GdA9EtgB,EAAa,CAAC,EACdC,EAAoB,mBAExBoe,EAAoB1c,EAAI,CAAC4e,EAAKze,EAAMiF,EAAKgZ,KACxC,GAAG/f,EAAWugB,GAAQvgB,EAAWugB,GAAKhW,KAAKzI,OAA3C,CACA,IAAI0e,EAAQC,EACZ,QAAW1b,IAARgC,EAEF,IADA,IAAI2Z,EAAUzX,SAAS0X,qBAAqB,UACpCjgB,EAAI,EAAGA,EAAIggB,EAAQhf,OAAQhB,IAAK,CACvC,IAAIkI,EAAI8X,EAAQhgB,GAChB,GAAGkI,EAAEgY,aAAa,QAAUL,GAAO3X,EAAEgY,aAAa,iBAAmB3gB,EAAoB8G,EAAK,CAAEyZ,EAAS5X,EAAG,KAAO,CACpH,CAEG4X,IACHC,GAAa,GACbD,EAASvX,SAASG,cAAc,WAEzByX,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgB9gB,EAAoB8G,GAExDyZ,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAInW,QAAQjG,OAAOI,SAAS+W,OAAS,OAC/CyE,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtBjhB,EAAWugB,GAAO,CAACze,GACnB,IAAIsf,EAAmB,CAACC,EAAM1H,KAE7B6G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU1hB,EAAWugB,GAIzB,UAHOvgB,EAAWugB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQjU,QAASoR,GAAQA,EAAGlF,IACpC0H,EAAM,OAAOA,EAAK1H,IAElB8H,EAAUI,WAAWT,EAAiB3f,KAAK,UAAMsD,EAAW,CAAEuL,KAAM,UAAWwR,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiB3f,KAAK,KAAM+e,EAAOc,SACpDd,EAAOe,OAASH,EAAiB3f,KAAK,KAAM+e,EAAOe,QACnDd,GAAcxX,SAAS8Y,KAAKzY,YAAYkX,EAxCkB,GeH3DnC,EAAoBje,EAAK+d,IACH,oBAAX9d,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAe0b,EAAS9d,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAe0b,EAAS,aAAc,CAAEpc,OAAO,KCLvDsc,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBld,EAAI,ICCxBkd,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBnd,EAAEoJ,EAAI,CAACyV,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoB7d,EAAE2hB,EAAiBpC,GAAWoC,EAAgBpC,QAAWhb,EACtG,GAA0B,IAAvBqd,EAGF,GAAGA,EACFlC,EAAS3V,KAAK6X,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAIxe,QAAQ,CAACC,EAASwe,IAAYF,EAAqBD,EAAgBpC,GAAW,CAACjc,EAASwe,IAC1GpC,EAAS3V,KAAK6X,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBld,EAAIkd,EAAoBvd,EAAEif,GAEpD1N,EAAQ,IAAI7M,MAgBhB6Y,EAAoB1c,EAAE4e,EAfF5G,IACnB,GAAG0E,EAAoB7d,EAAE2hB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAWhb,GACrDqd,GAAoB,CACtB,IAAIG,EAAY5I,IAAyB,SAAfA,EAAMrJ,KAAkB,UAAYqJ,EAAMrJ,MAChEkS,EAAU7I,GAASA,EAAMmI,QAAUnI,EAAMmI,OAAOd,IACpD3O,EAAMlJ,QAAU,iBAAmB4W,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1FnQ,EAAM3O,KAAO,iBACb2O,EAAM/B,KAAOiS,EACblQ,EAAMoQ,QAAUD,EAChBJ,EAAmB,GAAG/P,EACvB,GAGuC,SAAW0N,EAASA,EAE/D,GAYH1B,EAAoBM,EAAErU,EAAKyV,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4BlP,KACvD,IAGI6K,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAWpP,EAGhB/S,EAAI,EAC3B,GAAGke,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoB7d,EAAEoiB,EAAatE,KACrCD,EAAoB7b,EAAE8b,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAI1Y,EAAS0Y,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2BlP,GACrD/S,EAAIke,EAASld,OAAQhB,IACzBqf,EAAUnB,EAASle,GAChB2d,EAAoB7d,EAAE2hB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAExU,IAG1B4Y,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmBtV,QAAQiV,EAAqBjhB,KAAK,KAAM,IAC3DshB,EAAmBxY,KAAOmY,EAAqBjhB,KAAK,KAAMshB,EAAmBxY,KAAK9I,KAAKshB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAE5Z,EAAW,CAAC,IAAK,IAAOsZ,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/** 48 hours in milliseconds */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n// Persist keys in memory via mapping of { address --> pk }\nlet inMemoryKeys = {};\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n let encappedKeyBuf;\n let ciphertextBuf;\n let verified;\n\n // Parse the import bundle\n const bundleObj = JSON.parse(bundle);\n switch (bundleObj.version) {\n case \"v1.0.0\":\n // Validate fields exist\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n // Verify enclave signature\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method not loaded\");\n }\n verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(`failed to verify enclave signature: ${bundle}`);\n }\n\n // Parse the signed data. The data is produced by JSON encoding followed by hex encoding. We reverse this here.\n {\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n // Validate fields match\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n }\n break;\n default:\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n\n // Decrypt the ciphertext\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk: embeddedKeyJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Parse the decrypted key bytes\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n\n // Set in memory\n // If no address provided, use a default key\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n inMemoryKeys = {\n ...inMemoryKeys,\n [keyAddress]: {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair, // Cache the keypair for performance\n },\n };\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n const privateKey = keypair.secretKey.slice(0, 32);\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // Clear the specific key from memory\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","element","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","_slicedToArray","inMemoryKeys","textEncoder","TextEncoder","textDecoder","TextDecoder","decryptBundle","_decryptBundle","_callee8","bundle","organizationId","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","bundleObj","embeddedKeyJwk","_t8","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","receiverPrivJwk","onGetPublicEmbeddedKey","_x4","_onGetPublicEmbeddedKey","targetPubBuf","targetPubHex","onInjectKeyBundle","_x5","_x7","_x8","_x9","_onInjectKeyBundle","_callee0","address","keyBytes","keyAddress","cachedKeypair","_context0","subarray","Keypair","fromSecretKey","createSolanaKeypair","_defineProperty","format","keypair","onApplySettings","_onApplySettings","_callee1","_context1","onSignTransaction","_x11","_x12","_x13","_onSignTransaction","_callee10","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context10","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x14","_x15","_x16","_onSignMessage","_callee11","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context11","encode","secretKey","onClearEmbeddedPrivateKey","_x17","_x18","_onClearEmbeddedPrivateKey","_callee12","_context12","_x19","_createSolanaKeypair","_callee13","_context13","fromSeed","clearExpiredKey","now","addressesToRemove","_i","_Object$entries","_Object$entries$_i","_i2","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x20","_getOrCreateKeypair","_callee14","_context14","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_x26","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x21","_x22","_ref3","_x23","_ref4","_x24","injectWalletBtn","_ref5","_callee5","_context5","_x25","addDOMEventListeners","capture","signal","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","origin","_x27","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","enc","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js b/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js new file mode 100644 index 0000000..c86ea77 --- /dev/null +++ b/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js @@ -0,0 +1,3 @@ +/*! For license information please see bundle.dd09773f50e375d9ca7e.js.LICENSE.txt */ +(()=>{var e,t,r,n,o,a={560:(e,t,r)=>{"use strict";var n=r(598),o=r(443),a=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,o,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,o,"GeneratorFunction"),l(p),l(p,o,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function l(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}l=function(e,t,r,n){function a(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function S(){return(S=b(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function O(){return(O=b(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!E()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,P();case 2:if(null!==e.v){e.n=4;break}return e.n=3,k();case 3:_(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function k(){return j.apply(this,arguments)}function j(){return(j=b(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function P(){var e=T(m);return e?JSON.parse(e):null}function _(e){x(m,JSON.stringify(e),1728e5)}function x(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function T(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function I(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function A(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function D(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function R(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function N(e){return M.apply(this,arguments)}function M(){return(M=b(f().m(function e(t){var r,n,o,a;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return o=e.v,e.n=3,r.exportKey("raw",o);case 3:return a=e.v,e.a(2,new Uint8Array(a))}},e)}))).apply(this,arguments)}function K(e){for(var t="",r=[0],n=0;n0;)r.push(o%58),o=o/58|0}for(var i=0;i0;){var c=r[i];a=(c=void 0===c?a:58*c+a)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function C(){return(C=b(f().m(function e(t,r,n){var o,a;return f().w(function(e){for(;;)switch(e.n){case 0:a=r,e.n="SOLANA"===a?1:"HEXADECIMAL"===a?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(o=new Uint8Array(64)).set(t,0),o.set(n,32),e.a(2,K(o));case 5:return e.a(2,"0x"+A(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+A(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function G(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return B(s,"_invoke",function(r,n,o){var a,c,u,s=0,f=o||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return a=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(B(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,B(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,B(l,"constructor",s),B(s,"constructor",u),u.displayName="GeneratorFunction",B(s,o,"GeneratorFunction"),B(l),B(l,o,"Generator"),B(l,n,function(){return this}),B(l,"toString",function(){return"[object Generator]"}),(G=function(){return{w:a,m:d}})()}function B(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}B=function(e,t,r,n){function a(t,r){B(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},B(e,t,r,n)}function L(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(t,o)||p(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],c=a[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=n[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=l}),r},$=E,W=function(e){return S.apply(this,arguments)};function X(){return(X=H(G().m(function e(){return G().w(function(e){for(;;)switch(e.n){case 0:if(!$()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,Y();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function V(){return(V=H(G().m(function e(t,r,n){var o,i,c,u,s,f,l,d;return G().w(function(e){for(;;)switch(e.n){case 0:if(o={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=o[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(t===u){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(J(u)),e.n=3,W(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,a.g8)(r),d=J(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var Q={initEmbeddedKey:function(){return X.apply(this,arguments)},generateTargetKey:k,setItemWithExpiry:x,getItemWithExpiry:T,getEmbeddedKey:P,setEmbeddedKey:_,onResetEmbeddedKey:function(){window.localStorage.removeItem(m),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:N,base58Encode:K,base58Decode:U,encodeKey:function(e,t,r){return C.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};r&&(n.requestId=r),h?h.postMessage(n):window.parent!==window&&window.parent.postMessage({type:e,value:t},"*"),R("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:R,uint8arrayFromHexString:J,uint8arrayToHexString:A,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(ae(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,ae(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,ae(l,"constructor",s),ae(s,"constructor",u),u.displayName="GeneratorFunction",ae(s,o,"GeneratorFunction"),ae(l),ae(l,o,"Generator"),ae(l,n,function(){return this}),ae(l,"toString",function(){return"[object Generator]"}),(oe=function(){return{w:a,m:d}})()}function ae(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}ae=function(e,t,r,n){function a(t,r){ae(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},ae(e,t,r,n)}function ie(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return ce(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?ce(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function ce(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(o.organizationId&&o.organizationId===r){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(o.organizationId,"."));case 9:if(o.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(o.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return e.a(2,o)}},e)}))).apply(this,arguments)}function be(e,t,r){return me.apply(this,arguments)}function me(){return me=se(oe().m(function e(t,r,n){var o,a,i,c,u;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,ye(t,r);case 1:if(o=e.v,a=Q.uint8arrayFromHexString(o.encappedPublic),i=Q.uint8arrayFromHexString(o.ciphertext),u=le){e.n=3;break}return e.n=2,Q.getEmbeddedKey();case 2:u=e.v;case 3:return c=u,e.n=4,n({ciphertextBuf:i,encappedKeyBuf:a,receiverPrivJwk:c});case 4:return e.a(2,e.v)}},e)})),me.apply(this,arguments)}function ge(e){return he.apply(this,arguments)}function he(){return(he=se(oe().m(function e(t){var r,n,o;return oe().w(function(e){for(;;)switch(e.n){case 0:if(r=Q.getEmbeddedKey()){e.n=1;break}return Q.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,Q.p256JWKPrivateToPublic(r);case 2:n=e.v,o=Q.uint8arrayToHexString(n),Q.sendMessageUp("EMBEDDED_PUBLIC_KEY",o,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function we(e,t,r,n){return Ee.apply(this,arguments)}function Ee(){return(Ee=se(oe().m(function e(t,r,n,o){var a,i,c,u,s,f;return oe().w(function(e){for(;;)switch(e.n){case 0:if(i=new Uint8Array(r),"SOLANA"!==n){e.n=2;break}return c=Q.uint8arrayToHexString(i.subarray(0,32)),u=Q.getEd25519PublicKey(c),e.n=1,Q.encodeKey(i,n,u);case 1:a=e.v,e.n=4;break;case 2:return e.n=3,Q.encodeKey(i,n);case 3:a=e.v;case 4:if(s=t||"default","SOLANA"!==n){e.n=5;break}f=Z.AX.fromSecretKey(Q.base58Decode(a)),e.n=7;break;case 5:if("HEXADECIMAL"!==n){e.n=7;break}return e.n=6,Me(Array.from(Q.uint8arrayFromHexString(a)));case 6:f=e.v;case 7:fe=re(re({},fe),{},ne({},s,{organizationId:o,privateKey:a,format:n,expiry:(new Date).getTime()+864e5,keypair:f}));case 8:return e.a(2)}},e)}))).apply(this,arguments)}function Se(e,t,r,n,o,a){return Oe.apply(this,arguments)}function Oe(){return Oe=se(oe().m(function e(t,r,n,o,a,i){var c;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,i);case 1:return c=e.v,e.n=2,we(a,c,o,r);case 2:Q.sendMessageUp("BUNDLE_INJECTED",!0,t);case 3:return e.a(2)}},e)})),Oe.apply(this,arguments)}function ke(e,t){return je.apply(this,arguments)}function je(){return(je=se(oe().m(function e(t,r){var n;return oe().w(function(e){for(;;)switch(e.n){case 0:n=Q.applySettings(t),Q.setSettings(n),Q.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function Pe(e,t,r){return _e.apply(this,arguments)}function _e(){return(_e=se(oe().m(function e(t,r,n){var o,a,i,c,u,s,f,l,d;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Be(a=fe[o=n||"default"],o)){e.n=1;break}return e.a(2);case 1:return e.n=2,Le(a);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=Q.uint8arrayFromHexString(u),(l=Z.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=Q.uint8arrayToHexString(s),Q.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function xe(e,t,r){return Te.apply(this,arguments)}function Te(){return Te=se(oe().m(function e(t,r,a){var i,c,u,s,f,l,d,p,y,v;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Be(c=fe[i=a||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=de.encode(s),e.n=2,Le(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return o.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32),v=n._S(l,y),d=Q.uint8arrayToHexString(v),e.n=4;break;case 3:return Q.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:Q.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),Te.apply(this,arguments)}function Ie(e,t){return Ae.apply(this,arguments)}function Ae(){return(Ae=se(oe().m(function e(t,r){return oe().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}return fe={},Q.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t),e.a(2);case 1:if(fe[r]){e.n=2;break}return Q.sendMessageUp("ERROR",new Error("key not found for address ".concat(r,". Note that address is case sensitive.")).toString(),t),e.a(2);case 2:delete fe[r],Q.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function De(e,t,r,n){return Re.apply(this,arguments)}function Re(){return Re=se(oe().m(function e(t,r,n,o){var a,i;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,o);case 1:return a=e.v,e.n=2,Ue(new Uint8Array(a));case 2:i=e.v,le=i,Q.sendMessageUp("DECRYPTION_KEY_INJECTED",!0,t);case 3:return e.a(2)}},e)})),Re.apply(this,arguments)}function Ne(e){le=null,Q.sendMessageUp("RESET_TO_DEFAULT_EMBEDDED_KEY",!0,e)}function Me(e){return Ke.apply(this,arguments)}function Ke(){return(Ke=se(oe().m(function e(t){var r,n;return oe().w(function(e){for(;;)switch(e.n){case 0:if(32!==(r=Q.parsePrivateKey(t)).length){e.n=1;break}n=Z.AX.fromSeed(r),e.n=3;break;case 1:if(64!==r.length){e.n=2;break}n=Z.AX.fromSecretKey(r),e.n=3;break;case 2:throw new Error("Invalid private key length: ".concat(r.length,". Expected 32 or 64 bytes."));case 3:return e.a(2,n)}},e)}))).apply(this,arguments)}function Ue(e){return Ce.apply(this,arguments)}function Ce(){return(Ce=se(oe().m(function e(t){var r,n,o;return oe().w(function(e){for(;;)switch(e.n){case 0:if(32===t.length){e.n=1;break}throw new Error("invalid decryption key length: expected 32 bytes, got ".concat(t.length));case 1:return r=new Uint8Array([48,65,2,1,0,48,19,6,7,42,134,72,206,61,2,1,6,8,42,134,72,206,61,3,1,7,4,39,48,37,2,1,1,4,32]),(n=new Uint8Array(r.length+32)).set(r),n.set(t,r.length),e.n=2,crypto.subtle.importKey("pkcs8",n,{name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return o=e.v,e.n=3,crypto.subtle.exportKey("jwk",o);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Ge(e){fe[e]&&delete fe[e]}function Be(e,t){if(!e)throw new Error("key bytes not found. Please re-inject export bundle for address ".concat(t," into iframe. Note that address is case sensitive.")).toString();if((new Date).getTime()>=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(fe);r=i.expiry&&t.push(a)}for(var c=0,u=t;c3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(ze(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,ze(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,ze(l,"constructor",s),ze(s,"constructor",u),u.displayName="GeneratorFunction",ze(s,o,"GeneratorFunction"),ze(l),ze(l,o,"Generator"),ze(l,n,function(){return this}),ze(l,"toString",function(){return"[object Generator]"}),(qe=function(){return{w:a,m:d}})()}function ze(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}ze=function(e,t,r,n){function a(t,r){ze(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},ze(e,t,r,n)}function $e(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function We(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(rt(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,rt(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,rt(l,"constructor",s),rt(s,"constructor",u),u.displayName="GeneratorFunction",rt(s,o,"GeneratorFunction"),rt(l),rt(l,o,"Generator"),rt(l,n,function(){return this}),rt(l,"toString",function(){return"[object Generator]"}),(tt=function(){return{w:a,m:d}})()}function rt(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}rt=function(e,t,r,n){function a(t,r){rt(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},rt(e,t,r,n)}function nt(e,t,r,n,o,a,i){try{var c=e[a](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,o)}function ot(e){return function(){var t=this,r=arguments;return new Promise(function(n,o){var a=e.apply(t,r);function i(e){nt(a,n,o,i,c,"next",e)}function c(e){nt(a,n,o,i,c,"throw",e)}i(void 0)})}}window.TKHQ=Q,document.addEventListener("DOMContentLoaded",ot(tt().m(function e(){var t,r,n,o;return tt().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,Q.initEmbeddedKey();case 1:return e.n=2,Q.getEmbeddedKey();case 2:return t=e.v,e.n=3,Q.p256JWKPrivateToPublic(t);case 3:r=e.v,n=Q.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,He(Ze),(o=Q.getSettings())&&Q.applySettings(o),Q.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return a[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=a,e=[],c.O=(t,r,n,o)=>{if(!r){var a=1/0;for(f=0;f=o)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,o0&&e[f-1][2]>o;f--)e[f]=e[f-1];e[f]=[r,n,o]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var o=Object.create(null);c.r(o);var a={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>a[t]=()=>e[t]);return a.default=()=>e,c.d(o,a),o},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},o="export-and-sign:",c.l=(e,t,r,a)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var o=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),o&&o.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise((r,o)=>n=e[t]=[r,o]);r.push(n[2]=o);var a=c.p+c.u(t),i=new Error;c.l(a,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",i.name="ChunkLoadError",i.type=o,i.request=a,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,o,[a,i,u]=r,s=0;if(a.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); +//# sourceMappingURL=bundle.dd09773f50e375d9ca7e.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js.LICENSE.txt b/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js.LICENSE.txt similarity index 100% rename from export-and-sign/dist/bundle.2ddbc9eacea08f1f698a.js.LICENSE.txt rename to export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js.LICENSE.txt diff --git a/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js.map b/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js.map new file mode 100644 index 0000000..efe35ed --- /dev/null +++ b/export-and-sign/dist/bundle.dd09773f50e375d9ca7e.js.map @@ -0,0 +1 @@ +{"version":3,"file":"bundle.dd09773f50e375d9ca7e.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OAOA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAKrBC,EAAgC,KAMpC,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBvD,OAAS,EAEzCkD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAApB,EAAA1B,IAAAE,EAjBA,SAAA6C,EAA6BC,GAAY,IAAAX,EAAA,OAAArC,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACP,GAA1BqE,EAASH,IACF,CAAFe,EAAAjF,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAD,EAAAjF,EAAA,EAE3CqE,EAAOc,UAClB,MACAH,EACA,CACE5B,KAAM,QACNgC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACFnB,MAAA,KAAAD,UAAA,CAuCD,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAZA,SAAAoD,IAAA,OAAAtD,IAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,WACMwE,IAAmB,CAAFe,EAAAvF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAK,EAAAvF,EAAA,EAERwF,IAAgB,OAAzB,GACG,OADHD,EAAAvE,EACO,CAAAuE,EAAAvF,EAAA,eAAAuF,EAAAvF,EAAA,EACCyF,IAAmB,OAC3CC,EADeH,EAAAvE,GACW,cAAAuE,EAAAtE,EAAA,KAAAqE,EAAA,KAG7B1B,MAAA,KAAAD,UAAA,UAKc8B,IAAiB,OAAAE,EAAA/B,MAAC,KAADD,UAAA,CAiBhC,SAAAgC,IAFC,OAEDA,EAAAjC,EAAA1B,IAAAE,EAjBA,SAAA0D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA7D,IAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACkC,GAA1BqE,EAASH,IACF,CAAF4B,EAAA9F,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAY,EAAA9F,EAAA,EAElCqE,EAAO0B,YAC3B,CACE3C,KAAM,OACNgC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA9E,EAAA8E,EAAA9F,EAAG,EASHqE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA7E,EAAA,EAAA6E,EAAA9E,GAAA,EAAA4E,EAAA,KACzDhC,MAAA,KAAAD,UAAA,CAKD,SAAS6B,IACP,IAAMU,EAASC,EAAkBpC,GACjC,OAAOmC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACExC,EACAqC,KAAKI,UAAUF,GAjJwB,OAoJ3C,CA8DA,SAASC,EAAkBE,EAAKhF,EAAOiF,GACrC,IACMC,EAAO,CACXlF,MAAOA,EACPmF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGxG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,WAC3ClG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKlF,OARV6C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUpE,MAAM,GAChBoE,EAGN,GAAIC,EAAiBnG,OAAS,GAAK,IADpB,iBACmCiC,KAAKkE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOvF,EAAIuF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE/E,SAAS,IAAIgF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI7F,MAAMI,KAAK,IAAI4E,WAAWW,IAC9BtI,EAAI2C,MAAMI,KAAK,IAAI4E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMxI,GAClC,CAkJA,SAAS0I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAvF,MAAC,KAADD,UAAA,CAsBrC,SAAAwF,IAFC,OAEDA,EAAAzF,EAAA1B,IAAAE,EAtBA,SAAAkH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAA/F,IAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAAxJ,GAAA,OACd,GAA1BqE,EAASH,IACF,CAAFsF,EAAAxJ,EAAA,cACH,IAAIkF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENnI,EACtBoI,EAAeI,QAAU,CAAC,UAAUF,EAAAxJ,EAAA,EAEZqE,EAAOc,UAC7B,MACAmE,EACA,CAAElG,KAAM,QAASgC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAxI,EAAAwI,EAAAxJ,EAAG,EAOGqE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAxI,EAAAwI,EAAAvI,EAAA,EACL,IAAIwG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BxF,MAAA,KAAAD,UAAA,CAOD,SAASgG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL1J,EAAI,EAAGA,EAAIwJ,EAAMxI,OAAQhB,IAAK,CAErC,IADA,IAAI2J,EAAQH,EAAMxJ,GACT4J,EAAI,EAAGA,EAAIF,EAAO1I,SAAU4I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO1I,OAAQ8I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAIzJ,EAAI,EAAgB,IAAbwJ,EAAMxJ,IAAYA,EAAIwJ,EAAMxI,OAAS,EAAGhB,IACtDyJ,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVlK,EAAI,EAAGA,EAAIkI,EAAElH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BgK,EAASG,QAAQjC,EAAElI,IACrB,MAAM,IAAI8E,MAAM,yBAADqD,OAA0BD,EAAElI,GAAE,6BAE/C,IAAI2J,EAAQK,EAASG,QAAQjC,EAAElI,IAKlB,GAAT2J,GAAc3J,IAAMkK,EAAalJ,QACnCkJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAajJ,QAAU2I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAhH,EAAA1B,IAAAE,EAnCA,SAAAyI,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAhJ,IAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OAAAgL,EACzDH,EAASI,EAAAjL,EACV,WADUgL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAjL,EAAA,cACX,IAAIkF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBxJ,OAAa,CAAA6J,EAAAjL,EAAA,cACzB,IAAIkF,MAAM,sDAADqD,OACyCqC,EAAgBxJ,OAAM,MAC7E,UAE2B,KAA1B0J,EAAe1J,OAAa,CAAA6J,EAAAjL,EAAA,cACxB,IAAIkF,MAAM,qDAADqD,OACwCuC,EAAe1J,OAAM,MAC3E,OAKyC,OAFpC2J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAhK,EAAA,EACnC0I,EAAaoB,IAAkB,cAAAE,EAAAhK,EAAA,EAGjC,KAAO6G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAhK,EAAA,EACK,KAAO6G,EAAsB8C,IAAgB,cAAAK,EAAAhK,EAAA,KAAA0J,EAAA,KAEzD/G,MAAA,KAAAD,UAAA,C,aCxxBD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAIA,IACmBwH,EDmGlB,WAK6B,OAAAhG,EAAAzB,MAAC,KAADD,UAAA,EC3F5B0D,EAWEiE,EAPFnD,EAOEmD,EAHFC,EDsyBF,SAAwBC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAxM,OAAOyM,QAAQ1B,GAAQ2B,QAAQ,SAAAC,GAAuB,IAp2BxDtN,EAAAF,EAo2BwDyN,GAp2BxDzN,EAo2BwD,EAp2BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EAo2BwDsN,IAp2BxD,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IAo2BmCC,EAAQL,EAAA,GAAE5L,EAAK4L,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcvM,OAChB,MAAM,IAAI8D,MAAM,sCAElB,IAAM2I,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAI3I,MAAM,+CAADqD,OACkCoF,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAavM,EAAMmM,OACzB,GAAyB,GAArBI,EAAW5M,OACb,MAAM,IAAI8D,MAAM,kBAADqD,OAAmBoF,EAAa,eAGjD,IADqBG,EAAWzK,KAAK2K,GAEnC,MAAM,IAAI9I,MAAM,yCAADqD,OAC4BoF,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECn2BElH,EAEE8G,EADF2C,EDoCF,SAG4BC,GAAA,OAAApJ,EAAAlB,MAAC,KAADD,UAAA,EC1B5B,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAPA,SAAA6C,IAAA,OAAA/C,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,WACMwE,IAAmB,CAAFS,EAAAjF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAD,EAAAjF,EAAA,EAEtBqL,IAAuB,cAAApG,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACrCnB,MAAA,KAAAD,UAAA,CAuED,SAAAwK,IAFC,OAEDA,EAAAzK,EAAA1B,IAAAE,EA/DA,SAAAkM,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA/M,IAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OA2B6B,GAxBjCwO,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAb9F,WACH+F,EAAO/F,SAASwG,cACpB,6CAIAT,EAAKjG,SACY,mCAAjBiG,EAAKjG,UAELgG,EAAcC,EAAKjG,SAGlBgG,GAAiC,oBAAXnK,SACzBmK,EAAcnK,OAAO8K,qCAK0B3K,KAH3CkK,EACJH,EAAyBC,IAE+B,CAAAO,EAAAhP,EAAA,cAClD,IAAIkF,MAAM,8EAEf,UAGCmJ,IAAwBM,EAAwC,CAAAK,EAAAhP,EAAA,cAC5D,IAAIkF,MAAM,2EAADqD,OAC8DoG,EAAwC,cAAApG,OAAa8F,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAInH,WACpCJ,EAAwBsH,IACzBK,EAAAhP,EAAA,EACuBiO,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAAhO,EACC,CAAFgO,EAAAhP,EAAA,cACN,IAAIkF,MAAM,6BAA4B,OAKW,OADnD4J,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgB1H,EAAwBkH,GAAWS,EAAAhP,EAAA,EAC5CoE,OAAOC,OAAOiL,OACzB,CAAElM,KAAM,QAASmM,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA/N,EAAA,EAAA+N,EAAAhO,GAAA,EAAAoN,EAAA,KACFxK,MAAA,KAAAD,UAAA,CA2CM,IAAM6L,EAAO,CAClBC,gBAzHF,WAG8B,OAAApK,EAAAzB,MAAC,KAADD,UAAA,EAuH5B8B,kBA5HE6F,EA6HF/E,kBA7HE+E,EA8HFnF,kBA9HEmF,EA+HF9F,eA/HE8F,EAgIF5F,eAhIE4F,EAiIFoE,mBDyBF,WACEpL,OAAOyC,aAAaK,WAAWrD,GAC/BO,OAAOyC,aAAaK,WA7Kc,8BA8KpC,EC3BE6B,uBAlIEqC,EAmIF3B,aAnIE2B,EAoIFnB,aApIEmB,EAqIFqE,UD6kBD,SASuBC,EAAAC,EAAAC,GAAA,OAAApF,EAAA9G,MAAC,KAADD,UAAA,ECrlBtBoM,cD6RF,SAAuBC,EAAMvO,EAAOwO,GAClC,IAAMpH,EAAU,CACdmH,KAAMA,EACNvO,MAAOA,GAILwO,IACFpH,EAAQoH,UAAYA,GAGlBhM,EACFA,EAA8BiM,YAAYrH,GACjCvE,OAAOM,SAAWN,QAC3BA,OAAOM,OAAOsL,YACZ,CACEF,KAAMA,EACNvO,MAAOA,GAET,KAGJ+G,EAAW,mBAADD,OAAoByH,EAAI,MAAAzH,OAAK9G,GACzC,ECnTE+G,WAvIE8C,EAwIFjE,wBAAAA,EACAS,sBAzIEwD,EA0IF6E,iCD4BF,SAA0CC,GACxCnM,EAAgCmM,CAClC,EC7BEC,iBD8HF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUlP,OAG/C,GAAIoP,EAAgB,EAAG,CACrB,IAAM5E,EAAU,IAAInE,WAAW+I,GAAeC,KAAK,GACnD,OAAO,IAAIhJ,WAAW,GAADc,OAAA/F,EAAKoJ,GAAOpJ,EAAK8N,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPvQ,EAAI,EAAGA,EAAIsQ,GAAqBtQ,EAAIkQ,EAAUlP,OAAQhB,IACxC,IAAjBkQ,EAAUlQ,IACZuQ,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIxL,MAAM,iEAADqD,OACoDmI,EAAiB,aAAAnI,OAAYoI,EAAS,MAG3G,OAAOL,EAAUpN,MAAMwN,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECxJEjB,iBAAAA,EAAAA,GACAlH,yBAAAA,EACAyI,uBApID,SAQoC1C,EAAA2C,EAAAC,GAAA,OAAA3C,EAAAvK,MAAC,KAADD,UAAA,EA6HnCoN,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EACjDsN,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAOnL,KAAKI,UAAUgL,GAExB,IAAMC,EAAcrL,KAAKC,MAAMkL,GAC/B,GAAIE,EAAYjG,OAAQ,CAEtB,IAAMkG,EAAiB/I,SAASC,eAAe,WAC/C,IAAK8I,EACH,MAAM,IAAIxM,MAAM,uDAIlB,IAAMwG,EAAcH,EAAekG,EAAYjG,QAC/C/K,OAAOyM,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IA7I1DtN,EAAAF,EA6I0DyN,GA7I1DzN,EA6I0D,EA7I1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EA6I0DsN,IA7I1D,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IA6I0ChH,EAAG4G,EAAA,GAAE5L,EAAK4L,EAAA,GAC9CqE,EAAeC,MAAMlL,GAAOhF,CAC9B,GAEA+P,EAAsB,OAAI9F,CAC5B,CAEA,OAAOtF,KAAKI,UAAUgL,EACxB,EAyBEjG,eAAAA,EACAqG,YD2BF,WACE,IAAML,EAAWjN,OAAOyC,aAAaG,QAAQlD,GAC7C,OAAOuN,EAAWnL,KAAKC,MAAMkL,GAAY,IAC3C,EC7BEM,YDmCF,SAAqBN,GACnBjN,OAAOyC,aAAaC,QAAQhD,EAAkBoC,KAAKI,UAAU+K,GAC/D,ECpCEO,gBD2mBF,SAAyB7L,GACvB,GAAIxD,MAAMC,QAAQuD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAW/C,MAAM,IAIN,KAAtB+C,EAAW7E,QAAiB,iBAAiBiC,KAAK4C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO8L,GACP,MAAM,IAAI7M,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,G,+sCEvzBA,IAAAtF,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAmS,GAAAlS,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,EAAA,UAAA9K,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAKA,IAAIoO,GAAe,CAAC,EAIhBC,GAAgB,KAKdC,GAAc,IAAIC,YAClBC,GAAc,IAAIC,YAExB,SAMeC,GAAwBrE,EAAA2C,GAAA,OAAA2B,GAAA5O,MAAC,KAADD,UAAA,CAyDvC,SAAA6O,KAFC,OAEDA,GAAA9O,GAAA1B,KAAAE,EAzDA,SAAAuQ,EAAwCC,EAAQC,GAAc,IAAAC,EAAArE,EAAA,OAAAvM,KAAAC,EAAA,SAAA4Q,GAAA,cAAAA,EAAA7S,GAAA,OACxB,GAEV,YAFpB4S,EAAYxM,KAAKC,MAAMqM,IAEfI,QAAoB,CAAAD,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,wBAADqD,OAAyBqK,EAAUE,UAAU,UAEzDF,EAAUG,KAAM,CAAFF,EAAA7S,EAAA,cACX,IAAIkF,MAAM,4BAA2B,UAExC0N,EAAUI,cAAe,CAAFH,EAAA7S,EAAA,cACpB,IAAIkF,MAAM,qCAAoC,UAEjD0N,EAAUvE,oBAAqB,CAAFwE,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,2CAA0C,UAGvDsK,EAAKoB,uBAAwB,CAAFiC,EAAA7S,EAAA,cACxB,IAAIkF,MAAM,qBAAoB,cAAA2N,EAAA7S,EAAA,EAEfwP,EAAKoB,uBAC1BgC,EAAUvE,oBACVuE,EAAUI,cACVJ,EAAUG,MACX,OAJa,GAAAF,EAAA7R,EAKC,CAAF6R,EAAA7S,EAAA,cACL,IAAIkF,MAAM,uCAADqD,OAC0BqK,EAAUI,gBAClD,OAKF,GAFKzE,EAAanI,KAAKC,MACtBgM,GAAYY,OAAOzD,EAAKnI,wBAAwBuL,EAAUG,QAGvDJ,EAAgB,CAAFE,EAAA7S,EAAA,cACX,IAAIkF,MAAM,8IAEf,UAEAqJ,EAAWoE,gBACZpE,EAAWoE,iBAAmBA,EAAc,CAAAE,EAAA7S,EAAA,cAEtC,IAAIkF,MAAM,4DAADqD,OAC+CoK,EAAc,aAAApK,OAAYgG,EAAWoE,eAAc,MAChH,UAGEpE,EAAW2E,eAAgB,CAAFL,EAAA7S,EAAA,eACtB,IAAIkF,MAAM,kDAAiD,WAE9DqJ,EAAW4E,WAAY,CAAFN,EAAA7S,EAAA,eAClB,IAAIkF,MAAM,8CAA6C,eAAA2N,EAAA5R,EAAA,EAGxDsN,GAAU,EAAAkE,EAAA,KAClB7O,MAAA,KAAAD,UAAA,UAUcyP,GAAatC,EAAAuC,EAAAC,GAAA,OAAAC,GAAA3P,MAAC,KAADD,UAAA,CAiB5B,SAAA4P,KAFC,OAEDA,GAAA7P,GAAA1B,KAAAE,EAjBA,SAAAyI,EAA6B+H,EAAQC,EAAgBa,GAAW,IAAAjF,EAAAkF,EAAAC,EAAAC,EAAAC,EAAA,OAAA5R,KAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,cAAAiL,EAAAjL,EAAA,EACrCuS,GAAyBG,EAAQC,GAAe,OAQpC,GAR/BpE,EAAUtD,EAAAjK,EAEVyS,EAAiBjE,EAAKnI,wBAC1BkH,EAAW2E,gBAEPQ,EAAgBlE,EAAKnI,wBAAwBkH,EAAW4E,YAE9DS,EACwB1B,GAAa,CAAAjH,EAAAjL,EAAA,eAAAiL,EAAAjL,EAAA,EAAWwP,EAAKhK,iBAAgB,OAAAoO,EAAA3I,EAAAjK,EAAA,OAAhD,OAAf2S,EAAeC,EAAA3I,EAAAjL,EAAG,EACXwT,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAE,gBAAAA,IACA,cAAA1I,EAAAhK,EAAA,EAAAgK,EAAAjK,GAAA,EAAA2J,EAAA,IACH4I,GAAA3P,MAAA,KAAAD,UAAA,UAMckQ,GAAsB3K,GAAA,OAAA4K,GAAAlQ,MAAC,KAADD,UAAA,CAgBrC,SAAAmQ,KAFC,OAEDA,GAAApQ,GAAA1B,KAAAE,EAhBA,SAAA6R,EAAsC9D,GAAS,IAAA+D,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAkS,GAAA,cAAAA,EAAAnU,GAAA,OACD,GAAtCgU,EAAiBxE,EAAKhK,iBAEP,CAAF2O,EAAAnU,EAAA,QACyC,OAA1DwP,EAAKO,cAAc,sBAAuB,GAAIE,GAAYkE,EAAAlT,EAAA,iBAAAkT,EAAAnU,EAAA,EAKjCwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYE,EAAAnT,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAGhDzE,EAAKO,cAAc,sBAAuBmE,EAAcjE,GAAW,cAAAkE,EAAAlT,EAAA,KAAA8S,EAAA,KACpEnQ,MAAA,KAAAD,UAAA,UAScyQ,GAAiBC,EAAAC,EAAAC,EAAA3E,GAAA,OAAA4E,GAAA5Q,MAAC,KAADD,UAAA,CAsChC,SAAA6Q,KAFC,OAEDA,GAAA9Q,GAAA1B,KAAAE,EAtCA,SAAAuS,EAAiCC,EAASC,EAAU9J,EAAW8H,GAAc,IAAAlM,EAAAmE,EAAAoG,EAAAlG,EAAA8J,EAAAC,EAAA,OAAA7S,KAAAC,EAAA,SAAA6S,GAAA,cAAAA,EAAA9U,GAAA,OAE3B,GAA1C4K,EAAkB,IAAInD,WAAWkN,GAErB,WAAd9J,EAAsB,CAAAiK,EAAA9U,EAAA,QAIsC,OAHxDgR,EAAgBxB,EAAK1H,sBACzB8C,EAAgBmK,SAAS,EAAG,KAExBjK,EAAiB0E,EAAKuB,oBAAoBC,GAAc8D,EAAA9U,EAAA,EAClDwP,EAAKG,UAAU/E,EAAiBC,EAAWC,GAAe,OAAtErE,EAAGqO,EAAA9T,EAAA8T,EAAA9U,EAAG,EAAH,oBAAA8U,EAAA9U,EAAG,EAEMwP,EAAKG,UAAU/E,EAAiBC,GAAU,OAAtDpE,EAAGqO,EAAA9T,EAAA,OAKL,GAFM4T,EAAaF,GAAW,UAIZ,WAAd7J,EAAsB,CAAAiK,EAAA9U,EAAA,QACxB6U,EAAgBG,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,IAAMqO,EAAA9U,EAAA,kBACvC,gBAAd6K,EAA2B,CAAAiK,EAAA9U,EAAA,eAAA8U,EAAA9U,EAAA,EACdkV,GACpBzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,KACzC,OAFDoO,EAAaC,EAAA9T,EAAA,OAKfiR,GAAYxI,GAAAA,GAAA,GACPwI,IAAY,GAAAkD,GAAA,GACdP,EAAa,CACZjC,eAAAA,EACA1M,WAAYQ,EACZ2O,OAAQvK,EACRjE,QAAQ,IAAIC,MAAOC,UAzJe,MA0JlCuO,QAASR,KAEX,cAAAC,EAAA7T,EAAA,KAAAwT,EAAA,KACH7Q,MAAA,KAAAD,UAAA,UAWc2R,GAAiBzF,EAAAC,EAAAyF,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAA/R,MAAC,KAADD,UAAA,CAkBhC,SAAAgS,KAFC,OAEDA,GAAAjS,GAAA1B,KAAAE,EAlBA,SAAA0T,EACE3F,EACA0C,EACAD,EACA7H,EACA6J,EACAlB,GAAW,IAAAmB,EAAA,OAAA3S,KAAAC,EAAA,SAAA4T,GAAA,cAAAA,EAAA7V,GAAA,cAAA6V,EAAA7V,EAAA,EAGYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQkB,EAAA7U,EAAA6U,EAAA7V,EAAG,EAGXoU,GAAkBM,EAASC,EAAU9J,EAAW8H,GAAe,OAGrEnD,EAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAA4F,EAAA5U,EAAA,KAAA2U,EAAA,IACxDD,GAAA/R,MAAA,KAAAD,UAAA,UAUcmS,GAAeC,EAAAC,GAAA,OAAAC,GAAArS,MAAC,KAADD,UAAA,CAW9B,SAAAsS,KAFC,OAEDA,GAAAvS,GAAA1B,KAAAE,EAXA,SAAAgU,EAA+B3E,EAAUtB,GAAS,IAAAuB,EAAA,OAAAxP,KAAAC,EAAA,SAAAkU,GAAA,cAAAA,EAAAnW,GAAA,OAE1CwR,EAAgBhC,EAAK8B,cAAcC,GAGzC/B,EAAKqC,YAAYL,GAGjBhC,EAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAAkG,EAAAlV,EAAA,KAAAiV,EAAA,KACzDtS,MAAA,KAAAD,UAAA,UAQcyS,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAA5S,MAAC,KAADD,UAAA,CAmChC,SAAA6S,KAFC,OAEDA,GAAA9S,GAAA1B,KAAAE,EAnCA,SAAAuU,EAAiCxG,EAAWyG,EAAuBhC,GAAO,IAAAE,EAAAnO,EAAA4O,EAAAsB,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAhV,KAAAC,EAAA,SAAAgV,GAAA,cAAAA,EAAAjX,GAAA,OAKxE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFqC,EAAAjX,EAAA,eAAAiX,EAAAhW,EAAA,iBAAAgW,EAAAjX,EAAA,EAKtBmX,GAAmB1Q,GAAI,OAIE,GAJzC4O,EAAO4B,EAAAjW,EAEP2V,EAAqBvQ,KAAKC,MAAMqQ,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmB3G,KAIX,CAAAiH,EAAAjX,EAAA,QAExB8W,EAAmBtH,EAAKnI,wBAAwBuP,IAChDG,EAAcK,EAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAACjC,IAElBwB,EAAoBE,EAAYQ,YAAYN,EAAAjX,EAAA,qBAEtC,IAAIkF,MAAM,gCAA+B,OAG3C8R,EAAuBxH,EAAK1H,sBAAsB+O,GAExDrH,EAAKO,cAAc,qBAAsBiH,EAAsB/G,GAAW,cAAAgH,EAAAhW,EAAA,KAAAwV,EAAA,KAC3E7S,MAAA,KAAAD,UAAA,UAQc6T,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAhU,MAAC,KAADD,UAAA,CA4C5B,SAAAiU,KAFC,OAEDA,GAAAlU,GAAA1B,KAAAE,EA5CA,SAAA2V,EAA6B5H,EAAW6H,EAAmBpD,GAAO,IAAAE,EAAAnO,EAAAsR,EAAAC,EAAAC,EAAAC,EAAAC,EAAA9C,EAAApP,EAAAmS,EAAA,OAAApW,KAAAC,EAAA,SAAAoW,GAAA,cAAAA,EAAArY,GAAA,OAKhE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFyD,EAAArY,EAAA,eAAAqY,EAAApX,EAAA,UAOU,OAHhD8W,EAAiB3R,KAAKC,MAAMyR,GAC5BE,EAAgBD,EAAelP,QAC/BoP,EAAcF,EAAe/H,KAC7BkI,EAAe/F,GAAYmG,OAAON,GAAcK,EAAArY,EAAA,EAKhCmX,GAAmB1Q,GAAI,OAAhC,GAAP4O,EAAOgD,EAAArX,EAEO,WAAhBiX,EAAwB,CAAAI,EAAArY,EAAA,QAE1BiR,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EAIlDsC,EAAaoP,EAAQkD,UAAUrV,MAAM,EAAG,IAExCkV,EAAYnH,EAAAA,GAAkBiH,EAAcjS,GAKlDkS,EAAe3I,EAAK1H,sBAAsBsQ,GAAWC,EAAArY,EAAA,eAEc,OAAnEwP,EAAKO,cAAc,QAAS,2BAA4BE,GAAWoI,EAAApX,EAAA,UAKrEuO,EAAKO,cAAc,iBAAkBoI,EAAclI,GAAW,cAAAoI,EAAApX,EAAA,KAAA4W,EAAA,IAC/DD,GAAAhU,MAAA,KAAAD,UAAA,UAOc6U,GAAyBC,EAAAC,GAAA,OAAAC,GAAA/U,MAAC,KAADD,UAAA,CA4BxC,SAAAgV,KAFC,OAEDA,GAAAjV,GAAA1B,KAAAE,EA5BA,SAAA0W,EAAyC3I,EAAWyE,GAAO,OAAA1S,KAAAC,EAAA,SAAA4W,GAAA,cAAAA,EAAA7Y,GAAA,UAEpD0U,EAAS,CAAFmE,EAAA7Y,EAAA,QAE0D,OADpEiS,GAAe,CAAC,EAChBzC,EAAKO,cAAc,gCAAgC,EAAME,GAAW4I,EAAA5X,EAAA,aAMjEgR,GAAayC,GAAU,CAAFmE,EAAA7Y,EAAA,QAOtB,OANFwP,EAAKO,cACH,QACA,IAAI7K,MAAM,6BAADqD,OACsBmM,EAAO,2CACpCzR,WACFgN,GACA4I,EAAA5X,EAAA,iBAMGgR,GAAayC,GAEpBlF,EAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAA4I,EAAA5X,EAAA,KAAA2X,EAAA,KACrEhV,MAAA,KAAAD,UAAA,UAWcmV,GAAoBC,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAvV,MAAC,KAADD,UAAA,CAmBnC,SAAAwV,KAFC,OAEDA,GAAAzV,GAAA1B,KAAAE,EAnBA,SAAAkX,EACEnJ,EACA0C,EACAD,EACAc,GAAW,IAAAmB,EAAA0E,EAAA,OAAArX,KAAAC,EAAA,SAAAqX,GAAA,cAAAA,EAAAtZ,GAAA,cAAAsZ,EAAAtZ,EAAA,EAIYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQ2E,EAAAtY,EAAAsY,EAAAtZ,EAAG,EAGIuZ,GAAuB,IAAI9R,WAAWkN,IAAU,OAA/D0E,EAAMC,EAAAtY,EAGZkR,GAAgBmH,EAEhB7J,EAAKO,cAAc,2BAA2B,EAAME,GAAW,cAAAqJ,EAAArY,EAAA,KAAAmY,EAAA,IAChED,GAAAvV,MAAA,KAAAD,UAAA,CAOD,SAAS6V,GAA4BvJ,GACnCiC,GAAgB,KAChB1C,EAAKO,cAAc,iCAAiC,EAAME,EAC5D,CAEA,SACeiF,GAAmBuE,GAAA,OAAAC,GAAA9V,MAAC,KAADD,UAAA,CAmBlC,SAAA+V,KAFC,OAEDA,GAAAhW,GAAA1B,KAAAE,EAnBA,SAAAyX,EAAmC1T,GAAU,IAAA2E,EAAAyK,EAAA,OAAArT,KAAAC,EAAA,SAAA2X,GAAA,cAAAA,EAAA5Z,GAAA,OACa,GAGzB,MAHzB4K,EAAkB4E,EAAKsC,gBAAgB7L,IAGzB7E,OAAa,CAAAwY,EAAA5Z,EAAA,QAE/BqV,EAAUL,EAAAA,GAAQ6E,SAASjP,GAAiBgP,EAAA5Z,EAAA,kBACR,KAA3B4K,EAAgBxJ,OAAa,CAAAwY,EAAA5Z,EAAA,QAEtCqV,EAAUL,EAAAA,GAAQC,cAAcrK,GAAiBgP,EAAA5Z,EAAA,qBAE3C,IAAIkF,MAAM,+BAADqD,OACkBqC,EAAgBxJ,OAAM,+BACtD,cAAAwY,EAAA3Y,EAAA,EAGIoU,GAAO,EAAAsE,EAAA,KACf/V,MAAA,KAAAD,UAAA,UASc4V,GAAsBO,GAAA,OAAAC,GAAAnW,MAAC,KAADD,UAAA,CAmDrC,SAAAoW,KAFC,OAEDA,GAAArW,GAAA1B,KAAAE,EAnDA,SAAA8X,EAAsCC,GAAkB,IAAAC,EAAAC,EAAAC,EAAA,OAAApY,KAAAC,EAAA,SAAAoY,GAAA,cAAAA,EAAAra,GAAA,UACpB,KAA9Bia,EAAmB7Y,OAAa,CAAAiZ,EAAAra,EAAA,cAC5B,IAAIkF,MAAM,yDAADqD,OAC4C0R,EAAmB7Y,SAC7E,OAkC+C,OAR5C8Y,EAAc,IAAIzS,WAAW,CACjC,GAAM,GAAM,EAAM,EAAM,EAAM,GAAM,GAAM,EAAM,EAAM,GAAM,IAAM,GAClE,IAAM,GAAM,EAAM,EAAM,EAAM,EAAM,GAAM,IAAM,GAAM,IAAM,GAAM,EAClE,EAAM,EAAM,EAAM,GAAM,GAAM,GAAM,EAAM,EAAM,EAAM,EAAM,MAGxD0S,EAAQ,IAAI1S,WAAWyS,EAAY9Y,OAAS,KAC5C8J,IAAIgP,GACVC,EAAMjP,IAAI+O,EAAoBC,EAAY9Y,QAAQiZ,EAAAra,EAAA,EAE1BoE,OAAOC,OAAOc,UACpC,QACAgV,EACA,CAAE/W,KAAM,OAAQgC,WAAY,UAC5B,EACA,CAAC,eACF,OANc,OAATgV,EAASC,EAAArZ,EAAAqZ,EAAAra,EAAG,EAQLoE,OAAOC,OAAO2B,UAAU,MAAOoU,GAAU,cAAAC,EAAApZ,EAAA,EAAAoZ,EAAArZ,GAAA,EAAAgZ,EAAA,KACvDpW,MAAA,KAAAD,UAAA,CAgBD,SAAS2W,GAAgB1F,GACnB3C,GAAa2C,WACR3C,GAAa2C,EAExB,CA6BA,SAASsC,GAAYzQ,EAAKmO,GACxB,IAAKnO,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsDqM,EAAU,uDAC7E3R,WAIJ,IADY,IAAI4D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAM2T,GAAM,IAAI1T,MAAOC,UACjB0T,EAAoB,GAE1BC,EAAA,EAAAC,EAA6Bja,OAAOyM,QAAQ+E,IAAawI,EAAAC,EAAAtZ,OAAAqZ,IAAE,CAAtD,IAAAE,EAAA3I,GAAA0I,EAAAD,GAAA,GAAO/F,EAAOiG,EAAA,GAAElU,EAAGkU,EAAA,GAClBlU,EAAIG,QAAU2T,GAAO9T,EAAIG,QAC3B4T,EAAkBvQ,KAAKyK,EAE3B,CAEA,IAAK,IAALkG,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAAzZ,OAAAwZ,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAI5V,MArDP,SAAoC0P,GACzC,MAAO,sEAAPrM,OAA6EqM,EAAU,qDACzF,CAmDoBmG,CAA2BnG,IAAa3R,WAG1D,OAAO,CACT,CAEA,SAMekU,GAAkB6D,GAAA,OAAAC,GAAArX,MAAC,KAADD,UAAA,CAcjC,SAAAsX,KAFC,OAEDA,GAAAvX,GAAA1B,KAAAE,EAdA,SAAAgZ,EAAkCzU,GAAG,OAAAzE,KAAAC,EAAA,SAAAkZ,GAAA,cAAAA,EAAAnb,GAAA,WAC/ByG,EAAI4O,QAAS,CAAF8F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EACNwF,EAAI4O,SAAO,UAGD,WAAf5O,EAAI2O,OAAmB,CAAA+F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EAClB+T,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,EAAIR,cAAY,cAAAkV,EAAAnb,EAAA,EAElDkV,GACXzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,EAAIR,cAC7C,cAAAkV,EAAAla,EAAA,EAAAka,EAAAna,GAAA,cAAAma,EAAAla,EAAA,KAAAia,EAAA,KAEJtX,MAAA,KAAAD,UAAA,CAyMM,SAASyX,GAAkB5H,GAChC,IAAM6H,EA/HR,SAAkC7H,GAChC,sBAAA8H,EAAA5X,GAAA1B,KAAAE,EAAO,SAAAkH,EAAoCmS,GAAK,IAAAC,EAAAxQ,EAAAyQ,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA9Z,KAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAA3I,EAAA2I,EAAAxJ,GAAA,WAC1Cub,EAAMxI,MAA8B,4BAAtBwI,EAAMxI,KAAW,KAA+B,CAAAvJ,EAAAxJ,EAAA,QAG9D,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAgB,UAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBAC7HvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,QACpBS,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAA2a,EAAAhS,EAAAxI,EAEDwO,EAAKO,cAAc,QAASyL,EAAEvY,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,+BAAtBwI,EAAMxI,KAAW,KAAkC,CAAAvJ,EAAAxJ,EAAA,QAGjE,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBACjGvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,WAClBtO,OACAA,EACA+O,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAmK,EAAAxB,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS/E,EAAE/H,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,kBAAtBwI,EAAMxI,KAAW,KAAqB,CAAAvJ,EAAAxJ,EAAA,gBAAAwJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,GAE9C8V,GAAgByF,EAAMxI,KAAY,MAAGwI,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA4a,EAAAjS,EAAAxI,EAEnEwO,EAAKO,cAAc,QAAS0L,EAAExY,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,sBAAtBwI,EAAMxI,KAAW,KAA2B,CAC5DvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEvD,EAAKE,oBACP,CAAE,MAAO9P,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAChC,CACF,CAAC,IACGsY,EAAMxI,MAA8B,oBAAtBwI,EAAMxI,KAAW,KAAuB,CAAAvJ,EAAAxJ,EAAA,SAGtD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMoW,GACJmF,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA6a,EAAAlS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS2L,EAAEzY,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,gBAAtBwI,EAAMxI,KAAW,KAAmB,CAAAvJ,EAAAxJ,EAAA,SAGlD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMwX,GACJ+D,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA8a,EAAAnS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS4L,EAAE1Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,8BAAtBwI,EAAMxI,KAAW,KAAiC,CAAAvJ,EAAAxJ,EAAA,SACL,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDwY,GACJ+C,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA+a,EAAApS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS6L,EAAE3Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,2BAAtBwI,EAAMxI,KAAW,KAA8B,CAAAvJ,EAAAxJ,EAAA,SACF,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD6T,GAAuB0H,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAgb,EAAArS,EAAAxI,EAErDwO,EAAKO,cAAc,QAAS8L,EAAE5Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,wBAAtBwI,EAAMxI,KAAW,KAA2B,CAAAvJ,EAAAxJ,EAAA,SACC,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD8Y,GACJyC,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBS,GACD,QAAAhK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAib,EAAAtS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS+L,EAAE7Y,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,iCAAtBwI,EAAMxI,KAAW,KAAsC,CACvEvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEyG,GAA4B+B,EAAMxI,KAAgB,UACpD,CAAE,MAAOnT,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAAYsY,EAAMxI,KAAgB,UAClE,CACF,CAAC,eAAAvJ,EAAAvI,EAAA,KAAAmI,EAAA,sEArHuC,OAsHzC,SAtHyC2S,GAAA,OAAAT,EAAA1X,MAAC,KAADD,UAAA,EAA1C,EAuHF,CAO+BqY,CAAyBxI,GAGhDyI,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAiDlC,OAxPF,WAEEvT,SAASC,eAAe,cAAcwT,iBACpC,QAAO,eAAAhP,EAAA1J,GAAA1B,KAAAE,EACP,SAAA6C,EAAOnF,GAAC,OAAAoC,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,2BACNvO,MAAOkH,SAASC,eAAe,qBAAqBnH,MACpDoJ,UAAWlC,SAASC,eAAe,qBAAqBnH,MACxDkR,eAAgBhK,SAASC,eAAe,uBAAuBnH,QAC9D,cAAAwD,EAAAhE,EAAA,KAAA8D,EAAA,IACJ,gBAAAuX,GAAA,OAAAlP,EAAAxJ,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFgF,SAASC,eAAe,oBAAoBwT,iBAC1C,QAAO,eAAA/O,EAAA3J,GAAA1B,KAAAE,EACP,SAAAkM,EAAOxO,GAAC,OAAAoC,KAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,mBACNvO,MAAOkH,SAASC,eAAe,uBAAuBnH,QACrD,cAAAuN,EAAA/N,EAAA,KAAAmN,EAAA,IACJ,gBAAAmO,GAAA,OAAAlP,EAAAzJ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,gBAAgBwT,iBACtC,QAAO,eAAAI,EAAA9Y,GAAA1B,KAAAE,EACP,SAAAoD,EAAO1F,GAAC,OAAAoC,KAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,eACNvO,MAAOkH,SAASC,eAAe,mBAAmBnH,QACjD,cAAA8D,EAAAtE,EAAA,KAAAqE,EAAA,IACJ,gBAAAmX,GAAA,OAAAD,EAAA5Y,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,SAASwT,iBAC/B,QAAO,eAAAM,EAAAhZ,GAAA1B,KAAAE,EACP,SAAA0D,EAAOhG,GAAC,OAAAoC,KAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CAAEF,KAAM,uBAAwB,cAAAlK,EAAA7E,EAAA,KAAA2E,EAAA,IACpD,gBAAA+W,GAAA,OAAAD,EAAA9Y,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAMiZ,EAAkBjU,SAASC,eAAe,iBAC5CgU,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAAnZ,GAAA1B,KAAAE,EACP,SAAA4a,EAAOld,GAAC,OAAAoC,KAAAC,EAAA,SAAA8a,GAAA,cAAAA,EAAA/c,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,8BACNvO,MAAOkH,SAASC,eAAe,wBAAwBnH,MACvDkR,eAAgBhK,SAASC,eAAe,0BACrCnH,QACF,cAAAsb,EAAA9b,EAAA,KAAA6b,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAAjZ,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CA2IEsZ,GAGA3Y,OAAO8X,iBAAiB,UAAWf,EAAsB,CACvD6B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpC7Y,OAAO8X,iBACL,UAAS,eAAAgB,EAAA1Z,GAAA1B,KAAAE,EACT,SAAAmb,EAAgB9B,GAAK,IAAA+B,EAAAC,EAAAvJ,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAub,GAAA,cAAAA,EAAAxd,GAAA,WAQjBub,EAAMxI,MACgB,gCAAtBwI,EAAMxI,KAAW,MACN,QADyCuK,EACpD/B,EAAMkC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAAxd,EAAA,QAQyC,OALzDic,EAA0ByB,SAEpBH,EAAoBhC,EAAMkC,MAAM,IACpBE,UAAYtC,EAE9B7L,EAAKW,iCAAiCoN,GAAmBC,EAAAxd,EAAA,EAEnDwP,EAAKC,gBAAgB8L,EAAMqC,QAAO,cAAAJ,EAAAxd,EAAA,EACbwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAcwJ,EAAAxc,EAAAwc,EAAAxd,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYuJ,EAAAxc,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAC9CtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhD1E,EAAKO,cAAc,mBAAoBmE,GAGvCiI,EAAsBuB,QAAQ,cAAAF,EAAAvc,EAAA,KAAAoc,EAAA,IAEjC,gBAAAQ,GAAA,OAAAT,EAAAxZ,MAAA,KAAAD,UAAA,EAhCQ,GAiCT,CAAEwZ,OAAQhB,EAAsBgB,SAG3B,CAAE9B,qBAAAA,EACX,C,qQC1xBA,IAAAzb,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAie,GAAAle,EAAAE,GAAA,IAAAD,EAAAY,OAAAsd,KAAAne,GAAA,GAAAa,OAAAud,sBAAA,KAAA9d,EAAAO,OAAAud,sBAAApe,GAAAE,IAAAI,EAAAA,EAAA+d,OAAA,SAAAne,GAAA,OAAAW,OAAAyd,yBAAAte,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAoK,KAAArG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA4J,GAAA7J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAAge,GAAArd,OAAAZ,IAAA,GAAAsN,QAAA,SAAArN,GAAAqV,GAAAvV,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAA0d,0BAAA1d,OAAA2d,iBAAAxe,EAAAa,OAAA0d,0BAAAte,IAAAie,GAAArd,OAAAZ,IAAAsN,QAAA,SAAArN,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAAyd,yBAAAre,EAAAC,GAAA,UAAAF,CAAA,UAAAuV,GAAAvV,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAAwe,GAAAxe,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAue,aAAA,YAAA1e,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAue,GAAAje,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAAid,OAAA1e,EAAA,CAAA2e,CAAA3e,GAAA,gBAAAwe,GAAAje,GAAAA,EAAAA,EAAA,GAAAqe,CAAA3e,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAMwe,IAAoB,IAAItM,aAAckG,OAAO,gBAM5C,SAAe9E,GAAWtF,GAAA,OAAAyQ,GAAA/a,MAAC,KAADD,UAAA,CAsCjC,SAAAgb,KAFC,OA3DD3e,EA6DAgC,KAAAE,EAtCO,SAAA6C,EAAAqI,GAAA,IAAAsG,EAAAD,EAAAE,EAAAiL,EAAAC,EAAAC,EAAAC,EAAA1W,EAAA2W,EAAAC,EAAAzD,EAAA,OAAAxZ,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAApE,EAAAoE,EAAAjF,GAAA,OAKuC,OAJ5C0T,EAAatG,EAAbsG,cACAD,EAAcrG,EAAdqG,eACAE,EAAevG,EAAfuG,gBAEMiL,EAAa,IAAIM,GAAAA,GAAqBja,EAAAjF,EAAA,EACnB4e,EAAWzZ,UAClC,MAAKsE,GAAA,GACAkK,IACL,GACD,OAMC,OAVEkL,EAAY5Z,EAAAjE,EAMZ8d,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACVva,EAAAjF,EAAA,EAEuB8e,EAAMW,uBAAuB,CACpDC,aAAcb,EACdc,IAAKlM,EACLmM,KAAMlB,KACN,OAJc,OAAZK,EAAY9Z,EAAAjE,EAAAiE,EAAAjF,EAAG,EAMQiJ,EAAuB0K,GAAgB,OACA,OAD9DtL,EAAcpD,EAAAjE,EACdge,EAAM7W,EAAyBsL,EAAgBpL,GAAepD,EAAApE,EAAA,EAAAoE,EAAAjF,EAAA,EAGpD+e,EAAac,KAAKnM,EAAesL,GAAI,OAAjDC,EAAGha,EAAAjE,EAAAiE,EAAAjF,EAAG,EAAH,mBAAAiF,EAAApE,EAAG,EAAH2a,EAAAvW,EAAAjE,EAEG,IAAIkE,MACR,gGACEsW,EAAEvY,YACL,cAAAgC,EAAAhE,EAAA,EAEIge,GAAG,EAAAla,EAAA,gBAGZ4Z,GA7DA,eAAA9e,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAS,OAAOkL,KAAOA,EAGd7G,SAASyT,iBAAiB,mBAAkB1Y,GAAA1B,KAAAE,EAAE,SAAA6C,IAAA,IAAAiP,EAAAC,EAAAC,EAAA4L,EAAA,OAAA9d,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,cAAAiF,EAAAjF,EAAA,EACtCwP,EAAKC,kBAAiB,cAAAxK,EAAAjF,EAAA,EACCwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAc/O,EAAAjE,EAAAiE,EAAAjF,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYhP,EAAAjE,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAChDtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhDkH,GAAkB5H,KAGZsM,EAAgBtQ,EAAKoC,gBAEzBpC,EAAK8B,cAAcwO,GAGrBtQ,EAAKO,cAAc,mBAAoBmE,GAAc,cAAAjP,EAAAhE,EAAA,KAAA8D,EAAA,I,kCC3BvDgb,EAAOC,QAAU5b,M,GCCb6b,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqB1b,IAAjB2b,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAU5e,KAAKwe,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoBhe,EAAIqe,ET5BpBhhB,EAAW,GACf2gB,EAAoBM,EAAI,CAAC3W,EAAQ4W,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASzgB,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKqgB,EAAUC,EAAIC,GAAYphB,EAASa,GACpC0gB,GAAY,EACP9W,EAAI,EAAGA,EAAIyW,EAASrf,OAAQ4I,MACpB,EAAX2W,GAAsBC,GAAgBD,IAAalgB,OAAOsd,KAAKmC,EAAoBM,GAAGO,MAAOta,GAASyZ,EAAoBM,EAAE/Z,GAAKga,EAASzW,KAC9IyW,EAASO,OAAOhX,IAAK,IAErB8W,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbvhB,EAASyhB,OAAO5gB,IAAK,GACrB,IAAIN,EAAI4gB,SACEjc,IAAN3E,IAAiB+J,EAAS/J,EAC/B,CACD,CACA,OAAO+J,CAnBP,CAJC8W,EAAWA,GAAY,EACvB,IAAI,IAAIvgB,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKugB,EAAUvgB,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACqgB,EAAUC,EAAIC,IUJ/BT,EAAoBlgB,EAAK+f,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoBhf,EAAE+f,EAAQ,CAAEhgB,EAAGggB,IAC5BA,GTNJxhB,EAAWgB,OAAOmB,eAAkBuf,GAAS1gB,OAAOmB,eAAeuf,GAASA,GAASA,EAAa,UAQtGjB,EAAoBrgB,EAAI,SAAS4B,EAAO2f,GAEvC,GADU,EAAPA,IAAU3f,EAAQ4f,KAAK5f,IAChB,EAAP2f,EAAU,OAAO3f,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAP2f,GAAa3f,EAAMyf,WAAY,OAAOzf,EAC1C,GAAW,GAAP2f,GAAoC,mBAAf3f,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAI6f,EAAK7gB,OAAOC,OAAO,MACvBwf,EAAoBpgB,EAAEwhB,GACtB,IAAIC,EAAM,CAAC,EACX/hB,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAI+hB,EAAiB,EAAPJ,GAAY3f,GAA0B,iBAAX+f,GAAyC,mBAAXA,MAA4BhiB,EAAe+K,QAAQiX,GAAUA,EAAU/hB,EAAS+hB,GAC1J/gB,OAAOghB,oBAAoBD,GAASrU,QAAS1G,GAAS8a,EAAI9a,GAAO,IAAOhF,EAAMgF,IAI/E,OAFA8a,EAAa,QAAI,IAAM,EACvBrB,EAAoBhf,EAAEogB,EAAIC,GACnBD,CACR,EUxBApB,EAAoBhf,EAAI,CAAC8e,EAAS0B,KACjC,IAAI,IAAIjb,KAAOib,EACXxB,EAAoBhgB,EAAEwhB,EAAYjb,KAASyZ,EAAoBhgB,EAAE8f,EAASvZ,IAC5EhG,OAAO0B,eAAe6d,EAASvZ,EAAK,CAAEpE,YAAY,EAAMsf,IAAKD,EAAWjb,MCJ3EyZ,EAAoBtf,EAAI,CAAC,EAGzBsf,EAAoBtgB,EAAKgiB,GACjBre,QAAQse,IAAIphB,OAAOsd,KAAKmC,EAAoBtf,GAAGkhB,OAAO,CAACC,EAAUtb,KACvEyZ,EAAoBtf,EAAE6F,GAAKmb,EAASG,GAC7BA,GACL,KCNJ7B,EAAoB1f,EAAKohB,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAf9d,WAAyB,OAAOA,WAC3C,IACC,OAAOkd,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOtiB,GACR,GAAsB,iBAAX0E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxB4b,EAAoBhgB,EAAI,CAACihB,EAAKgB,IAAU1hB,OAAOH,UAAU6G,eAAe5F,KAAK4f,EAAKgB,GdA9EziB,EAAa,CAAC,EACdC,EAAoB,mBAExBugB,EAAoB7e,EAAI,CAAC+gB,EAAK5gB,EAAMiF,EAAKmb,KACxC,GAAGliB,EAAW0iB,GAAQ1iB,EAAW0iB,GAAKnY,KAAKzI,OAA3C,CACA,IAAI6gB,EAAQC,EACZ,QAAW7d,IAARgC,EAEF,IADA,IAAI8b,EAAU5Z,SAAS6Z,qBAAqB,UACpCpiB,EAAI,EAAGA,EAAImiB,EAAQnhB,OAAQhB,IAAK,CACvC,IAAIkI,EAAIia,EAAQniB,GAChB,GAAGkI,EAAEma,aAAa,QAAUL,GAAO9Z,EAAEma,aAAa,iBAAmB9iB,EAAoB8G,EAAK,CAAE4b,EAAS/Z,EAAG,KAAO,CACpH,CAEG+Z,IACHC,GAAa,GACbD,EAAS1Z,SAASG,cAAc,WAEzB4Z,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgBjjB,EAAoB8G,GAExD4b,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAItY,QAAQjG,OAAOI,SAASkZ,OAAS,OAC/CyE,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtBpjB,EAAW0iB,GAAO,CAAC5gB,GACnB,IAAIyhB,EAAmB,CAACC,EAAM3H,KAE7B8G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU7jB,EAAW0iB,GAIzB,UAHO1iB,EAAW0iB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQpW,QAASuT,GAAQA,EAAGnF,IACpC2H,EAAM,OAAOA,EAAK3H,IAElB+H,EAAUI,WAAWT,EAAiB9hB,KAAK,UAAMsD,EAAW,CAAEuL,KAAM,UAAW2T,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiB9hB,KAAK,KAAMkhB,EAAOc,SACpDd,EAAOe,OAASH,EAAiB9hB,KAAK,KAAMkhB,EAAOe,QACnDd,GAAc3Z,SAASib,KAAK5a,YAAYqZ,EAxCkB,GeH3DnC,EAAoBpgB,EAAKkgB,IACH,oBAAXjgB,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAe6d,EAASjgB,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAe6d,EAAS,aAAc,CAAEve,OAAO,KCLvDye,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBrf,EAAI,ICCxBqf,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBtf,EAAEoJ,EAAI,CAAC4X,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoBhgB,EAAE8jB,EAAiBpC,GAAWoC,EAAgBpC,QAAWnd,EACtG,GAA0B,IAAvBwf,EAGF,GAAGA,EACFlC,EAAS9X,KAAKga,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAI3gB,QAAQ,CAACC,EAAS2gB,IAAYF,EAAqBD,EAAgBpC,GAAW,CAACpe,EAAS2gB,IAC1GpC,EAAS9X,KAAKga,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBrf,EAAIqf,EAAoB1f,EAAEohB,GAEpD7P,EAAQ,IAAI7M,MAgBhBgb,EAAoB7e,EAAE+gB,EAfF7G,IACnB,GAAG2E,EAAoBhgB,EAAE8jB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAWnd,GACrDwf,GAAoB,CACtB,IAAIG,EAAY7I,IAAyB,SAAfA,EAAMvL,KAAkB,UAAYuL,EAAMvL,MAChEqU,EAAU9I,GAASA,EAAMoI,QAAUpI,EAAMoI,OAAOd,IACpD9Q,EAAMlJ,QAAU,iBAAmB+Y,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1FtS,EAAM3O,KAAO,iBACb2O,EAAM/B,KAAOoU,EACbrS,EAAMuS,QAAUD,EAChBJ,EAAmB,GAAGlS,EACvB,GAGuC,SAAW6P,EAASA,EAE/D,GAYH1B,EAAoBM,EAAExW,EAAK4X,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4BzR,KACvD,IAGIoN,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAW3R,EAGhB3S,EAAI,EAC3B,GAAGqgB,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoBhgB,EAAEukB,EAAatE,KACrCD,EAAoBhe,EAAEie,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAI7a,EAAS6a,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2BzR,GACrD3S,EAAIqgB,EAASrf,OAAQhB,IACzBwhB,EAAUnB,EAASrgB,GAChB8f,EAAoBhgB,EAAE8jB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAE3W,IAG1B+a,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmBzX,QAAQoX,EAAqBpjB,KAAK,KAAM,IAC3DyjB,EAAmB3a,KAAOsa,EAAqBpjB,KAAK,KAAMyjB,EAAmB3a,KAAK9I,KAAKyjB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAE/b,EAAW,CAAC,IAAK,IAAOyb,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/** 48 hours in milliseconds */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n// Persist keys in memory via mapping of { address --> pk }\nlet inMemoryKeys = {};\n\n// Injected decryption key -- held in memory only, never persisted.\n// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key.\nlet decryptionKey = null;\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data.\n * @param {string} bundle - JSON-stringified bundle\n * @param {string} organizationId - Expected organization ID\n * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext}\n */\nasync function verifyAndParseBundleData(bundle, organizationId) {\n const bundleObj = JSON.parse(bundle);\n\n if (bundleObj.version !== \"v1.0.0\") {\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method not loaded\");\n }\n const verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(\n `failed to verify enclave signature: ${bundleObj.dataSignature}`\n );\n }\n\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n\n return signedData;\n}\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n const signedData = await verifyAndParseBundleData(bundle, organizationId);\n\n const encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n\n // Use the injected decryption key if available, otherwise fall back to the embedded key\n const receiverPrivJwk = decryptionKey || (await TKHQ.getEmbeddedKey());\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Encodes raw key bytes and loads them into the in-memory key store.\n * @param {string} address - Wallet address (case-sensitive)\n * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes\n * @param {string} keyFormat - \"SOLANA\" | \"HEXADECIMAL\"\n * @param {string} organizationId - Organization ID\n */\nasync function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) {\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n inMemoryKeys = {\n ...inMemoryKeys,\n [keyAddress]: {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair,\n },\n };\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Load decrypted key into memory\n await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n const privateKey = keypair.secretKey.slice(0, 32);\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // Clear the specific key from memory\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n/**\n * Handler for REPLACE_EMBEDDED_KEY events.\n * Decrypts a P-256 private key bundle using the iframe's embedded key and\n * replaces the embedded key with it for subsequent bundle decryptions.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle - v1.0.0 bundle containing the P-256 private key\n * @param {Function} HpkeDecrypt\n */\nasync function onReplaceEmbeddedKey(\n requestId,\n organizationId,\n bundle,\n HpkeDecrypt\n) {\n // Decrypt the private key using the iframe's embedded key.\n // The decrypted payload is a raw 32-byte P-256 private key scalar.\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto)\n const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes));\n\n // Store in module-level variable (memory only)\n decryptionKey = keyJwk;\n\n TKHQ.sendMessageUp(\"DECRYPTION_KEY_INJECTED\", true, requestId);\n}\n\n/**\n * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events.\n * Clears the embedded decryption key from memory, replacing it with the iframe's default embedded key.\n * @param {string} requestId\n */\nfunction onResetToDefaultEmbeddedKey(requestId) {\n decryptionKey = null;\n TKHQ.sendMessageUp(\"RESET_TO_DEFAULT_EMBEDDED_KEY\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Converts raw P-256 private key bytes (32-byte scalar) to a JWK.\n * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto\n * (which derives the public key), then exports as JWK.\n * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar\n * @returns {Promise} - Full P-256 ECDH private key JWK\n */\nasync function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) {\n if (rawPrivateKeyBytes.length !== 32) {\n throw new Error(\n `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}`\n );\n }\n\n // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes).\n // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure\n // that WebCrypto's importKey(\"pkcs8\", ...) expects.\n //\n // Structure (per RFC 5958 §2 / RFC 5208 §5):\n // SEQUENCE {\n // INTEGER 0 -- version (v1)\n // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1)\n // OID 1.2.840.10045.2.1 -- id-ecPublicKey\n // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256)\n // }\n // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3)\n // SEQUENCE {\n // INTEGER 1 -- version\n // OCTET STRING (32 bytes) -- raw private key scalar\n // }\n // }\n // }\n //\n // References:\n // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo\n // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs)\n // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding\n const pkcs8Prefix = new Uint8Array([\n 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,\n 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03,\n 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n\n const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32);\n pkcs8.set(pkcs8Prefix);\n pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length);\n\n const cryptoKey = await crypto.subtle.importKey(\n \"pkcs8\",\n pkcs8,\n { name: \"ECDH\", namedCurve: \"P-256\" },\n true,\n [\"deriveBits\"]\n );\n\n return await crypto.subtle.exportKey(\"jwk\", cryptoKey);\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"REPLACE_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onReplaceEmbeddedKey(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_TO_DEFAULT_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n onResetToDefaultEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n onReplaceEmbeddedKey,\n onResetToDefaultEmbeddedKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","element","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","_slicedToArray","inMemoryKeys","decryptionKey","textEncoder","TextEncoder","textDecoder","TextDecoder","verifyAndParseBundleData","_verifyAndParseBundleData","_callee8","bundle","organizationId","bundleObj","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","decryptBundle","_x4","_x5","_decryptBundle","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","receiverPrivJwk","_t9","onGetPublicEmbeddedKey","_onGetPublicEmbeddedKey","_callee0","embeddedKeyJwk","targetPubBuf","targetPubHex","_context0","loadKeyIntoMemory","_x7","_x8","_x9","_loadKeyIntoMemory","_callee1","address","keyBytes","keyAddress","cachedKeypair","_context1","subarray","Keypair","fromSecretKey","createSolanaKeypair","_defineProperty","format","keypair","onInjectKeyBundle","_x11","_x12","_x13","_x14","_onInjectKeyBundle","_callee10","_context10","onApplySettings","_x15","_x16","_onApplySettings","_callee11","_context11","onSignTransaction","_x17","_x18","_x19","_onSignTransaction","_callee12","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context12","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x20","_x21","_x22","_onSignMessage","_callee13","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context13","encode","secretKey","onClearEmbeddedPrivateKey","_x23","_x24","_onClearEmbeddedPrivateKey","_callee14","_context14","onReplaceEmbeddedKey","_x25","_x26","_x27","_x28","_onReplaceEmbeddedKey","_callee15","keyJwk","_context15","rawP256PrivateKeyToJwk","onResetToDefaultEmbeddedKey","_x29","_createSolanaKeypair","_callee16","_context16","fromSeed","_x30","_rawP256PrivateKeyToJwk","_callee17","rawPrivateKeyBytes","pkcs8Prefix","pkcs8","cryptoKey","_context17","clearExpiredKey","now","addressesToRemove","_i","_Object$entries","_Object$entries$_i","_i2","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x31","_getOrCreateKeypair","_callee18","_context18","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_t8","_x37","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x32","_x33","_ref3","_x34","_ref4","_x35","injectWalletBtn","_ref5","_callee5","_context5","_x36","addDOMEventListeners","capture","signal","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","origin","_x38","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","enc","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/index.html b/export-and-sign/dist/index.html index 338cfef..a4804ab 100644 --- a/export-and-sign/dist/index.html +++ b/export-and-sign/dist/index.html @@ -1 +1 @@ -Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file +Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file diff --git a/export-and-sign/index.test.js b/export-and-sign/index.test.js index b4395e8..d51484f 100644 --- a/export-and-sign/index.test.js +++ b/export-and-sign/index.test.js @@ -8,6 +8,8 @@ import { onInjectKeyBundle, onSignTransaction, getKeyNotFoundErrorMessage, + onReplaceEmbeddedKey, + onResetToDefaultEmbeddedKey, } from "./src/event-handlers.js"; jest.mock("@solana/web3.js", () => { @@ -852,3 +854,307 @@ describe("Event Handler Expiration Flow", () => { } }); }); + +describe("Decryption Key Override", () => { + const requestId = "test-request-id"; + const serializedTransaction = JSON.stringify({ + type: "SOLANA", + transaction: "00", + }); + + let dom; + let TKHQ; + let sendMessageSpy; + + // Mock raw 32-byte P-256 private key (decryption key) + // This is what Turnkey exports after HPKE decryption - raw key bytes, not a JWK. + const mockDecryptionKeyBytes = new Uint8Array(32).fill(42); + + function buildBundle(organizationId = "org-test") { + const signedData = { + organizationId, + encappedPublic: "aa", + ciphertext: "bb", + }; + + const signedDataHex = Buffer.from( + JSON.stringify(signedData), + "utf8" + ).toString("hex"); + + return JSON.stringify({ + version: "v1.0.0", + data: signedDataHex, + dataSignature: "30440220773382ac", + enclaveQuorumPublic: "04e479640d6d34", + }); + } + + beforeEach(async () => { + jest.useFakeTimers().setSystemTime(new Date("2025-01-01T00:00:00Z")); + + dom = new JSDOM( + `
`, + { + url: "http://localhost", + } + ); + + global.window = dom.window; + global.document = dom.window.document; + global.localStorage = dom.window.localStorage; + global.TextEncoder = TextEncoder; + global.TextDecoder = TextDecoder; + global.crypto = crypto.webcrypto; + + const module = await import("./src/turnkey-core.js"); + TKHQ = module.TKHQ; + dom.window.TKHQ = TKHQ; + + sendMessageSpy = jest + .spyOn(TKHQ, "sendMessageUp") + .mockImplementation(() => {}); + + jest.spyOn(TKHQ, "verifyEnclaveSignature").mockResolvedValue(true); + TKHQ.setEmbeddedKey({ foo: "bar" }); + jest.spyOn(TKHQ, "onResetEmbeddedKey").mockImplementation(() => {}); + jest.spyOn(TKHQ, "uint8arrayFromHexString").mockImplementation((hex) => { + if (typeof hex !== "string" || hex.length === 0 || hex.length % 2 !== 0) { + throw new Error("cannot create uint8array from invalid hex string"); + } + return new Uint8Array(Buffer.from(hex, "hex")); + }); + jest + .spyOn(TKHQ, "uint8arrayToHexString") + .mockImplementation((bytes) => Buffer.from(bytes).toString("hex")); + jest + .spyOn(TKHQ, "getEd25519PublicKey") + .mockReturnValue(new Uint8Array(32).fill(3)); + jest + .spyOn(TKHQ, "encodeKey") + .mockImplementation(async (keyBytes, format) => { + if (format === "SOLANA") { + return "2P3qgS5A18gGmZJmYHNxYrDYPyfm6S3dJgs8tPW6ki6i2o4yx7K8r5N8CF7JpEtQiW8mx1kSktpgyDG1xuWNzfsM"; + } + return "encoded-key-material"; + }); + jest + .spyOn(TKHQ, "parsePrivateKey") + .mockReturnValue(new Uint8Array(64).fill(5)); + }); + + afterEach(() => { + // Reset module-level decryptionKey + onResetToDefaultEmbeddedKey("cleanup"); + jest.useRealTimers(); + jest.restoreAllMocks(); + delete global.window; + delete global.document; + delete global.localStorage; + delete global.crypto; + }); + + describe("REPLACE_EMBEDDED_KEY handler", () => { + it("decrypts and stores the decryption key", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(mockDecryptionKeyBytes); + + await onReplaceEmbeddedKey( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + expect(HpkeDecryptMock).toHaveBeenCalledTimes(1); + expect(sendMessageSpy).toHaveBeenCalledWith( + "DECRYPTION_KEY_INJECTED", + true, + requestId + ); + }); + + it("rejects invalid decryption key length", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(16).fill(1)); + + await expect( + onReplaceEmbeddedKey( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ) + ).rejects.toThrow("invalid decryption key length"); + }); + + it("uses injected key for subsequent bundle decryptions", async () => { + // 1. Replace embedded key with decryption key + let callCount = 0; + const HpkeDecryptMock = jest.fn().mockImplementation(() => { + callCount++; + if (callCount === 1) { + // First call: decrypting the decryption key bundle itself (uses embedded key) + return Promise.resolve(mockDecryptionKeyBytes); + } + // Subsequent calls: decrypting wallet bundles (should use the injected key) + return Promise.resolve(new Uint8Array(64).fill(9)); + }); + + await onReplaceEmbeddedKey( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + // 2. Inject a wallet bundle normally — decryptBundle should use the injected key + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet1", + HpkeDecryptMock + ); + + // Verify the second HpkeDecrypt call used the injected key (not the embedded key) + const secondCall = HpkeDecryptMock.mock.calls[1][0]; + expect(secondCall.receiverPrivJwk).not.toEqual({ foo: "bar" }); // not the embedded key + expect(secondCall.receiverPrivJwk.kty).toBe("EC"); + expect(secondCall.receiverPrivJwk.crv).toBe("P-256"); + + // 3. Verify key is usable by signing + await onSignTransaction(requestId, serializedTransaction, "wallet1"); + expect(sendMessageSpy).toHaveBeenCalledWith( + "TRANSACTION_SIGNED", + expect.any(String), + requestId + ); + }); + }); + + describe("RESET_TO_DEFAULT_EMBEDDED_KEY handler", () => { + it("clears the injected decryption key", async () => { + // 1. Replace embedded key + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(mockDecryptionKeyBytes); + + await onReplaceEmbeddedKey( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + // 2. Reset to default + onResetToDefaultEmbeddedKey(requestId); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "RESET_TO_DEFAULT_EMBEDDED_KEY", + true, + requestId + ); + + // 3. Next bundle decryption should use the embedded key again + HpkeDecryptMock.mockResolvedValue(new Uint8Array(64).fill(9)); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet1", + HpkeDecryptMock + ); + + const lastCall = + HpkeDecryptMock.mock.calls[HpkeDecryptMock.mock.calls.length - 1][0]; + expect(lastCall.receiverPrivJwk).toEqual({ foo: "bar" }); // back to the embedded key + }); + }); + + describe("Full Lifecycle", () => { + it("replace key -> inject bundles -> sign -> reset -> inject uses embedded key", async () => { + // 1. Replace embedded key with decryption key + let callCount = 0; + const HpkeDecryptMock = jest.fn().mockImplementation(() => { + callCount++; + if (callCount === 1) { + return Promise.resolve(mockDecryptionKeyBytes); + } + return Promise.resolve(new Uint8Array(64).fill(9)); + }); + + await onReplaceEmbeddedKey( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "DECRYPTION_KEY_INJECTED", + true, + requestId + ); + + // 2. Inject wallet bundles normally (decrypted with injected key) + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-a", + HpkeDecryptMock + ); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-b", + HpkeDecryptMock + ); + + // 3. Sign transactions + await onSignTransaction(requestId, serializedTransaction, "wallet-a"); + expect(sendMessageSpy).toHaveBeenCalledWith( + "TRANSACTION_SIGNED", + expect.any(String), + requestId + ); + + await onSignTransaction(requestId, serializedTransaction, "wallet-b"); + expect(sendMessageSpy).toHaveBeenCalledWith( + "TRANSACTION_SIGNED", + expect.any(String), + requestId + ); + + // 4. Reset to default embedded key + onResetToDefaultEmbeddedKey(requestId); + expect(sendMessageSpy).toHaveBeenCalledWith( + "RESET_TO_DEFAULT_EMBEDDED_KEY", + true, + requestId + ); + + // 5. Next inject uses embedded key (not the injected one) + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-c", + HpkeDecryptMock + ); + + const lastCall = + HpkeDecryptMock.mock.calls[HpkeDecryptMock.mock.calls.length - 1][0]; + expect(lastCall.receiverPrivJwk).toEqual({ foo: "bar" }); // embedded key + }); + }); +}); diff --git a/export-and-sign/src/event-handlers.js b/export-and-sign/src/event-handlers.js index bbfdf5b..ce4bb59 100644 --- a/export-and-sign/src/event-handlers.js +++ b/export-and-sign/src/event-handlers.js @@ -6,12 +6,79 @@ import * as nobleHashes from "@noble/hashes/sha512"; // Persist keys in memory via mapping of { address --> pk } let inMemoryKeys = {}; +// Injected decryption key -- held in memory only, never persisted. +// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key. +let decryptionKey = null; + export const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds // Instantiate these once (for perf) const textEncoder = new TextEncoder(); const textDecoder = new TextDecoder(); +/** + * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data. + * @param {string} bundle - JSON-stringified bundle + * @param {string} organizationId - Expected organization ID + * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext} + */ +async function verifyAndParseBundleData(bundle, organizationId) { + const bundleObj = JSON.parse(bundle); + + if (bundleObj.version !== "v1.0.0") { + throw new Error(`unsupported version: ${bundleObj.version}`); + } + if (!bundleObj.data) { + throw new Error('missing "data" in bundle'); + } + if (!bundleObj.dataSignature) { + throw new Error('missing "dataSignature" in bundle'); + } + if (!bundleObj.enclaveQuorumPublic) { + throw new Error('missing "enclaveQuorumPublic" in bundle'); + } + + if (!TKHQ.verifyEnclaveSignature) { + throw new Error("method not loaded"); + } + const verified = await TKHQ.verifyEnclaveSignature( + bundleObj.enclaveQuorumPublic, + bundleObj.dataSignature, + bundleObj.data + ); + if (!verified) { + throw new Error( + `failed to verify enclave signature: ${bundleObj.dataSignature}` + ); + } + + const signedData = JSON.parse( + textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data)) + ); + + if (!organizationId) { + throw new Error( + `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass "organizationId" for security purposes.` + ); + } else if ( + !signedData.organizationId || + signedData.organizationId !== organizationId + ) { + throw new Error( + `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.` + ); + } + + if (!signedData.encappedPublic) { + throw new Error('missing "encappedPublic" in bundle signed data'); + } + if (!signedData.ciphertext) { + throw new Error('missing "ciphertext" in bundle signed data'); + } + + return signedData; +} + /** * Parse and decrypt the export bundle. * The `bundle` param is a JSON string of the encapsulated public @@ -21,80 +88,19 @@ const textDecoder = new TextDecoder(); * @param {Function} HpkeDecrypt */ async function decryptBundle(bundle, organizationId, HpkeDecrypt) { - let encappedKeyBuf; - let ciphertextBuf; - let verified; - - // Parse the import bundle - const bundleObj = JSON.parse(bundle); - switch (bundleObj.version) { - case "v1.0.0": - // Validate fields exist - if (!bundleObj.data) { - throw new Error('missing "data" in bundle'); - } - if (!bundleObj.dataSignature) { - throw new Error('missing "dataSignature" in bundle'); - } - if (!bundleObj.enclaveQuorumPublic) { - throw new Error('missing "enclaveQuorumPublic" in bundle'); - } - - // Verify enclave signature - if (!TKHQ.verifyEnclaveSignature) { - throw new Error("method not loaded"); - } - verified = await TKHQ.verifyEnclaveSignature( - bundleObj.enclaveQuorumPublic, - bundleObj.dataSignature, - bundleObj.data - ); - if (!verified) { - throw new Error(`failed to verify enclave signature: ${bundle}`); - } + const signedData = await verifyAndParseBundleData(bundle, organizationId); - // Parse the signed data. The data is produced by JSON encoding followed by hex encoding. We reverse this here. - { - const signedData = JSON.parse( - textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data)) - ); - - // Validate fields match - if (!organizationId) { - throw new Error( - `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass "organizationId" for security purposes.` - ); - } else if ( - !signedData.organizationId || - signedData.organizationId !== organizationId - ) { - throw new Error( - `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.` - ); - } - - if (!signedData.encappedPublic) { - throw new Error('missing "encappedPublic" in bundle signed data'); - } - if (!signedData.ciphertext) { - throw new Error('missing "ciphertext" in bundle signed data'); - } - encappedKeyBuf = TKHQ.uint8arrayFromHexString( - signedData.encappedPublic - ); - ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext); - } - break; - default: - throw new Error(`unsupported version: ${bundleObj.version}`); - } + const encappedKeyBuf = TKHQ.uint8arrayFromHexString( + signedData.encappedPublic + ); + const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext); - // Decrypt the ciphertext - const embeddedKeyJwk = await TKHQ.getEmbeddedKey(); + // Use the injected decryption key if available, otherwise fall back to the embedded key + const receiverPrivJwk = decryptionKey || (await TKHQ.getEmbeddedKey()); return await HpkeDecrypt({ ciphertextBuf, encappedKeyBuf, - receiverPrivJwk: embeddedKeyJwk, + receiverPrivJwk, }); } @@ -119,26 +125,13 @@ async function onGetPublicEmbeddedKey(requestId) { } /** - * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received. - * @param {string} requestId - * @param {string} organizationId - * @param {string} bundle - * @param {string} keyFormat - * @param {string} address - * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around) + * Encodes raw key bytes and loads them into the in-memory key store. + * @param {string} address - Wallet address (case-sensitive) + * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes + * @param {string} keyFormat - "SOLANA" | "HEXADECIMAL" + * @param {string} organizationId - Organization ID */ -async function onInjectKeyBundle( - requestId, - organizationId, - bundle, - keyFormat, - address, - HpkeDecrypt -) { - // Decrypt the export bundle - const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt); - - // Parse the decrypted key bytes +async function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) { let key; const privateKeyBytes = new Uint8Array(keyBytes); @@ -152,8 +145,6 @@ async function onInjectKeyBundle( key = await TKHQ.encodeKey(privateKeyBytes, keyFormat); } - // Set in memory - // If no address provided, use a default key const keyAddress = address || "default"; // Cache keypair for improved signing perf @@ -173,9 +164,33 @@ async function onInjectKeyBundle( privateKey: key, format: keyFormat, expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS, - keypair: cachedKeypair, // Cache the keypair for performance + keypair: cachedKeypair, }, }; +} + +/** + * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received. + * @param {string} requestId + * @param {string} organizationId + * @param {string} bundle + * @param {string} keyFormat + * @param {string} address + * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around) + */ +async function onInjectKeyBundle( + requestId, + organizationId, + bundle, + keyFormat, + address, + HpkeDecrypt +) { + // Decrypt the export bundle + const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt); + + // Load decrypted key into memory + await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId); // Send up BUNDLE_INJECTED message TKHQ.sendMessageUp("BUNDLE_INJECTED", true, requestId); @@ -324,6 +339,44 @@ async function onClearEmbeddedPrivateKey(requestId, address) { TKHQ.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED", true, requestId); } +/** + * Handler for REPLACE_EMBEDDED_KEY events. + * Decrypts a P-256 private key bundle using the iframe's embedded key and + * replaces the embedded key with it for subsequent bundle decryptions. + * @param {string} requestId + * @param {string} organizationId + * @param {string} bundle - v1.0.0 bundle containing the P-256 private key + * @param {Function} HpkeDecrypt + */ +async function onReplaceEmbeddedKey( + requestId, + organizationId, + bundle, + HpkeDecrypt +) { + // Decrypt the private key using the iframe's embedded key. + // The decrypted payload is a raw 32-byte P-256 private key scalar. + const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt); + + // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto) + const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes)); + + // Store in module-level variable (memory only) + decryptionKey = keyJwk; + + TKHQ.sendMessageUp("DECRYPTION_KEY_INJECTED", true, requestId); +} + +/** + * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events. + * Clears the embedded decryption key from memory, replacing it with the iframe's default embedded key. + * @param {string} requestId + */ +function onResetToDefaultEmbeddedKey(requestId) { + decryptionKey = null; + TKHQ.sendMessageUp("RESET_TO_DEFAULT_EMBEDDED_KEY", true, requestId); +} + // Utility functions async function createSolanaKeypair(privateKey) { const privateKeyBytes = TKHQ.parsePrivateKey(privateKey); @@ -344,6 +397,64 @@ async function createSolanaKeypair(privateKey) { return keypair; } +/** + * Converts raw P-256 private key bytes (32-byte scalar) to a JWK. + * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto + * (which derives the public key), then exports as JWK. + * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar + * @returns {Promise} - Full P-256 ECDH private key JWK + */ +async function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) { + if (rawPrivateKeyBytes.length !== 32) { + throw new Error( + `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}` + ); + } + + // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes). + // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure + // that WebCrypto's importKey("pkcs8", ...) expects. + // + // Structure (per RFC 5958 §2 / RFC 5208 §5): + // SEQUENCE { + // INTEGER 0 -- version (v1) + // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1) + // OID 1.2.840.10045.2.1 -- id-ecPublicKey + // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256) + // } + // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3) + // SEQUENCE { + // INTEGER 1 -- version + // OCTET STRING (32 bytes) -- raw private key scalar + // } + // } + // } + // + // References: + // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo + // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs) + // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding + const pkcs8Prefix = new Uint8Array([ + 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48, + 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, + 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20, + ]); + + const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32); + pkcs8.set(pkcs8Prefix); + pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length); + + const cryptoKey = await crypto.subtle.importKey( + "pkcs8", + pkcs8, + { name: "ECDH", namedCurve: "P-256" }, + true, + ["deriveBits"] + ); + + return await crypto.subtle.exportKey("jwk", cryptoKey); +} + /** * Generates the error message for missing or expired keys. * @param {string} keyAddress - The address of the key @@ -599,6 +710,27 @@ function initMessageEventListener(HpkeDecrypt) { TKHQ.sendMessageUp("ERROR", e.toString(), event.data["requestId"]); } } + if (event.data && event.data["type"] == "REPLACE_EMBEDDED_KEY") { + TKHQ.logMessage(`⬇️ Received message ${event.data["type"]}`); + try { + await onReplaceEmbeddedKey( + event.data["requestId"], + event.data["organizationId"], + event.data["value"], + HpkeDecrypt + ); + } catch (e) { + TKHQ.sendMessageUp("ERROR", e.toString(), event.data["requestId"]); + } + } + if (event.data && event.data["type"] == "RESET_TO_DEFAULT_EMBEDDED_KEY") { + TKHQ.logMessage(`⬇️ Received message ${event.data["type"]}`); + try { + onResetToDefaultEmbeddedKey(event.data["requestId"]); + } catch (e) { + TKHQ.sendMessageUp("ERROR", e.toString(), event.data["requestId"]); + } + } }; } @@ -670,4 +802,6 @@ export { onSignTransaction, onSignMessage, onClearEmbeddedPrivateKey, + onReplaceEmbeddedKey, + onResetToDefaultEmbeddedKey, };