diff --git a/export-and-sign/dist/bundle.9876c027ef7327c209f1.js b/export-and-sign/dist/bundle.9876c027ef7327c209f1.js deleted file mode 100644 index 8e7c677..0000000 --- a/export-and-sign/dist/bundle.9876c027ef7327c209f1.js +++ /dev/null @@ -1,3 +0,0 @@ -/*! For license information please see bundle.9876c027ef7327c209f1.js.LICENSE.txt */ -(()=>{var e,t,r,n,o,a={560:(e,t,r)=>{"use strict";var n=r(598),o=r(443),a=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,o,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,o,"GeneratorFunction"),l(p),l(p,o,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function l(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}l=function(e,t,r,n){function a(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function S(){return(S=b(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function O(){return(O=b(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!E()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,P();case 2:if(null!==e.v){e.n=4;break}return e.n=3,k();case 3:_(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function k(){return j.apply(this,arguments)}function j(){return(j=b(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function P(){var e=T(m);return e?JSON.parse(e):null}function _(e){x(m,JSON.stringify(e),1728e5)}function x(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function T(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function I(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function A(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function D(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function R(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function N(e){return M.apply(this,arguments)}function M(){return(M=b(f().m(function e(t){var r,n,o,a;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=w()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return o=e.v,e.n=3,r.exportKey("raw",o);case 3:return a=e.v,e.a(2,new Uint8Array(a))}},e)}))).apply(this,arguments)}function K(e){for(var t="",r=[0],n=0;n0;)r.push(o%58),o=o/58|0}for(var i=0;i0;){var c=r[i];a=(c=void 0===c?a:58*c+a)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function C(){return(C=b(f().m(function e(t,r,n){var o,a;return f().w(function(e){for(;;)switch(e.n){case 0:a=r,e.n="SOLANA"===a?1:"HEXADECIMAL"===a?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(o=new Uint8Array(64)).set(t,0),o.set(n,32),e.a(2,K(o));case 5:return e.a(2,"0x"+A(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+A(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function G(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return B(s,"_invoke",function(r,n,o){var a,c,u,s=0,f=o||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return a=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!o&&t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(B(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,B(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,B(l,"constructor",s),B(s,"constructor",u),u.displayName="GeneratorFunction",B(s,o,"GeneratorFunction"),B(l),B(l,o,"Generator"),B(l,n,function(){return this}),B(l,"toString",function(){return"[object Generator]"}),(G=function(){return{w:a,m:d}})()}function B(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}B=function(e,t,r,n){function a(t,r){B(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},B(e,t,r,n)}function L(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(t,o)||p(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],c=a[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=n[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=l}),r},$=E,W=function(e){return S.apply(this,arguments)};function X(){return(X=H(G().m(function e(){return G().w(function(e){for(;;)switch(e.n){case 0:if(!$()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,Y();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Q(){return(Q=H(G().m(function e(t,r,n){var o,i,c,u,s,f,l,d;return G().w(function(e){for(;;)switch(e.n){case 0:if(o={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=o[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(t===u){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(q(u)),e.n=3,W(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,a.g8)(r),d=q(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var V={initEmbeddedKey:function(){return X.apply(this,arguments)},generateTargetKey:k,setItemWithExpiry:x,getItemWithExpiry:T,getEmbeddedKey:P,setEmbeddedKey:_,onResetEmbeddedKey:function(){window.localStorage.removeItem(m),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:N,base58Encode:K,base58Decode:U,encodeKey:function(e,t,r){return C.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};r&&(n.requestId=r),h?h.postMessage(n):window.parent!==window&&window.parent.postMessage({type:e,value:t},"*"),R("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:R,uint8arrayFromHexString:q,uint8arrayToHexString:A,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(ae(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,ae(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,ae(l,"constructor",s),ae(s,"constructor",u),u.displayName="GeneratorFunction",ae(s,o,"GeneratorFunction"),ae(l),ae(l,o,"Generator"),ae(l,n,function(){return this}),ae(l,"toString",function(){return"[object Generator]"}),(oe=function(){return{w:a,m:d}})()}function ae(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}ae=function(e,t,r,n){function a(t,r){ae(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},ae(e,t,r,n)}function ie(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,c=[],u=!0,s=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=a.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,o=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw o}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return ce(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?ce(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function ce(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(o.organizationId&&o.organizationId===r){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(o.organizationId,"."));case 9:if(o.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(o.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return e.a(2,o)}},e)}))).apply(this,arguments)}function be(e,t,r){return me.apply(this,arguments)}function me(){return me=se(oe().m(function e(t,r,n){var o,a,i,c,u;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,ye(t,r);case 1:if(o=e.v,a=V.uint8arrayFromHexString(o.encappedPublic),i=V.uint8arrayFromHexString(o.ciphertext),u=le){e.n=3;break}return e.n=2,V.getEmbeddedKey();case 2:u=e.v;case 3:return c=u,e.n=4,n({ciphertextBuf:i,encappedKeyBuf:a,receiverPrivJwk:c});case 4:return e.a(2,e.v)}},e)})),me.apply(this,arguments)}function ge(e){return he.apply(this,arguments)}function he(){return(he=se(oe().m(function e(t){var r,n,o;return oe().w(function(e){for(;;)switch(e.n){case 0:if(r=V.getEmbeddedKey()){e.n=1;break}return V.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,V.p256JWKPrivateToPublic(r);case 2:n=e.v,o=V.uint8arrayToHexString(n),V.sendMessageUp("EMBEDDED_PUBLIC_KEY",o,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function we(e,t,r,n){return Ee.apply(this,arguments)}function Ee(){return(Ee=se(oe().m(function e(t,r,n,o){var a,i,c,u,s,f;return oe().w(function(e){for(;;)switch(e.n){case 0:if(i=new Uint8Array(r),"SOLANA"!==n){e.n=2;break}return c=V.uint8arrayToHexString(i.subarray(0,32)),u=V.getEd25519PublicKey(c),e.n=1,V.encodeKey(i,n,u);case 1:a=e.v,e.n=4;break;case 2:return e.n=3,V.encodeKey(i,n);case 3:a=e.v;case 4:if(s=t||"default","SOLANA"!==n){e.n=5;break}f=Z.AX.fromSecretKey(V.base58Decode(a)),e.n=7;break;case 5:if("HEXADECIMAL"!==n){e.n=7;break}return e.n=6,Me(Array.from(V.uint8arrayFromHexString(a)));case 6:f=e.v;case 7:fe=re(re({},fe),{},ne({},s,{organizationId:o,privateKey:a,format:n,expiry:(new Date).getTime()+864e5,keypair:f}));case 8:return e.a(2)}},e)}))).apply(this,arguments)}function Se(e,t,r,n,o,a){return Oe.apply(this,arguments)}function Oe(){return Oe=se(oe().m(function e(t,r,n,o,a,i){var c;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,i);case 1:return c=e.v,e.n=2,we(a,c,o,r);case 2:V.sendMessageUp("BUNDLE_INJECTED",!0,t);case 3:return e.a(2)}},e)})),Oe.apply(this,arguments)}function ke(e,t){return je.apply(this,arguments)}function je(){return(je=se(oe().m(function e(t,r){var n;return oe().w(function(e){for(;;)switch(e.n){case 0:n=V.applySettings(t),V.setSettings(n),V.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function Pe(e,t,r){return _e.apply(this,arguments)}function _e(){return(_e=se(oe().m(function e(t,r,n){var o,a,i,c,u,s,f,l,d;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Be(a=fe[o=n||"default"],o)){e.n=1;break}return e.a(2);case 1:return e.n=2,Le(a);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=V.uint8arrayFromHexString(u),(l=Z.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=V.uint8arrayToHexString(s),V.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function xe(e,t,r){return Te.apply(this,arguments)}function Te(){return Te=se(oe().m(function e(t,r,a){var i,c,u,s,f,l,d,p,y,v;return oe().w(function(e){for(;;)switch(e.n){case 0:if(Be(c=fe[i=a||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=de.encode(s),e.n=2,Le(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return o.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32),v=n._S(l,y),d=V.uint8arrayToHexString(v),e.n=4;break;case 3:return V.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:V.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),Te.apply(this,arguments)}function Ie(e,t){return Ae.apply(this,arguments)}function Ae(){return(Ae=se(oe().m(function e(t,r){return oe().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}return fe={},V.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t),e.a(2);case 1:if(fe[r]){e.n=2;break}return V.sendMessageUp("ERROR",new Error("key not found for address ".concat(r,". Note that address is case sensitive.")).toString(),t),e.a(2);case 2:delete fe[r],V.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED",!0,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function De(e,t,r,n){return Re.apply(this,arguments)}function Re(){return Re=se(oe().m(function e(t,r,n,o){var a,i;return oe().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,o);case 1:return a=e.v,e.n=2,Ue(new Uint8Array(a));case 2:i=e.v,le=i,V.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET",!0,t);case 3:return e.a(2)}},e)})),Re.apply(this,arguments)}function Ne(e){le=null,V.sendMessageUp("RESET_TO_DEFAULT_EMBEDDED_KEY",!0,e)}function Me(e){return Ke.apply(this,arguments)}function Ke(){return(Ke=se(oe().m(function e(t){var r,n;return oe().w(function(e){for(;;)switch(e.n){case 0:if(32!==(r=V.parsePrivateKey(t)).length){e.n=1;break}n=Z.AX.fromSeed(r),e.n=3;break;case 1:if(64!==r.length){e.n=2;break}n=Z.AX.fromSecretKey(r),e.n=3;break;case 2:throw new Error("Invalid private key length: ".concat(r.length,". Expected 32 or 64 bytes."));case 3:return e.a(2,n)}},e)}))).apply(this,arguments)}function Ue(e){return Ce.apply(this,arguments)}function Ce(){return(Ce=se(oe().m(function e(t){var r,n,o;return oe().w(function(e){for(;;)switch(e.n){case 0:if(32===t.length){e.n=1;break}throw new Error("invalid decryption key length: expected 32 bytes, got ".concat(t.length));case 1:return r=new Uint8Array([48,65,2,1,0,48,19,6,7,42,134,72,206,61,2,1,6,8,42,134,72,206,61,3,1,7,4,39,48,37,2,1,1,4,32]),(n=new Uint8Array(r.length+32)).set(r),n.set(t,r.length),e.n=2,crypto.subtle.importKey("pkcs8",n,{name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return o=e.v,e.n=3,crypto.subtle.exportKey("jwk",o);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Ge(e){fe[e]&&delete fe[e]}function Be(e,t){if(!e)throw new Error("key bytes not found. Please re-inject export bundle for address ".concat(t," into iframe. Note that address is case sensitive.")).toString();if((new Date).getTime()>=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(fe);r=i.expiry&&t.push(a)}for(var c=0,u=t;c3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(Je(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,Je(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,Je(l,"constructor",s),Je(s,"constructor",u),u.displayName="GeneratorFunction",Je(s,o,"GeneratorFunction"),Je(l),Je(l,o,"Generator"),Je(l,n,function(){return this}),Je(l,"toString",function(){return"[object Generator]"}),(ze=function(){return{w:a,m:d}})()}function Je(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}Je=function(e,t,r,n){function a(t,r){Je(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},Je(e,t,r,n)}function $e(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function We(e){for(var t=1;t3?(o=y===n)&&(u=a[(c=a[4])?5:(c=3,3)],a[4]=a[5]=e):a[0]<=p&&((o=r<2&&pn||n>y)&&(a[4]=r,a[5]=n,d.n=y,c=0))}if(o||r>1)return i;throw l=!0,n}return function(o,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){a||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,a){if(c||(o="next"),t=a[o]){if(!(t=t.call(a,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=a.return)&&t.call(a),c<2&&(u=TypeError("The iterator does not provide a '"+o+"' method"),c=1);a=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){a=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,o,a),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(rt(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,rt(e,o,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,rt(l,"constructor",s),rt(s,"constructor",u),u.displayName="GeneratorFunction",rt(s,o,"GeneratorFunction"),rt(l),rt(l,o,"Generator"),rt(l,n,function(){return this}),rt(l,"toString",function(){return"[object Generator]"}),(tt=function(){return{w:a,m:d}})()}function rt(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}rt=function(e,t,r,n){function a(t,r){rt(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},rt(e,t,r,n)}function nt(e,t,r,n,o,a,i){try{var c=e[a](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,o)}function ot(e){return function(){var t=this,r=arguments;return new Promise(function(n,o){var a=e.apply(t,r);function i(e){nt(a,n,o,i,c,"next",e)}function c(e){nt(a,n,o,i,c,"throw",e)}i(void 0)})}}window.TKHQ=V,document.addEventListener("DOMContentLoaded",ot(tt().m(function e(){var t,r,n,o;return tt().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,V.initEmbeddedKey();case 1:return e.n=2,V.getEmbeddedKey();case 2:return t=e.v,e.n=3,V.p256JWKPrivateToPublic(t);case 3:r=e.v,n=V.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,He(Ze),(o=V.getSettings())&&V.applySettings(o),V.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return a[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=a,e=[],c.O=(t,r,n,o)=>{if(!r){var a=1/0;for(f=0;f=o)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,o0&&e[f-1][2]>o;f--)e[f]=e[f-1];e[f]=[r,n,o]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var o=Object.create(null);c.r(o);var a={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>a[t]=()=>e[t]);return a.default=()=>e,c.d(o,a),o},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},o="export-and-sign:",c.l=(e,t,r,a)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var o=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),o&&o.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise((r,o)=>n=e[t]=[r,o]);r.push(n[2]=o);var a=c.p+c.u(t),i=new Error;c.l(a,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",i.name="ChunkLoadError",i.type=o,i.request=a,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,o,[a,i,u]=r,s=0;if(a.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); -//# sourceMappingURL=bundle.9876c027ef7327c209f1.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.9876c027ef7327c209f1.js.map b/export-and-sign/dist/bundle.9876c027ef7327c209f1.js.map deleted file mode 100644 index f6f380e..0000000 --- a/export-and-sign/dist/bundle.9876c027ef7327c209f1.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"bundle.9876c027ef7327c209f1.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OAOA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAKrBC,EAAgC,KAMpC,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBvD,OAAS,EAEzCkD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAApB,EAAA1B,IAAAE,EAjBA,SAAA6C,EAA6BC,GAAY,IAAAX,EAAA,OAAArC,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACP,GAA1BqE,EAASH,IACF,CAAFe,EAAAjF,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAD,EAAAjF,EAAA,EAE3CqE,EAAOc,UAClB,MACAH,EACA,CACE5B,KAAM,QACNgC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACFnB,MAAA,KAAAD,UAAA,CAuCD,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAZA,SAAAoD,IAAA,OAAAtD,IAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,WACMwE,IAAmB,CAAFe,EAAAvF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAK,EAAAvF,EAAA,EAERwF,IAAgB,OAAzB,GACG,OADHD,EAAAvE,EACO,CAAAuE,EAAAvF,EAAA,eAAAuF,EAAAvF,EAAA,EACCyF,IAAmB,OAC3CC,EADeH,EAAAvE,GACW,cAAAuE,EAAAtE,EAAA,KAAAqE,EAAA,KAG7B1B,MAAA,KAAAD,UAAA,UAKc8B,IAAiB,OAAAE,EAAA/B,MAAC,KAADD,UAAA,CAiBhC,SAAAgC,IAFC,OAEDA,EAAAjC,EAAA1B,IAAAE,EAjBA,SAAA0D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA7D,IAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACkC,GAA1BqE,EAASH,IACF,CAAF4B,EAAA9F,EAAA,cACH,IAAIkF,MAAM,uCAAsC,cAAAY,EAAA9F,EAAA,EAElCqE,EAAO0B,YAC3B,CACE3C,KAAM,OACNgC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA9E,EAAA8E,EAAA9F,EAAG,EASHqE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA7E,EAAA,EAAA6E,EAAA9E,GAAA,EAAA4E,EAAA,KACzDhC,MAAA,KAAAD,UAAA,CAKD,SAAS6B,IACP,IAAMU,EAASC,EAAkBpC,GACjC,OAAOmC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACExC,EACAqC,KAAKI,UAAUF,GAjJwB,OAoJ3C,CA8DA,SAASC,EAAkBE,EAAKhF,EAAOiF,GACrC,IACMC,EAAO,CACXlF,MAAOA,EACPmF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGxG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,WAC3ClG,OAAOH,UAAU6G,eAAe5F,KAAKoF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKlF,OARV6C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUpE,MAAM,GAChBoE,EAGN,GAAIC,EAAiBnG,OAAS,GAAK,IADpB,iBACmCiC,KAAKkE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOvF,EAAIuF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAE/E,SAAS,IAAIgF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI7F,MAAMI,KAAK,IAAI4E,WAAWW,IAC9BtI,EAAI2C,MAAMI,KAAK,IAAI4E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMxI,GAClC,CAkJA,SAAS0I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAvF,MAAC,KAADD,UAAA,CAsBrC,SAAAwF,IAFC,OAEDA,EAAAzF,EAAA1B,IAAAE,EAtBA,SAAAkH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAA/F,IAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAAxJ,GAAA,OACd,GAA1BqE,EAASH,IACF,CAAFsF,EAAAxJ,EAAA,cACH,IAAIkF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENnI,EACtBoI,EAAeI,QAAU,CAAC,UAAUF,EAAAxJ,EAAA,EAEZqE,EAAOc,UAC7B,MACAmE,EACA,CAAElG,KAAM,QAASgC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAxI,EAAAwI,EAAAxJ,EAAG,EAOGqE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAxI,EAAAwI,EAAAvI,EAAA,EACL,IAAIwG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BxF,MAAA,KAAAD,UAAA,CAOD,SAASgG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL1J,EAAI,EAAGA,EAAIwJ,EAAMxI,OAAQhB,IAAK,CAErC,IADA,IAAI2J,EAAQH,EAAMxJ,GACT4J,EAAI,EAAGA,EAAIF,EAAO1I,SAAU4I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO1I,OAAQ8I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAIzJ,EAAI,EAAgB,IAAbwJ,EAAMxJ,IAAYA,EAAIwJ,EAAMxI,OAAS,EAAGhB,IACtDyJ,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVlK,EAAI,EAAGA,EAAIkI,EAAElH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BgK,EAASG,QAAQjC,EAAElI,IACrB,MAAM,IAAI8E,MAAM,yBAADqD,OAA0BD,EAAElI,GAAE,6BAE/C,IAAI2J,EAAQK,EAASG,QAAQjC,EAAElI,IAKlB,GAAT2J,GAAc3J,IAAMkK,EAAalJ,QACnCkJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAajJ,QAAU2I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAhH,EAAA1B,IAAAE,EAnCA,SAAAyI,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAhJ,IAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,OAAAgL,EACzDH,EAASI,EAAAjL,EACV,WADUgL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAjL,EAAA,cACX,IAAIkF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBxJ,OAAa,CAAA6J,EAAAjL,EAAA,cACzB,IAAIkF,MAAM,sDAADqD,OACyCqC,EAAgBxJ,OAAM,MAC7E,UAE2B,KAA1B0J,EAAe1J,OAAa,CAAA6J,EAAAjL,EAAA,cACxB,IAAIkF,MAAM,qDAADqD,OACwCuC,EAAe1J,OAAM,MAC3E,OAKyC,OAFpC2J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAhK,EAAA,EACnC0I,EAAaoB,IAAkB,cAAAE,EAAAhK,EAAA,EAGjC,KAAO6G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAhK,EAAA,EACK,KAAO6G,EAAsB8C,IAAgB,cAAAK,EAAAhK,EAAA,KAAA0J,EAAA,KAEzD/G,MAAA,KAAAD,UAAA,C,aCxxBD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAIA,IACmBwH,EDmGlB,WAK6B,OAAAhG,EAAAzB,MAAC,KAADD,UAAA,EC3F5B0D,EAWEiE,EAPFnD,EAOEmD,EAHFC,EDsyBF,SAAwBC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBAxM,OAAOyM,QAAQ1B,GAAQ2B,QAAQ,SAAAC,GAAuB,IAp2BxDtN,EAAAF,EAo2BwDyN,GAp2BxDzN,EAo2BwD,EAp2BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EAo2BwDsN,IAp2BxD,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IAo2BmCC,EAAQL,EAAA,GAAE5L,EAAK4L,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcvM,OAChB,MAAM,IAAI8D,MAAM,sCAElB,IAAM2I,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAI3I,MAAM,+CAADqD,OACkCoF,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAavM,EAAMmM,OACzB,GAAyB,GAArBI,EAAW5M,OACb,MAAM,IAAI8D,MAAM,kBAADqD,OAAmBoF,EAAa,eAGjD,IADqBG,EAAWzK,KAAK2K,GAEnC,MAAM,IAAI9I,MAAM,yCAADqD,OAC4BoF,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECn2BElH,EAEE8G,EADF2C,EDoCF,SAG4BC,GAAA,OAAApJ,EAAAlB,MAAC,KAADD,UAAA,EC1B5B,SAAA0B,IAFC,OAEDA,EAAA3B,EAAA1B,IAAAE,EAPA,SAAA6C,IAAA,OAAA/C,IAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,WACMwE,IAAmB,CAAFS,EAAAjF,EAAA,cACb,IAAIkF,MAAM,kBAAiB,cAAAD,EAAAjF,EAAA,EAEtBqL,IAAuB,cAAApG,EAAAhE,EAAA,EAAAgE,EAAAjE,GAAA,EAAA+D,EAAA,KACrCnB,MAAA,KAAAD,UAAA,CAuED,SAAAwK,IAFC,OAEDA,EAAAzK,EAAA1B,IAAAE,EA/DA,SAAAkM,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA/M,IAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OA2B6B,GAxBjCwO,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAb9F,WACH+F,EAAO/F,SAASwG,cACpB,6CAIAT,EAAKjG,SACY,mCAAjBiG,EAAKjG,UAELgG,EAAcC,EAAKjG,SAGlBgG,GAAiC,oBAAXnK,SACzBmK,EAAcnK,OAAO8K,qCAK0B3K,KAH3CkK,EACJH,EAAyBC,IAE+B,CAAAO,EAAAhP,EAAA,cAClD,IAAIkF,MAAM,8EAEf,UAGCmJ,IAAwBM,EAAwC,CAAAK,EAAAhP,EAAA,cAC5D,IAAIkF,MAAM,2EAADqD,OAC8DoG,EAAwC,cAAApG,OAAa8F,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAInH,WACpCJ,EAAwBsH,IACzBK,EAAAhP,EAAA,EACuBiO,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAAhO,EACC,CAAFgO,EAAAhP,EAAA,cACN,IAAIkF,MAAM,6BAA4B,OAKW,OADnD4J,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgB1H,EAAwBkH,GAAWS,EAAAhP,EAAA,EAC5CoE,OAAOC,OAAOiL,OACzB,CAAElM,KAAM,QAASmM,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA/N,EAAA,EAAA+N,EAAAhO,GAAA,EAAAoN,EAAA,KACFxK,MAAA,KAAAD,UAAA,CA2CM,IAAM6L,EAAO,CAClBC,gBAzHF,WAG8B,OAAApK,EAAAzB,MAAC,KAADD,UAAA,EAuH5B8B,kBA5HE6F,EA6HF/E,kBA7HE+E,EA8HFnF,kBA9HEmF,EA+HF9F,eA/HE8F,EAgIF5F,eAhIE4F,EAiIFoE,mBDyBF,WACEpL,OAAOyC,aAAaK,WAAWrD,GAC/BO,OAAOyC,aAAaK,WA7Kc,8BA8KpC,EC3BE6B,uBAlIEqC,EAmIF3B,aAnIE2B,EAoIFnB,aApIEmB,EAqIFqE,UD6kBD,SASuBC,EAAAC,EAAAC,GAAA,OAAApF,EAAA9G,MAAC,KAADD,UAAA,ECrlBtBoM,cD6RF,SAAuBC,EAAMvO,EAAOwO,GAClC,IAAMpH,EAAU,CACdmH,KAAMA,EACNvO,MAAOA,GAILwO,IACFpH,EAAQoH,UAAYA,GAGlBhM,EACFA,EAA8BiM,YAAYrH,GACjCvE,OAAOM,SAAWN,QAC3BA,OAAOM,OAAOsL,YACZ,CACEF,KAAMA,EACNvO,MAAOA,GAET,KAGJ+G,EAAW,mBAADD,OAAoByH,EAAI,MAAAzH,OAAK9G,GACzC,ECnTE+G,WAvIE8C,EAwIFjE,wBAAAA,EACAS,sBAzIEwD,EA0IF6E,iCD4BF,SAA0CC,GACxCnM,EAAgCmM,CAClC,EC7BEC,iBD8HF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAUlP,OAG/C,GAAIoP,EAAgB,EAAG,CACrB,IAAM5E,EAAU,IAAInE,WAAW+I,GAAeC,KAAK,GACnD,OAAO,IAAIhJ,WAAW,GAADc,OAAA/F,EAAKoJ,GAAOpJ,EAAK8N,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPvQ,EAAI,EAAGA,EAAIsQ,GAAqBtQ,EAAIkQ,EAAUlP,OAAQhB,IACxC,IAAjBkQ,EAAUlQ,IACZuQ,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIxL,MAAM,iEAADqD,OACoDmI,EAAiB,aAAAnI,OAAYoI,EAAS,MAG3G,OAAOL,EAAUpN,MAAMwN,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECxJEjB,iBAAAA,EAAAA,GACAlH,yBAAAA,EACAyI,uBApID,SAQoC1C,EAAA2C,EAAAC,GAAA,OAAA3C,EAAAvK,MAAC,KAADD,UAAA,EA6HnCoN,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EACjDsN,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAOnL,KAAKI,UAAUgL,GAExB,IAAMC,EAAcrL,KAAKC,MAAMkL,GAC/B,GAAIE,EAAYjG,OAAQ,CAEtB,IAAMkG,EAAiB/I,SAASC,eAAe,WAC/C,IAAK8I,EACH,MAAM,IAAIxM,MAAM,uDAIlB,IAAMwG,EAAcH,EAAekG,EAAYjG,QAC/C/K,OAAOyM,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IA7I1DtN,EAAAF,EA6I0DyN,GA7I1DzN,EA6I0D,EA7I1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,EA6I0DsN,IA7I1D,SAAAtN,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,IA6I0ChH,EAAG4G,EAAA,GAAE5L,EAAK4L,EAAA,GAC9CqE,EAAeC,MAAMlL,GAAOhF,CAC9B,GAEA+P,EAAsB,OAAI9F,CAC5B,CAEA,OAAOtF,KAAKI,UAAUgL,EACxB,EAyBEjG,eAAAA,EACAqG,YD2BF,WACE,IAAML,EAAWjN,OAAOyC,aAAaG,QAAQlD,GAC7C,OAAOuN,EAAWnL,KAAKC,MAAMkL,GAAY,IAC3C,EC7BEM,YDmCF,SAAqBN,GACnBjN,OAAOyC,aAAaC,QAAQhD,EAAkBoC,KAAKI,UAAU+K,GAC/D,ECpCEO,gBD2mBF,SAAyB7L,GACvB,GAAIxD,MAAMC,QAAQuD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAW/C,MAAM,IAIN,KAAtB+C,EAAW7E,QAAiB,iBAAiBiC,KAAK4C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO8L,GACP,MAAM,IAAI7M,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,G,+sCEvzBA,IAAAtF,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAmS,GAAAlS,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAwN,CAAAxN,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAyN,KAAA,IAAAlM,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAgJ,KAAArK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAuM,CAAA1N,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAAmM,EAAA,UAAA9K,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAKA,IAAIoO,GAAe,CAAC,EAIhBC,GAAsB,KAKpBC,GAAc,IAAIC,YAClBC,GAAc,IAAIC,YAExB,SAMeC,GAAwBrE,EAAA2C,GAAA,OAAA2B,GAAA5O,MAAC,KAADD,UAAA,CAyDvC,SAAA6O,KAFC,OAEDA,GAAA9O,GAAA1B,KAAAE,EAzDA,SAAAuQ,EAAwCC,EAAQC,GAAc,IAAAC,EAAArE,EAAA,OAAAvM,KAAAC,EAAA,SAAA4Q,GAAA,cAAAA,EAAA7S,GAAA,OACxB,GAEV,YAFpB4S,EAAYxM,KAAKC,MAAMqM,IAEfI,QAAoB,CAAAD,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,wBAADqD,OAAyBqK,EAAUE,UAAU,UAEzDF,EAAUG,KAAM,CAAFF,EAAA7S,EAAA,cACX,IAAIkF,MAAM,4BAA2B,UAExC0N,EAAUI,cAAe,CAAFH,EAAA7S,EAAA,cACpB,IAAIkF,MAAM,qCAAoC,UAEjD0N,EAAUvE,oBAAqB,CAAFwE,EAAA7S,EAAA,cAC1B,IAAIkF,MAAM,2CAA0C,UAGvDsK,EAAKoB,uBAAwB,CAAFiC,EAAA7S,EAAA,cACxB,IAAIkF,MAAM,iDAAgD,cAAA2N,EAAA7S,EAAA,EAE3CwP,EAAKoB,uBAC1BgC,EAAUvE,oBACVuE,EAAUI,cACVJ,EAAUG,MACX,OAJa,GAAAF,EAAA7R,EAKC,CAAF6R,EAAA7S,EAAA,cACL,IAAIkF,MAAM,sDAADqD,OACyCqK,EAAUI,cAAa,2BAAAzK,OAA0BqK,EAAUvE,sBAClH,OAKF,GAFKE,EAAanI,KAAKC,MACtBgM,GAAYY,OAAOzD,EAAKnI,wBAAwBuL,EAAUG,QAGvDJ,EAAgB,CAAFE,EAAA7S,EAAA,cACX,IAAIkF,MAAM,8IAEf,UAEAqJ,EAAWoE,gBACZpE,EAAWoE,iBAAmBA,EAAc,CAAAE,EAAA7S,EAAA,cAEtC,IAAIkF,MAAM,4DAADqD,OAC+CoK,EAAc,aAAApK,OAAYgG,EAAWoE,eAAc,MAChH,UAGEpE,EAAW2E,eAAgB,CAAFL,EAAA7S,EAAA,eACtB,IAAIkF,MAAM,kDAAiD,WAE9DqJ,EAAW4E,WAAY,CAAFN,EAAA7S,EAAA,eAClB,IAAIkF,MAAM,8CAA6C,eAAA2N,EAAA5R,EAAA,EAGxDsN,GAAU,EAAAkE,EAAA,KAClB7O,MAAA,KAAAD,UAAA,UAUcyP,GAAatC,EAAAuC,EAAAC,GAAA,OAAAC,GAAA3P,MAAC,KAADD,UAAA,CAiB5B,SAAA4P,KAFC,OAEDA,GAAA7P,GAAA1B,KAAAE,EAjBA,SAAAyI,EAA6B+H,EAAQC,EAAgBa,GAAW,IAAAjF,EAAAkF,EAAAC,EAAAC,EAAAC,EAAA,OAAA5R,KAAAC,EAAA,SAAAgJ,GAAA,cAAAA,EAAAjL,GAAA,cAAAiL,EAAAjL,EAAA,EACrCuS,GAAyBG,EAAQC,GAAe,OAQ9B,GARrCpE,EAAUtD,EAAAjK,EAEVyS,EAAiBjE,EAAKnI,wBAC1BkH,EAAW2E,gBAEPQ,EAAgBlE,EAAKnI,wBAAwBkH,EAAW4E,YAE9DS,EACwB1B,GAAmB,CAAAjH,EAAAjL,EAAA,eAAAiL,EAAAjL,EAAA,EAAWwP,EAAKhK,iBAAgB,OAAAoO,EAAA3I,EAAAjK,EAAA,OAAtD,OAAf2S,EAAeC,EAAA3I,EAAAjL,EAAG,EACXwT,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAE,gBAAAA,IACA,cAAA1I,EAAAhK,EAAA,EAAAgK,EAAAjK,GAAA,EAAA2J,EAAA,IACH4I,GAAA3P,MAAA,KAAAD,UAAA,UAMckQ,GAAsB3K,GAAA,OAAA4K,GAAAlQ,MAAC,KAADD,UAAA,CAgBrC,SAAAmQ,KAFC,OAEDA,GAAApQ,GAAA1B,KAAAE,EAhBA,SAAA6R,EAAsC9D,GAAS,IAAA+D,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAkS,GAAA,cAAAA,EAAAnU,GAAA,OACD,GAAtCgU,EAAiBxE,EAAKhK,iBAEP,CAAF2O,EAAAnU,EAAA,QACyC,OAA1DwP,EAAKO,cAAc,sBAAuB,GAAIE,GAAYkE,EAAAlT,EAAA,iBAAAkT,EAAAnU,EAAA,EAKjCwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYE,EAAAnT,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAGhDzE,EAAKO,cAAc,sBAAuBmE,EAAcjE,GAAW,cAAAkE,EAAAlT,EAAA,KAAA8S,EAAA,KACpEnQ,MAAA,KAAAD,UAAA,UAScyQ,GAAiBC,EAAAC,EAAAC,EAAA3E,GAAA,OAAA4E,GAAA5Q,MAAC,KAADD,UAAA,CAsChC,SAAA6Q,KAFC,OAEDA,GAAA9Q,GAAA1B,KAAAE,EAtCA,SAAAuS,EAAiCC,EAASC,EAAU9J,EAAW8H,GAAc,IAAAlM,EAAAmE,EAAAoG,EAAAlG,EAAA8J,EAAAC,EAAA,OAAA7S,KAAAC,EAAA,SAAA6S,GAAA,cAAAA,EAAA9U,GAAA,OAE3B,GAA1C4K,EAAkB,IAAInD,WAAWkN,GAErB,WAAd9J,EAAsB,CAAAiK,EAAA9U,EAAA,QAIsC,OAHxDgR,EAAgBxB,EAAK1H,sBACzB8C,EAAgBmK,SAAS,EAAG,KAExBjK,EAAiB0E,EAAKuB,oBAAoBC,GAAc8D,EAAA9U,EAAA,EAClDwP,EAAKG,UAAU/E,EAAiBC,EAAWC,GAAe,OAAtErE,EAAGqO,EAAA9T,EAAA8T,EAAA9U,EAAG,EAAH,oBAAA8U,EAAA9U,EAAG,EAEMwP,EAAKG,UAAU/E,EAAiBC,GAAU,OAAtDpE,EAAGqO,EAAA9T,EAAA,OAKL,GAFM4T,EAAaF,GAAW,UAIZ,WAAd7J,EAAsB,CAAAiK,EAAA9U,EAAA,QACxB6U,EAAgBG,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,IAAMqO,EAAA9U,EAAA,kBACvC,gBAAd6K,EAA2B,CAAAiK,EAAA9U,EAAA,eAAA8U,EAAA9U,EAAA,EACdkV,GACpBzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,KACzC,OAFDoO,EAAaC,EAAA9T,EAAA,OAKfiR,GAAYxI,GAAAA,GAAA,GACPwI,IAAY,GAAAkD,GAAA,GACdP,EAAa,CACZjC,eAAAA,EACA1M,WAAYQ,EACZ2O,OAAQvK,EACRjE,QAAQ,IAAIC,MAAOC,UAzJe,MA0JlCuO,QAASR,KAEX,cAAAC,EAAA7T,EAAA,KAAAwT,EAAA,KACH7Q,MAAA,KAAAD,UAAA,UAWc2R,GAAiBzF,EAAAC,EAAAyF,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAA/R,MAAC,KAADD,UAAA,CAkBhC,SAAAgS,KAFC,OAEDA,GAAAjS,GAAA1B,KAAAE,EAlBA,SAAA0T,EACE3F,EACA0C,EACAD,EACA7H,EACA6J,EACAlB,GAAW,IAAAmB,EAAA,OAAA3S,KAAAC,EAAA,SAAA4T,GAAA,cAAAA,EAAA7V,GAAA,cAAA6V,EAAA7V,EAAA,EAGYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQkB,EAAA7U,EAAA6U,EAAA7V,EAAG,EAGXoU,GAAkBM,EAASC,EAAU9J,EAAW8H,GAAe,OAGrEnD,EAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAA4F,EAAA5U,EAAA,KAAA2U,EAAA,IACxDD,GAAA/R,MAAA,KAAAD,UAAA,UAUcmS,GAAeC,EAAAC,GAAA,OAAAC,GAAArS,MAAC,KAADD,UAAA,CAW9B,SAAAsS,KAFC,OAEDA,GAAAvS,GAAA1B,KAAAE,EAXA,SAAAgU,EAA+B3E,EAAUtB,GAAS,IAAAuB,EAAA,OAAAxP,KAAAC,EAAA,SAAAkU,GAAA,cAAAA,EAAAnW,GAAA,OAE1CwR,EAAgBhC,EAAK8B,cAAcC,GAGzC/B,EAAKqC,YAAYL,GAGjBhC,EAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAAkG,EAAAlV,EAAA,KAAAiV,EAAA,KACzDtS,MAAA,KAAAD,UAAA,UAQcyS,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAA5S,MAAC,KAADD,UAAA,CAmChC,SAAA6S,KAFC,OAEDA,GAAA9S,GAAA1B,KAAAE,EAnCA,SAAAuU,EAAiCxG,EAAWyG,EAAuBhC,GAAO,IAAAE,EAAAnO,EAAA4O,EAAAsB,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAhV,KAAAC,EAAA,SAAAgV,GAAA,cAAAA,EAAAjX,GAAA,OAKxE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFqC,EAAAjX,EAAA,eAAAiX,EAAAhW,EAAA,iBAAAgW,EAAAjX,EAAA,EAKtBmX,GAAmB1Q,GAAI,OAIE,GAJzC4O,EAAO4B,EAAAjW,EAEP2V,EAAqBvQ,KAAKC,MAAMqQ,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmB3G,KAIX,CAAAiH,EAAAjX,EAAA,QAExB8W,EAAmBtH,EAAKnI,wBAAwBuP,IAChDG,EAAcK,EAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAACjC,IAElBwB,EAAoBE,EAAYQ,YAAYN,EAAAjX,EAAA,qBAEtC,IAAIkF,MAAM,gCAA+B,OAG3C8R,EAAuBxH,EAAK1H,sBAAsB+O,GAExDrH,EAAKO,cAAc,qBAAsBiH,EAAsB/G,GAAW,cAAAgH,EAAAhW,EAAA,KAAAwV,EAAA,KAC3E7S,MAAA,KAAAD,UAAA,UAQc6T,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAhU,MAAC,KAADD,UAAA,CA4C5B,SAAAiU,KAFC,OAEDA,GAAAlU,GAAA1B,KAAAE,EA5CA,SAAA2V,EAA6B5H,EAAW6H,EAAmBpD,GAAO,IAAAE,EAAAnO,EAAAsR,EAAAC,EAAAC,EAAAC,EAAAC,EAAA9C,EAAApP,EAAAmS,EAAA,OAAApW,KAAAC,EAAA,SAAAoW,GAAA,cAAAA,EAAArY,GAAA,OAKhE,GACKkX,GAHCzQ,EAAMwL,GADN2C,EAAaF,GAAW,WAIRE,GAAwB,CAAFyD,EAAArY,EAAA,eAAAqY,EAAApX,EAAA,UAOU,OAHhD8W,EAAiB3R,KAAKC,MAAMyR,GAC5BE,EAAgBD,EAAelP,QAC/BoP,EAAcF,EAAe/H,KAC7BkI,EAAe/F,GAAYmG,OAAON,GAAcK,EAAArY,EAAA,EAKhCmX,GAAmB1Q,GAAI,OAAhC,GAAP4O,EAAOgD,EAAArX,EAEO,WAAhBiX,EAAwB,CAAAI,EAAArY,EAAA,QAE1BiR,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWzN,MAAAuN,EAAAxN,WAAO,EAIlDsC,EAAaoP,EAAQkD,UAAUrV,MAAM,EAAG,IAExCkV,EAAYnH,EAAAA,GAAkBiH,EAAcjS,GAKlDkS,EAAe3I,EAAK1H,sBAAsBsQ,GAAWC,EAAArY,EAAA,eAEc,OAAnEwP,EAAKO,cAAc,QAAS,2BAA4BE,GAAWoI,EAAApX,EAAA,UAKrEuO,EAAKO,cAAc,iBAAkBoI,EAAclI,GAAW,cAAAoI,EAAApX,EAAA,KAAA4W,EAAA,IAC/DD,GAAAhU,MAAA,KAAAD,UAAA,UAOc6U,GAAyBC,EAAAC,GAAA,OAAAC,GAAA/U,MAAC,KAADD,UAAA,CA4BxC,SAAAgV,KAFC,OAEDA,GAAAjV,GAAA1B,KAAAE,EA5BA,SAAA0W,EAAyC3I,EAAWyE,GAAO,OAAA1S,KAAAC,EAAA,SAAA4W,GAAA,cAAAA,EAAA7Y,GAAA,UAEpD0U,EAAS,CAAFmE,EAAA7Y,EAAA,QAE0D,OADpEiS,GAAe,CAAC,EAChBzC,EAAKO,cAAc,gCAAgC,EAAME,GAAW4I,EAAA5X,EAAA,aAMjEgR,GAAayC,GAAU,CAAFmE,EAAA7Y,EAAA,QAOtB,OANFwP,EAAKO,cACH,QACA,IAAI7K,MAAM,6BAADqD,OACsBmM,EAAO,2CACpCzR,WACFgN,GACA4I,EAAA5X,EAAA,iBAMGgR,GAAayC,GAEpBlF,EAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAA4I,EAAA5X,EAAA,KAAA2X,EAAA,KACrEhV,MAAA,KAAAD,UAAA,UAWcmV,GAAwBC,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAvV,MAAC,KAADD,UAAA,CAmBvC,SAAAwV,KAFC,OAEDA,GAAAzV,GAAA1B,KAAAE,EAnBA,SAAAkX,EACEnJ,EACA0C,EACAD,EACAc,GAAW,IAAAmB,EAAA0E,EAAA,OAAArX,KAAAC,EAAA,SAAAqX,GAAA,cAAAA,EAAAtZ,GAAA,cAAAsZ,EAAAtZ,EAAA,EAIYoT,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQ2E,EAAAtY,EAAAsY,EAAAtZ,EAAG,EAGIuZ,GAAuB,IAAI9R,WAAWkN,IAAU,OAA/D0E,EAAMC,EAAAtY,EAGZkR,GAAsBmH,EAEtB7J,EAAKO,cAAc,6BAA6B,EAAME,GAAW,cAAAqJ,EAAArY,EAAA,KAAAmY,EAAA,IAClED,GAAAvV,MAAA,KAAAD,UAAA,CAOD,SAAS6V,GAA4BvJ,GACnCiC,GAAsB,KACtB1C,EAAKO,cAAc,iCAAiC,EAAME,EAC5D,CAEA,SACeiF,GAAmBuE,GAAA,OAAAC,GAAA9V,MAAC,KAADD,UAAA,CAmBlC,SAAA+V,KAFC,OAEDA,GAAAhW,GAAA1B,KAAAE,EAnBA,SAAAyX,EAAmC1T,GAAU,IAAA2E,EAAAyK,EAAA,OAAArT,KAAAC,EAAA,SAAA2X,GAAA,cAAAA,EAAA5Z,GAAA,OACa,GAGzB,MAHzB4K,EAAkB4E,EAAKsC,gBAAgB7L,IAGzB7E,OAAa,CAAAwY,EAAA5Z,EAAA,QAE/BqV,EAAUL,EAAAA,GAAQ6E,SAASjP,GAAiBgP,EAAA5Z,EAAA,kBACR,KAA3B4K,EAAgBxJ,OAAa,CAAAwY,EAAA5Z,EAAA,QAEtCqV,EAAUL,EAAAA,GAAQC,cAAcrK,GAAiBgP,EAAA5Z,EAAA,qBAE3C,IAAIkF,MAAM,+BAADqD,OACkBqC,EAAgBxJ,OAAM,+BACtD,cAAAwY,EAAA3Y,EAAA,EAGIoU,GAAO,EAAAsE,EAAA,KACf/V,MAAA,KAAAD,UAAA,UASc4V,GAAsBO,GAAA,OAAAC,GAAAnW,MAAC,KAADD,UAAA,CAmDrC,SAAAoW,KAFC,OAEDA,GAAArW,GAAA1B,KAAAE,EAnDA,SAAA8X,EAAsCC,GAAkB,IAAAC,EAAAC,EAAAC,EAAA,OAAApY,KAAAC,EAAA,SAAAoY,GAAA,cAAAA,EAAAra,GAAA,UACpB,KAA9Bia,EAAmB7Y,OAAa,CAAAiZ,EAAAra,EAAA,cAC5B,IAAIkF,MAAM,yDAADqD,OAC4C0R,EAAmB7Y,SAC7E,OAkC+C,OAR5C8Y,EAAc,IAAIzS,WAAW,CACjC,GAAM,GAAM,EAAM,EAAM,EAAM,GAAM,GAAM,EAAM,EAAM,GAAM,IAAM,GAClE,IAAM,GAAM,EAAM,EAAM,EAAM,EAAM,GAAM,IAAM,GAAM,IAAM,GAAM,EAClE,EAAM,EAAM,EAAM,GAAM,GAAM,GAAM,EAAM,EAAM,EAAM,EAAM,MAGxD0S,EAAQ,IAAI1S,WAAWyS,EAAY9Y,OAAS,KAC5C8J,IAAIgP,GACVC,EAAMjP,IAAI+O,EAAoBC,EAAY9Y,QAAQiZ,EAAAra,EAAA,EAE1BoE,OAAOC,OAAOc,UACpC,QACAgV,EACA,CAAE/W,KAAM,OAAQgC,WAAY,UAC5B,EACA,CAAC,eACF,OANc,OAATgV,EAASC,EAAArZ,EAAAqZ,EAAAra,EAAG,EAQLoE,OAAOC,OAAO2B,UAAU,MAAOoU,GAAU,cAAAC,EAAApZ,EAAA,EAAAoZ,EAAArZ,GAAA,EAAAgZ,EAAA,KACvDpW,MAAA,KAAAD,UAAA,CAgBD,SAAS2W,GAAgB1F,GACnB3C,GAAa2C,WACR3C,GAAa2C,EAExB,CA6BA,SAASsC,GAAYzQ,EAAKmO,GACxB,IAAKnO,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsDqM,EAAU,uDAC7E3R,WAIJ,IADY,IAAI4D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAM2T,GAAM,IAAI1T,MAAOC,UACjB0T,EAAoB,GAE1BC,EAAA,EAAAC,EAA6Bja,OAAOyM,QAAQ+E,IAAawI,EAAAC,EAAAtZ,OAAAqZ,IAAE,CAAtD,IAAAE,EAAA3I,GAAA0I,EAAAD,GAAA,GAAO/F,EAAOiG,EAAA,GAAElU,EAAGkU,EAAA,GAClBlU,EAAIG,QAAU2T,GAAO9T,EAAIG,QAC3B4T,EAAkBvQ,KAAKyK,EAE3B,CAEA,IAAK,IAALkG,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAAzZ,OAAAwZ,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAI5V,MArDP,SAAoC0P,GACzC,MAAO,sEAAPrM,OAA6EqM,EAAU,qDACzF,CAmDoBmG,CAA2BnG,IAAa3R,WAG1D,OAAO,CACT,CAEA,SAMekU,GAAkB6D,GAAA,OAAAC,GAAArX,MAAC,KAADD,UAAA,CAcjC,SAAAsX,KAFC,OAEDA,GAAAvX,GAAA1B,KAAAE,EAdA,SAAAgZ,EAAkCzU,GAAG,OAAAzE,KAAAC,EAAA,SAAAkZ,GAAA,cAAAA,EAAAnb,GAAA,WAC/ByG,EAAI4O,QAAS,CAAF8F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EACNwF,EAAI4O,SAAO,UAGD,WAAf5O,EAAI2O,OAAmB,CAAA+F,EAAAnb,EAAA,eAAAmb,EAAAla,EAAA,EAClB+T,EAAAA,GAAQC,cAAczF,EAAKrF,aAAa1D,EAAIR,cAAY,cAAAkV,EAAAnb,EAAA,EAElDkV,GACXzS,MAAMI,KAAK2M,EAAKnI,wBAAwBZ,EAAIR,cAC7C,cAAAkV,EAAAla,EAAA,EAAAka,EAAAna,GAAA,cAAAma,EAAAla,EAAA,KAAAia,EAAA,KAEJtX,MAAA,KAAAD,UAAA,CAyMM,SAASyX,GAAkB5H,GAChC,IAAM6H,EA/HR,SAAkC7H,GAChC,sBAAA8H,EAAA5X,GAAA1B,KAAAE,EAAO,SAAAkH,EAAoCmS,GAAK,IAAAC,EAAAxQ,EAAAyQ,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA9Z,KAAAC,EAAA,SAAAuH,GAAA,cAAAA,EAAA3I,EAAA2I,EAAAxJ,GAAA,WAC1Cub,EAAMxI,MAA8B,4BAAtBwI,EAAMxI,KAAW,KAA+B,CAAAvJ,EAAAxJ,EAAA,QAG9D,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAgB,UAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBAC7HvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,QACpBS,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAA2a,EAAAhS,EAAAxI,EAEDwO,EAAKO,cAAc,QAASyL,EAAEvY,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,+BAAtBwI,EAAMxI,KAAW,KAAkC,CAAAvJ,EAAAxJ,EAAA,QAGjE,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,MAAC,MAAAxK,OAAKgT,EAAMxI,KAAqB,iBACjGvJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,EAEMsV,GACJiG,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,WAClBtO,OACAA,EACA+O,GACD,OAAAhK,EAAAxJ,EAAA,eAAAwJ,EAAA3I,EAAA,EAAAmK,EAAAxB,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS/E,EAAE/H,WAAYsY,EAAMxI,KAAgB,WAAG,WAGnEwI,EAAMxI,MAA8B,kBAAtBwI,EAAMxI,KAAW,KAAqB,CAAAvJ,EAAAxJ,EAAA,gBAAAwJ,EAAA3I,EAAA,EAAA2I,EAAAxJ,EAAA,GAE9C8V,GAAgByF,EAAMxI,KAAY,MAAGwI,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA4a,EAAAjS,EAAAxI,EAEnEwO,EAAKO,cAAc,QAAS0L,EAAExY,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,sBAAtBwI,EAAMxI,KAAW,KAA2B,CAC5DvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEvD,EAAKE,oBACP,CAAE,MAAO9P,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAChC,CACF,CAAC,IACGsY,EAAMxI,MAA8B,oBAAtBwI,EAAMxI,KAAW,KAAuB,CAAAvJ,EAAAxJ,EAAA,SAGtD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMoW,GACJmF,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA6a,EAAAlS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS2L,EAAEzY,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,gBAAtBwI,EAAMxI,KAAW,KAAmB,CAAAvJ,EAAAxJ,EAAA,SAGlD,OAFFwP,EAAKhH,WAAW,uBAADD,OACUgT,EAAMxI,KAAW,KAAC,MAAAxK,OAAKgT,EAAMxI,KAAY,QAChEvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAEMwX,GACJ+D,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAY,MAClBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA8a,EAAAnS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS4L,EAAE1Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,8BAAtBwI,EAAMxI,KAAW,KAAiC,CAAAvJ,EAAAxJ,EAAA,SACL,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErDwY,GACJ+C,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAc,SACrB,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAA+a,EAAApS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS6L,EAAE3Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,2BAAtBwI,EAAMxI,KAAW,KAA8B,CAAAvJ,EAAAxJ,EAAA,SACF,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD6T,GAAuB0H,EAAMxI,KAAgB,WAAE,QAAAvJ,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAgb,EAAArS,EAAAxI,EAErDwO,EAAKO,cAAc,QAAS8L,EAAE5Y,WAAYsY,EAAMxI,KAAgB,WAAG,YAGnEwI,EAAMxI,MAA8B,6BAAtBwI,EAAMxI,KAAW,KAAgC,CAAAvJ,EAAAxJ,EAAA,SACJ,OAA7DwP,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OAAKvJ,EAAA3I,EAAA,GAAA2I,EAAAxJ,EAAA,GAErD8Y,GACJyC,EAAMxI,KAAgB,UACtBwI,EAAMxI,KAAqB,eAC3BwI,EAAMxI,KAAY,MAClBS,GACD,QAAAhK,EAAAxJ,EAAA,iBAAAwJ,EAAA3I,EAAA,GAAAib,EAAAtS,EAAAxI,EAEDwO,EAAKO,cAAc,QAAS+L,EAAE7Y,WAAYsY,EAAMxI,KAAgB,WAAG,QAGvE,GAAIwI,EAAMxI,MAA8B,iCAAtBwI,EAAMxI,KAAW,KAAsC,CACvEvD,EAAKhH,WAAW,uBAADD,OAAwBgT,EAAMxI,KAAW,OACxD,IACEyG,GAA4B+B,EAAMxI,KAAgB,UACpD,CAAE,MAAOnT,GACP4P,EAAKO,cAAc,QAASnQ,EAAEqD,WAAYsY,EAAMxI,KAAgB,UAClE,CACF,CAAC,eAAAvJ,EAAAvI,EAAA,KAAAmI,EAAA,sEArHuC,OAsHzC,SAtHyC2S,GAAA,OAAAT,EAAA1X,MAAC,KAADD,UAAA,EAA1C,EAuHF,CAO+BqY,CAAyBxI,GAGhDyI,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAiDlC,OAxPF,WAEEvT,SAASC,eAAe,cAAcwT,iBACpC,QAAO,eAAAhP,EAAA1J,GAAA1B,KAAAE,EACP,SAAA6C,EAAOnF,GAAC,OAAAoC,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,2BACNvO,MAAOkH,SAASC,eAAe,qBAAqBnH,MACpDoJ,UAAWlC,SAASC,eAAe,qBAAqBnH,MACxDkR,eAAgBhK,SAASC,eAAe,uBAAuBnH,QAC9D,cAAAwD,EAAAhE,EAAA,KAAA8D,EAAA,IACJ,gBAAAuX,GAAA,OAAAlP,EAAAxJ,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFgF,SAASC,eAAe,oBAAoBwT,iBAC1C,QAAO,eAAA/O,EAAA3J,GAAA1B,KAAAE,EACP,SAAAkM,EAAOxO,GAAC,OAAAoC,KAAAC,EAAA,SAAA+M,GAAA,cAAAA,EAAAhP,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,mBACNvO,MAAOkH,SAASC,eAAe,uBAAuBnH,QACrD,cAAAuN,EAAA/N,EAAA,KAAAmN,EAAA,IACJ,gBAAAmO,GAAA,OAAAlP,EAAAzJ,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,gBAAgBwT,iBACtC,QAAO,eAAAI,EAAA9Y,GAAA1B,KAAAE,EACP,SAAAoD,EAAO1F,GAAC,OAAAoC,KAAAC,EAAA,SAAAsD,GAAA,cAAAA,EAAAvF,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,eACNvO,MAAOkH,SAASC,eAAe,mBAAmBnH,QACjD,cAAA8D,EAAAtE,EAAA,KAAAqE,EAAA,IACJ,gBAAAmX,GAAA,OAAAD,EAAA5Y,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFgF,SAASC,eAAe,SAASwT,iBAC/B,QAAO,eAAAM,EAAAhZ,GAAA1B,KAAAE,EACP,SAAA0D,EAAOhG,GAAC,OAAAoC,KAAAC,EAAA,SAAA6D,GAAA,cAAAA,EAAA9F,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CAAEF,KAAM,uBAAwB,cAAAlK,EAAA7E,EAAA,KAAA2E,EAAA,IACpD,gBAAA+W,GAAA,OAAAD,EAAA9Y,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAMiZ,EAAkBjU,SAASC,eAAe,iBAC5CgU,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAAnZ,GAAA1B,KAAAE,EACP,SAAA4a,EAAOld,GAAC,OAAAoC,KAAAC,EAAA,SAAA8a,GAAA,cAAAA,EAAA/c,GAAA,OACNJ,EAAEyc,iBACF/X,OAAO4L,YAAY,CACjBF,KAAM,8BACNvO,MAAOkH,SAASC,eAAe,wBAAwBnH,MACvDkR,eAAgBhK,SAASC,eAAe,0BACrCnH,QACF,cAAAsb,EAAA9b,EAAA,KAAA6b,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAAjZ,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CA2IEsZ,GAGA3Y,OAAO8X,iBAAiB,UAAWf,EAAsB,CACvD6B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpC7Y,OAAO8X,iBACL,UAAS,eAAAgB,EAAA1Z,GAAA1B,KAAAE,EACT,SAAAmb,EAAgB9B,GAAK,IAAA+B,EAAAC,EAAAvJ,EAAAC,EAAAC,EAAA,OAAAlS,KAAAC,EAAA,SAAAub,GAAA,cAAAA,EAAAxd,GAAA,WAQjBub,EAAMxI,MACgB,gCAAtBwI,EAAMxI,KAAW,MACN,QADyCuK,EACpD/B,EAAMkC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAAxd,EAAA,QAQyC,OALzDic,EAA0ByB,SAEpBH,EAAoBhC,EAAMkC,MAAM,IACpBE,UAAYtC,EAE9B7L,EAAKW,iCAAiCoN,GAAmBC,EAAAxd,EAAA,EAEnDwP,EAAKC,gBAAgB8L,EAAMqC,QAAO,cAAAJ,EAAAxd,EAAA,EACbwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAcwJ,EAAAxc,EAAAwc,EAAAxd,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYuJ,EAAAxc,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAC9CtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhD1E,EAAKO,cAAc,mBAAoBmE,GAGvCiI,EAAsBuB,QAAQ,cAAAF,EAAAvc,EAAA,KAAAoc,EAAA,IAEjC,gBAAAQ,GAAA,OAAAT,EAAAxZ,MAAA,KAAAD,UAAA,EAhCQ,GAiCT,CAAEwZ,OAAQhB,EAAsBgB,SAG3B,CAAE9B,qBAAAA,EACX,C,qQC1xBA,IAAAzb,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAie,GAAAle,EAAAE,GAAA,IAAAD,EAAAY,OAAAsd,KAAAne,GAAA,GAAAa,OAAAud,sBAAA,KAAA9d,EAAAO,OAAAud,sBAAApe,GAAAE,IAAAI,EAAAA,EAAA+d,OAAA,SAAAne,GAAA,OAAAW,OAAAyd,yBAAAte,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAoK,KAAArG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA4J,GAAA7J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAAge,GAAArd,OAAAZ,IAAA,GAAAsN,QAAA,SAAArN,GAAAqV,GAAAvV,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAA0d,0BAAA1d,OAAA2d,iBAAAxe,EAAAa,OAAA0d,0BAAAte,IAAAie,GAAArd,OAAAZ,IAAAsN,QAAA,SAAArN,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAAyd,yBAAAre,EAAAC,GAAA,UAAAF,CAAA,UAAAuV,GAAAvV,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAAwe,GAAAxe,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAAue,aAAA,YAAA1e,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAAue,GAAAje,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAAid,OAAA1e,EAAA,CAAA2e,CAAA3e,GAAA,gBAAAwe,GAAAje,GAAAA,EAAAA,EAAA,GAAAqe,CAAA3e,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAMwe,IAAoB,IAAItM,aAAckG,OAAO,gBAM5C,SAAe9E,GAAWtF,GAAA,OAAAyQ,GAAA/a,MAAC,KAADD,UAAA,CAsCjC,SAAAgb,KAFC,OA3DD3e,EA6DAgC,KAAAE,EAtCO,SAAA6C,EAAAqI,GAAA,IAAAsG,EAAAD,EAAAE,EAAAiL,EAAAC,EAAAC,EAAAC,EAAA1W,EAAA2W,EAAAC,EAAAzD,EAAA,OAAAxZ,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAApE,EAAAoE,EAAAjF,GAAA,OAKuC,OAJ5C0T,EAAatG,EAAbsG,cACAD,EAAcrG,EAAdqG,eACAE,EAAevG,EAAfuG,gBAEMiL,EAAa,IAAIM,GAAAA,GAAqBja,EAAAjF,EAAA,EACnB4e,EAAWzZ,UAClC,MAAKsE,GAAA,GACAkK,IACL,GACD,OAMC,OAVEkL,EAAY5Z,EAAAjE,EAMZ8d,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACVva,EAAAjF,EAAA,EAEuB8e,EAAMW,uBAAuB,CACpDC,aAAcb,EACdc,IAAKlM,EACLmM,KAAMlB,KACN,OAJc,OAAZK,EAAY9Z,EAAAjE,EAAAiE,EAAAjF,EAAG,EAMQiJ,EAAuB0K,GAAgB,OACA,OAD9DtL,EAAcpD,EAAAjE,EACdge,EAAM7W,EAAyBsL,EAAgBpL,GAAepD,EAAApE,EAAA,EAAAoE,EAAAjF,EAAA,EAGpD+e,EAAac,KAAKnM,EAAesL,GAAI,OAAjDC,EAAGha,EAAAjE,EAAAiE,EAAAjF,EAAG,EAAH,mBAAAiF,EAAApE,EAAG,EAAH2a,EAAAvW,EAAAjE,EAEG,IAAIkE,MACR,gGACEsW,EAAEvY,YACL,cAAAgC,EAAAhE,EAAA,EAEIge,GAAG,EAAAla,EAAA,gBAGZ4Z,GA7DA,eAAA9e,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAS,OAAOkL,KAAOA,EAGd7G,SAASyT,iBAAiB,mBAAkB1Y,GAAA1B,KAAAE,EAAE,SAAA6C,IAAA,IAAAiP,EAAAC,EAAAC,EAAA4L,EAAA,OAAA9d,KAAAC,EAAA,SAAAgD,GAAA,cAAAA,EAAAjF,GAAA,cAAAiF,EAAAjF,EAAA,EACtCwP,EAAKC,kBAAiB,cAAAxK,EAAAjF,EAAA,EACCwP,EAAKhK,iBAAgB,OAA9B,OAAdwO,EAAc/O,EAAAjE,EAAAiE,EAAAjF,EAAG,EACIwP,EAAKvG,uBAAuB+K,GAAe,OAAhEC,EAAYhP,EAAAjE,EACZkT,EAAe1E,EAAK1H,sBAAsBmM,GAChDtL,SAASC,eAAe,gBAAgBnH,MAAQyS,EAEhDkH,GAAkB5H,KAGZsM,EAAgBtQ,EAAKoC,gBAEzBpC,EAAK8B,cAAcwO,GAGrBtQ,EAAKO,cAAc,mBAAoBmE,GAAc,cAAAjP,EAAAhE,EAAA,KAAA8D,EAAA,I,kCC3BvDgb,EAAOC,QAAU5b,M,GCCb6b,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqB1b,IAAjB2b,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAU5e,KAAKwe,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoBhe,EAAIqe,ET5BpBhhB,EAAW,GACf2gB,EAAoBM,EAAI,CAAC3W,EAAQ4W,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASzgB,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKqgB,EAAUC,EAAIC,GAAYphB,EAASa,GACpC0gB,GAAY,EACP9W,EAAI,EAAGA,EAAIyW,EAASrf,OAAQ4I,MACpB,EAAX2W,GAAsBC,GAAgBD,IAAalgB,OAAOsd,KAAKmC,EAAoBM,GAAGO,MAAOta,GAASyZ,EAAoBM,EAAE/Z,GAAKga,EAASzW,KAC9IyW,EAASO,OAAOhX,IAAK,IAErB8W,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbvhB,EAASyhB,OAAO5gB,IAAK,GACrB,IAAIN,EAAI4gB,SACEjc,IAAN3E,IAAiB+J,EAAS/J,EAC/B,CACD,CACA,OAAO+J,CAnBP,CAJC8W,EAAWA,GAAY,EACvB,IAAI,IAAIvgB,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKugB,EAAUvgB,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACqgB,EAAUC,EAAIC,IUJ/BT,EAAoBlgB,EAAK+f,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoBhf,EAAE+f,EAAQ,CAAEhgB,EAAGggB,IAC5BA,GTNJxhB,EAAWgB,OAAOmB,eAAkBuf,GAAS1gB,OAAOmB,eAAeuf,GAASA,GAASA,EAAa,UAQtGjB,EAAoBrgB,EAAI,SAAS4B,EAAO2f,GAEvC,GADU,EAAPA,IAAU3f,EAAQ4f,KAAK5f,IAChB,EAAP2f,EAAU,OAAO3f,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAP2f,GAAa3f,EAAMyf,WAAY,OAAOzf,EAC1C,GAAW,GAAP2f,GAAoC,mBAAf3f,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAI6f,EAAK7gB,OAAOC,OAAO,MACvBwf,EAAoBpgB,EAAEwhB,GACtB,IAAIC,EAAM,CAAC,EACX/hB,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAI+hB,EAAiB,EAAPJ,GAAY3f,GAA0B,iBAAX+f,GAAyC,mBAAXA,MAA4BhiB,EAAe+K,QAAQiX,GAAUA,EAAU/hB,EAAS+hB,GAC1J/gB,OAAOghB,oBAAoBD,GAASrU,QAAS1G,GAAS8a,EAAI9a,GAAO,IAAOhF,EAAMgF,IAI/E,OAFA8a,EAAa,QAAI,IAAM,EACvBrB,EAAoBhf,EAAEogB,EAAIC,GACnBD,CACR,EUxBApB,EAAoBhf,EAAI,CAAC8e,EAAS0B,KACjC,IAAI,IAAIjb,KAAOib,EACXxB,EAAoBhgB,EAAEwhB,EAAYjb,KAASyZ,EAAoBhgB,EAAE8f,EAASvZ,IAC5EhG,OAAO0B,eAAe6d,EAASvZ,EAAK,CAAEpE,YAAY,EAAMsf,IAAKD,EAAWjb,MCJ3EyZ,EAAoBtf,EAAI,CAAC,EAGzBsf,EAAoBtgB,EAAKgiB,GACjBre,QAAQse,IAAIphB,OAAOsd,KAAKmC,EAAoBtf,GAAGkhB,OAAO,CAACC,EAAUtb,KACvEyZ,EAAoBtf,EAAE6F,GAAKmb,EAASG,GAC7BA,GACL,KCNJ7B,EAAoB1f,EAAKohB,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAf9d,WAAyB,OAAOA,WAC3C,IACC,OAAOkd,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOtiB,GACR,GAAsB,iBAAX0E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxB4b,EAAoBhgB,EAAI,CAACihB,EAAKgB,IAAU1hB,OAAOH,UAAU6G,eAAe5F,KAAK4f,EAAKgB,GdA9EziB,EAAa,CAAC,EACdC,EAAoB,mBAExBugB,EAAoB7e,EAAI,CAAC+gB,EAAK5gB,EAAMiF,EAAKmb,KACxC,GAAGliB,EAAW0iB,GAAQ1iB,EAAW0iB,GAAKnY,KAAKzI,OAA3C,CACA,IAAI6gB,EAAQC,EACZ,QAAW7d,IAARgC,EAEF,IADA,IAAI8b,EAAU5Z,SAAS6Z,qBAAqB,UACpCpiB,EAAI,EAAGA,EAAImiB,EAAQnhB,OAAQhB,IAAK,CACvC,IAAIkI,EAAIia,EAAQniB,GAChB,GAAGkI,EAAEma,aAAa,QAAUL,GAAO9Z,EAAEma,aAAa,iBAAmB9iB,EAAoB8G,EAAK,CAAE4b,EAAS/Z,EAAG,KAAO,CACpH,CAEG+Z,IACHC,GAAa,GACbD,EAAS1Z,SAASG,cAAc,WAEzB4Z,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgBjjB,EAAoB8G,GAExD4b,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAItY,QAAQjG,OAAOI,SAASkZ,OAAS,OAC/CyE,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtBpjB,EAAW0iB,GAAO,CAAC5gB,GACnB,IAAIyhB,EAAmB,CAACC,EAAM3H,KAE7B8G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU7jB,EAAW0iB,GAIzB,UAHO1iB,EAAW0iB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQpW,QAASuT,GAAQA,EAAGnF,IACpC2H,EAAM,OAAOA,EAAK3H,IAElB+H,EAAUI,WAAWT,EAAiB9hB,KAAK,UAAMsD,EAAW,CAAEuL,KAAM,UAAW2T,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiB9hB,KAAK,KAAMkhB,EAAOc,SACpDd,EAAOe,OAASH,EAAiB9hB,KAAK,KAAMkhB,EAAOe,QACnDd,GAAc3Z,SAASib,KAAK5a,YAAYqZ,EAxCkB,GeH3DnC,EAAoBpgB,EAAKkgB,IACH,oBAAXjgB,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAe6d,EAASjgB,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAe6d,EAAS,aAAc,CAAEve,OAAO,KCLvDye,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBrf,EAAI,ICCxBqf,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBtf,EAAEoJ,EAAI,CAAC4X,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoBhgB,EAAE8jB,EAAiBpC,GAAWoC,EAAgBpC,QAAWnd,EACtG,GAA0B,IAAvBwf,EAGF,GAAGA,EACFlC,EAAS9X,KAAKga,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAI3gB,QAAQ,CAACC,EAAS2gB,IAAYF,EAAqBD,EAAgBpC,GAAW,CAACpe,EAAS2gB,IAC1GpC,EAAS9X,KAAKga,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBrf,EAAIqf,EAAoB1f,EAAEohB,GAEpD7P,EAAQ,IAAI7M,MAgBhBgb,EAAoB7e,EAAE+gB,EAfF7G,IACnB,GAAG2E,EAAoBhgB,EAAE8jB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAWnd,GACrDwf,GAAoB,CACtB,IAAIG,EAAY7I,IAAyB,SAAfA,EAAMvL,KAAkB,UAAYuL,EAAMvL,MAChEqU,EAAU9I,GAASA,EAAMoI,QAAUpI,EAAMoI,OAAOd,IACpD9Q,EAAMlJ,QAAU,iBAAmB+Y,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1FtS,EAAM3O,KAAO,iBACb2O,EAAM/B,KAAOoU,EACbrS,EAAMuS,QAAUD,EAChBJ,EAAmB,GAAGlS,EACvB,GAGuC,SAAW6P,EAASA,EAE/D,GAYH1B,EAAoBM,EAAExW,EAAK4X,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4BzR,KACvD,IAGIoN,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAW3R,EAGhB3S,EAAI,EAC3B,GAAGqgB,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoBhgB,EAAEukB,EAAatE,KACrCD,EAAoBhe,EAAEie,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAI7a,EAAS6a,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2BzR,GACrD3S,EAAIqgB,EAASrf,OAAQhB,IACzBwhB,EAAUnB,EAASrgB,GAChB8f,EAAoBhgB,EAAE8jB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAE3W,IAG1B+a,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmBzX,QAAQoX,EAAqBpjB,KAAK,KAAM,IAC3DyjB,EAAmB3a,KAAOsa,EAAqBpjB,KAAK,KAAMyjB,EAAmB3a,KAAK9I,KAAKyjB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAE/b,EAAW,CAAC,IAAK,IAAOyb,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/** 48 hours in milliseconds */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n// Persist keys in memory via mapping of { address --> pk }\nlet inMemoryKeys = {};\n\n// Injected embedded key -- held in memory only, never persisted.\n// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key.\nlet injectedEmbeddedKey = null;\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data.\n * @param {string} bundle - JSON-stringified bundle\n * @param {string} organizationId - Expected organization ID\n * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext}\n */\nasync function verifyAndParseBundleData(bundle, organizationId) {\n const bundleObj = JSON.parse(bundle);\n\n if (bundleObj.version !== \"v1.0.0\") {\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method TKHQ.verifyEnclaveSignature not loaded\");\n }\n const verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(\n `failed to verify enclave signature. Got signature: ${bundleObj.dataSignature}, enclaveQuorumPublic: ${bundleObj.enclaveQuorumPublic}`\n );\n }\n\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n\n return signedData;\n}\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n const signedData = await verifyAndParseBundleData(bundle, organizationId);\n\n const encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n\n // Use the injected embedded key if available, otherwise fall back to the embedded key\n const receiverPrivJwk = injectedEmbeddedKey || (await TKHQ.getEmbeddedKey());\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Encodes raw key bytes and loads them into the in-memory key store.\n * @param {string} address - Wallet address (case-sensitive)\n * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes\n * @param {string} keyFormat - \"SOLANA\" | \"HEXADECIMAL\"\n * @param {string} organizationId - Organization ID\n */\nasync function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) {\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n inMemoryKeys = {\n ...inMemoryKeys,\n [keyAddress]: {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair,\n },\n };\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Load decrypted key into memory\n await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n const privateKey = keypair.secretKey.slice(0, 32);\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // Clear the specific key from memory\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n/**\n * Handler for SET_EMBEDDED_KEY_OVERRIDE events.\n * Decrypts a P-256 private key bundle using the iframe's embedded key and\n * overrides the embedded key with it for subsequent bundle decryptions.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle - v1.0.0 bundle containing the P-256 private key\n * @param {Function} HpkeDecrypt\n */\nasync function onSetEmbeddedKeyOverride(\n requestId,\n organizationId,\n bundle,\n HpkeDecrypt\n) {\n // Decrypt the private key using the iframe's embedded key.\n // The decrypted payload is a raw 32-byte P-256 private key scalar.\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto)\n const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes));\n\n // Store in module-level variable (memory only)\n injectedEmbeddedKey = keyJwk;\n\n TKHQ.sendMessageUp(\"EMBEDDED_KEY_OVERRIDE_SET\", true, requestId);\n}\n\n/**\n * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events.\n * Clears the embedded key from memory, replacing it with the iframe's default embedded key.\n * @param {string} requestId\n */\nfunction onResetToDefaultEmbeddedKey(requestId) {\n injectedEmbeddedKey = null;\n TKHQ.sendMessageUp(\"RESET_TO_DEFAULT_EMBEDDED_KEY\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Converts raw P-256 private key bytes (32-byte scalar) to a JWK.\n * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto\n * (which derives the public key), then exports as JWK.\n * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar\n * @returns {Promise} - Full P-256 ECDH private key JWK\n */\nasync function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) {\n if (rawPrivateKeyBytes.length !== 32) {\n throw new Error(\n `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}`\n );\n }\n\n // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes).\n // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure\n // that WebCrypto's importKey(\"pkcs8\", ...) expects.\n //\n // Structure (per RFC 5958 §2 / RFC 5208 §5):\n // SEQUENCE {\n // INTEGER 0 -- version (v1)\n // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1)\n // OID 1.2.840.10045.2.1 -- id-ecPublicKey\n // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256)\n // }\n // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3)\n // SEQUENCE {\n // INTEGER 1 -- version\n // OCTET STRING (32 bytes) -- raw private key scalar\n // }\n // }\n // }\n //\n // References:\n // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo\n // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs)\n // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding\n const pkcs8Prefix = new Uint8Array([\n 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,\n 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03,\n 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n\n const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32);\n pkcs8.set(pkcs8Prefix);\n pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length);\n\n const cryptoKey = await crypto.subtle.importKey(\n \"pkcs8\",\n pkcs8,\n { name: \"ECDH\", namedCurve: \"P-256\" },\n true,\n [\"deriveBits\"]\n );\n\n return await crypto.subtle.exportKey(\"jwk\", cryptoKey);\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SET_EMBEDDED_KEY_OVERRIDE\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onSetEmbeddedKeyOverride(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_TO_DEFAULT_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n onResetToDefaultEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n onSetEmbeddedKeyOverride,\n onResetToDefaultEmbeddedKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","element","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","_slicedToArray","inMemoryKeys","injectedEmbeddedKey","textEncoder","TextEncoder","textDecoder","TextDecoder","verifyAndParseBundleData","_verifyAndParseBundleData","_callee8","bundle","organizationId","bundleObj","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","decryptBundle","_x4","_x5","_decryptBundle","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","receiverPrivJwk","_t9","onGetPublicEmbeddedKey","_onGetPublicEmbeddedKey","_callee0","embeddedKeyJwk","targetPubBuf","targetPubHex","_context0","loadKeyIntoMemory","_x7","_x8","_x9","_loadKeyIntoMemory","_callee1","address","keyBytes","keyAddress","cachedKeypair","_context1","subarray","Keypair","fromSecretKey","createSolanaKeypair","_defineProperty","format","keypair","onInjectKeyBundle","_x11","_x12","_x13","_x14","_onInjectKeyBundle","_callee10","_context10","onApplySettings","_x15","_x16","_onApplySettings","_callee11","_context11","onSignTransaction","_x17","_x18","_x19","_onSignTransaction","_callee12","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context12","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x20","_x21","_x22","_onSignMessage","_callee13","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context13","encode","secretKey","onClearEmbeddedPrivateKey","_x23","_x24","_onClearEmbeddedPrivateKey","_callee14","_context14","onSetEmbeddedKeyOverride","_x25","_x26","_x27","_x28","_onSetEmbeddedKeyOverride","_callee15","keyJwk","_context15","rawP256PrivateKeyToJwk","onResetToDefaultEmbeddedKey","_x29","_createSolanaKeypair","_callee16","_context16","fromSeed","_x30","_rawP256PrivateKeyToJwk","_callee17","rawPrivateKeyBytes","pkcs8Prefix","pkcs8","cryptoKey","_context17","clearExpiredKey","now","addressesToRemove","_i","_Object$entries","_Object$entries$_i","_i2","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x31","_getOrCreateKeypair","_callee18","_context18","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_t8","_x37","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x32","_x33","_ref3","_x34","_ref4","_x35","injectWalletBtn","_ref5","_callee5","_context5","_x36","addDOMEventListeners","capture","signal","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","origin","_x38","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","enc","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js b/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js new file mode 100644 index 0000000..bfa37c1 --- /dev/null +++ b/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js @@ -0,0 +1,3 @@ +/*! For license information please see bundle.dff20a3f8b4e5bcab5e4.js.LICENSE.txt */ +(()=>{var e,t,r,n,a,o={560:(e,t,r)=>{"use strict";var n=r(598),a=r(443),o=r(566);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function c(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function u(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var d=[][n]?t(t([][n]())):(l(t={},n,function(){return this}),t),p=s.prototype=c.prototype=Object.create(d);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,l(e,a,"GeneratorFunction")),e.prototype=Object.create(p),e}return u.prototype=s,l(p,"constructor",s),l(s,"constructor",u),u.displayName="GeneratorFunction",l(s,a,"GeneratorFunction"),l(p),l(p,a,"Generator"),l(p,n,function(){return this}),l(p,"toString",function(){return"[object Generator]"}),(f=function(){return{w:o,m:y}})()}function l(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}l=function(e,t,r,n){function o(t,r){l(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},l(e,t,r,n)}function d(e){return function(e){if(Array.isArray(e))return y(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||p(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function p(e,t){if(e){if("string"==typeof e)return y(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?y(e,t):void 0}}function y(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r1:window.parent!==window.top}function O(){return(O=g(f().m(function e(t){var r;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=E()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,r.importKey("raw",t,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function k(){return(k=g(f().m(function e(){return f().w(function(e){for(;;)switch(e.n){case 0:if(!S()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,j();case 2:if(null!==e.v){e.n=4;break}return e.n=3,_();case 3:x(e.v);case 4:return e.a(2)}},e)}))).apply(this,arguments)}function _(){return P.apply(this,arguments)}function P(){return(P=g(f().m(function e(){var t,r;return f().w(function(e){for(;;)switch(e.n){case 0:if(t=E()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return e.n=2,t.generateKey({name:"ECDH",namedCurve:"P-256"},!0,["deriveBits"]);case 2:return r=e.v,e.n=3,t.exportKey("jwk",r.privateKey);case 3:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function j(){var e=I(b);return e?JSON.parse(e):null}function x(e){T(b,JSON.stringify(e),144e5)}function T(e,t,r){var n={value:t,expiry:(new Date).getTime()+r};window.localStorage.setItem(e,JSON.stringify(n))}function I(e){var t=window.localStorage.getItem(e);if(!t)return null;var r=JSON.parse(t);return Object.prototype.hasOwnProperty.call(r,"expiry")&&Object.prototype.hasOwnProperty.call(r,"value")?(new Date).getTime()>r.expiry?(window.localStorage.removeItem(e),null):r.value:(window.localStorage.removeItem(e),null)}function A(e){if(!e||"string"!=typeof e)throw new Error("cannot create uint8array from invalid hex string");var t=e.startsWith("0x")||e.startsWith("0X")?e.slice(2):e;if(t.length%2!=0||!/^[0-9A-Fa-f]+$/.test(t))throw new Error("cannot create uint8array from invalid hex string");return new Uint8Array(t.match(/../g).map(function(e){return parseInt(e,16)}))}function D(e){return d(e).map(function(e){return e.toString(16).padStart(2,"0")}).join("")}function R(e,t){var r=Array.from(new Uint8Array(e)),n=Array.from(new Uint8Array(t));return new Uint8Array([].concat(r,n))}function N(e){var t=document.getElementById("message-log");if(t){var r=document.createElement("p");r.innerText=e,t.appendChild(r)}}function M(e){return K.apply(this,arguments)}function K(){return(K=g(f().m(function e(t){var r,n,a,o;return f().w(function(e){for(;;)switch(e.n){case 0:if(r=E()){e.n=1;break}throw new Error("WebCrypto subtle API is unavailable");case 1:return delete(n=u({},t)).d,n.key_ops=["verify"],e.n=2,r.importKey("jwk",n,{name:"ECDSA",namedCurve:"P-256"},!0,["verify"]);case 2:return a=e.v,e.n=3,r.exportKey("raw",a);case 3:return o=e.v,e.a(2,new Uint8Array(o))}},e)}))).apply(this,arguments)}function U(e){for(var t="",r=[0],n=0;n0;)r.push(a%58),a=a/58|0}for(var i=0;i0;){var c=r[i];o=(c=void 0===c?o:58*c+o)>>8,r[i]=c%256,i++}}var u=n.concat(r.reverse());return new Uint8Array(u)}function G(){return(G=g(f().m(function e(t,r,n){var a,o;return f().w(function(e){for(;;)switch(e.n){case 0:o=r,e.n="SOLANA"===o?1:"HEXADECIMAL"===o?5:6;break;case 1:if(n){e.n=2;break}throw new Error("public key must be specified for SOLANA key format");case 2:if(32===t.length){e.n=3;break}throw new Error("invalid private key length. Expected 32 bytes. Got ".concat(t.length,"."));case 3:if(32===n.length){e.n=4;break}throw new Error("invalid public key length. Expected 32 bytes. Got ".concat(n.length,"."));case 4:return(a=new Uint8Array(64)).set(t,0),a.set(n,32),e.a(2,U(a));case 5:return e.a(2,"0x"+D(t));case 6:return console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),e.a(2,"0x"+D(t));case 7:return e.a(2)}},e)}))).apply(this,arguments)}function B(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",a=r.toStringTag||"@@toStringTag";function o(r,n,a,o){var u=n&&n.prototype instanceof c?n:c,s=Object.create(u.prototype);return L(s,"_invoke",function(r,n,a){var o,c,u,s=0,f=a||[],l=!1,d={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return o=t,c=0,u=e,d.n=r,i}};function p(r,n){for(c=r,u=n,t=0;!l&&s&&!a&&t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(L(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,L(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,L(l,"constructor",s),L(s,"constructor",u),u.displayName="GeneratorFunction",L(s,a,"GeneratorFunction"),L(l),L(l,a,"Generator"),L(l,n,function(){return this}),L(l,"toString",function(){return"[object Generator]"}),(B=function(){return{w:o,m:d}})()}function L(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}L=function(e,t,r,n){function o(t,r){L(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},L(e,t,r,n)}function F(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,a,o=(a=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(t,a)||p(t,a)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=o[0],c=o[1],u=i.trim();if(0===u.length)throw new Error("css style property cannot be empty");var s=n[u];if(!s)throw new Error('invalid or unsupported css style property: "'.concat(u,'"'));var f=new RegExp(s),l=c.trim();if(0==l.length)throw new Error('css style for "'.concat(u,'" is empty'));if(!f.test(l))throw new Error('invalid css style value for property "'.concat(u,'"'));r[u]=l}),r},X=S,Q=function(e){return O.apply(this,arguments)};function V(){return(V=Y(B().m(function e(){return B().w(function(e){for(;;)switch(e.n){case 0:if(!X()){e.n=1;break}throw new Error("Doubly iframed");case 1:return e.n=2,z();case 2:return e.a(2,e.v)}},e)}))).apply(this,arguments)}function Z(){return(Z=Y(B().m(function e(t,r,n){var a,i,c,u,s,f,l,d;return B().w(function(e){for(;;)switch(e.n){case 0:if(a={prod:"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569",preprod:"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212"},i=null,"undefined"!=typeof document&&(c=document.querySelector('meta[name="turnkey-signer-environment"]'))&&c.content&&"__TURNKEY_SIGNER_ENVIRONMENT__"!==c.content&&(i=c.content),i||"undefined"==typeof window||(i=window.__TURNKEY_SIGNER_ENVIRONMENT__),void 0!==(u=a[i])){e.n=1;break}throw new Error("Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined");case 1:if(q(t,u)){e.n=2;break}throw new Error("enclave quorum public keys from client and bundle do not match. Client: ".concat(u,". Bundle: ").concat(t,"."));case 2:return s=new Uint8Array(J(u)),e.n=3,Q(s);case 3:if(f=e.v){e.n=4;break}throw new Error("failed to load quorum key");case 4:return l=(0,o.g8)(r),d=J(n),e.n=5,crypto.subtle.verify({name:"ECDSA",hash:"SHA-256"},f,l,d);case 5:return e.a(2,e.v)}},e)}))).apply(this,arguments)}var ee={initEmbeddedKey:function(){return V.apply(this,arguments)},generateTargetKey:_,setItemWithExpiry:T,getItemWithExpiry:I,getEmbeddedKey:j,setEmbeddedKey:x,onResetEmbeddedKey:function(){window.localStorage.removeItem(b),window.localStorage.removeItem("TURNKEY_EMBEDDED_KEY_ORIGIN")},p256JWKPrivateToPublic:M,base58Encode:U,base58Decode:C,encodeKey:function(e,t,r){return G.apply(this,arguments)},sendMessageUp:function(e,t,r){var n={type:e,value:t};if(r&&(n.requestId=r),h)h.postMessage(n);else if(window.parent!==window){var a=w||"*";window.parent.postMessage({type:e,value:t},a)}N("⬆️ Sent message ".concat(e,": ").concat(t))},logMessage:N,uint8arrayFromHexString:J,uint8arrayToHexString:D,setParentFrameMessageChannelPort:function(e){h=e},normalizePadding:function(e,t){var r=t-e.length;if(r>0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(d(n),d(e)))}if(r<0){for(var a=-1*r,o=0,i=0;i3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(ne(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,ne(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,ne(l,"constructor",s),ne(s,"constructor",u),u.displayName="GeneratorFunction",ne(s,a,"GeneratorFunction"),ne(l),ne(l,a,"Generator"),ne(l,n,function(){return this}),ne(l,"toString",function(){return"[object Generator]"}),(re=function(){return{w:o,m:d}})()}function ne(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}ne=function(e,t,r,n){function o(t,r){ne(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},ne(e,t,r,n)}function ae(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,a,o,i,c=[],u=!0,s=!1;try{if(o=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;u=!1}else for(;!(u=(n=o.call(r)).done)&&(c.push(n.value),c.length!==t);u=!0);}catch(e){s=!0,a=e}finally{try{if(!u&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(s)throw a}}return c}}(e,t)||function(e,t){if(e){if("string"==typeof e)return oe(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?oe(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function oe(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r= v2.0.0 to pass "organizationId" for security purposes.');case 8:if(a.organizationId&&pe(a.organizationId,r)){e.n=9;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(a.organizationId,"."));case 9:if(a.encappedPublic){e.n=10;break}throw new Error('missing "encappedPublic" in bundle signed data');case 10:if(a.ciphertext){e.n=11;break}throw new Error('missing "ciphertext" in bundle signed data');case 11:return e.a(2,a)}},e)}))).apply(this,arguments)}function be(e,t,r){return me.apply(this,arguments)}function me(){return me=ce(re().m(function e(t,r,n){var a,o,i,c,u;return re().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,ve(t,r);case 1:if(a=e.v,o=ee.uint8arrayFromHexString(a.encappedPublic),i=ee.uint8arrayFromHexString(a.ciphertext),u=se){e.n=3;break}return e.n=2,ee.getEmbeddedKey();case 2:u=e.v;case 3:return c=u,e.n=4,n({ciphertextBuf:i,encappedKeyBuf:o,receiverPrivJwk:c});case 4:return e.a(2,e.v)}},e)})),me.apply(this,arguments)}function he(e){return we.apply(this,arguments)}function we(){return(we=ce(re().m(function e(t){var r,n,a;return re().w(function(e){for(;;)switch(e.n){case 0:if(r=ee.getEmbeddedKey()){e.n=1;break}return ee.sendMessageUp("EMBEDDED_PUBLIC_KEY","",t),e.a(2);case 1:return e.n=2,ee.p256JWKPrivateToPublic(r);case 2:n=e.v,a=ee.uint8arrayToHexString(n),ee.sendMessageUp("EMBEDDED_PUBLIC_KEY",a,t);case 3:return e.a(2)}},e)}))).apply(this,arguments)}function Ee(e,t,r,n){return Se.apply(this,arguments)}function Se(){return(Se=ce(re().m(function e(t,r,n,a){var o,i,c,u,s,f;return re().w(function(e){for(;;)switch(e.p=e.n){case 0:if(i=new Uint8Array(r),e.p=1,"SOLANA"!==n){e.n=3;break}return c=ee.uint8arrayToHexString(i.subarray(0,32)),u=ee.getEd25519PublicKey(c),e.n=2,ee.encodeKey(i,n,u);case 2:o=e.v,e.n=5;break;case 3:return e.n=4,ee.encodeKey(i,n);case 4:o=e.v;case 5:return e.p=5,i.fill(0),e.f(5);case 6:if(s=t||"default","SOLANA"!==n){e.n=7;break}f=te.AX.fromSecretKey(ee.base58Decode(o)),e.n=9;break;case 7:if("HEXADECIMAL"!==n){e.n=9;break}return e.n=8,Ke(Array.from(ee.uint8arrayFromHexString(o)));case 8:f=e.v;case 9:ue[s]&&ye(ue[s]),ue[s]={organizationId:a,privateKey:o,format:n,expiry:(new Date).getTime()+864e5,keypair:f};case 10:return e.a(2)}},e,null,[[1,,5,6]])}))).apply(this,arguments)}function Oe(e,t,r,n,a,o){return ke.apply(this,arguments)}function ke(){return ke=ce(re().m(function e(t,r,n,a,o,i){var c;return re().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,be(n,r,i);case 1:return c=e.v,e.n=2,Ee(o,c,a,r);case 2:ee.sendMessageUp("BUNDLE_INJECTED",!0,t);case 3:return e.a(2)}},e)})),ke.apply(this,arguments)}function _e(e,t){return Pe.apply(this,arguments)}function Pe(){return(Pe=ce(re().m(function e(t,r){var n;return re().w(function(e){for(;;)switch(e.n){case 0:n=ee.applySettings(t),ee.setSettings(n),ee.sendMessageUp("SETTINGS_APPLIED",!0,r);case 1:return e.a(2)}},e)}))).apply(this,arguments)}function je(e,t,r){return xe.apply(this,arguments)}function xe(){return(xe=ce(re().m(function e(t,r,n){var a,o,i,c,u,s,f,l,d;return re().w(function(e){for(;;)switch(e.n){case 0:if(Le(o=ue[a=n||"default"],a)){e.n=1;break}return e.a(2);case 1:return e.n=2,Fe(o);case 2:if(i=e.v,c=JSON.parse(r),u=c.transaction,"SOLANA"!==c.type){e.n=3;break}f=ee.uint8arrayFromHexString(u),(l=te.Kt.deserialize(f)).sign([i]),s=l.serialize(),e.n=4;break;case 3:throw new Error("unsupported transaction type");case 4:d=ee.uint8arrayToHexString(s),ee.sendMessageUp("TRANSACTION_SIGNED",d,t);case 5:return e.a(2)}},e)}))).apply(this,arguments)}function Te(e,t,r){return Ie.apply(this,arguments)}function Ie(){return Ie=ce(re().m(function e(t,r,o){var i,c,u,s,f,l,d,p,y,v;return re().w(function(e){for(;;)switch(e.n){case 0:if(Le(c=ue[i=o||"default"],i)){e.n=1;break}return e.a(2);case 1:return u=JSON.parse(r),s=u.message,f=u.type,l=le.encode(s),e.n=2,Fe(c);case 2:if(p=e.v,"SOLANA"!==f){e.n=3;break}n.jn.sha512Sync=function(){var e;return a.Zf((e=n.jn).concatBytes.apply(e,arguments))},y=p.secretKey.slice(0,32);try{v=n._S(l,y),d=ee.uint8arrayToHexString(v)}finally{y.fill(0)}e.n=4;break;case 3:return ee.sendMessageUp("ERROR","unsupported message type",t),e.a(2);case 4:ee.sendMessageUp("MESSAGE_SIGNED",d,t);case 5:return e.a(2)}},e)})),Ie.apply(this,arguments)}function Ae(e,t){return De.apply(this,arguments)}function De(){return(De=ce(re().m(function e(t,r){var n,a,o;return re().w(function(e){for(;;)switch(e.n){case 0:if(r){e.n=1;break}for(n=0,a=Object.keys(ue);n=e.expiry)throw function(){for(var e=(new Date).getTime(),t=[],r=0,n=Object.entries(ue);r=i.expiry&&t.push(o)}for(var c=0,u=t;c3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):($e(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,$e(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,$e(l,"constructor",s),$e(s,"constructor",u),u.displayName="GeneratorFunction",$e(s,a,"GeneratorFunction"),$e(l),$e(l,a,"Generator"),$e(l,n,function(){return this}),$e(l,"toString",function(){return"[object Generator]"}),(Je=function(){return{w:o,m:d}})()}function $e(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}$e=function(e,t,r,n){function o(t,r){$e(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},$e(e,t,r,n)}function We(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function Xe(e){for(var t=1;t3?(a=y===n)&&(u=o[(c=o[4])?5:(c=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>y)&&(o[4]=r,o[5]=n,d.n=y,c=0))}if(a||r>1)return i;throw l=!0,n}return function(a,f,y){if(s>1)throw TypeError("Generator is already running");for(l&&1===f&&p(f,y),c=f,u=y;(t=c<2?e:u)||!l;){o||(c?c<3?(c>1&&(d.n=-1),p(c,u)):d.n=u:d.v=u);try{if(s=2,o){if(c||(a="next"),t=o[a]){if(!(t=t.call(o,u)))throw TypeError("iterator result is not an object");if(!t.done)return t;u=t.value,c<2&&(c=0)}else 1===c&&(t=o.return)&&t.call(o),c<2&&(u=TypeError("The iterator does not provide a '"+a+"' method"),c=1);o=e}else if((t=(l=d.n<0)?u:r.call(n,d))!==i)break}catch(t){o=e,c=1,u=t}finally{s=1}}return{value:t,done:l}}}(r,a,o),!0),s}var i={};function c(){}function u(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(nt(t={},n,function(){return this}),t),l=s.prototype=c.prototype=Object.create(f);function d(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,nt(e,a,"GeneratorFunction")),e.prototype=Object.create(l),e}return u.prototype=s,nt(l,"constructor",s),nt(s,"constructor",u),u.displayName="GeneratorFunction",nt(s,a,"GeneratorFunction"),nt(l),nt(l,a,"Generator"),nt(l,n,function(){return this}),nt(l,"toString",function(){return"[object Generator]"}),(rt=function(){return{w:o,m:d}})()}function nt(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}nt=function(e,t,r,n){function o(t,r){nt(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},nt(e,t,r,n)}function at(e,t,r,n,a,o,i){try{var c=e[o](i),u=c.value}catch(e){return void r(e)}c.done?t(u):Promise.resolve(u).then(n,a)}function ot(e){return function(){var t=this,r=arguments;return new Promise(function(n,a){var o=e.apply(t,r);function i(e){at(o,n,a,i,c,"next",e)}function c(e){at(o,n,a,i,c,"throw",e)}i(void 0)})}}window.TKHQ=ee,document.addEventListener("DOMContentLoaded",ot(rt().m(function e(){var t,r,n,a;return rt().w(function(e){for(;;)switch(e.n){case 0:return e.n=1,ee.initEmbeddedKey();case 1:return e.n=2,ee.getEmbeddedKey();case 2:return t=e.v,e.n=3,ee.p256JWKPrivateToPublic(t);case 3:r=e.v,n=ee.uint8arrayToHexString(r),document.getElementById("embedded-key").value=n,Ye(et),(a=ee.getSettings())&&ee.applySettings(a),ee.sendMessageUp("PUBLIC_KEY_READY",n);case 4:return e.a(2)}},e)})))},790:()=>{},846:e=>{"use strict";e.exports=crypto}},i={};function c(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={id:e,loaded:!1,exports:{}};return o[e].call(r.exports,r,r.exports,c),r.loaded=!0,r.exports}c.m=o,e=[],c.O=(t,r,n,a)=>{if(!r){var o=1/0;for(f=0;f=a)&&Object.keys(c.O).every(e=>c.O[e](r[u]))?r.splice(u--,1):(i=!1,a0&&e[f-1][2]>a;f--)e[f]=e[f-1];e[f]=[r,n,a]},c.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return c.d(t,{a:t}),t},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,c.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var a=Object.create(null);c.r(a);var o={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>o[t]=()=>e[t]);return o.default=()=>e,c.d(a,o),a},c.d=(e,t)=>{for(var r in t)c.o(t,r)&&!c.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},c.f={},c.e=e=>Promise.all(Object.keys(c.f).reduce((t,r)=>(c.f[r](e,t),t),[])),c.u=e=>"bundle."+{291:"3eaea85f4001b9cc63c3",825:"aaba32bf7338e3d0f1cc"}[e]+".js",c.miniCssF=e=>{},c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),c.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},a="export-and-sign:",c.l=(e,t,r,o)=>{if(n[e])n[e].push(t);else{var i,u;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var a=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),a&&a.forEach(e=>e(r)),t)return t(r)},p=setTimeout(d.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=d.bind(null,i.onerror),i.onload=d.bind(null,i.onload),u&&document.head.appendChild(i)}},c.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},c.nmd=e=>(e.paths=[],e.children||(e.children=[]),e),c.p="/",c.sriHashes={291:"sha384-G5pDFEAG9UZITbluyje/R/rWohZTUJf+Vu3ZIh0rsnLFLTw3SP/ca/XVNZVtv48f",825:"sha384-R9OIdd42i5GcdtZiHJuQgIUVvqyqJ0s7eaBnJHAfGllpi4YwbF7NSkjIRwOPUtsP"},(()=>{var e={792:0};c.f.j=(t,r)=>{var n=c.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var a=new Promise((r,a)=>n=e[t]=[r,a]);r.push(n[2]=a);var o=c.p+c.u(t),i=new Error;c.l(o,r=>{if(c.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var a=r&&("load"===r.type?"missing":r.type),o=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+a+": "+o+")",i.name="ChunkLoadError",i.type=a,i.request=o,n[1](i)}},"chunk-"+t,t)}},c.O.j=t=>0===e[t];var t=(t,r)=>{var n,a,[o,i,u]=r,s=0;if(o.some(t=>0!==e[t])){for(n in i)c.o(i,n)&&(c.m[n]=i[n]);if(u)var f=u(c)}for(t&&t(r);sc(560));u=c.O(u)})(); +//# sourceMappingURL=bundle.dff20a3f8b4e5bcab5e4.js.map \ No newline at end of file diff --git a/export-and-sign/dist/bundle.9876c027ef7327c209f1.js.LICENSE.txt b/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js.LICENSE.txt similarity index 100% rename from export-and-sign/dist/bundle.9876c027ef7327c209f1.js.LICENSE.txt rename to export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js.LICENSE.txt diff --git a/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js.map b/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js.map new file mode 100644 index 0000000..9fa5a94 --- /dev/null +++ b/export-and-sign/dist/bundle.dff20a3f8b4e5bcab5e4.js.map @@ -0,0 +1 @@ +{"version":3,"file":"bundle.dff20a3f8b4e5bcab5e4.js","mappings":";UAAIA,ECCAC,EADAC,ECAAC,EACAC,E,svCCAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA1C,GAAA,gBAAAA,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAA6C,EAAA7C,EAAA,CAAA8C,CAAA9C,IAAA,SAAAA,GAAA,uBAAAC,QAAA,MAAAD,EAAAC,OAAAE,WAAA,MAAAH,EAAA,qBAAA2C,MAAAI,KAAA/C,EAAA,CAAAgD,CAAAhD,IAAAiD,EAAAjD,IAAA,qBAAAwB,UAAA,wIAAA0B,EAAA,UAAAD,EAAAjD,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,YAAA0B,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,M,OAqCA,IAAME,EAAuB,uBAEvBC,EAAmB,mBAcrBC,EAAgC,KAOhCC,EAAe,KAMnB,SAASC,IACP,MAIwB,oBAAfC,YACPA,WAAWC,QACXD,WAAWC,OAAOC,OAEXF,WAAWC,OAAOC,OAEL,oBAAXC,QAA0BA,OAAOF,QAAUE,OAAOF,OAAOC,OAC3DC,OAAOF,OAAOC,YAED,IAAXE,EAAAA,GAA0BA,EAAAA,EAAOH,QAAUG,EAAAA,EAAOH,OAAOC,OAC3DE,EAAAA,EAAOH,OAAOC,OAED,oBAAXD,QAA0BA,OAAOC,OACnCD,OAAOC,OAGT,IACT,CAYA,SAASG,IACP,YAAwCC,IAApCH,OAAOI,SAASC,gBAGXL,OAAOI,SAASC,gBAAgBxD,OAAS,EAEzCmD,OAAOM,SAAWN,OAAOO,GAEpC,CAsBA,SAAAC,IAFC,OAEDA,EAAArB,EAAA1B,IAAAE,EAjBA,SAAA8C,EAA6BC,GAAY,IAAAX,EAAA,OAAAtC,IAAAC,EAAA,SAAAiD,GAAA,cAAAA,EAAAlF,GAAA,OACP,GAA1BsE,EAASH,IACF,CAAFe,EAAAlF,EAAA,cACH,IAAImF,MAAM,uCAAsC,cAAAD,EAAAlF,EAAA,EAE3CsE,EAAOc,UAClB,MACAH,EACA,CACE7B,KAAM,QACNiC,WAAY,UAEd,EACA,CAAC,WACF,cAAAH,EAAAjE,EAAA,EAAAiE,EAAAlE,GAAA,EAAAgE,EAAA,KACFpB,MAAA,KAAAD,UAAA,CAuCD,SAAA2B,IAFC,OAEDA,EAAA5B,EAAA1B,IAAAE,EAZA,SAAAqD,IAAA,OAAAvD,IAAAC,EAAA,SAAAuD,GAAA,cAAAA,EAAAxF,GAAA,WACMyE,IAAmB,CAAFe,EAAAxF,EAAA,cACb,IAAImF,MAAM,kBAAiB,cAAAK,EAAAxF,EAAA,EAERyF,IAAgB,OAAzB,GACG,OADHD,EAAAxE,EACO,CAAAwE,EAAAxF,EAAA,eAAAwF,EAAAxF,EAAA,EACC0F,IAAmB,OAC3CC,EADeH,EAAAxE,GACW,cAAAwE,EAAAvE,EAAA,KAAAsE,EAAA,KAG7B3B,MAAA,KAAAD,UAAA,UAKc+B,IAAiB,OAAAE,EAAAhC,MAAC,KAADD,UAAA,CAiBhC,SAAAiC,IAFC,OAEDA,EAAAlC,EAAA1B,IAAAE,EAjBA,SAAA2D,IAAA,IAAAvB,EAAAwB,EAAA,OAAA9D,IAAAC,EAAA,SAAA8D,GAAA,cAAAA,EAAA/F,GAAA,OACkC,GAA1BsE,EAASH,IACF,CAAF4B,EAAA/F,EAAA,cACH,IAAImF,MAAM,uCAAsC,cAAAY,EAAA/F,EAAA,EAElCsE,EAAO0B,YAC3B,CACE5C,KAAM,OACNiC,WAAY,UAEd,EACA,CAAC,eACF,OAPY,OAAPS,EAAOC,EAAA/E,EAAA+E,EAAA/F,EAAG,EASHsE,EAAO2B,UAAU,MAAOH,EAAQI,YAAW,cAAAH,EAAA9E,EAAA,EAAA8E,EAAA/E,GAAA,EAAA6E,EAAA,KACzDjC,MAAA,KAAAD,UAAA,CAKD,SAAS8B,IACP,IAAMU,EAASC,EAAkBrC,GACjC,OAAOoC,EAASE,KAAKC,MAAMH,GAAU,IACvC,CAMA,SAASR,EAAeY,GACtBC,EACEzC,EACAsC,KAAKI,UAAUF,GAxJwB,MA2J3C,CAgFA,SAASC,EAAkBE,EAAKjF,EAAOkF,GACrC,IACMC,EAAO,CACXnF,MAAOA,EACPoF,QAHU,IAAIC,MAGFC,UAAYJ,GAE1BpC,OAAOyC,aAAaC,QAAQP,EAAKL,KAAKI,UAAUG,GAClD,CAQA,SAASR,EAAkBM,GACzB,IAAMQ,EAAU3C,OAAOyC,aAAaG,QAAQT,GAC5C,IAAKQ,EACH,OAAO,KAET,IAAMN,EAAOP,KAAKC,MAAMY,GACxB,OACGzG,OAAOH,UAAU8G,eAAe7F,KAAKqF,EAAM,WAC3CnG,OAAOH,UAAU8G,eAAe7F,KAAKqF,EAAM,UAKlC,IAAIE,MACRC,UAAYH,EAAKC,QACvBtC,OAAOyC,aAAaK,WAAWX,GACxB,MAEFE,EAAKnF,OARV8C,OAAOyC,aAAaK,WAAWX,GACxB,KAQX,CAOA,SAASY,EAAwBC,GAC/B,IAAKA,GAAkC,iBAAdA,EACvB,MAAM,IAAIpC,MAAM,oDAIlB,IAAMqC,EACJD,EAAUE,WAAW,OAASF,EAAUE,WAAW,MAC/CF,EAAUrE,MAAM,GAChBqE,EAGN,GAAIC,EAAiBpG,OAAS,GAAK,IADpB,iBACmCiC,KAAKmE,GACrD,MAAM,IAAIrC,MAAM,oDAElB,OAAO,IAAIuC,WACTF,EAAiBG,MAAM,OAAOC,IAAI,SAACC,GAAC,OAAKC,SAASD,EAAG,GAAG,GAE5D,CAOA,SAASE,EAAsBC,GAC7B,OAAOxF,EAAIwF,GAAQJ,IAAI,SAACK,GAAC,OAAKA,EAAEhF,SAAS,IAAIiF,SAAS,EAAG,IAAI,GAAEC,KAAK,GACtE,CAqCA,SAASC,EAAyBC,EAAcC,GAC9C,IAAMC,EAAI9F,MAAMI,KAAK,IAAI6E,WAAWW,IAC9BvI,EAAI2C,MAAMI,KAAK,IAAI6E,WAAWY,IACpC,OAAO,IAAIZ,WAAW,GAADc,OAAKD,EAAMzI,GAClC,CA+JA,SAAS2I,EAAWC,GAClB,IAAMC,EAAaC,SAASC,eAAe,eAC3C,GAAIF,EAAY,CACd,IAAMG,EAAUF,SAASG,cAAc,KACvCD,EAAQE,UAAYN,EACpBC,EAAWM,YAAYH,EACzB,CACF,CAEA,SAKeI,EAAsBC,GAAA,OAAAC,EAAAxF,MAAC,KAADD,UAAA,CAsBrC,SAAAyF,IAFC,OAEDA,EAAA1F,EAAA1B,IAAAE,EAtBA,SAAAmH,EAAsCC,GAAU,IAAAhF,EAAAiF,EAAAC,EAAAxB,EAAA,OAAAhG,IAAAC,EAAA,SAAAwH,GAAA,cAAAA,EAAAzJ,GAAA,OACd,GAA1BsE,EAASH,IACF,CAAFsF,EAAAzJ,EAAA,cACH,IAAImF,MAAM,uCAAsC,OAMpB,cAH9BoE,EAAcG,EAAA,GAAQJ,IAENpI,EACtBqI,EAAeI,QAAU,CAAC,UAAUF,EAAAzJ,EAAA,EAEZsE,EAAOc,UAC7B,MACAmE,EACA,CAAEnG,KAAM,QAASiC,WAAY,UAC7B,EACA,CAAC,WACF,OANc,OAATmE,EAASC,EAAAzI,EAAAyI,EAAAzJ,EAAG,EAOGsE,EAAO2B,UAAU,MAAOuD,GAAU,OAA3C,OAANxB,EAAMyB,EAAAzI,EAAAyI,EAAAxI,EAAA,EACL,IAAIyG,WAAWM,IAAO,EAAAqB,EAAA,KAC9BzF,MAAA,KAAAD,UAAA,CAOD,SAASiG,EAAaC,GAKpB,IAHA,IACIC,EAAS,GACTC,EAAS,CAAC,GACL3J,EAAI,EAAGA,EAAIyJ,EAAMzI,OAAQhB,IAAK,CAErC,IADA,IAAI4J,EAAQH,EAAMzJ,GACT6J,EAAI,EAAGA,EAAIF,EAAO3I,SAAU6I,EACnCD,GAASD,EAAOE,IAAM,EACtBF,EAAOE,GAAKD,EAAQ,GACpBA,EAASA,EAAQ,GAAM,EAGzB,KAAOA,EAAQ,GACbD,EAAOG,KAAKF,EAAQ,IACpBA,EAASA,EAAQ,GAAM,CAE3B,CAEA,IAAK,IAAIG,EAAI,EAAGA,EAAIJ,EAAO3I,OAAQ+I,IACjCL,EAlBe,6DAkBGC,EAAOI,IAAML,EAIjC,IAAK,IAAI1J,EAAI,EAAgB,IAAbyJ,EAAMzJ,IAAYA,EAAIyJ,EAAMzI,OAAS,EAAGhB,IACtD0J,EAAS,IAAMA,EAEjB,OAAOA,CACT,CAQA,SAASM,EAAa7B,GAKpB,IAHA,IAAI8B,EAAW,6DACXC,EAAe,GACfC,EAAe,GACVnK,EAAI,EAAGA,EAAImI,EAAEnH,OAAQhB,IAAK,CACjC,IAAgC,IAA5BiK,EAASG,QAAQjC,EAAEnI,IACrB,MAAM,IAAI+E,MAAM,yBAADqD,OAA0BD,EAAEnI,GAAE,6BAE/C,IAAI4J,EAAQK,EAASG,QAAQjC,EAAEnI,IAKlB,GAAT4J,GAAc5J,IAAMmK,EAAanJ,QACnCmJ,EAAaL,KAAK,GAIpB,IADA,IAAID,EAAI,EACDA,EAAIK,EAAalJ,QAAU4I,EAAQ,GAAG,CAC3C,IAAIS,EAAcH,EAAaL,GAW/BD,GANES,OADkB/F,IAAhB+F,EACYT,EAEc,GAAdS,EAAmBT,IAIZ,EAEvBM,EAAaL,GAAKQ,EAAc,IAChCR,GACF,CACF,CAEA,IAAIH,EAASS,EAAa/B,OAAO8B,EAAaI,WAC9C,OAAO,IAAIhD,WAAWoC,EACxB,CA0MA,SAAAa,IAHC,OAGDA,EAAAjH,EAAA1B,IAAAE,EAnCA,SAAA0I,EAAyBC,EAAiBC,EAAWC,GAAc,IAAAC,EAAAC,EAAA,OAAAjJ,IAAAC,EAAA,SAAAiJ,GAAA,cAAAA,EAAAlL,GAAA,OAAAiL,EACzDH,EAASI,EAAAlL,EACV,WADUiL,EACF,EAoBR,gBApBQA,EAoBK,oBAnBXF,EAAgB,CAAFG,EAAAlL,EAAA,cACX,IAAImF,MAAM,sDAAqD,UAExC,KAA3B0F,EAAgBzJ,OAAa,CAAA8J,EAAAlL,EAAA,cACzB,IAAImF,MAAM,sDAADqD,OACyCqC,EAAgBzJ,OAAM,MAC7E,UAE2B,KAA1B2J,EAAe3J,OAAa,CAAA8J,EAAAlL,EAAA,cACxB,IAAImF,MAAM,qDAADqD,OACwCuC,EAAe3J,OAAM,MAC3E,OAKyC,OAFpC4J,EAAoB,IAAItD,WAAW,KACvByD,IAAIN,EAAiB,GACvCG,EAAkBG,IAAIJ,EAAgB,IAAIG,EAAAjK,EAAA,EACnC2I,EAAaoB,IAAkB,cAAAE,EAAAjK,EAAA,EAGjC,KAAO8G,EAAsB8C,IAAgB,OAMlD,OAFFO,QAAQC,KAAK,uBAAD7C,OACasC,EAAS,iCAChCI,EAAAjK,EAAA,EACK,KAAO8G,EAAsB8C,IAAgB,cAAAK,EAAAjK,EAAA,KAAA2J,EAAA,KAEzDhH,MAAA,KAAAD,UAAA,C,aCr2BD,IAAA/D,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA8C,EAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,EAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,EAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,EAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAWA,SAASyH,EAAgBrK,EAAGsK,GAC1B,IAAMC,EAAM,IAAIC,YACVC,EAAOF,EAAIG,OAAO1K,GAClB2K,EAAOJ,EAAIG,OAAOJ,GACxB,GAAIG,EAAKtK,SAAWwK,EAAKxK,OAAQ,CAG/B,IAFA,IACMyK,EAAMC,KAAKC,IAAIL,EAAKtK,OAAQwK,EAAKxK,QAC9BhB,EAAI,EAAGA,EAAIyL,EAAKzL,IACfsL,EAAKtL,GAAKwL,EAAKxL,GAEzB,OAAO,CACT,CAEA,IADA,IAAI4L,EAAO,EACF5L,EAAI,EAAGA,EAAIsL,EAAKtK,OAAQhB,IAC/B4L,GAAQN,EAAKtL,GAAKwL,EAAKxL,GAEzB,OAAgB,IAAT4L,CACT,CAEA,IACmBC,EDuHlB,WAK6B,OAAA3G,EAAA1B,MAAC,KAADD,UAAA,EC/G5B2D,EAaE4E,EATF9D,EASE8D,EALFC,EDy1BF,SAAwBC,EAAQC,GAC9B,IAAMC,EAAc,CAAC,EAEfC,EAAqB,CACzBC,QAAS,+BACTC,OAAQ,+BACRC,YAAa,6BACbC,YACE,gEACFC,YACE,iLACFC,aAAc,+BACdC,SAAU,6DACVC,WAAY,wCACZC,WAAY,aACZC,MACE,iLACFC,WACE,iLACFC,gBACE,iLACFC,MAAO,kEACPC,OAAQ,kEACRC,SAAU,kEACVC,UACE,kEACFC,WACE,8EACFC,UACE,8HACFC,UAAW,gDACXC,aAAc,iCACdC,SAAU,wBACVC,OAAQ,kDA4BV,OAzBApN,OAAOqN,QAAQ1B,GAAQ2B,QAAQ,SAAAC,GAAuB,IAj7BxDlO,EAAAF,EAi7BwDqO,GAj7BxDrO,EAi7BwD,EAj7BxD,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAoO,CAAApO,EAi7BwDkO,IAj7BxD,SAAAlO,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAqO,KAAA,IAAA9M,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAiJ,KAAAtK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAmN,CAAAtO,EAAAF,IAAAmD,EAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAA+M,IAi7BmCC,EAAQL,EAAA,GAAExM,EAAKwM,EAAA,GACxCM,EAAgBD,EAASE,OAC/B,GAA6B,IAAzBD,EAAcnN,OAChB,MAAM,IAAI+D,MAAM,sCAElB,IAAMsJ,EAAgBlC,EAAmBgC,GACzC,IAAKE,EACH,MAAM,IAAItJ,MAAM,+CAADqD,OACkC+F,EAAa,MAGhE,IAAMG,EAAa,IAAIC,OAAOF,GACxBG,EAAanN,EAAM+M,OACzB,GAAyB,GAArBI,EAAWxN,OACb,MAAM,IAAI+D,MAAM,kBAADqD,OAAmB+F,EAAa,eAGjD,IADqBG,EAAWrL,KAAKuL,GAEnC,MAAM,IAAIzJ,MAAM,yCAADqD,OAC4B+F,EAAa,MAG1DjC,EAAYiC,GAAiBK,CAC/B,GAEOtC,CACT,ECt5BE7H,EAIEyH,EAHF2C,EDwDF,SAG4BC,GAAA,OAAA/J,EAAAnB,MAAC,KAADD,UAAA,EC5C5B,SAAA2B,IAFC,OAEDA,EAAA5B,EAAA1B,IAAAE,EAPA,SAAA8C,IAAA,OAAAhD,IAAAC,EAAA,SAAAiD,GAAA,cAAAA,EAAAlF,GAAA,WACMyE,IAAmB,CAAFS,EAAAlF,EAAA,cACb,IAAImF,MAAM,kBAAiB,cAAAD,EAAAlF,EAAA,EAEtBiM,IAAuB,cAAA/G,EAAAjE,EAAA,EAAAiE,EAAAlE,GAAA,EAAAgE,EAAA,KACrCpB,MAAA,KAAAD,UAAA,CA8ED,SAAAoL,IAFC,OAEDA,EAAArL,EAAA1B,IAAAE,EAtEA,SAAA8M,EACEC,EACAC,EACAC,GAAU,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA3N,IAAAC,EAAA,SAAA2N,GAAA,cAAAA,EAAA5P,GAAA,OA2B6B,GAxBjCoP,EAA2B,CAC/BS,KAAM,qIACNC,QACE,sIAIAT,EAAc,KACM,oBAAbzG,WACH0G,EAAO1G,SAASmH,cACpB,6CAIAT,EAAK5G,SACY,mCAAjB4G,EAAK5G,UAEL2G,EAAcC,EAAK5G,SAGlB2G,GAAiC,oBAAX9K,SACzB8K,EAAc9K,OAAOyL,qCAK0BtL,KAH3C6K,EACJH,EAAyBC,IAE+B,CAAAO,EAAA5P,EAAA,cAClD,IAAImF,MAAM,8EAEf,UAMAmG,EACC2D,EACAM,GACD,CAAAK,EAAA5P,EAAA,cAEK,IAAImF,MAAM,2EAADqD,OAC8D+G,EAAwC,cAAA/G,OAAayG,EAAmB,MACpJ,OAKF,OAFKO,EAA4B,IAAI9H,WACpCJ,EAAwBiI,IACzBK,EAAA5P,EAAA,EACuB6O,EAAcW,GAA0B,OAAjD,GAATC,EAASG,EAAA5O,EACC,CAAF4O,EAAA5P,EAAA,cACN,IAAImF,MAAM,6BAA4B,OAKW,OADnDuK,GAAqBO,EAAAA,EAAAA,IAAiBf,GACtCS,EAAgBrI,EAAwB6H,GAAWS,EAAA5P,EAAA,EAC5CqE,OAAOC,OAAO4L,OACzB,CAAE9M,KAAM,QAAS+M,KAAM,WACvBV,EACAC,EACAC,GACD,cAAAC,EAAA3O,EAAA,EAAA2O,EAAA5O,GAAA,EAAAgO,EAAA,KACFpL,MAAA,KAAAD,UAAA,CA2CM,IAAMyM,GAAO,CAClBC,gBAhIF,WAG8B,OAAA/K,EAAA1B,MAAC,KAADD,UAAA,EA8H5B+B,kBAnIEwG,EAoIF1F,kBApIE0F,EAqIF9F,kBArIE8F,EAsIFzG,eAtIEyG,EAuIFvG,eAvIEuG,EAwIFoE,mBDoCF,WACE/L,OAAOyC,aAAaK,WAAWtD,GAC/BQ,OAAOyC,aAAaK,WApLc,8BAqLpC,ECtCE6B,uBAzIEgD,EA0IFtC,aA1IEsC,EA2IF9B,aA3IE8B,EA4IFqE,UDunBD,SASuBC,EAAAC,EAAAC,GAAA,OAAA/F,EAAA/G,MAAC,KAADD,UAAA,EC/nBtBgN,cDiUF,SAAuBC,EAAMnP,EAAOoP,GAClC,IAAM/H,EAAU,CACd8H,KAAMA,EACNnP,MAAOA,GAQT,GAJIoP,IACF/H,EAAQ+H,UAAYA,GAGlB5M,EACFA,EAA8B6M,YAAYhI,QACrC,GAAIvE,OAAOM,SAAWN,OAAQ,CAMnC,IAAMwM,EAAe7M,GAAgB,IACrCK,OAAOM,OAAOiM,YACZ,CACEF,KAAMA,EACNnP,MAAOA,GAETsP,EAEJ,CACAtI,EAAW,mBAADD,OAAoBoI,EAAI,MAAApI,OAAK/G,GACzC,EC7VEgH,WA9IEyD,EA+IF5E,wBAAAA,EACAS,sBAhJEmE,EAiJF8E,iCDuCF,SAA0CC,GACxChN,EAAgCgN,CAClC,ECxCEC,iBD2JF,SAA0BC,EAAWC,GACnC,IAAMC,EAAgBD,EAAeD,EAAU/P,OAG/C,GAAIiQ,EAAgB,EAAG,CACrB,IAAM7E,EAAU,IAAI9E,WAAW2J,GAAeC,KAAK,GACnD,OAAO,IAAI5J,WAAW,GAADc,OAAAhG,EAAKgK,GAAOhK,EAAK2O,IACxC,CAGA,GAAIE,EAAgB,EAAG,CAGrB,IAFA,IAAME,GAAqC,EAAjBF,EACtBG,EAAY,EACPpR,EAAI,EAAGA,EAAImR,GAAqBnR,EAAI+Q,EAAU/P,OAAQhB,IACxC,IAAjB+Q,EAAU/Q,IACZoR,IAIJ,GAAIA,IAAcD,EAChB,MAAM,IAAIpM,MAAM,iEAADqD,OACoD+I,EAAiB,aAAA/I,OAAYgJ,EAAS,MAG3G,OAAOL,EAAUjO,MAAMqO,EAAmBA,EAAoBH,EAChE,CACA,OAAOD,CACT,ECrLElB,iBAAAA,EAAAA,GACA7H,yBAAAA,EACAqJ,uBA3ID,SAQoC3C,EAAA4C,EAAAC,GAAA,OAAA5C,EAAAnL,MAAC,KAADD,UAAA,EAoInCiO,oBA1DF,SAA6BC,GAG3B,OAFAC,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWtO,MAAAoO,EAAArO,WAAO,EACjDmO,EAAAA,GAA0BD,EACnC,EAuDEM,cA/CF,SAAuBC,GACrB,IAAMC,EAAgB,CAAC,EACvB,IAAKD,EACH,OAAO/L,KAAKI,UAAU4L,GAExB,IAAMC,EAAcjM,KAAKC,MAAM8L,GAC/B,GAAIE,EAAYlG,OAAQ,CAEtB,IAAMmG,EAAiB3J,SAASC,eAAe,WAC/C,IAAK0J,EACH,MAAM,IAAIpN,MAAM,uDAIlB,IAAMmH,EAAcH,EAAemG,EAAYlG,QAC/C3L,OAAOqN,QAAQxB,GAAayB,QAAQ,SAAAC,GAAkB,IAhL1DlO,EAAAF,EAgL0DqO,GAhL1DrO,EAgL0D,EAhL1D,SAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAoO,CAAApO,EAgL0DkO,IAhL1D,SAAAlO,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAqO,KAAA,IAAA9M,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAiJ,KAAAtK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAmN,CAAAtO,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,EAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,EAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAA+M,IAgL0C3H,EAAGuH,EAAA,GAAExM,EAAKwM,EAAA,GAC9CsE,EAAeC,MAAM9L,GAAOjF,CAC9B,GAEA4Q,EAAsB,OAAI/F,CAC5B,CAEA,OAAOjG,KAAKI,UAAU4L,EACxB,EAyBElG,eAAAA,EACAsG,YDwDF,WACE,IAAML,EAAW7N,OAAOyC,aAAaG,QAAQnD,GAC7C,OAAOoO,EAAW/L,KAAKC,MAAM8L,GAAY,IAC3C,EC1DEM,YDgEF,SAAqBN,GACnB7N,OAAOyC,aAAaC,QAAQjD,EAAkBqC,KAAKI,UAAU2L,GAC/D,ECjEEO,gBDqpBF,SAAyBzM,GACvB,GAAIzD,MAAMC,QAAQwD,GAChB,OAAO,IAAIwB,WAAWxB,GAGxB,GAA0B,iBAAfA,EAAyB,CAOlC,GALIA,EAAWuB,WAAW,QACxBvB,EAAaA,EAAWhD,MAAM,IAIN,KAAtBgD,EAAW9E,QAAiB,iBAAiBiC,KAAK6C,GACpD,OAAOoB,EAAwBpB,GAIjC,IACE,OAAOkE,EAAalE,EACtB,CAAE,MAAO0M,GACP,MAAM,IAAIzN,MACR,mEAEJ,CACF,CAEA,MAAM,IAAIA,MAAM,4DAClB,EC/qBE0N,gBDsCF,SAAyBC,GACvB5O,EAAe4O,CACjB,ECvCEC,gBD6CF,WACE,OAAO7O,CACT,G,wBErQA,IAAAtE,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAmT,GAAAlT,EAAAF,GAAA,gBAAAE,GAAA,GAAA2C,MAAAC,QAAA5C,GAAA,OAAAA,CAAA,CAAAoO,CAAApO,IAAA,SAAAA,EAAAuB,GAAA,IAAAxB,EAAA,MAAAC,EAAA,yBAAAC,QAAAD,EAAAC,OAAAE,WAAAH,EAAA,uBAAAD,EAAA,KAAAD,EAAAI,EAAAI,EAAAI,EAAAS,EAAA,GAAAL,GAAA,EAAAV,GAAA,SAAAE,GAAAP,EAAAA,EAAA0B,KAAAzB,IAAAqO,KAAA,IAAA9M,EAAA,IAAAZ,OAAAZ,KAAAA,EAAA,OAAAe,GAAA,cAAAA,GAAAhB,EAAAQ,EAAAmB,KAAA1B,IAAA2B,QAAAP,EAAAiJ,KAAAtK,EAAA6B,OAAAR,EAAAG,SAAAC,GAAAT,GAAA,UAAAd,GAAAI,GAAA,EAAAF,EAAAF,CAAA,iBAAAc,GAAA,MAAAf,EAAA,SAAAW,EAAAX,EAAA,SAAAY,OAAAD,KAAAA,GAAA,kBAAAN,EAAA,MAAAF,CAAA,SAAAiB,CAAA,EAAAmN,CAAAtO,EAAAF,IAAA,SAAAE,EAAAmB,GAAA,GAAAnB,EAAA,qBAAAA,EAAA,OAAA6C,GAAA7C,EAAAmB,GAAA,IAAApB,EAAA,GAAAoD,SAAA1B,KAAAzB,GAAAoD,MAAA,uBAAArD,GAAAC,EAAAqD,cAAAtD,EAAAC,EAAAqD,YAAAC,MAAA,QAAAvD,GAAA,QAAAA,EAAA4C,MAAAI,KAAA/C,GAAA,cAAAD,GAAA,2CAAAwD,KAAAxD,GAAA8C,GAAA7C,EAAAmB,QAAA,GAAA8B,CAAAjD,EAAAF,IAAA,qBAAA0B,UAAA,6IAAA+M,EAAA,UAAA1L,GAAA7C,EAAAmB,IAAA,MAAAA,GAAAA,EAAAnB,EAAAsB,UAAAH,EAAAnB,EAAAsB,QAAA,QAAAxB,EAAA,EAAAI,EAAAyC,MAAAxB,GAAArB,EAAAqB,EAAArB,IAAAI,EAAAJ,GAAAE,EAAAF,GAAA,OAAAI,CAAA,UAAAsD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAUA,IAAIoP,GAAe,CAAC,EAUhBC,GAAsB,KAQtBC,GAAgB,KAKdC,GAAc,IAAI3H,YAClB4H,GAAc,IAAIC,YAcxB,SAAShI,GAAgBrK,EAAGsK,GAC1B,GAAiB,iBAANtK,GAA+B,iBAANsK,EAClC,OAAO,EAGT,IAAMG,EAAO0H,GAAYzH,OAAO1K,GAC1B2K,EAAOwH,GAAYzH,OAAOJ,GAChC,GAAIG,EAAKtK,SAAWwK,EAAKxK,OAAQ,CAK/B,IAFA,IACMyK,EAAMC,KAAKC,IAAIL,EAAKtK,OAAQwK,EAAKxK,QAC9BhB,EAAI,EAAGA,EAAIyL,EAAKzL,IACfsL,EAAKtL,GAAKwL,EAAKxL,GAEzB,OAAO,CACT,CAEA,IADA,IAAI4L,EAAO,EACF5L,EAAI,EAAGA,EAAIsL,EAAKtK,OAAQhB,IAC/B4L,GAAQN,EAAKtL,GAAKwL,EAAKxL,GAEzB,OAAgB,IAAT4L,CACT,CASA,SAASuH,GAAaC,GACfA,GAEDA,EAASC,SAAWD,EAASC,QAAQC,WACvCF,EAASC,QAAQC,UAAUpC,KAAK,EAMpC,CAEA,SAMeqC,GAAwB7E,EAAA4C,GAAA,OAAAkC,GAAAhQ,MAAC,KAADD,UAAA,CA2DvC,SAAAiQ,KAFC,OAEDA,GAAAlQ,GAAA1B,KAAAE,EA3DA,SAAA2R,EAAwCC,EAAQC,GAAc,IAAAC,EAAA7E,EAAA,OAAAnN,KAAAC,EAAA,SAAAgS,GAAA,cAAAA,EAAAjU,GAAA,OACxB,GAEV,YAFpBgU,EAAY3N,KAAKC,MAAMwN,IAEfI,QAAoB,CAAAD,EAAAjU,EAAA,cAC1B,IAAImF,MAAM,wBAADqD,OAAyBwL,EAAUE,UAAU,UAEzDF,EAAUG,KAAM,CAAFF,EAAAjU,EAAA,cACX,IAAImF,MAAM,4BAA2B,UAExC6O,EAAUI,cAAe,CAAFH,EAAAjU,EAAA,cACpB,IAAImF,MAAM,qCAAoC,UAEjD6O,EAAU/E,oBAAqB,CAAFgF,EAAAjU,EAAA,cAC1B,IAAImF,MAAM,2CAA0C,UAGvDiL,GAAKqB,uBAAwB,CAAFwC,EAAAjU,EAAA,cACxB,IAAImF,MAAM,iDAAgD,cAAA8O,EAAAjU,EAAA,EAE3CoQ,GAAKqB,uBAC1BuC,EAAU/E,oBACV+E,EAAUI,cACVJ,EAAUG,MACX,OAJa,GAAAF,EAAAjT,EAKC,CAAFiT,EAAAjU,EAAA,cACL,IAAImF,MAAM,sDAADqD,OACyCwL,EAAUI,cAAa,2BAAA5L,OAA0BwL,EAAU/E,sBAClH,OAKF,GAFKE,EAAa9I,KAAKC,MACtB+M,GAAYgB,OAAOjE,GAAK9I,wBAAwB0M,EAAUG,QAGvDJ,EAAgB,CAAFE,EAAAjU,EAAA,cACX,IAAImF,MAAM,8IAEf,UAEAgK,EAAW4E,gBAGXzI,GAAgB6D,EAAW4E,eAAgBA,GAAe,CAAAE,EAAAjU,EAAA,cAErD,IAAImF,MAAM,4DAADqD,OAC+CuL,EAAc,aAAAvL,OAAY2G,EAAW4E,eAAc,MAChH,UAGE5E,EAAWmF,eAAgB,CAAFL,EAAAjU,EAAA,eACtB,IAAImF,MAAM,kDAAiD,WAE9DgK,EAAWoF,WAAY,CAAFN,EAAAjU,EAAA,eAClB,IAAImF,MAAM,8CAA6C,eAAA8O,EAAAhT,EAAA,EAGxDkO,GAAU,EAAA0E,EAAA,KAClBjQ,MAAA,KAAAD,UAAA,UAUc6Q,GAAa7C,EAAA8C,EAAAC,GAAA,OAAAC,GAAA/Q,MAAC,KAADD,UAAA,CAiB5B,SAAAgR,KAFC,OAEDA,GAAAjR,GAAA1B,KAAAE,EAjBA,SAAA0I,EAA6BkJ,EAAQC,EAAgBa,GAAW,IAAAzF,EAAA0F,EAAAC,EAAAC,EAAAC,EAAA,OAAAhT,KAAAC,EAAA,SAAAiJ,GAAA,cAAAA,EAAAlL,GAAA,cAAAkL,EAAAlL,EAAA,EACrC2T,GAAyBG,EAAQC,GAAe,OAQ9B,GARrC5E,EAAUjE,EAAAlK,EAEV6T,EAAiBzE,GAAK9I,wBAC1B6H,EAAWmF,gBAEPQ,EAAgB1E,GAAK9I,wBAAwB6H,EAAWoF,YAE9DS,EACwB9B,GAAmB,CAAAhI,EAAAlL,EAAA,eAAAkL,EAAAlL,EAAA,EAAWoQ,GAAK3K,iBAAgB,OAAAuP,EAAA9J,EAAAlK,EAAA,OAAtD,OAAf+T,EAAeC,EAAA9J,EAAAlL,EAAG,EACX4U,EAAY,CACvBE,cAAAA,EACAD,eAAAA,EACAE,gBAAAA,IACA,cAAA7J,EAAAjK,EAAA,EAAAiK,EAAAlK,GAAA,EAAA4J,EAAA,IACH+J,GAAA/Q,MAAA,KAAAD,UAAA,UAMcsR,GAAsB9L,GAAA,OAAA+L,GAAAtR,MAAC,KAADD,UAAA,CAgBrC,SAAAuR,KAFC,OAEDA,GAAAxR,GAAA1B,KAAAE,EAhBA,SAAAiT,EAAsCtE,GAAS,IAAAuE,EAAAC,EAAAC,EAAA,OAAAtT,KAAAC,EAAA,SAAAsT,GAAA,cAAAA,EAAAvV,GAAA,OACD,GAAtCoV,EAAiBhF,GAAK3K,iBAEP,CAAF8P,EAAAvV,EAAA,QACyC,OAA1DoQ,GAAKO,cAAc,sBAAuB,GAAIE,GAAY0E,EAAAtU,EAAA,iBAAAsU,EAAAvV,EAAA,EAKjCoQ,GAAKlH,uBAAuBkM,GAAe,OAAhEC,EAAYE,EAAAvU,EACZsU,EAAelF,GAAKrI,sBAAsBsN,GAGhDjF,GAAKO,cAAc,sBAAuB2E,EAAczE,GAAW,cAAA0E,EAAAtU,EAAA,KAAAkU,EAAA,KACpEvR,MAAA,KAAAD,UAAA,UASc6R,GAAiBC,EAAAC,EAAAC,EAAAnF,GAAA,OAAAoF,GAAAhS,MAAC,KAADD,UAAA,CAkDhC,SAAAiS,KAFC,OAEDA,GAAAlS,GAAA1B,KAAAE,EAlDA,SAAA2T,EAAiCC,EAASC,EAAUjL,EAAWiJ,GAAc,IAAArN,EAAAmE,EAAAgH,EAAA9G,EAAAiL,EAAAC,EAAA,OAAAjU,KAAAC,EAAA,SAAAiU,GAAA,cAAAA,EAAArV,EAAAqV,EAAAlW,GAAA,OAE3B,GAA1C6K,EAAkB,IAAInD,WAAWqO,GAASG,EAAArV,EAAA,EAG5B,WAAdiK,EAAsB,CAAAoL,EAAAlW,EAAA,QAIsC,OAHxD6R,EAAgBzB,GAAKrI,sBACzB8C,EAAgBsL,SAAS,EAAG,KAExBpL,EAAiBqF,GAAKwB,oBAAoBC,GAAcqE,EAAAlW,EAAA,EAClDoQ,GAAKG,UAAU1F,EAAiBC,EAAWC,GAAe,OAAtErE,EAAGwP,EAAAlV,EAAAkV,EAAAlW,EAAG,EAAH,oBAAAkW,EAAAlW,EAAG,EAEMoQ,GAAKG,UAAU1F,EAAiBC,GAAU,OAAtDpE,EAAGwP,EAAAlV,EAAA,OAMmB,OANnBkV,EAAArV,EAAG,EAMRgK,EAAgByG,KAAK,GAAG4E,EAAAtV,EAAA,UAK1B,GAFMoV,EAAaF,GAAW,UAIZ,WAAdhL,EAAsB,CAAAoL,EAAAlW,EAAA,QACxBiW,EAAgBG,GAAAA,GAAQC,cAAcjG,GAAKhG,aAAa1D,IAAMwP,EAAAlW,EAAA,kBACvC,gBAAd8K,EAA2B,CAAAoL,EAAAlW,EAAA,eAAAkW,EAAAlW,EAAA,EACdsW,GACpB7T,MAAMI,KAAKuN,GAAK9I,wBAAwBZ,KACzC,OAFDuP,EAAaC,EAAAlV,EAAA,OAUXiS,GAAa+C,IACfzC,GAAaN,GAAa+C,IAE5B/C,GAAa+C,GAAc,CACzBjC,eAAAA,EACA7N,WAAYQ,EACZ6P,OAAQzL,EACRjE,QAAQ,IAAIC,MAAOC,UA/NiB,MAgOpC0M,QAASwC,GACT,eAAAC,EAAAjV,EAAA,KAAA4U,EAAA,qBACHjS,MAAA,KAAAD,UAAA,UAWc6S,GAAiB/F,EAAAC,EAAA+F,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAAjT,MAAC,KAADD,UAAA,CAkBhC,SAAAkT,KAFC,OAEDA,GAAAnT,GAAA1B,KAAAE,EAlBA,SAAA4U,EACEjG,EACAkD,EACAD,EACAhJ,EACAgL,EACAlB,GAAW,IAAAmB,EAAA,OAAA/T,KAAAC,EAAA,SAAA8U,GAAA,cAAAA,EAAA/W,GAAA,cAAA+W,EAAA/W,EAAA,EAGYwU,GAAcV,EAAQC,EAAgBa,GAAY,OAA3D,OAARmB,EAAQgB,EAAA/V,EAAA+V,EAAA/W,EAAG,EAGXwV,GAAkBM,EAASC,EAAUjL,EAAWiJ,GAAe,OAGrE3D,GAAKO,cAAc,mBAAmB,EAAME,GAAW,cAAAkG,EAAA9V,EAAA,KAAA6V,EAAA,IACxDD,GAAAjT,MAAA,KAAAD,UAAA,UAUcqT,GAAeC,EAAAC,GAAA,OAAAC,GAAAvT,MAAC,KAADD,UAAA,CAW9B,SAAAwT,KAFC,OAEDA,GAAAzT,GAAA1B,KAAAE,EAXA,SAAAkV,EAA+BhF,EAAUvB,GAAS,IAAAwB,EAAA,OAAArQ,KAAAC,EAAA,SAAAoV,GAAA,cAAAA,EAAArX,GAAA,OAE1CqS,EAAgBjC,GAAK+B,cAAcC,GAGzChC,GAAKsC,YAAYL,GAGjBjC,GAAKO,cAAc,oBAAoB,EAAME,GAAW,cAAAwG,EAAApW,EAAA,KAAAmW,EAAA,KACzDxT,MAAA,KAAAD,UAAA,UAQc2T,GAAiBC,EAAAC,EAAAC,GAAA,OAAAC,GAAA9T,MAAC,KAADD,UAAA,CAmChC,SAAA+T,KAFC,OAEDA,GAAAhU,GAAA1B,KAAAE,EAnCA,SAAAyV,EAAiC9G,EAAW+G,EAAuB9B,GAAO,IAAAE,EAAAtP,EAAA+M,EAAAoE,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAlW,KAAAC,EAAA,SAAAkW,GAAA,cAAAA,EAAAnY,GAAA,OAKxE,GACKoY,GAHC1R,EAAMuM,GADN+C,EAAaF,GAAW,WAIRE,GAAwB,CAAFmC,EAAAnY,EAAA,eAAAmY,EAAAlX,EAAA,iBAAAkX,EAAAnY,EAAA,EAKtBqY,GAAmB3R,GAAI,OAIE,GAJzC+M,EAAO0E,EAAAnX,EAEP6W,EAAqBxR,KAAKC,MAAMsR,GAChCE,EAAoBD,EAAmBI,YAKrB,WAJAJ,EAAmBjH,KAIX,CAAAuH,EAAAnY,EAAA,QAExBgY,EAAmB5H,GAAK9I,wBAAwBwQ,IAChDG,EAAcK,GAAAA,GAAqBC,YAAYP,IACzCQ,KAAK,CAAC/E,IAElBsE,EAAoBE,EAAYQ,YAAYN,EAAAnY,EAAA,qBAEtC,IAAImF,MAAM,gCAA+B,OAG3C+S,EAAuB9H,GAAKrI,sBAAsBgQ,GAExD3H,GAAKO,cAAc,qBAAsBuH,EAAsBrH,GAAW,cAAAsH,EAAAlX,EAAA,KAAA0W,EAAA,KAC3E/T,MAAA,KAAAD,UAAA,UAQc+U,GAAaC,EAAAC,EAAAC,GAAA,OAAAC,GAAAlV,MAAC,KAADD,UAAA,CAmD5B,SAAAmV,KAFC,OAEDA,GAAApV,GAAA1B,KAAAE,EAnDA,SAAA6W,EAA6BlI,EAAWmI,EAAmBlD,GAAO,IAAAE,EAAAtP,EAAAuS,EAAAC,EAAAC,EAAAC,EAAAC,EAAA5F,EAAAvN,EAAAoT,EAAA,OAAAtX,KAAAC,EAAA,SAAAsX,GAAA,cAAAA,EAAAvZ,GAAA,OAKhE,GACKoY,GAHC1R,EAAMuM,GADN+C,EAAaF,GAAW,WAIRE,GAAwB,CAAFuD,EAAAvZ,EAAA,eAAAuZ,EAAAtY,EAAA,UAOU,OAHhDgY,EAAiB5S,KAAKC,MAAM0S,GAC5BE,EAAgBD,EAAenQ,QAC/BqQ,EAAcF,EAAerI,KAC7BwI,EAAehG,GAAYzH,OAAOuN,GAAcK,EAAAvZ,EAAA,EAKhCqY,GAAmB3R,GAAI,OAAhC,GAAP+M,EAAO8F,EAAAvY,EAEO,WAAhBmY,EAAwB,CAAAI,EAAAvZ,EAAA,QAE1B8R,EAAAA,GAAiBC,WAAa,eAAAC,EAAA,OAC5BC,EAAAA,IAAmBD,EAAAF,EAAAA,IAAiBI,YAAWtO,MAAAoO,EAAArO,WAAO,EAMlDuC,EAAauN,EAAQC,UAAUxQ,MAAM,EAAG,IAC9C,IAEQoW,EAAYxH,EAAAA,GAAkBsH,EAAclT,GAKlDmT,EAAejJ,GAAKrI,sBAAsBuR,EAC5C,CAAE,QAEApT,EAAWoL,KAAK,EAClB,CAACiI,EAAAvZ,EAAA,eAEkE,OAAnEoQ,GAAKO,cAAc,QAAS,2BAA4BE,GAAW0I,EAAAtY,EAAA,UAKrEmP,GAAKO,cAAc,iBAAkB0I,EAAcxI,GAAW,cAAA0I,EAAAtY,EAAA,KAAA8X,EAAA,IAC/DD,GAAAlV,MAAA,KAAAD,UAAA,UAOc6V,GAAyBC,EAAAC,GAAA,OAAAC,GAAA/V,MAAC,KAADD,UAAA,CAmCxC,SAAAgW,KAFC,OAEDA,GAAAjW,GAAA1B,KAAAE,EAnCA,SAAA0X,EAAyC/I,EAAWiF,GAAO,IAAA+D,EAAAC,EAAApT,EAAA,OAAA1E,KAAAC,EAAA,SAAA8X,GAAA,cAAAA,EAAA/Z,GAAA,UAEpD8V,EAAS,CAAFiE,EAAA/Z,EAAA,QAIV,IAAA6Z,EAAA,EAAAC,EAAkBrZ,OAAOuZ,KAAK/G,IAAa4G,EAAAC,EAAA1Y,OAAAyY,IAAhCnT,EAAGoT,EAAAD,GACZtG,GAAaN,GAAavM,IAGwC,OADpEuM,GAAe,CAAC,EAChB7C,GAAKO,cAAc,gCAAgC,EAAME,GAAWkJ,EAAA9Y,EAAA,aAMjEgS,GAAa6C,GAAU,CAAFiE,EAAA/Z,EAAA,QAOtB,OANFoQ,GAAKO,cACH,QACA,IAAIxL,MAAM,6BAADqD,OACsBsN,EAAO,2CACpC7S,WACF4N,GACAkJ,EAAA9Y,EAAA,UAMJsS,GAAaN,GAAa6C,WACnB7C,GAAa6C,GAEpB1F,GAAKO,cAAc,gCAAgC,EAAME,GAAW,cAAAkJ,EAAA9Y,EAAA,KAAA2Y,EAAA,KACrEhW,MAAA,KAAAD,UAAA,UAWcsW,GAAwBC,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,GAAA1W,MAAC,KAADD,UAAA,CAmCvC,SAAA2W,KAFC,OAEDA,GAAA5W,GAAA1B,KAAAE,EAnCA,SAAAqY,EACE1J,EACAkD,EACAD,EACAc,GAAW,IAAAmB,EAAAyE,EAAAC,EAAAC,EAAA,OAAA1Y,KAAAC,EAAA,SAAA0Y,GAAA,cAAAA,EAAA9Z,EAAA8Z,EAAA3a,GAAA,OAEQ,OAAf+V,EAAW,KAAI4E,EAAA9Z,EAAA,EAAA8Z,EAAA3a,EAAA,EAIOwU,GAAcV,EAAQC,EAAgBa,GAAY,OAI1E,OAJM4F,EAASG,EAAA3Z,EACf+U,EACEyE,aAAqB9S,WAAa8S,EAAY,IAAI9S,WAAW8S,GAE/DG,EAAA3a,EAAA,EACqB4a,GAAuB,IAAIlT,WAAWqO,IAAU,OAA/D0E,EAAME,EAAA3Z,EAGZkS,GAAsBuH,EAEtBrK,GAAKO,cAAc,6BAA6B,EAAME,GAAW8J,EAAA3a,EAAA,eAKtC,MALsC2a,EAAA9Z,EAAA,EAAA6Z,EAAAC,EAAA3Z,EAKjEkS,GAAsB,KAAKwH,EAAA,OAM1B,OAN0BC,EAAA9Z,EAAA,EAIvBkV,GACFA,EAASzE,KAAK,GACfqJ,EAAA/Z,EAAA,iBAAA+Z,EAAA1Z,EAAA,KAAAsZ,EAAA,qBAEJD,GAAA1W,MAAA,KAAAD,UAAA,CAOD,SAASkX,GAA4BhK,GACnCqC,GAAsB,KACtB9C,GAAKO,cAAc,iCAAiC,EAAME,EAC5D,CAEA,SACeyF,GAAmBwE,GAAA,OAAAC,GAAAnX,MAAC,KAADD,UAAA,CAmBlC,SAAAoX,KAFC,OAEDA,GAAArX,GAAA1B,KAAAE,EAnBA,SAAA8Y,EAAmC9U,GAAU,IAAA2E,EAAA4I,EAAA,OAAAzR,KAAAC,EAAA,SAAAgZ,GAAA,cAAAA,EAAAjb,GAAA,OACa,GAGzB,MAHzB6K,EAAkBuF,GAAKuC,gBAAgBzM,IAGzB9E,OAAa,CAAA6Z,EAAAjb,EAAA,QAE/ByT,EAAU2C,GAAAA,GAAQ8E,SAASrQ,GAAiBoQ,EAAAjb,EAAA,kBACR,KAA3B6K,EAAgBzJ,OAAa,CAAA6Z,EAAAjb,EAAA,QAEtCyT,EAAU2C,GAAAA,GAAQC,cAAcxL,GAAiBoQ,EAAAjb,EAAA,qBAE3C,IAAImF,MAAM,+BAADqD,OACkBqC,EAAgBzJ,OAAM,+BACtD,cAAA6Z,EAAAha,EAAA,EAGIwS,GAAO,EAAAuH,EAAA,KACfpX,MAAA,KAAAD,UAAA,UASciX,GAAsBO,GAAA,OAAAC,GAAAxX,MAAC,KAADD,UAAA,CA0DrC,SAAAyX,KAFC,OAEDA,GAAA1X,GAAA1B,KAAAE,EA1DA,SAAAmZ,EAAsCC,GAAkB,IAAAC,EAAAC,EAAAC,EAAA,OAAAzZ,KAAAC,EAAA,SAAAyZ,GAAA,cAAAA,EAAA7a,EAAA6a,EAAA1b,GAAA,UACpB,KAA9Bsb,EAAmBla,OAAa,CAAAsa,EAAA1b,EAAA,cAC5B,IAAImF,MAAM,yDAADqD,OAC4C8S,EAAmBla,SAC7E,OAkC+C,OAR5Cma,EAAc,IAAI7T,WAAW,CACjC,GAAM,GAAM,EAAM,EAAM,EAAM,GAAM,GAAM,EAAM,EAAM,GAAM,IAAM,GAClE,IAAM,GAAM,EAAM,EAAM,EAAM,EAAM,GAAM,IAAM,GAAM,IAAM,GAAM,EAClE,EAAM,EAAM,EAAM,GAAM,GAAM,GAAM,EAAM,EAAM,EAAM,EAAM,MAGxD8T,EAAQ,IAAI9T,WAAW6T,EAAYna,OAAS,KAC5C+J,IAAIoQ,GACVC,EAAMrQ,IAAImQ,EAAoBC,EAAYna,QAAQsa,EAAA7a,EAAA,EAAA6a,EAAA1b,EAAA,EAGxBqE,OAAOC,OAAOc,UACpC,QACAoW,EACA,CAAEpY,KAAM,OAAQiC,WAAY,UAC5B,EACA,CAAC,eACF,OANc,OAAToW,EAASC,EAAA1a,EAAA0a,EAAA1b,EAAG,EAQLqE,OAAOC,OAAO2B,UAAU,MAAOwV,GAAU,cAAAC,EAAAza,EAAA,EAAAya,EAAA1a,GAAA,OAK3B,OAL2B0a,EAAA7a,EAAA,EAItD2a,EAAMlK,KAAK,GACXgK,EAAmBhK,KAAK,GAAGoK,EAAA9a,EAAA,iBAAA8a,EAAAza,EAAA,KAAAoa,EAAA,qBAE9BzX,MAAA,KAAAD,UAAA,CAgBD,SAASgY,GAAgB3F,GACnB/C,GAAa+C,KAEfzC,GAAaN,GAAa+C,WACnB/C,GAAa+C,GAExB,CA6BA,SAASoC,GAAY1R,EAAKsP,GACxB,IAAKtP,EACH,MAAM,IAAIvB,MAAM,mEAADqD,OACsDwN,EAAU,uDAC7E/S,WAIJ,IADY,IAAI6D,MAAOC,WACZL,EAAIG,OAGb,MAlCJ,WAIE,IAHA,IAAM+U,GAAM,IAAI9U,MAAOC,UACjB8U,EAAoB,GAE1BC,EAAA,EAAAC,EAA6Btb,OAAOqN,QAAQmF,IAAa6I,EAAAC,EAAA3a,OAAA0a,IAAE,CAAtD,IAAAE,EAAAhJ,GAAA+I,EAAAD,GAAA,GAAOhG,EAAOkG,EAAA,GAAEtV,EAAGsV,EAAA,GAClBtV,EAAIG,QAAU+U,GAAOlV,EAAIG,QAC3BgV,EAAkB3R,KAAK4L,EAE3B,CAEA,IAAK,IAALmG,EAAA,EAAAC,EAAsBL,EAAiBI,EAAAC,EAAA9a,OAAA6a,IACrCN,GADgBO,EAAAD,GAGpB,CAoBIE,GACM,IAAIhX,MAvDP,SAAoC6Q,GACzC,MAAO,sEAAPxN,OAA6EwN,EAAU,qDACzF,CAqDoBoG,CAA2BpG,IAAa/S,WAG1D,OAAO,CACT,CAEA,SAMeoV,GAAkBgE,GAAA,OAAAC,GAAA1Y,MAAC,KAADD,UAAA,CAcjC,SAAA2Y,KAFC,OAEDA,GAAA5Y,GAAA1B,KAAAE,EAdA,SAAAqa,EAAkC7V,GAAG,OAAA1E,KAAAC,EAAA,SAAAua,GAAA,cAAAA,EAAAxc,GAAA,WAC/B0G,EAAI+M,QAAS,CAAF+I,EAAAxc,EAAA,eAAAwc,EAAAvb,EAAA,EACNyF,EAAI+M,SAAO,UAGD,WAAf/M,EAAI6P,OAAmB,CAAAiG,EAAAxc,EAAA,eAAAwc,EAAAvb,EAAA,EAClBmV,GAAAA,GAAQC,cAAcjG,GAAKhG,aAAa1D,EAAIR,cAAY,cAAAsW,EAAAxc,EAAA,EAElDsW,GACX7T,MAAMI,KAAKuN,GAAK9I,wBAAwBZ,EAAIR,cAC7C,cAAAsW,EAAAvb,EAAA,EAAAub,EAAAxb,GAAA,cAAAwb,EAAAvb,EAAA,KAAAsb,EAAA,KAEJ3Y,MAAA,KAAAD,UAAA,CAqNM,SAAS8Y,GAAkB7H,GAChC,IAAM8H,EA3IR,SAAkC9H,GAChC,sBAAA+H,EAAAjZ,GAAA1B,KAAAE,EAAO,SAAAmH,EAAoCuT,GAAK,IAAAC,EAAA5R,EAAA6R,EAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAAnb,KAAAC,EAAA,SAAAwH,GAAA,cAAAA,EAAA5I,EAAA4I,EAAAzJ,GAAA,WAM1CmT,KAAiByJ,EAAM9J,QAAU8J,EAAM9J,SAAWK,GAAa,CAAA1J,EAAAzJ,EAAA,QAG/D,OAFFoQ,GAAK3H,WAAW,+CAADD,OACkCoU,EAAM9J,OAAM,gBAAAtK,OAAe2K,GAAa,MACvF1J,EAAAxI,EAAA,cAIA2b,EAAMzI,MAA8B,4BAAtByI,EAAMzI,KAAW,KAA+B,CAAA1K,EAAAzJ,EAAA,QAG9D,OAFFoQ,GAAK3H,WAAW,uBAADD,OACUoU,EAAMzI,KAAW,KAAC,MAAA3L,OAAKoU,EAAMzI,KAAY,MAAC,MAAA3L,OAAKoU,EAAMzI,KAAgB,UAAC,MAAA3L,OAAKoU,EAAMzI,KAAqB,iBAC7H1K,EAAA5I,EAAA,EAAA4I,EAAAzJ,EAAA,EAEMwW,GACJoG,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAc,QACpBS,GACD,OAAAnL,EAAAzJ,EAAA,eAAAyJ,EAAA5I,EAAA,EAAAgc,EAAApT,EAAAzI,EAEDoP,GAAKO,cAAc,QAASkM,EAAE5Z,WAAY2Z,EAAMzI,KAAgB,WAAG,WAGnEyI,EAAMzI,MAA8B,+BAAtByI,EAAMzI,KAAW,KAAkC,CAAA1K,EAAAzJ,EAAA,QAGjE,OAFFoQ,GAAK3H,WAAW,uBAADD,OACUoU,EAAMzI,KAAW,KAAC,MAAA3L,OAAKoU,EAAMzI,KAAY,MAAC,MAAA3L,OAAKoU,EAAMzI,KAAqB,iBACjG1K,EAAA5I,EAAA,EAAA4I,EAAAzJ,EAAA,EAEMwW,GACJoG,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,WAClBzP,OACAA,EACAkQ,GACD,OAAAnL,EAAAzJ,EAAA,eAAAyJ,EAAA5I,EAAA,EAAAoK,EAAAxB,EAAAzI,EAEDoP,GAAKO,cAAc,QAAS1F,EAAEhI,WAAY2Z,EAAMzI,KAAgB,WAAG,WAGnEyI,EAAMzI,MAA8B,kBAAtByI,EAAMzI,KAAW,KAAqB,CAAA1K,EAAAzJ,EAAA,gBAAAyJ,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAE9CgX,GAAgB4F,EAAMzI,KAAY,MAAGyI,EAAMzI,KAAgB,WAAE,QAAA1K,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAic,EAAArT,EAAAzI,EAEnEoP,GAAKO,cAAc,QAASmM,EAAE7Z,WAAY2Z,EAAMzI,KAAgB,WAAG,QAGvE,GAAIyI,EAAMzI,MAA8B,sBAAtByI,EAAMzI,KAAW,KAA2B,CAC5D/D,GAAK3H,WAAW,uBAADD,OAAwBoU,EAAMzI,KAAW,OACxD,IACE/D,GAAKE,oBACP,CAAE,MAAO1Q,GACPwQ,GAAKO,cAAc,QAAS/Q,EAAEqD,WAChC,CACF,CAAC,IACG2Z,EAAMzI,MAA8B,oBAAtByI,EAAMzI,KAAW,KAAuB,CAAA1K,EAAAzJ,EAAA,SAGtD,OAFFoQ,GAAK3H,WAAW,uBAADD,OACUoU,EAAMzI,KAAW,KAAC,MAAA3L,OAAKoU,EAAMzI,KAAY,QAChE1K,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAEMsX,GACJsF,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAc,SACrB,QAAA1K,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAkc,EAAAtT,EAAAzI,EAEDoP,GAAKO,cAAc,QAASoM,EAAE9Z,WAAY2Z,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,gBAAtByI,EAAMzI,KAAW,KAAmB,CAAA1K,EAAAzJ,EAAA,SAGlD,OAFFoQ,GAAK3H,WAAW,uBAADD,OACUoU,EAAMzI,KAAW,KAAC,MAAA3L,OAAKoU,EAAMzI,KAAY,QAChE1K,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAEM0Y,GACJkE,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAY,MAClByI,EAAMzI,KAAc,SACrB,QAAA1K,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAmc,EAAAvT,EAAAzI,EAEDoP,GAAKO,cAAc,QAASqM,EAAE/Z,WAAY2Z,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,8BAAtByI,EAAMzI,KAAW,KAAiC,CAAA1K,EAAAzJ,EAAA,SACL,OAA7DoQ,GAAK3H,WAAW,uBAADD,OAAwBoU,EAAMzI,KAAW,OAAK1K,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAErDwZ,GACJoD,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAc,SACrB,QAAA1K,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAoc,EAAAxT,EAAAzI,EAEDoP,GAAKO,cAAc,QAASsM,EAAEha,WAAY2Z,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,2BAAtByI,EAAMzI,KAAW,KAA8B,CAAA1K,EAAAzJ,EAAA,SACF,OAA7DoQ,GAAK3H,WAAW,uBAADD,OAAwBoU,EAAMzI,KAAW,OAAK1K,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAErDiV,GAAuB2H,EAAMzI,KAAgB,WAAE,QAAA1K,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAqc,EAAAzT,EAAAzI,EAErDoP,GAAKO,cAAc,QAASuM,EAAEja,WAAY2Z,EAAMzI,KAAgB,WAAG,YAGnEyI,EAAMzI,MAA8B,6BAAtByI,EAAMzI,KAAW,KAAgC,CAAA1K,EAAAzJ,EAAA,SACJ,OAA7DoQ,GAAK3H,WAAW,uBAADD,OAAwBoU,EAAMzI,KAAW,OAAK1K,EAAA5I,EAAA,GAAA4I,EAAAzJ,EAAA,GAErDia,GACJ2C,EAAMzI,KAAgB,UACtByI,EAAMzI,KAAqB,eAC3ByI,EAAMzI,KAAY,MAClBS,GACD,QAAAnL,EAAAzJ,EAAA,iBAAAyJ,EAAA5I,EAAA,GAAAsc,EAAA1T,EAAAzI,EAEDoP,GAAKO,cAAc,QAASwM,EAAEla,WAAY2Z,EAAMzI,KAAgB,WAAG,QAGvE,GAAIyI,EAAMzI,MAA8B,iCAAtByI,EAAMzI,KAAW,KAAsC,CACvE/D,GAAK3H,WAAW,uBAADD,OAAwBoU,EAAMzI,KAAW,OACxD,IACE0G,GAA4B+B,EAAMzI,KAAgB,UACpD,CAAE,MAAOvU,GACPwQ,GAAKO,cAAc,QAAS/Q,EAAEqD,WAAY2Z,EAAMzI,KAAgB,UAClE,CACF,CAAC,eAAA1K,EAAAxI,EAAA,KAAAoI,EAAA,uEAjIuC,OAkIzC,SAlIyC+T,GAAA,OAAAT,EAAA/Y,MAAC,KAADD,UAAA,EAA1C,EAmIF,CAO+B0Z,CAAyBzI,GAGhD0I,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAuDlC,OA1QF,WAEE3U,SAASC,eAAe,cAAc4U,iBACpC,QAAO,eAAAzP,EAAAtK,GAAA1B,KAAAE,EACP,SAAA8C,EAAOpF,GAAC,OAAAoC,KAAAC,EAAA,SAAAiD,GAAA,cAAAA,EAAAlF,GAAA,OACNJ,EAAE8d,iBACFnZ,OAAOuM,YAAY,CACjBF,KAAM,2BACNnP,MAAOmH,SAASC,eAAe,qBAAqBpH,MACpDqJ,UAAWlC,SAASC,eAAe,qBAAqBpH,MACxDsS,eAAgBnL,SAASC,eAAe,uBAAuBpH,QAC9D,cAAAyD,EAAAjE,EAAA,KAAA+D,EAAA,IACJ,gBAAA2Y,GAAA,OAAA3P,EAAApK,MAAA,KAAAD,UAAA,EATM,IAUP,GAEFiF,SAASC,eAAe,oBAAoB4U,iBAC1C,QAAO,eAAAxP,EAAAvK,GAAA1B,KAAAE,EACP,SAAA8M,EAAOpP,GAAC,OAAAoC,KAAAC,EAAA,SAAA2N,GAAA,cAAAA,EAAA5P,GAAA,OACNJ,EAAE8d,iBACFnZ,OAAOuM,YAAY,CACjBF,KAAM,mBACNnP,MAAOmH,SAASC,eAAe,uBAAuBpH,QACrD,cAAAmO,EAAA3O,EAAA,KAAA+N,EAAA,IACJ,gBAAA4O,GAAA,OAAA3P,EAAArK,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFiF,SAASC,eAAe,gBAAgB4U,iBACtC,QAAO,eAAAI,EAAAna,GAAA1B,KAAAE,EACP,SAAAqD,EAAO3F,GAAC,OAAAoC,KAAAC,EAAA,SAAAuD,GAAA,cAAAA,EAAAxF,GAAA,OACNJ,EAAE8d,iBACFnZ,OAAOuM,YAAY,CACjBF,KAAM,eACNnP,MAAOmH,SAASC,eAAe,mBAAmBpH,QACjD,cAAA+D,EAAAvE,EAAA,KAAAsE,EAAA,IACJ,gBAAAuY,GAAA,OAAAD,EAAAja,MAAA,KAAAD,UAAA,EAPM,IAQP,GAEFiF,SAASC,eAAe,SAAS4U,iBAC/B,QAAO,eAAAM,EAAAra,GAAA1B,KAAAE,EACP,SAAA2D,EAAOjG,GAAC,OAAAoC,KAAAC,EAAA,SAAA8D,GAAA,cAAAA,EAAA/F,GAAA,OACNJ,EAAE8d,iBACFnZ,OAAOuM,YAAY,CAAEF,KAAM,uBAAwB,cAAA7K,EAAA9E,EAAA,KAAA4E,EAAA,IACpD,gBAAAmY,GAAA,OAAAD,EAAAna,MAAA,KAAAD,UAAA,EAJM,IAKP,GAIF,IAAMsa,EAAkBrV,SAASC,eAAe,iBAC5CoV,GACFA,EAAgBR,iBACd,QAAO,eAAAS,EAAAxa,GAAA1B,KAAAE,EACP,SAAAic,EAAOve,GAAC,OAAAoC,KAAAC,EAAA,SAAAmc,GAAA,cAAAA,EAAApe,GAAA,OACNJ,EAAE8d,iBACFnZ,OAAOuM,YAAY,CACjBF,KAAM,8BACNnP,MAAOmH,SAASC,eAAe,wBAAwBpH,MACvDsS,eAAgBnL,SAASC,eAAe,0BACrCpH,QACF,cAAA2c,EAAAnd,EAAA,KAAAkd,EAAA,IACJ,gBAAAE,GAAA,OAAAH,EAAAta,MAAA,KAAAD,UAAA,EATM,IAUP,EAGN,CAuJE2a,GAGA/Z,OAAOkZ,iBAAiB,UAAWf,EAAsB,CACvD6B,SAAS,EACTC,OAAQlB,EAA0BkB,SAIpCja,OAAOkZ,iBACL,UAAS,eAAAgB,EAAA/a,GAAA1B,KAAAE,EACT,SAAAwc,EAAgB9B,GAAK,IAAA+B,EAAAC,EAAAxJ,EAAAC,EAAAC,EAAA,OAAAtT,KAAAC,EAAA,SAAA4c,GAAA,cAAAA,EAAA7e,GAAA,WAQjB4c,EAAMzI,MACgB,gCAAtByI,EAAMzI,KAAW,MACN,QADyCwK,EACpD/B,EAAMkC,aAAK,IAAAH,IAAXA,EAAc,GAAE,CAAAE,EAAA7e,EAAA,QAcyC,OATzDmT,GAAgByJ,EAAM9J,OACtB1C,GAAKyC,gBAAgB+J,EAAM9J,QAG3BwK,EAA0ByB,SAEpBH,EAAoBhC,EAAMkC,MAAM,IACpBE,UAAYtC,EAE9BtM,GAAKY,iCAAiC4N,GAAmBC,EAAA7e,EAAA,EAEnDoQ,GAAKC,gBAAgBuM,EAAM9J,QAAO,cAAA+L,EAAA7e,EAAA,EACboQ,GAAK3K,iBAAgB,OAA9B,OAAd2P,EAAcyJ,EAAA7d,EAAA6d,EAAA7e,EAAG,EACIoQ,GAAKlH,uBAAuBkM,GAAe,OAAhEC,EAAYwJ,EAAA7d,EACZsU,EAAelF,GAAKrI,sBAAsBsN,GAC9CzM,SAASC,eAAe,gBAAgBpH,MAAQ6T,EAEhDlF,GAAKO,cAAc,mBAAoB2E,GAGvCkI,EAAsBuB,QAAQ,cAAAF,EAAA5d,EAAA,KAAAyd,EAAA,IAEjC,gBAAAO,GAAA,OAAAR,EAAA7a,MAAA,KAAAD,UAAA,EAtCQ,GAuCT,CAAE6a,OAAQhB,EAAsBgB,SAG3B,CAAE9B,qBAAAA,EACX,C,qQC36BA,IAAA9c,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAqf,GAAAtf,EAAAE,GAAA,IAAAD,EAAAY,OAAAuZ,KAAApa,GAAA,GAAAa,OAAA0e,sBAAA,KAAAjf,EAAAO,OAAA0e,sBAAAvf,GAAAE,IAAAI,EAAAA,EAAAkf,OAAA,SAAAtf,GAAA,OAAAW,OAAA4e,yBAAAzf,EAAAE,GAAAuC,UAAA,IAAAxC,EAAAqK,KAAAtG,MAAA/D,EAAAK,EAAA,QAAAL,CAAA,UAAA6J,GAAA9J,GAAA,QAAAE,EAAA,EAAAA,EAAA6D,UAAAvC,OAAAtB,IAAA,KAAAD,EAAA,MAAA8D,UAAA7D,GAAA6D,UAAA7D,GAAA,GAAAA,EAAA,EAAAof,GAAAze,OAAAZ,IAAA,GAAAkO,QAAA,SAAAjO,GAAAwf,GAAA1f,EAAAE,EAAAD,EAAAC,GAAA,GAAAW,OAAA8e,0BAAA9e,OAAA+e,iBAAA5f,EAAAa,OAAA8e,0BAAA1f,IAAAqf,GAAAze,OAAAZ,IAAAkO,QAAA,SAAAjO,GAAAW,OAAA0B,eAAAvC,EAAAE,EAAAW,OAAA4e,yBAAAxf,EAAAC,GAAA,UAAAF,CAAA,UAAA0f,GAAA1f,EAAAE,EAAAD,GAAA,OAAAC,EAAA,SAAAD,GAAA,IAAAO,EAAA,SAAAP,GAAA,aAAA4f,GAAA5f,KAAAA,EAAA,OAAAA,EAAA,IAAAD,EAAAC,EAAAE,OAAA2f,aAAA,YAAA9f,EAAA,KAAAQ,EAAAR,EAAA2B,KAAA1B,EAAAC,UAAA,aAAA2f,GAAArf,GAAA,OAAAA,EAAA,UAAAkB,UAAA,uDAAAqe,OAAA9f,EAAA,CAAA+f,CAAA/f,GAAA,gBAAA4f,GAAArf,GAAAA,EAAAA,EAAA,GAAAyf,CAAA/f,MAAAF,EAAAa,OAAA0B,eAAAvC,EAAAE,EAAA,CAAA2B,MAAA5B,EAAAwC,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAA3C,EAAAE,GAAAD,EAAAD,CAAA,UAAA0D,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,CAiBA,IAAM4f,IAAoB,IAAIrU,aAAcE,OAAO,gBAM5C,SAAeiJ,GAAW9F,GAAA,OAAAiR,GAAAnc,MAAC,KAADD,UAAA,CAsCjC,SAAAoc,KAFC,OA3DD/f,EA6DAgC,KAAAE,EAtCO,SAAA8C,EAAAgJ,GAAA,IAAA8G,EAAAD,EAAAE,EAAAiL,EAAAC,EAAAC,EAAAC,EAAA7X,EAAA8X,EAAAC,EAAAxD,EAAA,OAAA7a,KAAAC,EAAA,SAAAiD,GAAA,cAAAA,EAAArE,EAAAqE,EAAAlF,GAAA,OAKuC,OAJ5C8U,EAAa9G,EAAb8G,cACAD,EAAc7G,EAAd6G,eACAE,EAAe/G,EAAf+G,gBAEMiL,EAAa,IAAIM,GAAAA,GAAqBpb,EAAAlF,EAAA,EACnBggB,EAAW5a,UAClC,MAAKsE,GAAA,GACAqL,IACL,GACD,OAMC,OAVEkL,EAAY/a,EAAAlE,EAMZkf,EAAQ,IAAIK,GAAAA,GAAY,CAC1BC,IAAKR,EACLS,IAAK,IAAIC,GAAAA,GACTC,KAAM,IAAIC,GAAAA,KACV1b,EAAAlF,EAAA,EAEuBkgB,EAAMW,uBAAuB,CACpDC,aAAcb,EACdzU,IAAKqJ,EACLkM,KAAMjB,KACN,OAJc,OAAZK,EAAYjb,EAAAlE,EAAAkE,EAAAlF,EAAG,EAMQkJ,EAAuB6L,GAAgB,OACA,OAD9DzM,EAAcpD,EAAAlE,EACdof,EAAMhY,EAAyByM,EAAgBvM,GAAepD,EAAArE,EAAA,EAAAqE,EAAAlF,EAAA,EAGpDmgB,EAAaa,KAAKlM,EAAesL,GAAI,OAAjDC,EAAGnb,EAAAlE,EAAAkE,EAAAlF,EAAG,EAAH,mBAAAkF,EAAArE,EAAG,EAAHgc,EAAA3X,EAAAlE,EAEG,IAAImE,MACR,gGACE0X,EAAE5Z,YACL,cAAAiC,EAAAjE,EAAA,EAEIof,GAAG,EAAArb,EAAA,gBAGZ+a,GA7DA,eAAAlgB,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,OA2DCD,MAAA,KAAAD,WA3DD,IAAA3D,CA2DC,C,cC3DD,IAAAJ,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,GAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,GAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,GAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,GAAAH,EAAA,cAAAmB,GAAAhB,GAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,GAAAgB,EAAAzB,EAAA,qBAAAS,GAAAH,GAAAG,GAAAH,EAAAN,EAAA,aAAAS,GAAAH,EAAAR,EAAA,yBAAAW,GAAAH,EAAA,oDAAAwB,GAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,GAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,GAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,GAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,GAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAAyD,GAAAtD,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAA+C,QAAAC,QAAAhD,GAAAiD,KAAA3D,EAAAI,EAAA,UAAAwD,GAAA1D,GAAA,sBAAAH,EAAA,KAAAD,EAAA+D,UAAA,WAAAJ,QAAA,SAAAzD,EAAAI,GAAA,IAAAe,EAAAjB,EAAA4D,MAAA/D,EAAAD,GAAA,SAAAiE,EAAA7D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,OAAA9D,EAAA,UAAA8D,EAAA9D,GAAAsD,GAAArC,EAAAnB,EAAAI,EAAA2D,EAAAC,EAAA,QAAA9D,EAAA,CAAA6D,OAAA,MAQAU,OAAO6L,KAAOA,GAGdxH,SAAS6U,iBAAiB,mBAAkB/Z,GAAA1B,KAAAE,EAAE,SAAA8C,IAAA,IAAAoQ,EAAAC,EAAAC,EAAA2L,EAAA,OAAAjf,KAAAC,EAAA,SAAAiD,GAAA,cAAAA,EAAAlF,GAAA,cAAAkF,EAAAlF,EAAA,EACtCoQ,GAAKC,kBAAiB,cAAAnL,EAAAlF,EAAA,EACCoQ,GAAK3K,iBAAgB,OAA9B,OAAd2P,EAAclQ,EAAAlE,EAAAkE,EAAAlF,EAAG,EACIoQ,GAAKlH,uBAAuBkM,GAAe,OAAhEC,EAAYnQ,EAAAlE,EACZsU,EAAelF,GAAKrI,sBAAsBsN,GAChDzM,SAASC,eAAe,gBAAgBpH,MAAQ6T,EAEhDmH,GAAkB7H,KAGZqM,EAAgB7Q,GAAKqC,gBAEzBrC,GAAK+B,cAAc8O,GAGrB7Q,GAAKO,cAAc,mBAAoB2E,GAAc,cAAApQ,EAAAjE,EAAA,KAAA+D,EAAA,I,kCC3BvDkc,EAAOC,QAAU9c,M,GCCb+c,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqB5c,IAAjB6c,EACH,OAAOA,EAAaJ,QAGrB,IAAID,EAASE,EAAyBE,GAAY,CACjDE,GAAIF,EACJG,QAAQ,EACRN,QAAS,CAAC,GAUX,OANAO,EAAoBJ,GAAU/f,KAAK2f,EAAOC,QAASD,EAAQA,EAAOC,QAASE,GAG3EH,EAAOO,QAAS,EAGTP,EAAOC,OACf,CAGAE,EAAoBnf,EAAIwf,ET5BpBniB,EAAW,GACf8hB,EAAoBM,EAAI,CAAC7X,EAAQ8X,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAAS5hB,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAKwhB,EAAUC,EAAIC,GAAYviB,EAASa,GACpC6hB,GAAY,EACPhY,EAAI,EAAGA,EAAI2X,EAASxgB,OAAQ6I,MACpB,EAAX6X,GAAsBC,GAAgBD,IAAarhB,OAAOuZ,KAAKqH,EAAoBM,GAAGO,MAAOxb,GAAS2a,EAAoBM,EAAEjb,GAAKkb,EAAS3X,KAC9I2X,EAASO,OAAOlY,IAAK,IAErBgY,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACb1iB,EAAS4iB,OAAO/hB,IAAK,GACrB,IAAIN,EAAI+hB,SACEnd,IAAN5E,IAAiBgK,EAAShK,EAC/B,CACD,CACA,OAAOgK,CAnBP,CAJCgY,EAAWA,GAAY,EACvB,IAAI,IAAI1hB,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAK0hB,EAAU1hB,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAACwhB,EAAUC,EAAIC,IUJ/BT,EAAoBrhB,EAAKkhB,IACxB,IAAIkB,EAASlB,GAAUA,EAAOmB,WAC7B,IAAOnB,EAAiB,QACxB,IAAM,EAEP,OADAG,EAAoBngB,EAAEkhB,EAAQ,CAAEnhB,EAAGmhB,IAC5BA,GTNJ3iB,EAAWgB,OAAOmB,eAAkB0gB,GAAS7hB,OAAOmB,eAAe0gB,GAASA,GAASA,EAAa,UAQtGjB,EAAoBxhB,EAAI,SAAS4B,EAAO8gB,GAEvC,GADU,EAAPA,IAAU9gB,EAAQ+gB,KAAK/gB,IAChB,EAAP8gB,EAAU,OAAO9gB,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAP8gB,GAAa9gB,EAAM4gB,WAAY,OAAO5gB,EAC1C,GAAW,GAAP8gB,GAAoC,mBAAf9gB,EAAMgC,KAAqB,OAAOhC,CAC5D,CACA,IAAIghB,EAAKhiB,OAAOC,OAAO,MACvB2gB,EAAoBvhB,EAAE2iB,GACtB,IAAIC,EAAM,CAAC,EACXljB,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAIkjB,EAAiB,EAAPJ,GAAY9gB,GAA0B,iBAAXkhB,GAAyC,mBAAXA,MAA4BnjB,EAAegL,QAAQmY,GAAUA,EAAUljB,EAASkjB,GAC1JliB,OAAOmiB,oBAAoBD,GAAS5U,QAASrH,GAASgc,EAAIhc,GAAO,IAAOjF,EAAMiF,IAI/E,OAFAgc,EAAa,QAAI,IAAM,EACvBrB,EAAoBngB,EAAEuhB,EAAIC,GACnBD,CACR,EUxBApB,EAAoBngB,EAAI,CAACigB,EAAS0B,KACjC,IAAI,IAAInc,KAAOmc,EACXxB,EAAoBnhB,EAAE2iB,EAAYnc,KAAS2a,EAAoBnhB,EAAEihB,EAASza,IAC5EjG,OAAO0B,eAAegf,EAASza,EAAK,CAAErE,YAAY,EAAMygB,IAAKD,EAAWnc,MCJ3E2a,EAAoBzgB,EAAI,CAAC,EAGzBygB,EAAoBzhB,EAAKmjB,GACjBxf,QAAQyf,IAAIviB,OAAOuZ,KAAKqH,EAAoBzgB,GAAGqiB,OAAO,CAACC,EAAUxc,KACvE2a,EAAoBzgB,EAAE8F,GAAKqc,EAASG,GAC7BA,GACL,KCNJ7B,EAAoB7gB,EAAKuiB,GAEjB,UAAY,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3F1B,EAAoB8B,SAAYJ,MCDhC1B,EAAoB+B,EAAI,WACvB,GAA0B,iBAAfhf,WAAyB,OAAOA,WAC3C,IACC,OAAOoe,MAAQ,IAAIa,SAAS,cAAb,EAChB,CAAE,MAAOzjB,GACR,GAAsB,iBAAX2E,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxB8c,EAAoBnhB,EAAI,CAACoiB,EAAKgB,IAAU7iB,OAAOH,UAAU8G,eAAe7F,KAAK+gB,EAAKgB,GdA9E5jB,EAAa,CAAC,EACdC,EAAoB,mBAExB0hB,EAAoBhgB,EAAI,CAACkiB,EAAK/hB,EAAMkF,EAAKqc,KACxC,GAAGrjB,EAAW6jB,GAAQ7jB,EAAW6jB,GAAKrZ,KAAK1I,OAA3C,CACA,IAAIgiB,EAAQC,EACZ,QAAW/e,IAARgC,EAEF,IADA,IAAIgd,EAAU9a,SAAS+a,qBAAqB,UACpCvjB,EAAI,EAAGA,EAAIsjB,EAAQtiB,OAAQhB,IAAK,CACvC,IAAImI,EAAImb,EAAQtjB,GAChB,GAAGmI,EAAEqb,aAAa,QAAUL,GAAOhb,EAAEqb,aAAa,iBAAmBjkB,EAAoB+G,EAAK,CAAE8c,EAASjb,EAAG,KAAO,CACpH,CAEGib,IACHC,GAAa,GACbD,EAAS5a,SAASG,cAAc,WAEzB8a,QAAU,QACbxC,EAAoByC,IACvBN,EAAOO,aAAa,QAAS1C,EAAoByC,IAElDN,EAAOO,aAAa,eAAgBpkB,EAAoB+G,GAExD8c,EAAOQ,IAAMT,EAC4C,IAArDC,EAAOQ,IAAIxZ,QAAQjG,OAAOI,SAASmO,OAAS,OAC/C0Q,EAAOS,YAAc,aAEtBT,EAAOU,UAAY7C,EAAoB8C,UAAUpB,GACjDS,EAAOS,YAAc,aAEtBvkB,EAAW6jB,GAAO,CAAC/hB,GACnB,IAAI4iB,EAAmB,CAACC,EAAMzH,KAE7B4G,EAAOc,QAAUd,EAAOe,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAUhlB,EAAW6jB,GAIzB,UAHO7jB,EAAW6jB,GAClBC,EAAOmB,YAAcnB,EAAOmB,WAAWC,YAAYpB,GACnDkB,GAAWA,EAAQ3W,QAAS8T,GAAQA,EAAGjF,IACpCyH,EAAM,OAAOA,EAAKzH,IAElB6H,EAAUI,WAAWT,EAAiBjjB,KAAK,UAAMuD,EAAW,CAAEkM,KAAM,UAAWkU,OAAQtB,IAAW,MACtGA,EAAOc,QAAUF,EAAiBjjB,KAAK,KAAMqiB,EAAOc,SACpDd,EAAOe,OAASH,EAAiBjjB,KAAK,KAAMqiB,EAAOe,QACnDd,GAAc7a,SAASmc,KAAK9b,YAAYua,EAxCkB,GeH3DnC,EAAoBvhB,EAAKqhB,IACH,oBAAXphB,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAegf,EAASphB,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAegf,EAAS,aAAc,CAAE1f,OAAO,KCLvD4f,EAAoB2D,IAAO9D,IAC1BA,EAAO+D,MAAQ,GACV/D,EAAOgE,WAAUhE,EAAOgE,SAAW,IACjChE,GCHRG,EAAoBxgB,EAAI,ICCxBwgB,EAAoB8C,UAAY,CAAC,IAAM,0EAA0E,IAAM,2E,MCIvH,IAAIgB,EAAkB,CACrB,IAAK,GAGN9D,EAAoBzgB,EAAEqJ,EAAI,CAAC8Y,EAASG,KAElC,IAAIkC,EAAqB/D,EAAoBnhB,EAAEilB,EAAiBpC,GAAWoC,EAAgBpC,QAAWre,EACtG,GAA0B,IAAvB0gB,EAGF,GAAGA,EACFlC,EAAShZ,KAAKkb,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAI9hB,QAAQ,CAACC,EAAS8hB,IAAYF,EAAqBD,EAAgBpC,GAAW,CAACvf,EAAS8hB,IAC1GpC,EAAShZ,KAAKkb,EAAmB,GAAKC,GAGtC,IAAI9B,EAAMlC,EAAoBxgB,EAAIwgB,EAAoB7gB,EAAEuiB,GAEpDnQ,EAAQ,IAAIzN,MAgBhBkc,EAAoBhgB,EAAEkiB,EAfF3G,IACnB,GAAGyE,EAAoBnhB,EAAEilB,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAWre,GACrD0gB,GAAoB,CACtB,IAAIG,EAAY3I,IAAyB,SAAfA,EAAMhM,KAAkB,UAAYgM,EAAMhM,MAChE4U,EAAU5I,GAASA,EAAMkI,QAAUlI,EAAMkI,OAAOd,IACpDpR,EAAM9J,QAAU,iBAAmBia,EAAU,cAAgBwC,EAAY,KAAOC,EAAU,IAC1F5S,EAAMxP,KAAO,iBACbwP,EAAMhC,KAAO2U,EACb3S,EAAM6S,QAAUD,EAChBJ,EAAmB,GAAGxS,EACvB,GAGuC,SAAWmQ,EAASA,EAE/D,GAYH1B,EAAoBM,EAAE1X,EAAK8Y,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI2C,EAAuB,CAACC,EAA4BxR,KACvD,IAGImN,EAAUyB,GAHTnB,EAAUgE,EAAaC,GAAW1R,EAGhB/T,EAAI,EAC3B,GAAGwhB,EAASkE,KAAMtE,GAAgC,IAAxB2D,EAAgB3D,IAAa,CACtD,IAAIF,KAAYsE,EACZvE,EAAoBnhB,EAAE0lB,EAAatE,KACrCD,EAAoBnf,EAAEof,GAAYsE,EAAYtE,IAGhD,GAAGuE,EAAS,IAAI/b,EAAS+b,EAAQxE,EAClC,CAEA,IADGsE,GAA4BA,EAA2BxR,GACrD/T,EAAIwhB,EAASxgB,OAAQhB,IACzB2iB,EAAUnB,EAASxhB,GAChBihB,EAAoBnhB,EAAEilB,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAO1B,EAAoBM,EAAE7X,IAG1Bic,EAAqBC,KAAkC,4BAAIA,KAAkC,6BAAK,GACtGD,EAAmBhY,QAAQ2X,EAAqBvkB,KAAK,KAAM,IAC3D4kB,EAAmB7b,KAAOwb,EAAqBvkB,KAAK,KAAM4kB,EAAmB7b,KAAK/I,KAAK4kB,G,KClFvF,IAAIE,EAAsB5E,EAAoBM,OAAEjd,EAAW,CAAC,IAAK,IAAO2c,EAAoB,MAC5F4E,EAAsB5E,EAAoBM,EAAEsE,E","sources":["webpack://export-and-sign/webpack/runtime/chunk loaded","webpack://export-and-sign/webpack/runtime/create fake namespace object","webpack://export-and-sign/webpack/runtime/load script","webpack://export-and-sign/../shared/turnkey-core.js","webpack://export-and-sign/./src/turnkey-core.js","webpack://export-and-sign/./src/event-handlers.js","webpack://export-and-sign/../shared/crypto-utils.js","webpack://export-and-sign/./src/index.js","webpack://export-and-sign/external var \"crypto\"","webpack://export-and-sign/webpack/bootstrap","webpack://export-and-sign/webpack/runtime/compat get default export","webpack://export-and-sign/webpack/runtime/define property getters","webpack://export-and-sign/webpack/runtime/ensure chunk","webpack://export-and-sign/webpack/runtime/get javascript chunk filename","webpack://export-and-sign/webpack/runtime/get mini-css chunk filename","webpack://export-and-sign/webpack/runtime/global","webpack://export-and-sign/webpack/runtime/hasOwnProperty shorthand","webpack://export-and-sign/webpack/runtime/make namespace object","webpack://export-and-sign/webpack/runtime/node module decorator","webpack://export-and-sign/webpack/runtime/publicPath","webpack://export-and-sign/webpack/runtime/compat","webpack://export-and-sign/webpack/runtime/jsonp chunk loading","webpack://export-and-sign/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"export-and-sign:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t\tif (script.src.indexOf(window.location.origin + '/') !== 0) {\n\t\t\tscript.crossOrigin = \"anonymous\";\n\t\t}\n\t\tscript.integrity = __webpack_require__.sriHashes[chunkId];\n\t\tscript.crossOrigin = \"anonymous\";\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import { bech32 } from \"bech32\";\n\n/**\n * Turnkey Core Module - Shared\n * Contains all the core cryptographic and utility functions shared across frames\n */\n\n/**\n * Constant-time string comparison to prevent timing side-channel attacks.\n * Standard `===` / `!==` short-circuits on the first differing byte, leaking\n * information about how many leading bytes match. This XOR-based approach\n * always compares every byte regardless of mismatches.\n * @param {string} a\n * @param {string} b\n * @returns {boolean} true if strings are equal\n */\nfunction timingSafeEqual(a, b) {\n if (typeof a !== \"string\" || typeof b !== \"string\") return false;\n const enc = new TextEncoder();\n const aBuf = enc.encode(a);\n const bBuf = enc.encode(b);\n if (aBuf.length !== bBuf.length) {\n // Length mismatch already leaks info; still iterate to avoid further leakage.\n let diff = 1;\n const len = Math.min(aBuf.length, bBuf.length);\n for (let i = 0; i < len; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return false;\n }\n let diff = 0;\n for (let i = 0; i < aBuf.length; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return diff === 0;\n}\n\n/** constants for LocalStorage */\nconst TURNKEY_EMBEDDED_KEY = \"TURNKEY_EMBEDDED_KEY\";\nconst TURNKEY_TARGET_EMBEDDED_KEY = \"TURNKEY_TARGET_EMBEDDED_KEY\";\nconst TURNKEY_SETTINGS = \"TURNKEY_SETTINGS\";\n/**\n * TTL for the embedded ECDH private key stored in localStorage.\n *\n * SECURITY NOTE: The P-256 ECDH private key is stored as a JSON-serialized JWK\n * in localStorage, where it cannot be reliably zeroed (localStorage values are\n * immutable strings managed by the browser). The ideal solution would be to store\n * a non-extractable CryptoKey in IndexedDB, but that is a larger refactor.\n * As a mitigation, we keep the TTL as short as practical (4 hours) to limit the\n * window of exposure if the storage is compromised.\n */\nconst TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 4;\nconst TURNKEY_EMBEDDED_KEY_ORIGIN = \"TURNKEY_EMBEDDED_KEY_ORIGIN\";\n\nlet parentFrameMessageChannelPort = null;\n/**\n * Captured parent origin from the init message. Used as the targetOrigin for\n * legacy postMessage calls instead of the wildcard \"*\", which would allow any\n * window to eavesdrop on sensitive messages (e.g. public keys, signed data).\n * @type {string|null}\n */\nlet parentOrigin = null;\nvar cryptoProviderOverride = null;\n\n/*\n * Returns a reference to the WebCrypto subtle interface regardless of the host environment.\n */\nfunction getSubtleCrypto() {\n if (cryptoProviderOverride && cryptoProviderOverride.subtle) {\n return cryptoProviderOverride.subtle;\n }\n if (\n typeof globalThis !== \"undefined\" &&\n globalThis.crypto &&\n globalThis.crypto.subtle\n ) {\n return globalThis.crypto.subtle;\n }\n if (typeof window !== \"undefined\" && window.crypto && window.crypto.subtle) {\n return window.crypto.subtle;\n }\n if (typeof global !== \"undefined\" && global.crypto && global.crypto.subtle) {\n return global.crypto.subtle;\n }\n if (typeof crypto !== \"undefined\" && crypto.subtle) {\n return crypto.subtle;\n }\n\n return null;\n}\n\n/*\n * Allows tests to explicitly set the crypto provider (e.g. crypto.webcrypto) when the runtime\n * environment does not expose one on the global/window objects.\n */\nfunction setCryptoProvider(cryptoProvider) {\n cryptoProviderOverride = cryptoProvider || null;\n}\n\n/* Security functions */\n\nfunction isDoublyIframed() {\n if (window.location.ancestorOrigins !== undefined) {\n // Does not exist in IE and firefox.\n // See https://developer.mozilla.org/en-US/docs/Web/API/Location/ancestorOrigins for how this works\n return window.location.ancestorOrigins.length > 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Stores the parent frame's origin, captured from the init postMessage event.\n * This is used as the targetOrigin for legacy postMessage calls to prevent\n * messages from being delivered to unintended recipients.\n * @param {string} origin\n */\nfunction setParentOrigin(origin) {\n parentOrigin = origin;\n}\n\n/**\n * Returns the stored parent origin.\n * @returns {string|null}\n */\nfunction getParentOrigin() {\n return parentOrigin;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n // SECURITY: Use constant-time comparison to prevent timing side-channel\n // attacks that could leak the enclave quorum public key byte-by-byte.\n if (\n !timingSafeEqual(\n enclaveQuorumPublic,\n TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY\n )\n ) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions (= v2.1.0).\n // For older iframe-stamper versions that never send TURNKEY_INIT_MESSAGE_CHANNEL,\n // parentOrigin remains null and we must fall back to \"*\" for backwards compatibility.\n const targetOrigin = parentOrigin || \"*\";\n window.parent.postMessage(\n {\n type: type,\n value: value,\n },\n targetOrigin\n );\n }\n logMessage(`⬆️ Sent message ${type}: ${value}`);\n}\n\n/**\n * Function to log a message and persist it in the page's DOM.\n */\nfunction logMessage(content) {\n const messageLog = document.getElementById(\"message-log\");\n if (messageLog) {\n const message = document.createElement(\"p\");\n message.innerText = content;\n messageLog.appendChild(message);\n }\n}\n\n/**\n * Convert a JSON Web Key private key to a public key and export the public\n * key in raw format.\n * @return {Uint8array}\n */\nasync function p256JWKPrivateToPublic(jwkPrivate) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n // make a copy so we don't modify the underlying object\n const jwkPrivateCopy = { ...jwkPrivate };\n // change jwk so it will be imported as a public key\n delete jwkPrivateCopy.d;\n jwkPrivateCopy.key_ops = [\"verify\"];\n\n const publicKey = await subtle.importKey(\n \"jwk\",\n jwkPrivateCopy,\n { name: \"ECDSA\", namedCurve: \"P-256\" },\n true,\n [\"verify\"]\n );\n const buffer = await subtle.exportKey(\"raw\", publicKey);\n return new Uint8Array(buffer);\n}\n\n/**\n * Encodes a buffer into a base58-encoded string.\n * @param {Uint8Array} bytes The buffer to encode.\n * @return {string} The base58-encoded string.\n */\nfunction base58Encode(bytes) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n const alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n let result = \"\";\n let digits = [0];\n for (let i = 0; i < bytes.length; i++) {\n let carry = bytes[i];\n for (let j = 0; j < digits.length; ++j) {\n carry += digits[j] << 8;\n digits[j] = carry % 58;\n carry = (carry / 58) | 0;\n }\n\n while (carry > 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n setParentOrigin,\n getParentOrigin,\n};\n","import * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\nimport { fromDerSignature } from \"@turnkey/crypto\";\nimport * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\n/**\n * Constant-time string comparison to prevent timing side-channel attacks.\n * See event-handlers.js for detailed rationale.\n * @param {string} a\n * @param {string} b\n * @returns {boolean}\n */\nfunction timingSafeEqual(a, b) {\n const enc = new TextEncoder();\n const aBuf = enc.encode(a);\n const bBuf = enc.encode(b);\n if (aBuf.length !== bBuf.length) {\n let diff = 1;\n const len = Math.min(aBuf.length, bBuf.length);\n for (let i = 0; i < len; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return false;\n }\n let diff = 0;\n for (let i = 0; i < aBuf.length; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return diff === 0;\n}\n\nconst {\n initEmbeddedKey: sharedInitEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n additionalAssociatedData,\n getSettings,\n setSettings,\n parsePrivateKey,\n validateStyles,\n isDoublyIframed,\n loadQuorumKey,\n setParentOrigin,\n getParentOrigin,\n} = SharedTKHQ;\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n return await sharedInitEmbeddedKey();\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Read environment from meta tag (templated at deploy time), fall back to window variable (for testing)\n let environment = null;\n if (typeof document !== \"undefined\") {\n const meta = document.querySelector(\n 'meta[name=\"turnkey-signer-environment\"]'\n );\n if (\n meta &&\n meta.content &&\n meta.content !== \"__TURNKEY_SIGNER_ENVIRONMENT__\"\n ) {\n environment = meta.content;\n }\n }\n if (!environment && typeof window !== \"undefined\") {\n environment = window.__TURNKEY_SIGNER_ENVIRONMENT__;\n }\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // SECURITY: Use constant-time comparison to prevent timing side-channel\n // attacks that could leak the enclave quorum public key byte-by-byte.\n if (\n !timingSafeEqual(\n enclaveQuorumPublic,\n TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY\n )\n ) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n return await crypto.subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Returns the public key bytes for a hex-encoded Ed25519 private key.\n * @param {string} privateKeyHex\n */\nfunction getEd25519PublicKey(privateKeyHex) {\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n return nobleEd25519.getPublicKey(privateKeyHex);\n}\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n if (!settings) {\n return JSON.stringify(validSettings);\n }\n const settingsObj = JSON.parse(settings);\n if (settingsObj.styles) {\n // Valid styles will be applied the \"key-div\" div HTML element.\n const keyDivTextarea = document.getElementById(\"key-div\");\n if (!keyDivTextarea) {\n throw new Error(\"no key-div HTML element found to apply settings to.\");\n }\n\n // Validate, sanitize, and apply the styles to the \"key-div\" div element.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n keyDivTextarea.style[key] = value;\n });\n\n validSettings[\"styles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport const TKHQ = {\n initEmbeddedKey,\n generateTargetKey,\n setItemWithExpiry,\n getItemWithExpiry,\n getEmbeddedKey,\n setEmbeddedKey,\n onResetEmbeddedKey,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n encodeKey,\n sendMessageUp,\n logMessage,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n getEd25519PublicKey,\n applySettings,\n validateStyles,\n getSettings,\n setSettings,\n parsePrivateKey,\n setParentOrigin,\n getParentOrigin,\n};\n","import { TKHQ } from \"./turnkey-core.js\";\nimport { Keypair, VersionedTransaction } from \"@solana/web3.js\";\nimport * as nobleEd25519 from \"@noble/ed25519\";\nimport * as nobleHashes from \"@noble/hashes/sha512\";\n\n/**\n * In-memory key store: { address --> key object }.\n * SECURITY: Mutated in-place (not spread-copied) to avoid multiplying\n * copies of key material on the V8 heap. Before deleting an entry,\n * all Uint8Array fields (e.g. keypair.secretKey) must be zeroed.\n */\nlet inMemoryKeys = {};\n\n/**\n * Injected embedded key -- held in memory only, never persisted.\n * When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key.\n *\n * SECURITY LIMITATION: This is a JWK object containing the raw \"d\" parameter.\n * It cannot be reliably zeroed in JS (object properties are GC'd, not wiped).\n * We null it on error paths and on reset to limit the exposure window.\n */\nlet injectedEmbeddedKey = null;\n\n/**\n * Allowed message origin captured during iframe initialization.\n * Used to validate incoming postMessage events and reject messages\n * from unexpected origins, preventing cross-origin injection attacks.\n * @type {string|null}\n */\nlet allowedOrigin = null;\n\nexport const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds\n\n// Instantiate these once (for perf)\nconst textEncoder = new TextEncoder();\nconst textDecoder = new TextDecoder();\n\n/**\n * Constant-time string comparison to prevent timing side-channel attacks.\n * Standard `===` / `!==` short-circuits on the first differing byte, which\n * leaks information about how many leading bytes match. This is exploitable\n * when comparing security-critical values like organization IDs or enclave\n * quorum public keys, where an attacker can iteratively guess each byte.\n *\n * Uses XOR accumulation so every byte is always compared regardless of mismatches.\n * @param {string} a\n * @param {string} b\n * @returns {boolean} true if strings are equal\n */\nfunction timingSafeEqual(a, b) {\n if (typeof a !== \"string\" || typeof b !== \"string\") {\n return false;\n }\n // Encode to bytes so we XOR fixed-width units (UTF-8 bytes)\n const aBuf = textEncoder.encode(a);\n const bBuf = textEncoder.encode(b);\n if (aBuf.length !== bBuf.length) {\n // Length mismatch already leaks info, but we still do constant-time\n // comparison over the shorter length to avoid additional leakage.\n let diff = 1; // already know they differ\n const len = Math.min(aBuf.length, bBuf.length);\n for (let i = 0; i < len; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return false;\n }\n let diff = 0;\n for (let i = 0; i < aBuf.length; i++) {\n diff |= aBuf[i] ^ bBuf[i];\n }\n return diff === 0;\n}\n\n/**\n * Zeros all sensitive Uint8Array fields on a key entry before removal.\n * JS strings (like `privateKey`) are immutable and cannot be zeroed — this is\n * a known V8 limitation. We zero what we can (Uint8Array buffers) and document\n * the rest.\n * @param {Object} keyEntry - An entry from inMemoryKeys\n */\nfunction zeroKeyEntry(keyEntry) {\n if (!keyEntry) return;\n // Zero the cached Solana keypair's secret key (64-byte Uint8Array)\n if (keyEntry.keypair && keyEntry.keypair.secretKey) {\n keyEntry.keypair.secretKey.fill(0);\n }\n // NOTE: keyEntry.privateKey is a JS string (hex or base58 encoded).\n // JS strings are immutable — we cannot zero them. They will linger on the\n // V8 heap until GC. Keeping key material as Uint8Array end-to-end would\n // require a larger refactor of the encodeKey/decodeKey pipeline.\n}\n\n/**\n * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data.\n * @param {string} bundle - JSON-stringified bundle\n * @param {string} organizationId - Expected organization ID\n * @returns {Promise} - The parsed signed data {organizationId, encappedPublic, ciphertext}\n */\nasync function verifyAndParseBundleData(bundle, organizationId) {\n const bundleObj = JSON.parse(bundle);\n\n if (bundleObj.version !== \"v1.0.0\") {\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method TKHQ.verifyEnclaveSignature not loaded\");\n }\n const verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(\n `failed to verify enclave signature. Got signature: ${bundleObj.dataSignature}, enclaveQuorumPublic: ${bundleObj.enclaveQuorumPublic}`\n );\n }\n\n const signedData = JSON.parse(\n textDecoder.decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n if (!organizationId) {\n throw new Error(\n `organization id is required. Please ensure you are using @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.`\n );\n } else if (\n !signedData.organizationId ||\n // SECURITY: Use constant-time comparison to prevent timing side-channel\n // attacks that could leak the organization ID byte-by-byte.\n !timingSafeEqual(signedData.organizationId, organizationId)\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n\n if (!signedData.encappedPublic) {\n throw new Error('missing \"encappedPublic\" in bundle signed data');\n }\n if (!signedData.ciphertext) {\n throw new Error('missing \"ciphertext\" in bundle signed data');\n }\n\n return signedData;\n}\n\n/**\n * Parse and decrypt the export bundle.\n * The `bundle` param is a JSON string of the encapsulated public\n * key, encapsulated public key signature, and the ciphertext.\n * @param {string} bundle\n * @param {string} organizationId\n * @param {Function} HpkeDecrypt\n */\nasync function decryptBundle(bundle, organizationId, HpkeDecrypt) {\n const signedData = await verifyAndParseBundleData(bundle, organizationId);\n\n const encappedKeyBuf = TKHQ.uint8arrayFromHexString(\n signedData.encappedPublic\n );\n const ciphertextBuf = TKHQ.uint8arrayFromHexString(signedData.ciphertext);\n\n // Use the injected embedded key if available, otherwise fall back to the embedded key\n const receiverPrivJwk = injectedEmbeddedKey || (await TKHQ.getEmbeddedKey());\n return await HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n });\n}\n\n/**\n * Function triggered when GET_EMBEDDED_PUBLIC_KEY event is received.\n * @param {string} requestId\n */\nasync function onGetPublicEmbeddedKey(requestId) {\n const embeddedKeyJwk = TKHQ.getEmbeddedKey();\n\n if (!embeddedKeyJwk) {\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", \"\", requestId); // no key == empty string\n\n return;\n }\n\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n\n // Send up EMBEDDED_PUBLIC_KEY message\n TKHQ.sendMessageUp(\"EMBEDDED_PUBLIC_KEY\", targetPubHex, requestId);\n}\n\n/**\n * Encodes raw key bytes and loads them into the in-memory key store.\n * @param {string} address - Wallet address (case-sensitive)\n * @param {ArrayBuffer} keyBytes - Raw decrypted private key bytes\n * @param {string} keyFormat - \"SOLANA\" | \"HEXADECIMAL\"\n * @param {string} organizationId - Organization ID\n */\nasync function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) {\n let key;\n const privateKeyBytes = new Uint8Array(keyBytes);\n\n try {\n if (keyFormat === \"SOLANA\") {\n const privateKeyHex = TKHQ.uint8arrayToHexString(\n privateKeyBytes.subarray(0, 32)\n );\n const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex);\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes);\n } else {\n key = await TKHQ.encodeKey(privateKeyBytes, keyFormat);\n }\n } finally {\n // SECURITY: Zero the raw private key bytes immediately after encoding.\n // The encoded `key` is a JS string (hex or base58) which we cannot zero,\n // but we can at least wipe the Uint8Array source material from the heap.\n privateKeyBytes.fill(0);\n }\n\n const keyAddress = address || \"default\";\n\n // Cache keypair for improved signing perf\n let cachedKeypair;\n if (keyFormat === \"SOLANA\") {\n cachedKeypair = Keypair.fromSecretKey(TKHQ.base58Decode(key));\n } else if (keyFormat === \"HEXADECIMAL\") {\n cachedKeypair = await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key))\n );\n }\n\n // SECURITY: Mutate in-place rather than spread-copying. The spread pattern\n // `{ ...inMemoryKeys, [addr]: ... }` creates a shallow copy of the entire map\n // on every key injection, multiplying references to key material on the heap.\n // In-place mutation avoids this; only one reference per key exists at a time.\n // If replacing an existing entry, zero its buffers first.\n if (inMemoryKeys[keyAddress]) {\n zeroKeyEntry(inMemoryKeys[keyAddress]);\n }\n inMemoryKeys[keyAddress] = {\n organizationId,\n privateKey: key,\n format: keyFormat,\n expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS,\n keypair: cachedKeypair,\n };\n}\n\n/**\n * Function triggered when INJECT_KEY_EXPORT_BUNDLE event is received.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle\n * @param {string} keyFormat\n * @param {string} address\n * @param {Function} HpkeDecrypt // TODO: import this directly (instead of passing around)\n */\nasync function onInjectKeyBundle(\n requestId,\n organizationId,\n bundle,\n keyFormat,\n address,\n HpkeDecrypt\n) {\n // Decrypt the export bundle\n const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n\n // Load decrypted key into memory\n await loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n\n/**\n * Function triggered when SIGN_TRANSACTION event is received.\n * @param {string} requestId\n * @param {string} transaction (serialized)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignTransaction(requestId, serializedTransaction, address) {\n // If no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and is valid/non-expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n const transactionWrapper = JSON.parse(serializedTransaction);\n const transactionToSign = transactionWrapper.transaction;\n const transactionType = transactionWrapper.type;\n\n let signedTransaction;\n\n if (transactionType === \"SOLANA\") {\n // Fetch the transaction and sign\n const transactionBytes = TKHQ.uint8arrayFromHexString(transactionToSign);\n const transaction = VersionedTransaction.deserialize(transactionBytes);\n transaction.sign([keypair]);\n\n signedTransaction = transaction.serialize();\n } else {\n throw new Error(\"unsupported transaction type\");\n }\n\n const signedTransactionHex = TKHQ.uint8arrayToHexString(signedTransaction);\n\n TKHQ.sendMessageUp(\"TRANSACTION_SIGNED\", signedTransactionHex, requestId);\n}\n\n/**\n * Function triggered when SIGN_MESSAGE event is received.\n * @param {string} requestId\n * @param {string} message (serialized, JSON-stringified)\n * @param {string} address (case-sensitive --> enforce this, optional for backwards compatibility)\n */\nasync function onSignMessage(requestId, serializedMessage, address) {\n // Backwards compatibility: if no address provided, use \"default\"\n const keyAddress = address || \"default\";\n const key = inMemoryKeys[keyAddress];\n\n // Validate key exists and has not expired\n if (!validateKey(key, keyAddress, requestId)) {\n return;\n }\n\n const messageWrapper = JSON.parse(serializedMessage);\n const messageToSign = messageWrapper.message;\n const messageType = messageWrapper.type;\n const messageBytes = textEncoder.encode(messageToSign);\n\n let signatureHex;\n\n // Get or create keypair (uses cached keypair if available)\n const keypair = await getOrCreateKeypair(key);\n\n if (messageType === \"SOLANA\") {\n // Set up sha512 for nobleEd25519 (required for signing)\n nobleEd25519.etc.sha512Sync = (...m) =>\n nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m));\n\n // Extract the 32-byte private key from the 64-byte secretKey.\n // Solana keypair.secretKey format: [32-byte private key][32-byte public key]\n // SECURITY: .slice() creates a new Uint8Array copy. We must zero it after\n // signing to avoid leaving an extra copy of the private key on the heap.\n const privateKey = keypair.secretKey.slice(0, 32);\n try {\n // Sign the message using nobleEd25519\n const signature = nobleEd25519.sign(messageBytes, privateKey);\n\n // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair.\n // Clients can verify the signature returned.\n\n signatureHex = TKHQ.uint8arrayToHexString(signature);\n } finally {\n // SECURITY: Zero the private key slice immediately after use.\n privateKey.fill(0);\n }\n } else {\n TKHQ.sendMessageUp(\"ERROR\", \"unsupported message type\", requestId);\n\n return;\n }\n\n TKHQ.sendMessageUp(\"MESSAGE_SIGNED\", signatureHex, requestId);\n}\n\n/**\n * Function triggered when CLEAR_EMBEDDED_PRIVATE_KEY event is received.\n * @param {string} requestId\n * @param {string} address - Optional: The address of the key to clear (case-sensitive). If not provided, clears all keys.\n */\nasync function onClearEmbeddedPrivateKey(requestId, address) {\n // If no address is provided, clear all keys\n if (!address) {\n // SECURITY: Zero all Uint8Array buffers before releasing references.\n // `delete` and reassignment only remove the JS reference — the underlying\n // memory isn't wiped and will persist until GC reclaims it.\n for (const key of Object.keys(inMemoryKeys)) {\n zeroKeyEntry(inMemoryKeys[key]);\n }\n inMemoryKeys = {};\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n\n return;\n }\n\n // Check if key exists for the specific address\n if (!inMemoryKeys[address]) {\n TKHQ.sendMessageUp(\n \"ERROR\",\n new Error(\n `key not found for address ${address}. Note that address is case sensitive.`\n ).toString(),\n requestId\n );\n\n return;\n }\n\n // SECURITY: Zero sensitive buffers before deleting the entry.\n zeroKeyEntry(inMemoryKeys[address]);\n delete inMemoryKeys[address];\n\n TKHQ.sendMessageUp(\"EMBEDDED_PRIVATE_KEY_CLEARED\", true, requestId);\n}\n\n/**\n * Handler for SET_EMBEDDED_KEY_OVERRIDE events.\n * Decrypts a P-256 private key bundle using the iframe's embedded key and\n * overrides the embedded key with it for subsequent bundle decryptions.\n * @param {string} requestId\n * @param {string} organizationId\n * @param {string} bundle - v1.0.0 bundle containing the P-256 private key\n * @param {Function} HpkeDecrypt\n */\nasync function onSetEmbeddedKeyOverride(\n requestId,\n organizationId,\n bundle,\n HpkeDecrypt\n) {\n let keyBytes = null;\n try {\n // Decrypt the private key using the iframe's embedded key.\n // The decrypted payload is a raw 32-byte P-256 private key scalar.\n const decrypted = await decryptBundle(bundle, organizationId, HpkeDecrypt);\n keyBytes =\n decrypted instanceof Uint8Array ? decrypted : new Uint8Array(decrypted);\n\n // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto)\n const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes));\n\n // Store in module-level variable (memory only)\n injectedEmbeddedKey = keyJwk;\n\n TKHQ.sendMessageUp(\"EMBEDDED_KEY_OVERRIDE_SET\", true, requestId);\n } catch (e) {\n // SECURITY: Ensure the injected key is cleared on any error path.\n // If decryption or JWK conversion partially succeeded before throwing,\n // we must not leave stale key material in the module variable.\n injectedEmbeddedKey = null;\n throw e;\n } finally {\n // SECURITY: Zero decrypted key bytes on all paths once we've derived the JWK.\n if (keyBytes) {\n keyBytes.fill(0);\n }\n }\n}\n\n/**\n * Handler for RESET_TO_DEFAULT_EMBEDDED_KEY events.\n * Clears the embedded key from memory, replacing it with the iframe's default embedded key.\n * @param {string} requestId\n */\nfunction onResetToDefaultEmbeddedKey(requestId) {\n injectedEmbeddedKey = null;\n TKHQ.sendMessageUp(\"RESET_TO_DEFAULT_EMBEDDED_KEY\", true, requestId);\n}\n\n// Utility functions\nasync function createSolanaKeypair(privateKey) {\n const privateKeyBytes = TKHQ.parsePrivateKey(privateKey);\n\n let keypair;\n if (privateKeyBytes.length === 32) {\n // 32-byte private key (seed)\n keypair = Keypair.fromSeed(privateKeyBytes);\n } else if (privateKeyBytes.length === 64) {\n // 64-byte secret key (private + public)\n keypair = Keypair.fromSecretKey(privateKeyBytes);\n } else {\n throw new Error(\n `Invalid private key length: ${privateKeyBytes.length}. Expected 32 or 64 bytes.`\n );\n }\n\n return keypair;\n}\n\n/**\n * Converts raw P-256 private key bytes (32-byte scalar) to a JWK.\n * Constructs a PKCS8 wrapper around the raw bytes, imports via WebCrypto\n * (which derives the public key), then exports as JWK.\n * @param {Uint8Array} rawPrivateKeyBytes - 32-byte P-256 private key scalar\n * @returns {Promise} - Full P-256 ECDH private key JWK\n */\nasync function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) {\n if (rawPrivateKeyBytes.length !== 32) {\n throw new Error(\n `invalid decryption key length: expected 32 bytes, got ${rawPrivateKeyBytes.length}`\n );\n }\n\n // Fixed PKCS#8 DER prefix for a P-256 private key (36 bytes).\n // This wraps a raw 32-byte scalar into the PrivateKeyInfo structure\n // that WebCrypto's importKey(\"pkcs8\", ...) expects.\n //\n // Structure (per RFC 5958 §2 / RFC 5208 §5):\n // SEQUENCE {\n // INTEGER 0 -- version (v1)\n // SEQUENCE { -- AlgorithmIdentifier (RFC 5480 §2.1.1)\n // OID 1.2.840.10045.2.1 -- id-ecPublicKey\n // OID 1.2.840.10045.3.1.7 -- secp256r1 (P-256)\n // }\n // OCTET STRING { -- privateKey (SEC 1 §C.4 / RFC 5915 §3)\n // SEQUENCE {\n // INTEGER 1 -- version\n // OCTET STRING (32 bytes) -- raw private key scalar\n // }\n // }\n // }\n //\n // References:\n // - RFC 5958 / RFC 5208: PKCS#8 PrivateKeyInfo\n // - RFC 5480 §2.1.1: ECC AlgorithmIdentifier (OIDs)\n // - RFC 5915 / SEC 1 v2 §C.4: ECPrivateKey encoding\n const pkcs8Prefix = new Uint8Array([\n 0x30, 0x41, 0x02, 0x01, 0x00, 0x30, 0x13, 0x06, 0x07, 0x2a, 0x86, 0x48,\n 0xce, 0x3d, 0x02, 0x01, 0x06, 0x08, 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03,\n 0x01, 0x07, 0x04, 0x27, 0x30, 0x25, 0x02, 0x01, 0x01, 0x04, 0x20,\n ]);\n\n const pkcs8 = new Uint8Array(pkcs8Prefix.length + 32);\n pkcs8.set(pkcs8Prefix);\n pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length);\n\n try {\n const cryptoKey = await crypto.subtle.importKey(\n \"pkcs8\",\n pkcs8,\n { name: \"ECDH\", namedCurve: \"P-256\" },\n true,\n [\"deriveBits\"]\n );\n\n return await crypto.subtle.exportKey(\"jwk\", cryptoKey);\n } finally {\n // SECURITY: Zero intermediate buffers that contain private key material.\n // The PKCS#8 wrapper embeds the raw scalar, so both must be wiped.\n pkcs8.fill(0);\n rawPrivateKeyBytes.fill(0);\n }\n}\n\n/**\n * Generates the error message for missing or expired keys.\n * @param {string} keyAddress - The address of the key\n * @returns {string} - The error message string\n */\nexport function getKeyNotFoundErrorMessage(keyAddress) {\n return `key bytes have expired. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`;\n}\n\n/**\n * Clears an expired key from memory. This is an internal helper function\n * that clears the key without sending messages to the parent frame.\n * @param {string} keyAddress - The address of the key to clear\n */\nfunction clearExpiredKey(keyAddress) {\n if (inMemoryKeys[keyAddress]) {\n // SECURITY: Zero sensitive Uint8Array buffers before releasing the reference.\n zeroKeyEntry(inMemoryKeys[keyAddress]);\n delete inMemoryKeys[keyAddress];\n }\n}\n\n/**\n * Clears all expired keys from memory.\n * This function iterates through all keys and removes any that have expired.\n */\nfunction clearAllExpiredKeys() {\n const now = new Date().getTime();\n const addressesToRemove = [];\n\n for (const [address, key] of Object.entries(inMemoryKeys)) {\n if (key.expiry && now >= key.expiry) {\n addressesToRemove.push(address);\n }\n }\n\n for (const address of addressesToRemove) {\n clearExpiredKey(address);\n }\n}\n\n/**\n * Validates that a key exists and has not expired.\n * Clears the key from memory if it has expired.\n * Throws error if validation fails (and caller will send message up back to parent).\n * @param {Object} key - The key object from inMemoryKeys\n * @param {string} keyAddress - The address of the key\n * @returns {boolean} - True if key is valid, false otherwise\n */\nfunction validateKey(key, keyAddress) {\n if (!key) {\n throw new Error(\n `key bytes not found. Please re-inject export bundle for address ${keyAddress} into iframe. Note that address is case sensitive.`\n ).toString();\n }\n\n const now = new Date().getTime();\n if (now >= key.expiry) {\n // Clear all expired keys before processing the signing request\n clearAllExpiredKeys();\n throw new Error(getKeyNotFoundErrorMessage(keyAddress)).toString();\n }\n\n return true;\n}\n\n/**\n * Gets or creates a Solana keypair from a key object.\n * Uses cached keypair if available, otherwise creates a new one.\n * @param {Object} key - The key object containing format and privateKey\n * @returns {Promise} - The Solana keypair\n */\nasync function getOrCreateKeypair(key) {\n if (key.keypair) {\n return key.keypair;\n }\n\n if (key.format === \"SOLANA\") {\n return Keypair.fromSecretKey(TKHQ.base58Decode(key.privateKey));\n } else {\n return await createSolanaKeypair(\n Array.from(TKHQ.uint8arrayFromHexString(key.privateKey))\n );\n }\n}\n\n/**\n * DOM Event handlers to power the export flow in standalone mode\n * Instead of receiving events from the parent page, forms trigger them.\n * This is useful for debugging as well.\n */\nfunction addDOMEventListeners() {\n // only support injected keys, not wallets\n document.getElementById(\"inject-key\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_KEY_EXPORT_BUNDLE\",\n value: document.getElementById(\"key-export-bundle\").value,\n keyFormat: document.getElementById(\"key-export-format\").value,\n organizationId: document.getElementById(\"key-organization-id\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-transaction\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_TRANSACTION\",\n value: document.getElementById(\"transaction-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"sign-message\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"SIGN_MESSAGE\",\n value: document.getElementById(\"message-to-sign\").value,\n });\n },\n false\n );\n document.getElementById(\"reset\").addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({ type: \"RESET_EMBEDDED_KEY\" });\n },\n false\n );\n\n // Add wallet injection support\n const injectWalletBtn = document.getElementById(\"inject-wallet\");\n if (injectWalletBtn) {\n injectWalletBtn.addEventListener(\n \"click\",\n async (e) => {\n e.preventDefault();\n window.postMessage({\n type: \"INJECT_WALLET_EXPORT_BUNDLE\",\n value: document.getElementById(\"wallet-export-bundle\").value,\n organizationId: document.getElementById(\"wallet-organization-id\")\n .value,\n });\n },\n false\n );\n }\n}\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nfunction initMessageEventListener(HpkeDecrypt) {\n return async function messageEventListener(event) {\n // SECURITY: Validate event.origin against the allowlist captured at init time.\n // Without this check, any page that can obtain a reference to this iframe's\n // window (e.g. via window.frames) could inject messages and trigger key\n // operations. We skip validation only if allowedOrigin hasn't been set yet\n // (i.e. during the initial handshake itself).\n if (allowedOrigin && event.origin && event.origin !== allowedOrigin) {\n TKHQ.logMessage(\n `⚠️ Rejected message from unexpected origin: ${event.origin} (expected: ${allowedOrigin})`\n );\n return;\n }\n\n if (event.data && event.data[\"type\"] == \"INJECT_KEY_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"keyFormat\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"], // bundle\n event.data[\"keyFormat\"],\n event.data[\"address\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"INJECT_WALLET_EXPORT_BUNDLE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}, ${event.data[\"organizationId\"]}`\n );\n try {\n await onInjectKeyBundle(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n undefined, // keyFormat - default to HEXADECIMAL\n undefined, // address - default to \"default\"\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n TKHQ.onResetEmbeddedKey();\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString());\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_TRANSACTION\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignTransaction(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SIGN_MESSAGE\") {\n TKHQ.logMessage(\n `⬇️ Received message ${event.data[\"type\"]}: ${event.data[\"value\"]}`\n );\n try {\n await onSignMessage(\n event.data[\"requestId\"],\n event.data[\"value\"],\n event.data[\"address\"] // signing address (case sensitive)\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"CLEAR_EMBEDDED_PRIVATE_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onClearEmbeddedPrivateKey(\n event.data[\"requestId\"],\n event.data[\"address\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"GET_EMBEDDED_PUBLIC_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onGetPublicEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"SET_EMBEDDED_KEY_OVERRIDE\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n await onSetEmbeddedKeyOverride(\n event.data[\"requestId\"],\n event.data[\"organizationId\"],\n event.data[\"value\"],\n HpkeDecrypt\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"RESET_TO_DEFAULT_EMBEDDED_KEY\") {\n TKHQ.logMessage(`⬇️ Received message ${event.data[\"type\"]}`);\n try {\n onResetToDefaultEmbeddedKey(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n };\n}\n\n/**\n * Set up event handlers for both DOM and message events\n * @param {Function} HpkeDecrypt\n */\nexport function initEventHandlers(HpkeDecrypt) {\n const messageEventListener = initMessageEventListener(HpkeDecrypt);\n\n // controllers to remove event listeners\n const messageListenerController = new AbortController();\n const turnkeyInitController = new AbortController();\n\n // Add DOM event listeners for standalone mode\n addDOMEventListeners();\n\n // Add window message listener for iframe mode\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n // Handle MessageChannel initialization for iframe communication\n window.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // SECURITY: Capture the parent origin from the init handshake.\n // This is used both for origin validation on incoming messages and\n // as the targetOrigin for legacy postMessage responses (instead of \"*\").\n allowedOrigin = event.origin;\n TKHQ.setParentOrigin(event.origin);\n\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n const iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n await TKHQ.initEmbeddedKey(event.origin);\n var embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n var targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n var targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n );\n\n return { messageEventListener };\n}\n/**\n * Expose internal handlers for targeted testing.\n */\nexport {\n onInjectKeyBundle,\n onSignTransaction,\n onSignMessage,\n onClearEmbeddedPrivateKey,\n onSetEmbeddedKeyOverride,\n onResetToDefaultEmbeddedKey,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n","// This file is the main entrypoint of the webpack-bundled application\n\n// Import relevant modules\nimport { TKHQ } from \"./turnkey-core.js\";\nimport { initEventHandlers } from \"./event-handlers.js\";\nimport { HpkeDecrypt } from \"@shared/crypto-utils.js\";\nimport \"./styles.css\";\n\n// Surface TKHQ for external access\nwindow.TKHQ = TKHQ;\n\n// Init app\ndocument.addEventListener(\"DOMContentLoaded\", async function () {\n await TKHQ.initEmbeddedKey();\n const embeddedKeyJwk = await TKHQ.getEmbeddedKey();\n const targetPubBuf = await TKHQ.p256JWKPrivateToPublic(embeddedKeyJwk);\n const targetPubHex = TKHQ.uint8arrayToHexString(targetPubBuf);\n document.getElementById(\"embedded-key\").value = targetPubHex;\n\n initEventHandlers(HpkeDecrypt);\n\n // If styles are saved in local storage, sanitize and apply them\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", targetPubHex);\n});\n","module.exports = crypto;","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\tid: moduleId,\n\t\tloaded: false,\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n\t// Flag the module as loaded\n\tmodule.loaded = true;\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// getDefaultExport function for compatibility with non-harmony modules\n__webpack_require__.n = (module) => {\n\tvar getter = module && module.__esModule ?\n\t\t() => (module['default']) :\n\t\t() => (module);\n\t__webpack_require__.d(getter, { a: getter });\n\treturn getter;\n};","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"bundle.\" + {\"291\":\"3eaea85f4001b9cc63c3\",\"825\":\"aaba32bf7338e3d0f1cc\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.nmd = (module) => {\n\tmodule.paths = [];\n\tif (!module.children) module.children = [];\n\treturn module;\n};","__webpack_require__.p = \"/\";","\n__webpack_require__.sriHashes = {\"291\":\"*-*-*-CHUNK-SRI-HASH-r3NPGwA4ft5fHgGXhVIptCiDVf06qPa+sxzG6L+8GwPuhn89e/\",\"825\":\"*-*-*-CHUNK-SRI-HASH-mfog3UJdGPOmSk4QZbKxsxHPFZtt298WnZNc1aQ1MCgc6YirFj\"};","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t792: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkexport_and_sign\"] = self[\"webpackChunkexport_and_sign\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96], () => (__webpack_require__(560)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","parentOrigin","getSubtleCrypto","globalThis","crypto","subtle","window","global","isDoublyIframed","undefined","location","ancestorOrigins","parent","top","_loadQuorumKey","_callee","quorumPublic","_context","Error","importKey","namedCurve","_initEmbeddedKey","_callee3","_context3","getEmbeddedKey","generateTargetKey","setEmbeddedKey","_generateTargetKey","_callee4","p256key","_context4","generateKey","exportKey","privateKey","jwtKey","getItemWithExpiry","JSON","parse","targetKey","setItemWithExpiry","stringify","key","ttl","item","expiry","Date","getTime","localStorage","setItem","itemStr","getItem","hasOwnProperty","removeItem","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","concat","logMessage","content","messageLog","document","getElementById","message","createElement","innerText","appendChild","p256JWKPrivateToPublic","_x6","_p256JWKPrivateToPublic","_callee6","jwkPrivate","jwkPrivateCopy","publicKey","_context6","_objectSpread","key_ops","base58Encode","bytes","result","digits","carry","j","push","k","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","currentByte","reverse","_encodeKey","_callee9","privateKeyBytes","keyFormat","publicKeyBytes","concatenatedBytes","_t2","_context9","set","console","warn","timingSafeEqual","b","enc","TextEncoder","aBuf","encode","bBuf","len","Math","min","diff","sharedInitEmbeddedKey","SharedTKHQ","validateStyles","styles","element","validStyles","cssValidationRegex","padding","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","next","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","loadQuorumKey","_x","_verifyEnclaveSignature","_callee2","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","meta","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context2","prod","preprod","querySelector","__TURNKEY_SIGNER_ENVIRONMENT__","fromDerSignature","verify","hash","TKHQ","initEmbeddedKey","onResetEmbeddedKey","encodeKey","_x0","_x1","_x10","sendMessageUp","type","requestId","postMessage","targetOrigin","setParentFrameMessageChannelPort","port","normalizePadding","byteArray","targetLength","paddingLength","fill","expectedZeroCount","zeroCount","verifyEnclaveSignature","_x2","_x3","getEd25519PublicKey","privateKeyHex","nobleEd25519","sha512Sync","_nobleEd25519$etc","nobleHashes","concatBytes","applySettings","settings","validSettings","settingsObj","keyDivTextarea","style","getSettings","setSettings","parsePrivateKey","error","setParentOrigin","origin","getParentOrigin","_slicedToArray","inMemoryKeys","injectedEmbeddedKey","allowedOrigin","textEncoder","textDecoder","TextDecoder","zeroKeyEntry","keyEntry","keypair","secretKey","verifyAndParseBundleData","_verifyAndParseBundleData","_callee8","bundle","organizationId","bundleObj","_context8","version","data","dataSignature","decode","encappedPublic","ciphertext","decryptBundle","_x4","_x5","_decryptBundle","HpkeDecrypt","encappedKeyBuf","ciphertextBuf","receiverPrivJwk","_t9","onGetPublicEmbeddedKey","_onGetPublicEmbeddedKey","_callee0","embeddedKeyJwk","targetPubBuf","targetPubHex","_context0","loadKeyIntoMemory","_x7","_x8","_x9","_loadKeyIntoMemory","_callee1","address","keyBytes","keyAddress","cachedKeypair","_context1","subarray","Keypair","fromSecretKey","createSolanaKeypair","format","onInjectKeyBundle","_x11","_x12","_x13","_x14","_onInjectKeyBundle","_callee10","_context10","onApplySettings","_x15","_x16","_onApplySettings","_callee11","_context11","onSignTransaction","_x17","_x18","_x19","_onSignTransaction","_callee12","serializedTransaction","transactionWrapper","transactionToSign","signedTransaction","transactionBytes","transaction","signedTransactionHex","_context12","validateKey","getOrCreateKeypair","VersionedTransaction","deserialize","sign","serialize","onSignMessage","_x20","_x21","_x22","_onSignMessage","_callee13","serializedMessage","messageWrapper","messageToSign","messageType","messageBytes","signatureHex","signature","_context13","onClearEmbeddedPrivateKey","_x23","_x24","_onClearEmbeddedPrivateKey","_callee14","_i4","_Object$keys","_context14","keys","onSetEmbeddedKeyOverride","_x25","_x26","_x27","_x28","_onSetEmbeddedKeyOverride","_callee15","decrypted","keyJwk","_t0","_context15","rawP256PrivateKeyToJwk","onResetToDefaultEmbeddedKey","_x29","_createSolanaKeypair","_callee16","_context16","fromSeed","_x30","_rawP256PrivateKeyToJwk","_callee17","rawPrivateKeyBytes","pkcs8Prefix","pkcs8","cryptoKey","_context17","clearExpiredKey","now","addressesToRemove","_i2","_Object$entries","_Object$entries$_i","_i3","_addressesToRemove","clearAllExpiredKeys","getKeyNotFoundErrorMessage","_x31","_getOrCreateKeypair","_callee18","_context18","initEventHandlers","messageEventListener","_messageEventListener","event","_t","_t3","_t4","_t5","_t6","_t7","_t8","_x37","initMessageEventListener","messageListenerController","AbortController","turnkeyInitController","addEventListener","preventDefault","_x32","_x33","_ref3","_x34","_ref4","_x35","injectWalletBtn","_ref5","_callee5","_context5","_x36","addDOMEventListeners","capture","signal","_ref6","_callee7","_event$ports","iframeMessagePort","_context7","ports","abort","onmessage","_x38","ownKeys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","_HpkeDecrypt","kemContext","receiverPriv","suite","recipientCtx","aad","res","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createRecipientContext","recipientKey","info","open","styleSettings","module","exports","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","id","loaded","__webpack_modules__","O","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","every","splice","getter","__esModule","obj","mode","this","ns","def","current","getOwnPropertyNames","definition","get","chunkId","all","reduce","promises","miniCssF","g","Function","prop","url","script","needAttach","scripts","getElementsByTagName","getAttribute","charset","nc","setAttribute","src","crossOrigin","integrity","sriHashes","onScriptComplete","prev","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","target","head","nmd","paths","children","installedChunks","installedChunkData","promise","reject","errorType","realSrc","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/export-and-sign/dist/index.html b/export-and-sign/dist/index.html index bbca992..da131d5 100644 --- a/export-and-sign/dist/index.html +++ b/export-and-sign/dist/index.html @@ -1 +1 @@ -Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file +Turnkey Export

Export Key Material

This public key will be sent along with a private key ID or wallet ID inside of a new EXPORT_PRIVATE_KEY or EXPORT_WALLET activity




Inject Key Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).





Inject Wallet Export Bundle

The export bundle comes from the parent page and is composed of a public key and an encrypted payload. The payload is encrypted to this document's embedded key (stored in local storage and displayed above). The scheme relies on HPKE (RFC 9180).




Sign Transaction

Input a serialized transaction to sign.



Sign Message

Input a serialized message to sign.



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file diff --git a/export-and-sign/index.test.js b/export-and-sign/index.test.js index 74d0f47..98e73f7 100644 --- a/export-and-sign/index.test.js +++ b/export-and-sign/index.test.js @@ -7,6 +7,7 @@ import { DEFAULT_TTL_MILLISECONDS, onInjectKeyBundle, onSignTransaction, + onClearEmbeddedPrivateKey, getKeyNotFoundErrorMessage, onResetToDefaultEmbeddedKey, onSetEmbeddedKeyOverride, @@ -868,7 +869,8 @@ describe("Embedded Key Override", () => { // Mock raw 32-byte P-256 private key (embedded key) // This is what Turnkey exports after HPKE decryption - raw key bytes, not a JWK. - const mockEmbeddedKeyBytes = new Uint8Array(32).fill(42); + // Return a fresh buffer each time since handlers zero key buffers in-place. + const makeMockEmbeddedKeyBytes = () => new Uint8Array(32).fill(42); function buildBundle(organizationId = "org-test") { const signedData = { @@ -956,7 +958,9 @@ describe("Embedded Key Override", () => { describe("SET_EMBEDDED_KEY_OVERRIDE handler", () => { it("decrypts and stores the embedded key", async () => { - const HpkeDecryptMock = jest.fn().mockResolvedValue(mockEmbeddedKeyBytes); + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(makeMockEmbeddedKeyBytes()); await onSetEmbeddedKeyOverride( requestId, @@ -973,6 +977,20 @@ describe("Embedded Key Override", () => { ); }); + it("zeros decrypted key bytes on success", async () => { + const decrypted = new Uint8Array(32).fill(42); + const HpkeDecryptMock = jest.fn().mockResolvedValue(decrypted); + + await onSetEmbeddedKeyOverride( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ); + + expect(decrypted.every((b) => b === 0)).toBe(true); + }); + it("rejects invalid decryption key length", async () => { const HpkeDecryptMock = jest .fn() @@ -988,6 +1006,22 @@ describe("Embedded Key Override", () => { ).rejects.toThrow("invalid decryption key length"); }); + it("zeros decrypted key bytes on error", async () => { + const decrypted = new Uint8Array(16).fill(1); + const HpkeDecryptMock = jest.fn().mockResolvedValue(decrypted); + + await expect( + onSetEmbeddedKeyOverride( + requestId, + "org-test", + buildBundle(), + HpkeDecryptMock + ) + ).rejects.toThrow("invalid decryption key length"); + + expect(decrypted.every((b) => b === 0)).toBe(true); + }); + it("uses injected key for subsequent bundle decryptions", async () => { // 1. Replace embedded key with embedded key let callCount = 0; @@ -995,7 +1029,7 @@ describe("Embedded Key Override", () => { callCount++; if (callCount === 1) { // First call: decrypting the embedded key bundle itself (uses embedded key) - return Promise.resolve(mockEmbeddedKeyBytes); + return Promise.resolve(makeMockEmbeddedKeyBytes()); } // Subsequent calls: decrypting wallet bundles (should use the injected key) return Promise.resolve(new Uint8Array(64).fill(9)); @@ -1037,7 +1071,9 @@ describe("Embedded Key Override", () => { describe("RESET_TO_DEFAULT_EMBEDDED_KEY handler", () => { it("clears the injected embedded key", async () => { // 1. Replace embedded key - const HpkeDecryptMock = jest.fn().mockResolvedValue(mockEmbeddedKeyBytes); + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(makeMockEmbeddedKeyBytes()); await onSetEmbeddedKeyOverride( requestId, @@ -1072,6 +1108,148 @@ describe("Embedded Key Override", () => { }); }); + describe("Key clearing and buffer zeroing", () => { + it("clears all keys when no address is given and subsequent signing fails", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + // Inject two keys + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-x", + HpkeDecryptMock + ); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-y", + HpkeDecryptMock + ); + + // Clear all keys (no address argument) + await onClearEmbeddedPrivateKey(requestId, undefined); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "EMBEDDED_PRIVATE_KEY_CLEARED", + true, + requestId + ); + + // After clearing, signing should throw "key bytes not found" + let signError; + try { + await onSignTransaction(requestId, serializedTransaction, "wallet-x"); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + + try { + await onSignTransaction(requestId, serializedTransaction, "wallet-y"); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + }); + + it("clears only the targeted key and leaves other keys intact", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-keep", + HpkeDecryptMock + ); + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-remove", + HpkeDecryptMock + ); + + // Clear only wallet-remove + await onClearEmbeddedPrivateKey(requestId, "wallet-remove"); + + expect(sendMessageSpy).toHaveBeenCalledWith( + "EMBEDDED_PRIVATE_KEY_CLEARED", + true, + requestId + ); + + // wallet-remove should be gone -- signing throws + let signError; + try { + await onSignTransaction( + requestId, + serializedTransaction, + "wallet-remove" + ); + } catch (e) { + signError = e.toString(); + } + expect(signError).toContain("key bytes not found"); + + // wallet-keep should still be signable + await onSignTransaction(requestId, serializedTransaction, "wallet-keep"); + expect(sendMessageSpy).toHaveBeenCalledWith( + "TRANSACTION_SIGNED", + expect.any(String), + requestId + ); + }); + + it("zeros the Solana secretKey buffer on single-key clear", async () => { + const HpkeDecryptMock = jest + .fn() + .mockResolvedValue(new Uint8Array(64).fill(9)); + + await onInjectKeyBundle( + requestId, + "org-test", + buildBundle(), + "SOLANA", + "wallet-zero", + HpkeDecryptMock + ); + + // The mock Keypair.fromSecretKey always returns the same mockKeypair object. + // Capture the secretKey reference before clearing. + const { Keypair } = await import("@solana/web3.js"); + const capturedSecretKey = Keypair.fromSecretKey().secretKey; + + await onClearEmbeddedPrivateKey(requestId, "wallet-zero"); + + // zeroKeyEntry should have called fill(0) on the secretKey buffer. + // (It may already be zero if a prior test cleared the same mock keypair, + // but the important invariant is: it must be zero after a clear.) + expect(capturedSecretKey.every((b) => b === 0)).toBe(true); + }); + + it("sends error when trying to clear a key that does not exist", async () => { + await onClearEmbeddedPrivateKey(requestId, "nonexistent-wallet"); + + // onClearEmbeddedPrivateKey sends new Error(...).toString() which includes "Error: " prefix + expect(sendMessageSpy).toHaveBeenCalledWith( + "ERROR", + "Error: key not found for address nonexistent-wallet. Note that address is case sensitive.", + requestId + ); + }); + }); + describe("Full Lifecycle", () => { it("replace key -> inject bundles -> sign -> reset -> inject uses embedded key", async () => { // 1. Replace embedded key with injected embedded key @@ -1079,7 +1257,7 @@ describe("Embedded Key Override", () => { const HpkeDecryptMock = jest.fn().mockImplementation(() => { callCount++; if (callCount === 1) { - return Promise.resolve(mockEmbeddedKeyBytes); + return Promise.resolve(makeMockEmbeddedKeyBytes()); } return Promise.resolve(new Uint8Array(64).fill(9)); }); diff --git a/export-and-sign/src/event-handlers.js b/export-and-sign/src/event-handlers.js index ba7f797..c283f10 100644 --- a/export-and-sign/src/event-handlers.js +++ b/export-and-sign/src/event-handlers.js @@ -3,19 +3,93 @@ import { Keypair, VersionedTransaction } from "@solana/web3.js"; import * as nobleEd25519 from "@noble/ed25519"; import * as nobleHashes from "@noble/hashes/sha512"; -// Persist keys in memory via mapping of { address --> pk } +/** + * In-memory key store: { address --> key object }. + * SECURITY: Mutated in-place (not spread-copied) to avoid multiplying + * copies of key material on the V8 heap. Before deleting an entry, + * all Uint8Array fields (e.g. keypair.secretKey) must be zeroed. + */ let inMemoryKeys = {}; -// Injected embedded key -- held in memory only, never persisted. -// When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key. +/** + * Injected embedded key -- held in memory only, never persisted. + * When set, decryptBundle uses this P-256 JWK instead of the iframe's embedded key. + * + * SECURITY LIMITATION: This is a JWK object containing the raw "d" parameter. + * It cannot be reliably zeroed in JS (object properties are GC'd, not wiped). + * We null it on error paths and on reset to limit the exposure window. + */ let injectedEmbeddedKey = null; +/** + * Allowed message origin captured during iframe initialization. + * Used to validate incoming postMessage events and reject messages + * from unexpected origins, preventing cross-origin injection attacks. + * @type {string|null} + */ +let allowedOrigin = null; + export const DEFAULT_TTL_MILLISECONDS = 1000 * 24 * 60 * 60; // 24 hours or 86,400,000 milliseconds // Instantiate these once (for perf) const textEncoder = new TextEncoder(); const textDecoder = new TextDecoder(); +/** + * Constant-time string comparison to prevent timing side-channel attacks. + * Standard `===` / `!==` short-circuits on the first differing byte, which + * leaks information about how many leading bytes match. This is exploitable + * when comparing security-critical values like organization IDs or enclave + * quorum public keys, where an attacker can iteratively guess each byte. + * + * Uses XOR accumulation so every byte is always compared regardless of mismatches. + * @param {string} a + * @param {string} b + * @returns {boolean} true if strings are equal + */ +function timingSafeEqual(a, b) { + if (typeof a !== "string" || typeof b !== "string") { + return false; + } + // Encode to bytes so we XOR fixed-width units (UTF-8 bytes) + const aBuf = textEncoder.encode(a); + const bBuf = textEncoder.encode(b); + if (aBuf.length !== bBuf.length) { + // Length mismatch already leaks info, but we still do constant-time + // comparison over the shorter length to avoid additional leakage. + let diff = 1; // already know they differ + const len = Math.min(aBuf.length, bBuf.length); + for (let i = 0; i < len; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return false; + } + let diff = 0; + for (let i = 0; i < aBuf.length; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return diff === 0; +} + +/** + * Zeros all sensitive Uint8Array fields on a key entry before removal. + * JS strings (like `privateKey`) are immutable and cannot be zeroed — this is + * a known V8 limitation. We zero what we can (Uint8Array buffers) and document + * the rest. + * @param {Object} keyEntry - An entry from inMemoryKeys + */ +function zeroKeyEntry(keyEntry) { + if (!keyEntry) return; + // Zero the cached Solana keypair's secret key (64-byte Uint8Array) + if (keyEntry.keypair && keyEntry.keypair.secretKey) { + keyEntry.keypair.secretKey.fill(0); + } + // NOTE: keyEntry.privateKey is a JS string (hex or base58 encoded). + // JS strings are immutable — we cannot zero them. They will linger on the + // V8 heap until GC. Keeping key material as Uint8Array end-to-end would + // require a larger refactor of the encodeKey/decodeKey pipeline. +} + /** * Verifies the enclave signature on a v1.0.0 bundle and returns the parsed signed data. * @param {string} bundle - JSON-stringified bundle @@ -62,7 +136,9 @@ async function verifyAndParseBundleData(bundle, organizationId) { ); } else if ( !signedData.organizationId || - signedData.organizationId !== organizationId + // SECURITY: Use constant-time comparison to prevent timing side-channel + // attacks that could leak the organization ID byte-by-byte. + !timingSafeEqual(signedData.organizationId, organizationId) ) { throw new Error( `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.` @@ -135,14 +211,21 @@ async function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) { let key; const privateKeyBytes = new Uint8Array(keyBytes); - if (keyFormat === "SOLANA") { - const privateKeyHex = TKHQ.uint8arrayToHexString( - privateKeyBytes.subarray(0, 32) - ); - const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex); - key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes); - } else { - key = await TKHQ.encodeKey(privateKeyBytes, keyFormat); + try { + if (keyFormat === "SOLANA") { + const privateKeyHex = TKHQ.uint8arrayToHexString( + privateKeyBytes.subarray(0, 32) + ); + const publicKeyBytes = TKHQ.getEd25519PublicKey(privateKeyHex); + key = await TKHQ.encodeKey(privateKeyBytes, keyFormat, publicKeyBytes); + } else { + key = await TKHQ.encodeKey(privateKeyBytes, keyFormat); + } + } finally { + // SECURITY: Zero the raw private key bytes immediately after encoding. + // The encoded `key` is a JS string (hex or base58) which we cannot zero, + // but we can at least wipe the Uint8Array source material from the heap. + privateKeyBytes.fill(0); } const keyAddress = address || "default"; @@ -157,15 +240,20 @@ async function loadKeyIntoMemory(address, keyBytes, keyFormat, organizationId) { ); } - inMemoryKeys = { - ...inMemoryKeys, - [keyAddress]: { - organizationId, - privateKey: key, - format: keyFormat, - expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS, - keypair: cachedKeypair, - }, + // SECURITY: Mutate in-place rather than spread-copying. The spread pattern + // `{ ...inMemoryKeys, [addr]: ... }` creates a shallow copy of the entire map + // on every key injection, multiplying references to key material on the heap. + // In-place mutation avoids this; only one reference per key exists at a time. + // If replacing an existing entry, zero its buffers first. + if (inMemoryKeys[keyAddress]) { + zeroKeyEntry(inMemoryKeys[keyAddress]); + } + inMemoryKeys[keyAddress] = { + organizationId, + privateKey: key, + format: keyFormat, + expiry: new Date().getTime() + DEFAULT_TTL_MILLISECONDS, + keypair: cachedKeypair, }; } @@ -287,16 +375,23 @@ async function onSignMessage(requestId, serializedMessage, address) { nobleEd25519.etc.sha512Sync = (...m) => nobleHashes.sha512(nobleEd25519.etc.concatBytes(...m)); - // Extract the 32-byte private key from the 64-byte secretKey + // Extract the 32-byte private key from the 64-byte secretKey. // Solana keypair.secretKey format: [32-byte private key][32-byte public key] + // SECURITY: .slice() creates a new Uint8Array copy. We must zero it after + // signing to avoid leaving an extra copy of the private key on the heap. const privateKey = keypair.secretKey.slice(0, 32); - // Sign the message using nobleEd25519 - const signature = nobleEd25519.sign(messageBytes, privateKey); + try { + // Sign the message using nobleEd25519 + const signature = nobleEd25519.sign(messageBytes, privateKey); - // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair. - // Clients can verify the signature returned. + // Note: Signature verification is skipped for performance. The signature will always be valid if signing succeeds with a valid keypair. + // Clients can verify the signature returned. - signatureHex = TKHQ.uint8arrayToHexString(signature); + signatureHex = TKHQ.uint8arrayToHexString(signature); + } finally { + // SECURITY: Zero the private key slice immediately after use. + privateKey.fill(0); + } } else { TKHQ.sendMessageUp("ERROR", "unsupported message type", requestId); @@ -314,6 +409,12 @@ async function onSignMessage(requestId, serializedMessage, address) { async function onClearEmbeddedPrivateKey(requestId, address) { // If no address is provided, clear all keys if (!address) { + // SECURITY: Zero all Uint8Array buffers before releasing references. + // `delete` and reassignment only remove the JS reference — the underlying + // memory isn't wiped and will persist until GC reclaims it. + for (const key of Object.keys(inMemoryKeys)) { + zeroKeyEntry(inMemoryKeys[key]); + } inMemoryKeys = {}; TKHQ.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED", true, requestId); @@ -333,7 +434,8 @@ async function onClearEmbeddedPrivateKey(requestId, address) { return; } - // Clear the specific key from memory + // SECURITY: Zero sensitive buffers before deleting the entry. + zeroKeyEntry(inMemoryKeys[address]); delete inMemoryKeys[address]; TKHQ.sendMessageUp("EMBEDDED_PRIVATE_KEY_CLEARED", true, requestId); @@ -354,17 +456,33 @@ async function onSetEmbeddedKeyOverride( bundle, HpkeDecrypt ) { - // Decrypt the private key using the iframe's embedded key. - // The decrypted payload is a raw 32-byte P-256 private key scalar. - const keyBytes = await decryptBundle(bundle, organizationId, HpkeDecrypt); - - // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto) - const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes)); - - // Store in module-level variable (memory only) - injectedEmbeddedKey = keyJwk; - - TKHQ.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET", true, requestId); + let keyBytes = null; + try { + // Decrypt the private key using the iframe's embedded key. + // The decrypted payload is a raw 32-byte P-256 private key scalar. + const decrypted = await decryptBundle(bundle, organizationId, HpkeDecrypt); + keyBytes = + decrypted instanceof Uint8Array ? decrypted : new Uint8Array(decrypted); + + // Convert raw P-256 bytes to a full JWK (derives public key via WebCrypto) + const keyJwk = await rawP256PrivateKeyToJwk(new Uint8Array(keyBytes)); + + // Store in module-level variable (memory only) + injectedEmbeddedKey = keyJwk; + + TKHQ.sendMessageUp("EMBEDDED_KEY_OVERRIDE_SET", true, requestId); + } catch (e) { + // SECURITY: Ensure the injected key is cleared on any error path. + // If decryption or JWK conversion partially succeeded before throwing, + // we must not leave stale key material in the module variable. + injectedEmbeddedKey = null; + throw e; + } finally { + // SECURITY: Zero decrypted key bytes on all paths once we've derived the JWK. + if (keyBytes) { + keyBytes.fill(0); + } + } } /** @@ -444,15 +562,22 @@ async function rawP256PrivateKeyToJwk(rawPrivateKeyBytes) { pkcs8.set(pkcs8Prefix); pkcs8.set(rawPrivateKeyBytes, pkcs8Prefix.length); - const cryptoKey = await crypto.subtle.importKey( - "pkcs8", - pkcs8, - { name: "ECDH", namedCurve: "P-256" }, - true, - ["deriveBits"] - ); + try { + const cryptoKey = await crypto.subtle.importKey( + "pkcs8", + pkcs8, + { name: "ECDH", namedCurve: "P-256" }, + true, + ["deriveBits"] + ); - return await crypto.subtle.exportKey("jwk", cryptoKey); + return await crypto.subtle.exportKey("jwk", cryptoKey); + } finally { + // SECURITY: Zero intermediate buffers that contain private key material. + // The PKCS#8 wrapper embeds the raw scalar, so both must be wiped. + pkcs8.fill(0); + rawPrivateKeyBytes.fill(0); + } } /** @@ -471,6 +596,8 @@ export function getKeyNotFoundErrorMessage(keyAddress) { */ function clearExpiredKey(keyAddress) { if (inMemoryKeys[keyAddress]) { + // SECURITY: Zero sensitive Uint8Array buffers before releasing the reference. + zeroKeyEntry(inMemoryKeys[keyAddress]); delete inMemoryKeys[keyAddress]; } } @@ -614,6 +741,18 @@ function addDOMEventListeners() { */ function initMessageEventListener(HpkeDecrypt) { return async function messageEventListener(event) { + // SECURITY: Validate event.origin against the allowlist captured at init time. + // Without this check, any page that can obtain a reference to this iframe's + // window (e.g. via window.frames) could inject messages and trigger key + // operations. We skip validation only if allowedOrigin hasn't been set yet + // (i.e. during the initial handshake itself). + if (allowedOrigin && event.origin && event.origin !== allowedOrigin) { + TKHQ.logMessage( + `⚠️ Rejected message from unexpected origin: ${event.origin} (expected: ${allowedOrigin})` + ); + return; + } + if (event.data && event.data["type"] == "INJECT_KEY_EXPORT_BUNDLE") { TKHQ.logMessage( `⬇️ Received message ${event.data["type"]}: ${event.data["value"]}, ${event.data["keyFormat"]}, ${event.data["organizationId"]}` @@ -769,6 +908,12 @@ export function initEventHandlers(HpkeDecrypt) { event.data["type"] == "TURNKEY_INIT_MESSAGE_CHANNEL" && event.ports?.[0] ) { + // SECURITY: Capture the parent origin from the init handshake. + // This is used both for origin validation on incoming messages and + // as the targetOrigin for legacy postMessage responses (instead of "*"). + allowedOrigin = event.origin; + TKHQ.setParentOrigin(event.origin); + // remove the message event listener that was added in the DOMContentLoaded event messageListenerController.abort(); diff --git a/export-and-sign/src/turnkey-core.js b/export-and-sign/src/turnkey-core.js index 8c79de7..c1494f3 100644 --- a/export-and-sign/src/turnkey-core.js +++ b/export-and-sign/src/turnkey-core.js @@ -3,6 +3,32 @@ import * as nobleHashes from "@noble/hashes/sha512"; import { fromDerSignature } from "@turnkey/crypto"; import * as SharedTKHQ from "@shared/turnkey-core.js"; +/** + * Constant-time string comparison to prevent timing side-channel attacks. + * See event-handlers.js for detailed rationale. + * @param {string} a + * @param {string} b + * @returns {boolean} + */ +function timingSafeEqual(a, b) { + const enc = new TextEncoder(); + const aBuf = enc.encode(a); + const bBuf = enc.encode(b); + if (aBuf.length !== bBuf.length) { + let diff = 1; + const len = Math.min(aBuf.length, bBuf.length); + for (let i = 0; i < len; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return false; + } + let diff = 0; + for (let i = 0; i < aBuf.length; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return diff === 0; +} + const { initEmbeddedKey: sharedInitEmbeddedKey, generateTargetKey, @@ -28,6 +54,8 @@ const { validateStyles, isDoublyIframed, loadQuorumKey, + setParentOrigin, + getParentOrigin, } = SharedTKHQ; /** @@ -84,7 +112,14 @@ async function verifyEnclaveSignature( ); } - if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) { + // SECURITY: Use constant-time comparison to prevent timing side-channel + // attacks that could leak the enclave quorum public key byte-by-byte. + if ( + !timingSafeEqual( + enclaveQuorumPublic, + TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY + ) + ) { throw new Error( `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.` ); @@ -177,4 +212,6 @@ export const TKHQ = { getSettings, setSettings, parsePrivateKey, + setParentOrigin, + getParentOrigin, }; diff --git a/import/dist/551.bundle.08061863f4b2493743cb.js b/import/dist/551.bundle.08061863f4b2493743cb.js new file mode 100644 index 0000000..4528865 --- /dev/null +++ b/import/dist/551.bundle.08061863f4b2493743cb.js @@ -0,0 +1,3 @@ +/*! For license information please see 551.bundle.08061863f4b2493743cb.js.LICENSE.txt */ +"use strict";(self.webpackChunkimport=self.webpackChunkimport||[]).push([[551],{275:(e,t,r)=>{r.d(t,{Di:()=>W,FZ:()=>T,MO:()=>C,P2:()=>_,Rx:()=>J,Sb:()=>K,Tn:()=>L,VU:()=>U,Wq:()=>G,Y$:()=>B,ZX:()=>Y,Z_:()=>Z,b6:()=>I,fX:()=>R,fw:()=>N,g8:()=>M,jr:()=>F,mt:()=>$,oc:()=>D,y3:()=>q});var n=r(343);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function a(){var e=f(),t=e.m(a),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function p(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,i(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(a=function(){return{wrap:function(t,r,n,o){return e.w(p(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new d(e,t)},AsyncIterator:s,async:function(e,t,r,o,a){return(n(t)?l:c)(p(e),t,r,o,a)},keys:u,values:i}})()}function i(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function u(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function c(e,t,r,n,o){var a=l(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function l(e,t,r,n,o){return new s(f().w(e,t,r,n),o||Promise)}function s(e,t){function r(n,o,a,i){try{var u=e[n](o),c=u.value;return c instanceof d?t.resolve(c.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(c).then(function(e){u.value=e,a(u)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(p(s.prototype),p(s.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function f(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var c=n&&n.prototype instanceof u?n:u,l=Object.create(c.prototype);return p(l,"_invoke",function(r,n,o){var a,u,c,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,u=0,c=e,p.n=r,i}};function d(r,n){for(u=r,c=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(c=a[(u=a[4])?5:(u=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,u=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),u=s,c=y;(t=u<2?e:c)||!f;){a||(u?u<3?(u>1&&(p.n=-1),d(u,c)):p.n=c:p.v=c);try{if(l=2,a){if(u||(o="next"),t=a[o]){if(!(t=t.call(a,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=a.return)&&t.call(a),u<2&&(c=TypeError("The iterator does not provide a '"+o+"' method"),u=1);a=e}else if((t=(f=p.n<0)?c:r.call(n,p))!==i)break}catch(t){a=e,u=1,c=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function u(){}function c(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=l.prototype=u.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,p(e,o,"GeneratorFunction")),e.prototype=Object.create(d),e}return c.prototype=l,p(d,"constructor",l),p(l,"constructor",c),c.displayName="GeneratorFunction",p(l,o,"GeneratorFunction"),p(d),p(d,o,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function p(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}p=function(e,t,r,n){function a(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},p(e,t,r,n)}function d(e,t){this.v=e,this.k=t}function y(e){return function(e){if(Array.isArray(e))return v(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||b(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function b(e,t){if(e){if("string"==typeof e)return v(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?v(e,t):void 0}}function v(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(y(n),y(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i0;){var u=r[i];a=(u=void 0===u?a:58*u+a)>>8,r[i]=u%256,i++}}var c=n.concat(r.reverse());return new Uint8Array(c)}function L(e){return X.apply(this,arguments)}function X(){return(X=m(a().mark(function e(t){var r,n,o,i,u,c,l,s,f;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!((r=J(t)).length<5)){e.next=3;break}throw new Error("invalid base58check length: expected at least 5 bytes, got ".concat(r.length));case 3:if(n=r.subarray(0,r.length-4),o=r.subarray(r.length-4),i=O()){e.next=8;break}throw new Error("WebCrypto subtle API is unavailable");case 8:return e.next=10,i.digest("SHA-256",n);case 10:return u=e.sent,c=new Uint8Array(u),e.next=14,i.digest("SHA-256",c);case 14:if(l=e.sent,s=new Uint8Array(l),f=s.subarray(0,4),0===(o[0]^f[0]|o[1]^f[1]|o[2]^f[2]|o[3]^f[3])){e.next=20;break}throw new Error("invalid base58check checksum");case 20:return e.abrupt("return",n);case 21:case"end":return e.stop()}},e)}))).apply(this,arguments)}function q(e,t){return z.apply(this,arguments)}function z(){return(z=m(a().mark(function e(t,r){var o,i,u,c,l,s,f,p,d,y,b,v,h;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:e.t0=r,e.next="SOLANA"===e.t0?3:"HEXADECIMAL"===e.t0?7:"BITCOIN_MAINNET_WIF"===e.t0?10:"BITCOIN_TESTNET_WIF"===e.t0?22:"SUI_BECH32"===e.t0?34:45;break;case 3:if(64===(o=J(t)).length){e.next=6;break}throw new Error("invalid key length. Expected 64 bytes. Got ".concat(o.length,"."));case 6:return e.abrupt("return",o.subarray(0,32));case 7:if(!t.startsWith("0x")){e.next=9;break}return e.abrupt("return",G(t.slice(2)));case 9:case 48:return e.abrupt("return",G(t));case 10:return e.next=12,L(t);case 12:if(i=e.sent,u=i[0],c=i.subarray(1),128===u){e.next=17;break}throw new Error("invalid WIF version byte: ".concat(u,". Expected 0x80 (mainnet)."));case 17:if(32!==c.length){e.next=19;break}throw new Error("uncompressed WIF keys not supported");case 19:if(33===c.length&&1===c[32]){e.next=21;break}throw new Error("invalid WIF format: expected compressed private key");case 21:return e.abrupt("return",c.subarray(0,32));case 22:return e.next=24,L(t);case 24:if(l=e.sent,s=l[0],f=l.subarray(1),239===s){e.next=29;break}throw new Error("invalid WIF version byte: ".concat(s,". Expected 0xEF (testnet)."));case 29:if(32!==f.length){e.next=31;break}throw new Error("uncompressed WIF keys not supported");case 31:if(33===f.length&&1===f[32]){e.next=33;break}throw new Error("invalid WIF format: expected compressed private key");case 33:return e.abrupt("return",f.subarray(0,32));case 34:if(p=n.I.decode(t),d=p.prefix,y=p.words,"suiprivkey"===d){e.next=37;break}throw new Error('invalid SUI private key human-readable part (HRP): expected "suiprivkey"');case 37:if(33===(b=n.I.fromWords(y)).length){e.next=40;break}throw new Error("invalid SUI private key length: expected 33 bytes, got ".concat(b.length));case 40:if(v=b[0],h=b.slice(1),0===v){e.next=44;break}throw new Error("invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.");case 44:return e.abrupt("return",new Uint8Array(h));case 45:if(console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),!t.startsWith("0x")){e.next=48;break}return e.abrupt("return",G(t.slice(2)));case 49:case"end":return e.stop()}},e)}))).apply(this,arguments)}function Z(e,t){var r={},n={padding:"^(\\d+(px|em|%|rem) ?){1,4}$",margin:"^(\\d+(px|em|%|rem) ?){1,4}$",borderWidth:"^(\\d+(px|em|rem) ?){1,4}$",borderStyle:"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$",borderColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",borderRadius:"^(\\d+(px|em|%|rem) ?){1,4}$",fontSize:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$",fontWeight:"^(normal|bold|bolder|lighter|\\d{3})$",fontFamily:'^[^";<>]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,u=[],c=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;c=!1}else for(;!(c=(n=a.call(r)).done)&&(u.push(n.value),u.length!==t);c=!0);}catch(e){l=!0,o=e}finally{try{if(!c&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return u}}(t,o)||b(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],u=a[1],c=i.trim();if(0===c.length)throw new Error("css style property cannot be empty");var l=n[c];if(!l)throw new Error('invalid or unsupported css style property: "'.concat(c,'"'));var s=new RegExp(l),f=u.trim();if(0==f.length)throw new Error('css style for "'.concat(c,'" is empty'));if(!s.test(f))throw new Error('invalid css style value for property "'.concat(c,'"'));r[c]=f}),r}},482:(e,t,r)=>{r.r(t),r.d(t,{additionalAssociatedData:()=>E,applySettings:()=>I,base58CheckDecode:()=>h,base58Decode:()=>v,decodeKey:()=>m,fromDerSignature:()=>x,getSettings:()=>f,getTargetEmbeddedKey:()=>c,loadTargetKey:()=>u,normalizePadding:()=>g,resetTargetEmbeddedKey:()=>s,sendMessageUp:()=>d,setCryptoProvider:()=>i,setParentFrameMessageChannelPort:()=>w,setParentOrigin:()=>O,setSettings:()=>p,setTargetEmbeddedKey:()=>l,uint8arrayFromHexString:()=>y,uint8arrayToHexString:()=>b,validateStyles:()=>k,verifyEnclaveSignature:()=>S});var n=r(275);function o(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,u=[],c=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;c=!1}else for(;!(c=(n=a.call(r)).done)&&(u.push(n.value),u.length!==t);c=!0);}catch(e){l=!0,o=e}finally{try{if(!c&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return u}}(e,t)||function(e,t){if(e){if("string"==typeof e)return a(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?a(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function a(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r{r.d(t,{q:()=>g});var n=r(275),o=r(255);function a(e){return a="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},a(e)}function i(){var e=p(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function a(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,u(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,o){return e.w(a(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new y(e,t)},AsyncIterator:f,async:function(e,t,r,o,i){return(n(t)?s:l)(a(e),t,r,o,i)},keys:c,values:u}})()}function u(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(a(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function l(e,t,r,n,o){var a=s(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function s(e,t,r,n,o){return new f(p().w(e,t,r,n),o||Promise)}function f(e,t){function r(n,o,a,i){try{var u=e[n](o),c=u.value;return c instanceof y?t.resolve(c.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(c).then(function(e){u.value=e,a(u)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(d(f.prototype),d(f.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),d(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function p(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var c=n&&n.prototype instanceof u?n:u,l=Object.create(c.prototype);return d(l,"_invoke",function(r,n,o){var a,u,c,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,u=0,c=e,p.n=r,i}};function d(r,n){for(u=r,c=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(c=a[(u=a[4])?5:(u=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,u=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),u=s,c=y;(t=u<2?e:c)||!f;){a||(u?u<3?(u>1&&(p.n=-1),d(u,c)):p.n=c:p.v=c);try{if(l=2,a){if(u||(o="next"),t=a[o]){if(!(t=t.call(a,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=a.return)&&t.call(a),u<2&&(c=TypeError("The iterator does not provide a '"+o+"' method"),u=1);a=e}else if((t=(f=p.n<0)?c:r.call(n,p))!==i)break}catch(t){a=e,u=1,c=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function u(){}function c(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(d(t={},n,function(){return this}),t),f=l.prototype=u.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,d(e,o,"GeneratorFunction")),e.prototype=Object.create(f),e}return c.prototype=l,d(f,"constructor",l),d(l,"constructor",c),c.displayName="GeneratorFunction",d(l,o,"GeneratorFunction"),d(f),d(f,o,"Generator"),d(f,n,function(){return this}),d(f,"toString",function(){return"[object Generator]"}),(p=function(){return{w:a,m:y}})()}function d(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}d=function(e,t,r,n){function a(t,r){d(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},d(e,t,r,n)}function y(e,t){this.v=e,this.k=t}function b(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function v(e){for(var t=1;t 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Stores the parent frame's origin, captured from the init postMessage event.\n * This is used as the targetOrigin for legacy postMessage calls to prevent\n * messages from being delivered to unintended recipients.\n * @param {string} origin\n */\nfunction setParentOrigin(origin) {\n parentOrigin = origin;\n}\n\n/**\n * Returns the stored parent origin.\n * @returns {string|null}\n */\nfunction getParentOrigin() {\n return parentOrigin;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n // SECURITY: Use constant-time comparison to prevent timing side-channel\n // attacks that could leak the enclave quorum public key byte-by-byte.\n if (\n !timingSafeEqual(\n enclaveQuorumPublic,\n TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY\n )\n ) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions (= v2.1.0).\n // For older iframe-stamper versions that never send TURNKEY_INIT_MESSAGE_CHANNEL,\n // parentOrigin remains null and we must fall back to \"*\" for backwards compatibility.\n const targetOrigin = parentOrigin || \"*\";\n window.parent.postMessage(\n {\n type: type,\n value: value,\n },\n targetOrigin\n );\n }\n logMessage(`⬆️ Sent message ${type}: ${value}`);\n}\n\n/**\n * Function to log a message and persist it in the page's DOM.\n */\nfunction logMessage(content) {\n const messageLog = document.getElementById(\"message-log\");\n if (messageLog) {\n const message = document.createElement(\"p\");\n message.innerText = content;\n messageLog.appendChild(message);\n }\n}\n\n/**\n * Convert a JSON Web Key private key to a public key and export the public\n * key in raw format.\n * @return {Uint8array}\n */\nasync function p256JWKPrivateToPublic(jwkPrivate) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n // make a copy so we don't modify the underlying object\n const jwkPrivateCopy = { ...jwkPrivate };\n // change jwk so it will be imported as a public key\n delete jwkPrivateCopy.d;\n jwkPrivateCopy.key_ops = [\"verify\"];\n\n const publicKey = await subtle.importKey(\n \"jwk\",\n jwkPrivateCopy,\n { name: \"ECDSA\", namedCurve: \"P-256\" },\n true,\n [\"verify\"]\n );\n const buffer = await subtle.exportKey(\"raw\", publicKey);\n return new Uint8Array(buffer);\n}\n\n/**\n * Encodes a buffer into a base58-encoded string.\n * @param {Uint8Array} bytes The buffer to encode.\n * @return {string} The base58-encoded string.\n */\nfunction base58Encode(bytes) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n const alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n let result = \"\";\n let digits = [0];\n for (let i = 0; i < bytes.length; i++) {\n let carry = bytes[i];\n for (let j = 0; j < digits.length; ++j) {\n carry += digits[j] << 8;\n digits[j] = carry % 58;\n carry = (carry / 58) | 0;\n }\n\n while (carry > 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n setParentOrigin,\n getParentOrigin,\n};\n","import * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n setParentOrigin,\n} = SharedTKHQ;\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n const settingsObj = JSON.parse(settings);\n\n const passphraseLabel = document.getElementById(\"passphrase-label\");\n const mnemonicLabel = document.getElementById(\"mnemonic-label\");\n const passphraseTextarea = document.getElementById(\"passphrase\");\n\n if (!passphraseLabel || !passphraseTextarea) {\n throw new Error(\"no passphrase HTML elements found to apply settings to.\");\n }\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) {\n throw new Error(\n \"no plaintext textarea HTML element found to apply settings to.\"\n );\n }\n\n // Apply enablePassphrase setting\n if (settingsObj.enablePassphrase === true) {\n passphraseLabel.style.display = \"inline-block\";\n passphraseTextarea.style.display = \"inline-block\";\n passphraseTextarea.style.border = \"solid 1px #ccc\";\n passphraseTextarea.style.borderRadius = \"4px\";\n\n mnemonicLabel.style.display = \"inline-block\";\n plaintextTextarea.style.border = \"solid 1px #ccc\";\n plaintextTextarea.style.borderRadius = \"4px\";\n\n validSettings[\"enablePassphrase\"] = true;\n } else {\n passphraseLabel.style.display = \"none\";\n passphraseTextarea.style.display = \"none\";\n mnemonicLabel.style.display = \"none\";\n\n plaintextTextarea.style.border = \"none\";\n validSettings[\"enablePassphrase\"] = false;\n }\n\n if (settingsObj.styles) {\n // Validate, sanitize, and apply the styles to the \"plaintext\" textarea.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n plaintextTextarea.style[key] = value;\n });\n\n if (validStyles.backgroundColor) {\n // Apply background color to document and body as well.\n document.documentElement.style.backgroundColor =\n validStyles.backgroundColor;\n document.body.style.backgroundColor = validStyles.backgroundColor;\n }\n\n if (validStyles.labelColor) {\n document.getElementById(\"mnemonic-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"styles\"] = validStyles;\n }\n\n if (settingsObj.passphraseStyles) {\n // Validate, sanitize, and apply the styles to the \"passphrase\" textarea.\n const validStyles = validateStyles(settingsObj.passphraseStyles);\n Object.entries(validStyles).forEach(([key, value]) => {\n passphraseTextarea.style[key] = value;\n });\n\n if (validStyles.labelColor) {\n document.getElementById(\"passphrase-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"passphraseStyles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n setParentOrigin,\n applySettings,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n"],"names":["e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","timingSafeEqual","b","enc","TextEncoder","aBuf","encode","bBuf","len","Math","min","diff","TURNKEY_TARGET_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","parentOrigin","cryptoProviderOverride","getSubtleCrypto","subtle","globalThis","crypto","window","global","setCryptoProvider","cryptoProvider","loadQuorumKey","_x","_loadQuorumKey","_regeneratorRuntime","mark","_callee","quorumPublic","wrap","_context","prev","next","Error","importKey","namedCurve","abrupt","sent","stop","loadTargetKey","_x2","_loadTargetKey","_callee2","targetPublic","targetKey","_context2","exportKey","getTargetEmbeddedKey","jwtKey","localStorage","getItem","JSON","parse","setTargetEmbeddedKey","setItem","stringify","resetTargetEmbeddedKey","removeItem","setParentFrameMessageChannelPort","port","setParentOrigin","origin","getSettings","settings","setSettings","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","normalizePadding","byteArray","targetLength","paddingLength","padding","fill","concat","expectedZeroCount","zeroCount","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","fromDerSignature","derSignature","derSignatureBuf","index","rLength","sLength","rPadded","sPadded","verifyEnclaveSignature","_x3","_x4","_x5","_verifyEnclaveSignature","_callee5","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context5","prod","preprod","__TURNKEY_SIGNER_ENVIRONMENT__","undefined","verify","hash","sendMessageUp","type","requestId","message","postMessage","parent","targetOrigin","content","messageLog","document","getElementById","createElement","innerText","appendChild","logMessage","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","carry","push","j","currentByte","result","reverse","base58CheckDecode","_x7","_base58CheckDecode","_callee7","decoded","payload","checksum","hash1Buf","hash1","hash2Buf","hash2","computedChecksum","_context7","subarray","digest","decodeKey","_x8","_x9","_decodeKey","_callee8","privateKey","keyFormat","decodedKeyBytes","version","keyAndFlags","_payload","_version","_keyAndFlags","_bech32$decode","prefix","words","bytes","schemeFlag","privkey","_context8","t0","bech32","decode","fromWords","console","warn","validateStyles","styles","element","validStyles","cssValidationRegex","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","SharedTKHQ","applySettings","validSettings","settingsObj","passphraseLabel","mnemonicLabel","passphraseTextarea","plaintextTextarea","enablePassphrase","style","display","border","_slicedToArray","key","documentElement","body","passphraseStyles","_ref3","_ref4","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_objectSpread","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","HpkeEncrypt","_HpkeEncrypt","plaintextBuf","receiverPubJwk","kemContext","receiverPub","suite","senderCtx","receiverPubCryptoKey","receiverPubRaw","encappedKeyBuf","aad","ciphertextBuf","ciphertextHex","encappedKeyBufHex","encryptedBundle","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createSenderContext","recipientPublicKey","info","seal","encappedPublic","ciphertext"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/551.bundle.27da59437a4e403e3c24.js b/import/dist/551.bundle.27da59437a4e403e3c24.js deleted file mode 100644 index 42c6ce2..0000000 --- a/import/dist/551.bundle.27da59437a4e403e3c24.js +++ /dev/null @@ -1,3 +0,0 @@ -/*! For license information please see 551.bundle.27da59437a4e403e3c24.js.LICENSE.txt */ -"use strict";(self.webpackChunkimport=self.webpackChunkimport||[]).push([[551],{275:(e,t,r)=>{r.d(t,{Di:()=>$,FZ:()=>A,MO:()=>_,P2:()=>T,Rx:()=>B,Sb:()=>G,Tn:()=>H,VU:()=>N,Wq:()=>F,Y$:()=>R,ZX:()=>M,Z_:()=>X,b6:()=>k,fX:()=>D,fw:()=>P,g8:()=>W,mt:()=>C,oc:()=>U,y3:()=>J});var n=r(343);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function a(){var e=f(),t=e.m(a),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function p(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,i(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(a=function(){return{wrap:function(t,r,n,o){return e.w(p(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new d(e,t)},AsyncIterator:s,async:function(e,t,r,o,a){return(n(t)?l:c)(p(e),t,r,o,a)},keys:u,values:i}})()}function i(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function u(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function c(e,t,r,n,o){var a=l(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function l(e,t,r,n,o){return new s(f().w(e,t,r,n),o||Promise)}function s(e,t){function r(n,o,a,i){try{var u=e[n](o),c=u.value;return c instanceof d?t.resolve(c.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(c).then(function(e){u.value=e,a(u)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(p(s.prototype),p(s.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function f(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var c=n&&n.prototype instanceof u?n:u,l=Object.create(c.prototype);return p(l,"_invoke",function(r,n,o){var a,u,c,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,u=0,c=e,p.n=r,i}};function d(r,n){for(u=r,c=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(c=a[(u=a[4])?5:(u=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,u=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),u=s,c=y;(t=u<2?e:c)||!f;){a||(u?u<3?(u>1&&(p.n=-1),d(u,c)):p.n=c:p.v=c);try{if(l=2,a){if(u||(o="next"),t=a[o]){if(!(t=t.call(a,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=a.return)&&t.call(a),u<2&&(c=TypeError("The iterator does not provide a '"+o+"' method"),u=1);a=e}else if((t=(f=p.n<0)?c:r.call(n,p))!==i)break}catch(t){a=e,u=1,c=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function u(){}function c(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=l.prototype=u.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,p(e,o,"GeneratorFunction")),e.prototype=Object.create(d),e}return c.prototype=l,p(d,"constructor",l),p(l,"constructor",c),c.displayName="GeneratorFunction",p(l,o,"GeneratorFunction"),p(d),p(d,o,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(f=function(){return{w:a,m:y}})()}function p(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}p=function(e,t,r,n){function a(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},p(e,t,r,n)}function d(e,t){this.v=e,this.k=t}function y(e){return function(e){if(Array.isArray(e))return v(e)}(e)||function(e){if("undefined"!=typeof Symbol&&null!=e[Symbol.iterator]||null!=e["@@iterator"])return Array.from(e)}(e)||b(e)||function(){throw new TypeError("Invalid attempt to spread non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function b(e,t){if(e){if("string"==typeof e)return v(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?v(e,t):void 0}}function v(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r0){var n=new Uint8Array(r).fill(0);return new Uint8Array([].concat(y(n),y(e)))}if(r<0){for(var o=-1*r,a=0,i=0;i0;){var u=r[i];a=(u=void 0===u?a:58*u+a)>>8,r[i]=u%256,i++}}var c=n.concat(r.reverse());return new Uint8Array(c)}function H(e){return Y.apply(this,arguments)}function Y(){return(Y=m(a().mark(function e(t){var r,n,o,i,u,c,l,s,f;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!((r=B(t)).length<5)){e.next=3;break}throw new Error("invalid base58check length: expected at least 5 bytes, got ".concat(r.length));case 3:if(n=r.subarray(0,r.length-4),o=r.subarray(r.length-4),i=S()){e.next=8;break}throw new Error("WebCrypto subtle API is unavailable");case 8:return e.next=10,i.digest("SHA-256",n);case 10:return u=e.sent,c=new Uint8Array(u),e.next=14,i.digest("SHA-256",c);case 14:if(l=e.sent,s=new Uint8Array(l),f=s.subarray(0,4),0===(o[0]^f[0]|o[1]^f[1]|o[2]^f[2]|o[3]^f[3])){e.next=20;break}throw new Error("invalid base58check checksum");case 20:return e.abrupt("return",n);case 21:case"end":return e.stop()}},e)}))).apply(this,arguments)}function J(e,t){return L.apply(this,arguments)}function L(){return(L=m(a().mark(function e(t,r){var o,i,u,c,l,s,f,p,d,y,b,v,h;return a().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:e.t0=r,e.next="SOLANA"===e.t0?3:"HEXADECIMAL"===e.t0?7:"BITCOIN_MAINNET_WIF"===e.t0?10:"BITCOIN_TESTNET_WIF"===e.t0?22:"SUI_BECH32"===e.t0?34:45;break;case 3:if(64===(o=B(t)).length){e.next=6;break}throw new Error("invalid key length. Expected 64 bytes. Got ".concat(o.length,"."));case 6:return e.abrupt("return",o.subarray(0,32));case 7:if(!t.startsWith("0x")){e.next=9;break}return e.abrupt("return",F(t.slice(2)));case 9:case 48:return e.abrupt("return",F(t));case 10:return e.next=12,H(t);case 12:if(i=e.sent,u=i[0],c=i.subarray(1),128===u){e.next=17;break}throw new Error("invalid WIF version byte: ".concat(u,". Expected 0x80 (mainnet)."));case 17:if(32!==c.length){e.next=19;break}throw new Error("uncompressed WIF keys not supported");case 19:if(33===c.length&&1===c[32]){e.next=21;break}throw new Error("invalid WIF format: expected compressed private key");case 21:return e.abrupt("return",c.subarray(0,32));case 22:return e.next=24,H(t);case 24:if(l=e.sent,s=l[0],f=l.subarray(1),239===s){e.next=29;break}throw new Error("invalid WIF version byte: ".concat(s,". Expected 0xEF (testnet)."));case 29:if(32!==f.length){e.next=31;break}throw new Error("uncompressed WIF keys not supported");case 31:if(33===f.length&&1===f[32]){e.next=33;break}throw new Error("invalid WIF format: expected compressed private key");case 33:return e.abrupt("return",f.subarray(0,32));case 34:if(p=n.I.decode(t),d=p.prefix,y=p.words,"suiprivkey"===d){e.next=37;break}throw new Error('invalid SUI private key human-readable part (HRP): expected "suiprivkey"');case 37:if(33===(b=n.I.fromWords(y)).length){e.next=40;break}throw new Error("invalid SUI private key length: expected 33 bytes, got ".concat(b.length));case 40:if(v=b[0],h=b.slice(1),0===v){e.next=44;break}throw new Error("invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.");case 44:return e.abrupt("return",new Uint8Array(h));case 45:if(console.warn("invalid key format: ".concat(r,". Defaulting to HEXADECIMAL.")),!t.startsWith("0x")){e.next=48;break}return e.abrupt("return",F(t.slice(2)));case 49:case"end":return e.stop()}},e)}))).apply(this,arguments)}function X(e,t){var r={},n={padding:"^(\\d+(px|em|%|rem) ?){1,4}$",margin:"^(\\d+(px|em|%|rem) ?){1,4}$",borderWidth:"^(\\d+(px|em|rem) ?){1,4}$",borderStyle:"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$",borderColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",borderRadius:"^(\\d+(px|em|%|rem) ?){1,4}$",fontSize:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$",fontWeight:"^(normal|bold|bolder|lighter|\\d{3})$",fontFamily:'^[^";<>]*$',color:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",labelColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",backgroundColor:"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)|hsla?\\(\\d{1,3}, \\d{1,3}%, \\d{1,3}%(, \\d?(\\.\\d{1,2})?)?\\))$",width:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",height:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$",maxWidth:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",maxHeight:"^(\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$",lineHeight:"^(\\d+(\\.\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$",boxShadow:"^(none|(\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\(\\d{1,3}, \\d{1,3}, \\d{1,3}(, \\d?(\\.\\d{1,2})?)?\\)) ?(inset)?)$",textAlign:"^(left|right|center|justify|initial|inherit)$",overflowWrap:"^(normal|break-word|anywhere)$",wordWrap:"^(normal|break-word)$",resize:"^(none|both|horizontal|vertical|block|inline)$"};return Object.entries(e).forEach(function(e){var t,o,a=(o=2,function(e){if(Array.isArray(e))return e}(t=e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,u=[],c=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;c=!1}else for(;!(c=(n=a.call(r)).done)&&(u.push(n.value),u.length!==t);c=!0);}catch(e){l=!0,o=e}finally{try{if(!c&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return u}}(t,o)||b(t,o)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()),i=a[0],u=a[1],c=i.trim();if(0===c.length)throw new Error("css style property cannot be empty");var l=n[c];if(!l)throw new Error('invalid or unsupported css style property: "'.concat(c,'"'));var s=new RegExp(l),f=u.trim();if(0==f.length)throw new Error('css style for "'.concat(c,'" is empty'));if(!s.test(f))throw new Error('invalid css style value for property "'.concat(c,'"'));r[c]=f}),r}},482:(e,t,r)=>{r.r(t),r.d(t,{additionalAssociatedData:()=>E,applySettings:()=>O,base58CheckDecode:()=>h,base58Decode:()=>v,decodeKey:()=>m,fromDerSignature:()=>x,getSettings:()=>f,getTargetEmbeddedKey:()=>c,loadTargetKey:()=>u,normalizePadding:()=>g,resetTargetEmbeddedKey:()=>s,sendMessageUp:()=>d,setCryptoProvider:()=>i,setParentFrameMessageChannelPort:()=>w,setSettings:()=>p,setTargetEmbeddedKey:()=>l,uint8arrayFromHexString:()=>y,uint8arrayToHexString:()=>b,validateStyles:()=>k,verifyEnclaveSignature:()=>S});var n=r(275);function o(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var r=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(null!=r){var n,o,a,i,u=[],c=!0,l=!1;try{if(a=(r=r.call(e)).next,0===t){if(Object(r)!==r)return;c=!1}else for(;!(c=(n=a.call(r)).done)&&(u.push(n.value),u.length!==t);c=!0);}catch(e){l=!0,o=e}finally{try{if(!c&&null!=r.return&&(i=r.return(),Object(i)!==i))return}finally{if(l)throw o}}return u}}(e,t)||function(e,t){if(e){if("string"==typeof e)return a(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?a(e,t):void 0}}(e,t)||function(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}()}function a(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r{r.d(t,{q:()=>g});var n=r(275),o=r(255);function a(e){return a="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},a(e)}function i(){var e=p(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var o={throw:1,return:2,break:3,continue:3};function a(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,o[e],t)},delegateYield:function(e,o,a){return t.resultName=o,r(n.d,u(e),a)},finish:function(e){return r(n.f,e)}},r=function(e,r,o){n.p=t.prev,n.n=t.next;try{return e(r,o)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,o){return e.w(a(t),r,n,o&&o.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new y(e,t)},AsyncIterator:f,async:function(e,t,r,o,i){return(n(t)?s:l)(a(e),t,r,o,i)},keys:c,values:u}})()}function u(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(a(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function l(e,t,r,n,o){var a=s(e,t,r,n,o);return a.next().then(function(e){return e.done?e.value:a.next()})}function s(e,t,r,n,o){return new f(p().w(e,t,r,n),o||Promise)}function f(e,t){function r(n,o,a,i){try{var u=e[n](o),c=u.value;return c instanceof y?t.resolve(c.v).then(function(e){r("next",e,a,i)},function(e){r("throw",e,a,i)}):t.resolve(c).then(function(e){u.value=e,a(u)},function(e){return r("throw",e,a,i)})}catch(e){i(e)}}var n;this.next||(d(f.prototype),d(f.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),d(this,"_invoke",function(e,o,a){function i(){return new t(function(t,n){r(e,a,t,n)})}return n=n?n.then(i,i):i()},!0)}function p(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",o=r.toStringTag||"@@toStringTag";function a(r,n,o,a){var c=n&&n.prototype instanceof u?n:u,l=Object.create(c.prototype);return d(l,"_invoke",function(r,n,o){var a,u,c,l=0,s=o||[],f=!1,p={p:0,n:0,v:e,a:d,f:d.bind(e,4),d:function(t,r){return a=t,u=0,c=e,p.n=r,i}};function d(r,n){for(u=r,c=n,t=0;!f&&l&&!o&&t3?(o=y===n)&&(c=a[(u=a[4])?5:(u=3,3)],a[4]=a[5]=e):a[0]<=d&&((o=r<2&&dn||n>y)&&(a[4]=r,a[5]=n,p.n=y,u=0))}if(o||r>1)return i;throw f=!0,n}return function(o,s,y){if(l>1)throw TypeError("Generator is already running");for(f&&1===s&&d(s,y),u=s,c=y;(t=u<2?e:c)||!f;){a||(u?u<3?(u>1&&(p.n=-1),d(u,c)):p.n=c:p.v=c);try{if(l=2,a){if(u||(o="next"),t=a[o]){if(!(t=t.call(a,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=a.return)&&t.call(a),u<2&&(c=TypeError("The iterator does not provide a '"+o+"' method"),u=1);a=e}else if((t=(f=p.n<0)?c:r.call(n,p))!==i)break}catch(t){a=e,u=1,c=t}finally{l=1}}return{value:t,done:f}}}(r,o,a),!0),l}var i={};function u(){}function c(){}function l(){}t=Object.getPrototypeOf;var s=[][n]?t(t([][n]())):(d(t={},n,function(){return this}),t),f=l.prototype=u.prototype=Object.create(s);function y(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,l):(e.__proto__=l,d(e,o,"GeneratorFunction")),e.prototype=Object.create(f),e}return c.prototype=l,d(f,"constructor",l),d(l,"constructor",c),c.displayName="GeneratorFunction",d(l,o,"GeneratorFunction"),d(f),d(f,o,"Generator"),d(f,n,function(){return this}),d(f,"toString",function(){return"[object Generator]"}),(p=function(){return{w:a,m:y}})()}function d(e,t,r,n){var o=Object.defineProperty;try{o({},"",{})}catch(e){o=0}d=function(e,t,r,n){function a(t,r){d(e,t,function(e){return this._invoke(t,r,e)})}t?o?o(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(a("next",0),a("throw",1),a("return",2))},d(e,t,r,n)}function y(e,t){this.v=e,this.k=t}function b(e,t){var r=Object.keys(e);if(Object.getOwnPropertySymbols){var n=Object.getOwnPropertySymbols(e);t&&(n=n.filter(function(t){return Object.getOwnPropertyDescriptor(e,t).enumerable})),r.push.apply(r,n)}return r}function v(e){for(var t=1;t 1;\n } else {\n return window.parent !== window.top;\n }\n}\n\n/*\n * Loads the quorum public key as a CryptoKey.\n */\nasync function loadQuorumKey(quorumPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.importKey(\n \"raw\",\n quorumPublic,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n [\"verify\"]\n );\n}\n\n/*\n * Load a key to encrypt to as a CryptoKey and return it as a JSON Web Key.\n */\nasync function loadTargetKey(targetPublic) {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const targetKey = await subtle.importKey(\n \"raw\",\n targetPublic,\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n\n return await subtle.exportKey(\"jwk\", targetKey);\n}\n\n/**\n * Creates a new public/private key pair and persists it in localStorage\n */\nasync function initEmbeddedKey() {\n if (isDoublyIframed()) {\n throw new Error(\"Doubly iframed\");\n }\n const retrievedKey = await getEmbeddedKey();\n if (retrievedKey === null) {\n const targetKey = await generateTargetKey();\n setEmbeddedKey(targetKey);\n }\n // Nothing to do, key is correctly initialized!\n}\n\n/*\n * Generate a key to encrypt to and export it as a JSON Web Key.\n */\nasync function generateTargetKey() {\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n const p256key = await subtle.generateKey(\n {\n name: \"ECDH\",\n namedCurve: \"P-256\",\n },\n true,\n [\"deriveBits\"]\n );\n\n return await subtle.exportKey(\"jwk\", p256key.privateKey);\n}\n\n/**\n * Gets the current embedded private key JWK. Returns `null` if not found.\n */\nfunction getEmbeddedKey() {\n const jwtKey = getItemWithExpiry(TURNKEY_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the embedded private key JWK with the default expiration time.\n * @param {JsonWebKey} targetKey\n */\nfunction setEmbeddedKey(targetKey) {\n setItemWithExpiry(\n TURNKEY_EMBEDDED_KEY,\n JSON.stringify(targetKey),\n TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS\n );\n}\n\n/**\n * Gets the current target embedded private key JWK. Returns `null` if not found.\n */\nfunction getTargetEmbeddedKey() {\n const jwtKey = window.localStorage.getItem(TURNKEY_TARGET_EMBEDDED_KEY);\n return jwtKey ? JSON.parse(jwtKey) : null;\n}\n\n/**\n * Sets the target embedded public key JWK.\n * @param {JsonWebKey} targetKey\n */\nfunction setTargetEmbeddedKey(targetKey) {\n window.localStorage.setItem(\n TURNKEY_TARGET_EMBEDDED_KEY,\n JSON.stringify(targetKey)\n );\n}\n\n/**\n * Resets the current embedded private key JWK.\n */\nfunction onResetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY);\n window.localStorage.removeItem(TURNKEY_EMBEDDED_KEY_ORIGIN);\n}\n\n/**\n * Resets the current target embedded private key JWK.\n */\nfunction resetTargetEmbeddedKey() {\n window.localStorage.removeItem(TURNKEY_TARGET_EMBEDDED_KEY);\n}\n\nfunction setParentFrameMessageChannelPort(port) {\n parentFrameMessageChannelPort = port;\n}\n\n/**\n * Gets the current settings.\n */\nfunction getSettings() {\n const settings = window.localStorage.getItem(TURNKEY_SETTINGS);\n return settings ? JSON.parse(settings) : null;\n}\n\n/**\n * Sets the settings object.\n * @param {Object} settings\n */\nfunction setSettings(settings) {\n window.localStorage.setItem(TURNKEY_SETTINGS, JSON.stringify(settings));\n}\n\n/**\n * Set an item in localStorage with an expiration time\n * @param {string} key\n * @param {string} value\n * @param {number} ttl expiration time in milliseconds\n */\nfunction setItemWithExpiry(key, value, ttl) {\n const now = new Date();\n const item = {\n value: value,\n expiry: now.getTime() + ttl,\n };\n window.localStorage.setItem(key, JSON.stringify(item));\n}\n\n/**\n * Get an item from localStorage. Returns `null` and\n * removes the item from localStorage if expired or\n * expiry time is missing.\n * @param {string} key\n */\nfunction getItemWithExpiry(key) {\n const itemStr = window.localStorage.getItem(key);\n if (!itemStr) {\n return null;\n }\n const item = JSON.parse(itemStr);\n if (\n !Object.prototype.hasOwnProperty.call(item, \"expiry\") ||\n !Object.prototype.hasOwnProperty.call(item, \"value\")\n ) {\n window.localStorage.removeItem(key);\n return null;\n }\n const now = new Date();\n if (now.getTime() > item.expiry) {\n window.localStorage.removeItem(key);\n return null;\n }\n return item.value;\n}\n\n/**\n * Takes a hex string (e.g. \"e4567ab\" or \"0xe4567ab\") and returns an array buffer (Uint8Array)\n * @param {string} hexString - Hex string with or without \"0x\" prefix\n * @returns {Uint8Array}\n */\nfunction uint8arrayFromHexString(hexString) {\n if (!hexString || typeof hexString !== \"string\") {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n\n // Remove 0x prefix if present\n const hexWithoutPrefix =\n hexString.startsWith(\"0x\") || hexString.startsWith(\"0X\")\n ? hexString.slice(2)\n : hexString;\n\n var hexRegex = /^[0-9A-Fa-f]+$/;\n if (hexWithoutPrefix.length % 2 != 0 || !hexRegex.test(hexWithoutPrefix)) {\n throw new Error(\"cannot create uint8array from invalid hex string\");\n }\n return new Uint8Array(\n hexWithoutPrefix.match(/../g).map((h) => parseInt(h, 16))\n );\n}\n\n/**\n * Takes a Uint8Array and returns a hex string\n * @param {Uint8Array} buffer\n * @return {string}\n */\nfunction uint8arrayToHexString(buffer) {\n return [...buffer].map((x) => x.toString(16).padStart(2, \"0\")).join(\"\");\n}\n\n/**\n * Function to normalize padding of byte array with 0's to a target length\n */\nfunction normalizePadding(byteArray, targetLength) {\n const paddingLength = targetLength - byteArray.length;\n\n // Add leading 0's to array\n if (paddingLength > 0) {\n const padding = new Uint8Array(paddingLength).fill(0);\n return new Uint8Array([...padding, ...byteArray]);\n }\n\n // Remove leading 0's from array\n if (paddingLength < 0) {\n const expectedZeroCount = paddingLength * -1;\n let zeroCount = 0;\n for (let i = 0; i < expectedZeroCount && i < byteArray.length; i++) {\n if (byteArray[i] === 0) {\n zeroCount++;\n }\n }\n // Check if the number of zeros found equals the number of zeroes expected\n if (zeroCount !== expectedZeroCount) {\n throw new Error(\n `invalid number of starting zeroes. Expected number of zeroes: ${expectedZeroCount}. Found: ${zeroCount}.`\n );\n }\n return byteArray.slice(expectedZeroCount, expectedZeroCount + targetLength);\n }\n return byteArray;\n}\n\n/**\n * Additional Associated Data (AAD) in the format dictated by the enclave_encrypt crate.\n */\nfunction additionalAssociatedData(senderPubBuf, receiverPubBuf) {\n const s = Array.from(new Uint8Array(senderPubBuf));\n const r = Array.from(new Uint8Array(receiverPubBuf));\n return new Uint8Array([...s, ...r]);\n}\n\n/**\n * Converts an ASN.1 DER-encoded ECDSA signature to the raw format that WebCrypto uses.\n */\nfunction fromDerSignature(derSignature) {\n const derSignatureBuf = uint8arrayFromHexString(derSignature);\n\n // Check and skip the sequence tag (0x30)\n let index = 2;\n\n // Parse 'r' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for r\"\n );\n }\n index++; // Move past the INTEGER tag\n const rLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const r = derSignatureBuf.slice(index, index + rLength);\n index += rLength; // Move to the start of s\n\n // Parse 's' and check for integer tag (0x02)\n if (derSignatureBuf[index] !== 0x02) {\n throw new Error(\n \"failed to convert DER-encoded signature: invalid tag for s\"\n );\n }\n index++; // Move past the INTEGER tag\n const sLength = derSignatureBuf[index];\n index++; // Move past the length byte\n const s = derSignatureBuf.slice(index, index + sLength);\n\n // Normalize 'r' and 's' to 32 bytes each\n const rPadded = normalizePadding(r, 32);\n const sPadded = normalizePadding(s, 32);\n\n // Concatenate and return the raw signature\n return new Uint8Array([...rPadded, ...sPadded]);\n}\n\n/**\n * Function to verify enclave signature on import bundle received from the server.\n * @param {string} enclaveQuorumPublic uncompressed public key for the quorum key which produced the signature\n * @param {string} publicSignature signature bytes encoded as a hexadecimal string\n * @param {string} signedData signed bytes encoded as a hexadecimal string. This could be public key bytes directly, or JSON-encoded bytes\n */\nasync function verifyEnclaveSignature(\n enclaveQuorumPublic,\n publicSignature,\n signedData\n) {\n /** Turnkey Signer enclave's public keys */\n const TURNKEY_SIGNERS_ENCLAVES = {\n prod: \"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\",\n preprod:\n \"04f3422b8afbe425d6ece77b8d2469954715a2ff273ab7ac89f1ed70e0a9325eaa1698b4351fd1b23734e65c0b6a86b62dd49d70b37c94606aac402cbd84353212\",\n };\n\n // Use window.__TURNKEY_SIGNER_ENVIRONMENT__ if available (for testing), otherwise use the webpack replacement\n const environment =\n (typeof window !== \"undefined\" && window.__TURNKEY_SIGNER_ENVIRONMENT__) ||\n \"__TURNKEY_SIGNER_ENVIRONMENT__\";\n const TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY =\n TURNKEY_SIGNERS_ENCLAVES[environment];\n\n if (TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY === undefined) {\n throw new Error(\n `Configuration error: TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY is undefined`\n );\n }\n\n // todo(olivia): throw error if enclave quorum public is null once server changes are deployed\n if (enclaveQuorumPublic) {\n if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) {\n throw new Error(\n `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.`\n );\n }\n }\n\n const encryptionQuorumPublicBuf = new Uint8Array(\n uint8arrayFromHexString(TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY)\n );\n const quorumKey = await loadQuorumKey(encryptionQuorumPublicBuf);\n if (!quorumKey) {\n throw new Error(\"failed to load quorum key\");\n }\n\n // The ECDSA signature is ASN.1 DER encoded but WebCrypto uses raw format\n const publicSignatureBuf = fromDerSignature(publicSignature);\n const signedDataBuf = uint8arrayFromHexString(signedData);\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n return await subtle.verify(\n { name: \"ECDSA\", hash: \"SHA-256\" },\n quorumKey,\n publicSignatureBuf,\n signedDataBuf\n );\n}\n\n/**\n * Function to send a message.\n *\n * If this page is embedded as an iframe we'll send a postMessage\n * in one of two ways depending on the version of @turnkey/iframe-stamper:\n * 1. newer versions (>=v2.1.0) pass a MessageChannel MessagePort from the parent frame for postMessages.\n * 2. older versions ( 0) {\n digits.push(carry % 58);\n carry = (carry / 58) | 0;\n }\n }\n // Convert digits to a base58 string\n for (let k = 0; k < digits.length; k++) {\n result = alphabet[digits[k]] + result;\n }\n\n // Add '1' for each leading 0 byte\n for (let i = 0; bytes[i] === 0 && i < bytes.length - 1; i++) {\n result = \"1\" + result;\n }\n return result;\n}\n\n/**\n * Decodes a base58-encoded string into a buffer\n * This function throws an error when the string contains invalid characters.\n * @param {string} s The base58-encoded string.\n * @return {Uint8Array} The decoded buffer.\n */\nfunction base58Decode(s) {\n // See https://en.bitcoin.it/wiki/Base58Check_encoding\n var alphabet = \"123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz\";\n var decodedBytes = [];\n var leadingZeros = [];\n for (var i = 0; i < s.length; i++) {\n if (alphabet.indexOf(s[i]) === -1) {\n throw new Error(`cannot base58-decode: ${s[i]} isn't a valid character`);\n }\n var carry = alphabet.indexOf(s[i]);\n\n // If the current base58 digit is 0, append a 0 byte.\n // \"i == leadingZeros.length\" can only be true if we have not seen non-zero bytes so far.\n // If we had seen a non-zero byte, carry wouldn't be 0, and i would be strictly more than `leadingZeros.length`\n if (carry == 0 && i === leadingZeros.length) {\n leadingZeros.push(0);\n }\n\n var j = 0;\n while (j < decodedBytes.length || carry > 0) {\n var currentByte = decodedBytes[j];\n\n // shift the current byte 58 units and add the carry amount\n // (or just add the carry amount if this is a new byte -- undefined case)\n if (currentByte === undefined) {\n currentByte = carry;\n } else {\n currentByte = currentByte * 58 + carry;\n }\n\n // find the new carry amount (1-byte shift of current byte value)\n carry = currentByte >> 8;\n // reset the current byte to the remainder (the carry amount will pass on the overflow)\n decodedBytes[j] = currentByte % 256;\n j++;\n }\n }\n\n var result = leadingZeros.concat(decodedBytes.reverse());\n return new Uint8Array(result);\n}\n\n/**\n * Decodes a base58check-encoded string and verifies the checksum.\n * Base58Check encoding includes a 4-byte checksum at the end to detect errors.\n * The checksum is the first 4 bytes of SHA256(SHA256(payload)).\n * This function throws an error if the checksum is invalid.\n * @param {string} s The base58check-encoded string.\n * @return {Promise} The decoded payload (without checksum).\n */\nasync function base58CheckDecode(s) {\n const decoded = base58Decode(s);\n\n if (decoded.length < 5) {\n throw new Error(\n `invalid base58check length: expected at least 5 bytes, got ${decoded.length}`\n );\n }\n\n const payload = decoded.subarray(0, decoded.length - 4);\n const checksum = decoded.subarray(decoded.length - 4);\n\n const subtle = getSubtleCrypto();\n if (!subtle) {\n throw new Error(\"WebCrypto subtle API is unavailable\");\n }\n\n // Compute double SHA256 hash\n const hash1Buf = await subtle.digest(\"SHA-256\", payload);\n const hash1 = new Uint8Array(hash1Buf);\n const hash2Buf = await subtle.digest(\"SHA-256\", hash1);\n const hash2 = new Uint8Array(hash2Buf);\n const computedChecksum = hash2.subarray(0, 4);\n\n // Verify checksum\n const mismatch =\n (checksum[0] ^ computedChecksum[0]) |\n (checksum[1] ^ computedChecksum[1]) |\n (checksum[2] ^ computedChecksum[2]) |\n (checksum[3] ^ computedChecksum[3]);\n if (mismatch !== 0) {\n throw new Error(\"invalid base58check checksum\");\n }\n\n return payload;\n}\n\n/**\n * Returns private key bytes from a private key, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {string} privateKey\n * @param {string} keyFormat Can be \"HEXADECIMAL\", \"SUI_BECH32\", \"BITCOIN_MAINNET_WIF\", \"BITCOIN_TESTNET_WIF\" or \"SOLANA\"\n * @return {Promise}\n */\nasync function decodeKey(privateKey, keyFormat) {\n switch (keyFormat) {\n case \"SOLANA\": {\n const decodedKeyBytes = base58Decode(privateKey);\n if (decodedKeyBytes.length !== 64) {\n throw new Error(\n `invalid key length. Expected 64 bytes. Got ${decodedKeyBytes.length}.`\n );\n }\n return decodedKeyBytes.subarray(0, 32);\n }\n case \"HEXADECIMAL\":\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n case \"BITCOIN_MAINNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0x80 = mainnet\n if (version !== 0x80) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0x80 (mainnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"BITCOIN_TESTNET_WIF\": {\n const payload = await base58CheckDecode(privateKey);\n\n const version = payload[0];\n const keyAndFlags = payload.subarray(1);\n\n // 0xEF = testnet\n if (version !== 0xef) {\n throw new Error(\n `invalid WIF version byte: ${version}. Expected 0xEF (testnet).`\n );\n }\n\n // Check for common mistake: uncompressed keys\n if (keyAndFlags.length === 32) {\n throw new Error(\"uncompressed WIF keys not supported\");\n }\n\n // Validate compressed format\n if (keyAndFlags.length !== 33 || keyAndFlags[32] !== 0x01) {\n throw new Error(\"invalid WIF format: expected compressed private key\");\n }\n\n return keyAndFlags.subarray(0, 32);\n }\n case \"SUI_BECH32\": {\n const { prefix, words } = bech32.decode(privateKey);\n\n if (prefix !== \"suiprivkey\") {\n throw new Error(\n `invalid SUI private key human-readable part (HRP): expected \"suiprivkey\"`\n );\n }\n\n const bytes = bech32.fromWords(words);\n if (bytes.length !== 33) {\n throw new Error(\n `invalid SUI private key length: expected 33 bytes, got ${bytes.length}`\n );\n }\n\n const schemeFlag = bytes[0];\n const privkey = bytes.slice(1);\n\n // schemeFlag = 0 is Ed25519; We currently only support Ed25519 keys for SUI.\n if (schemeFlag !== 0) {\n throw new Error(\n `invalid SUI private key scheme flag: expected 0 (Ed25519). Turnkey only supports Ed25519 keys for SUI.`\n );\n }\n\n return new Uint8Array(privkey);\n }\n default:\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n if (privateKey.startsWith(\"0x\")) {\n return uint8arrayFromHexString(privateKey.slice(2));\n }\n return uint8arrayFromHexString(privateKey);\n }\n}\n\n/**\n * Returns a private key from private key bytes, represented in\n * the encoding and format specified by `keyFormat`. Defaults to\n * hex-encoding if `keyFormat` isn't passed.\n * @param {Uint8Array} privateKeyBytes\n * @param {string} keyFormat Can be \"HEXADECIMAL\" or \"SOLANA\"\n */\nasync function encodeKey(privateKeyBytes, keyFormat, publicKeyBytes) {\n switch (keyFormat) {\n case \"SOLANA\":\n if (!publicKeyBytes) {\n throw new Error(\"public key must be specified for SOLANA key format\");\n }\n if (privateKeyBytes.length !== 32) {\n throw new Error(\n `invalid private key length. Expected 32 bytes. Got ${privateKeyBytes.length}.`\n );\n }\n if (publicKeyBytes.length !== 32) {\n throw new Error(\n `invalid public key length. Expected 32 bytes. Got ${publicKeyBytes.length}.`\n );\n }\n {\n const concatenatedBytes = new Uint8Array(64);\n concatenatedBytes.set(privateKeyBytes, 0);\n concatenatedBytes.set(publicKeyBytes, 32);\n return base58Encode(concatenatedBytes);\n }\n case \"HEXADECIMAL\":\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n default:\n // keeping console.warn for debugging purposes.\n // eslint-disable-next-line no-console\n console.warn(\n `invalid key format: ${keyFormat}. Defaulting to HEXADECIMAL.`\n );\n return \"0x\" + uint8arrayToHexString(privateKeyBytes);\n }\n}\n\n// Helper to parse a private key into a Solana base58 private key.\n// To be used if a wallet account is exported without the `SOLANA` address format.\nfunction parsePrivateKey(privateKey) {\n if (Array.isArray(privateKey)) {\n return new Uint8Array(privateKey);\n }\n\n if (typeof privateKey === \"string\") {\n // Remove 0x prefix if present\n if (privateKey.startsWith(\"0x\")) {\n privateKey = privateKey.slice(2);\n }\n\n // Check if it's hex-formatted correctly (i.e. 64 hex chars)\n if (privateKey.length === 64 && /^[0-9a-fA-F]+$/.test(privateKey)) {\n return uint8arrayFromHexString(privateKey);\n }\n\n // Otherwise assume it's base58 format (for Solana)\n try {\n return base58Decode(privateKey);\n } catch (error) {\n throw new Error(\n \"Invalid private key format. Use hex (64 chars) or base58 format.\"\n );\n }\n }\n\n throw new Error(\"Private key must be a string (hex/base58) or number array\");\n}\n\n/**\n * Function to validate and sanitize the styles object using the accepted map of style keys and values (as regular expressions).\n * Any invalid style throws an error. Returns an object of valid styles.\n * @param {Object} styles\n * @param {HTMLElement} element - Optional element parameter (for import frame)\n * @return {Object}\n */\nfunction validateStyles(styles, element) {\n const validStyles = {};\n\n const cssValidationRegex = {\n padding: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n margin: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n borderWidth: \"^(\\\\d+(px|em|rem) ?){1,4}$\",\n borderStyle:\n \"^(none|solid|dashed|dotted|double|groove|ridge|inset|outset)$\",\n borderColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n borderRadius: \"^(\\\\d+(px|em|%|rem) ?){1,4}$\",\n fontSize: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax))$\",\n fontWeight: \"^(normal|bold|bolder|lighter|\\\\d{3})$\",\n fontFamily: '^[^\";<>]*$', // checks for the absence of some characters that could lead to CSS/HTML injection\n color:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n labelColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n backgroundColor:\n \"^(transparent|inherit|initial|#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)|hsla?\\\\(\\\\d{1,3}, \\\\d{1,3}%, \\\\d{1,3}%(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\))$\",\n width: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n height: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|auto)$\",\n maxWidth: \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n maxHeight:\n \"^(\\\\d+(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|none)$\",\n lineHeight:\n \"^(\\\\d+(\\\\.\\\\d+)?(px|em|rem|%|vh|vw|in|cm|mm|pt|pc|ex|ch|vmin|vmax)|normal)$\",\n boxShadow:\n \"^(none|(\\\\d+(px|em|rem) ?){2,4} (#[0-9a-f]{3,8}|rgba?\\\\(\\\\d{1,3}, \\\\d{1,3}, \\\\d{1,3}(, \\\\d?(\\\\.\\\\d{1,2})?)?\\\\)) ?(inset)?)$\",\n textAlign: \"^(left|right|center|justify|initial|inherit)$\",\n overflowWrap: \"^(normal|break-word|anywhere)$\",\n wordWrap: \"^(normal|break-word)$\",\n resize: \"^(none|both|horizontal|vertical|block|inline)$\",\n };\n\n Object.entries(styles).forEach(([property, value]) => {\n const styleProperty = property.trim();\n if (styleProperty.length === 0) {\n throw new Error(\"css style property cannot be empty\");\n }\n const styleRegexStr = cssValidationRegex[styleProperty];\n if (!styleRegexStr) {\n throw new Error(\n `invalid or unsupported css style property: \"${styleProperty}\"`\n );\n }\n const styleRegex = new RegExp(styleRegexStr);\n const styleValue = value.trim();\n if (styleValue.length == 0) {\n throw new Error(`css style for \"${styleProperty}\" is empty`);\n }\n const isValidStyle = styleRegex.test(styleValue);\n if (!isValidStyle) {\n throw new Error(\n `invalid css style value for property \"${styleProperty}\"`\n );\n }\n validStyles[styleProperty] = styleValue;\n });\n\n return validStyles;\n}\n\n// Export all shared functions\nexport {\n setCryptoProvider,\n getSubtleCrypto,\n isDoublyIframed,\n loadQuorumKey,\n loadTargetKey,\n initEmbeddedKey,\n generateTargetKey,\n getEmbeddedKey,\n setEmbeddedKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n onResetEmbeddedKey,\n resetTargetEmbeddedKey,\n setParentFrameMessageChannelPort,\n getSettings,\n setSettings,\n setItemWithExpiry,\n getItemWithExpiry,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n normalizePadding,\n additionalAssociatedData,\n fromDerSignature,\n verifyEnclaveSignature,\n sendMessageUp,\n logMessage,\n p256JWKPrivateToPublic,\n base58Encode,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n encodeKey,\n parsePrivateKey,\n validateStyles,\n};\n","import * as SharedTKHQ from \"@shared/turnkey-core.js\";\n\nconst {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n} = SharedTKHQ;\n\n/**\n * Function to apply settings on this page. For now, the only settings that can be applied\n * are for \"styles\". Upon successful application, return the valid, sanitized settings JSON string.\n * @param {string} settings\n * @return {string}\n */\nfunction applySettings(settings) {\n const validSettings = {};\n const settingsObj = JSON.parse(settings);\n\n const passphraseLabel = document.getElementById(\"passphrase-label\");\n const mnemonicLabel = document.getElementById(\"mnemonic-label\");\n const passphraseTextarea = document.getElementById(\"passphrase\");\n\n if (!passphraseLabel || !passphraseTextarea) {\n throw new Error(\"no passphrase HTML elements found to apply settings to.\");\n }\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) {\n throw new Error(\n \"no plaintext textarea HTML element found to apply settings to.\"\n );\n }\n\n // Apply enablePassphrase setting\n if (settingsObj.enablePassphrase === true) {\n passphraseLabel.style.display = \"inline-block\";\n passphraseTextarea.style.display = \"inline-block\";\n passphraseTextarea.style.border = \"solid 1px #ccc\";\n passphraseTextarea.style.borderRadius = \"4px\";\n\n mnemonicLabel.style.display = \"inline-block\";\n plaintextTextarea.style.border = \"solid 1px #ccc\";\n plaintextTextarea.style.borderRadius = \"4px\";\n\n validSettings[\"enablePassphrase\"] = true;\n } else {\n passphraseLabel.style.display = \"none\";\n passphraseTextarea.style.display = \"none\";\n mnemonicLabel.style.display = \"none\";\n\n plaintextTextarea.style.border = \"none\";\n validSettings[\"enablePassphrase\"] = false;\n }\n\n if (settingsObj.styles) {\n // Validate, sanitize, and apply the styles to the \"plaintext\" textarea.\n const validStyles = validateStyles(settingsObj.styles);\n Object.entries(validStyles).forEach(([key, value]) => {\n plaintextTextarea.style[key] = value;\n });\n\n if (validStyles.backgroundColor) {\n // Apply background color to document and body as well.\n document.documentElement.style.backgroundColor =\n validStyles.backgroundColor;\n document.body.style.backgroundColor = validStyles.backgroundColor;\n }\n\n if (validStyles.labelColor) {\n document.getElementById(\"mnemonic-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"styles\"] = validStyles;\n }\n\n if (settingsObj.passphraseStyles) {\n // Validate, sanitize, and apply the styles to the \"passphrase\" textarea.\n const validStyles = validateStyles(settingsObj.passphraseStyles);\n Object.entries(validStyles).forEach(([key, value]) => {\n passphraseTextarea.style[key] = value;\n });\n\n if (validStyles.labelColor) {\n document.getElementById(\"passphrase-label\").style.color =\n validStyles.labelColor;\n }\n\n validSettings[\"passphraseStyles\"] = validStyles;\n }\n\n return JSON.stringify(validSettings);\n}\n\nexport {\n setCryptoProvider,\n loadTargetKey,\n getTargetEmbeddedKey,\n setTargetEmbeddedKey,\n resetTargetEmbeddedKey,\n getSettings,\n setSettings,\n sendMessageUp,\n uint8arrayFromHexString,\n uint8arrayToHexString,\n base58Decode,\n base58CheckDecode,\n decodeKey,\n setParentFrameMessageChannelPort,\n normalizePadding,\n fromDerSignature,\n additionalAssociatedData,\n verifyEnclaveSignature,\n validateStyles,\n applySettings,\n};\n","/**\n * Crypto Utilities - Shared\n * Contains HPKE encryption and decryption functions\n */\n\nimport {\n p256JWKPrivateToPublic,\n additionalAssociatedData,\n uint8arrayToHexString,\n} from \"./turnkey-core.js\";\nimport {\n CipherSuite,\n DhkemP256HkdfSha256,\n HkdfSha256,\n Aes256Gcm,\n} from \"@hpke/core\";\n\n// Pre-compute const (for perf)\nconst TURNKEY_HPKE_INFO = new TextEncoder().encode(\"turnkey_hpke\");\n\n/**\n * Decrypt the ciphertext (ArrayBuffer) given an encapsulation key (ArrayBuffer)\n * and the receivers private key (JSON Web Key).\n */\nexport async function HpkeDecrypt({\n ciphertextBuf,\n encappedKeyBuf,\n receiverPrivJwk,\n}) {\n const kemContext = new DhkemP256HkdfSha256();\n var receiverPriv = await kemContext.importKey(\n \"jwk\",\n { ...receiverPrivJwk },\n false\n );\n\n var suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n var recipientCtx = await suite.createRecipientContext({\n recipientKey: receiverPriv,\n enc: encappedKeyBuf,\n info: TURNKEY_HPKE_INFO,\n });\n\n var receiverPubBuf = await p256JWKPrivateToPublic(receiverPrivJwk);\n var aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n var res;\n try {\n res = await recipientCtx.open(ciphertextBuf, aad);\n } catch (e) {\n throw new Error(\n \"unable to decrypt bundle using embedded key. the bundle may be incorrect. failed with error: \" +\n e.toString()\n );\n }\n return res;\n}\n\n/**\n * Encrypt plaintext using HPKE with the receiver's public key.\n * @param {Object} params\n * @param {Uint8Array} params.plaintextBuf - Plaintext to encrypt\n * @param {JsonWebKey} params.receiverPubJwk - Receiver's public key in JWK format\n * @returns {Promise} JSON stringified encrypted bundle with encappedPublic and ciphertext\n */\nexport async function HpkeEncrypt({ plaintextBuf, receiverPubJwk }) {\n const kemContext = new DhkemP256HkdfSha256();\n const receiverPub = await kemContext.importKey(\n \"jwk\",\n { ...receiverPubJwk },\n true\n );\n\n const suite = new CipherSuite({\n kem: kemContext,\n kdf: new HkdfSha256(),\n aead: new Aes256Gcm(),\n });\n\n const senderCtx = await suite.createSenderContext({\n recipientPublicKey: receiverPub,\n info: TURNKEY_HPKE_INFO,\n });\n\n // Need to import the key again as a JWK to export as a raw key, the format needed to\n // create the aad with the newly generated raw encapped key.\n const receiverPubCryptoKey = await crypto.subtle.importKey(\n \"jwk\",\n receiverPubJwk,\n {\n name: \"ECDSA\",\n namedCurve: \"P-256\",\n },\n true,\n []\n );\n const receiverPubRaw = await crypto.subtle.exportKey(\n \"raw\",\n receiverPubCryptoKey\n );\n const receiverPubBuf = new Uint8Array(receiverPubRaw);\n\n const encappedKeyBuf = new Uint8Array(senderCtx.enc);\n\n const aad = additionalAssociatedData(encappedKeyBuf, receiverPubBuf);\n\n var ciphertextBuf;\n try {\n ciphertextBuf = await senderCtx.seal(plaintextBuf, aad);\n } catch (e) {\n throw new Error(\"failed to encrypt import bundle: \" + e.toString());\n }\n\n const ciphertextHex = uint8arrayToHexString(new Uint8Array(ciphertextBuf));\n const encappedKeyBufHex = uint8arrayToHexString(encappedKeyBuf);\n const encryptedBundle = JSON.stringify({\n encappedPublic: encappedKeyBufHex,\n ciphertext: ciphertextHex,\n });\n return encryptedBundle;\n}\n"],"names":["e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","_toConsumableArray","Array","isArray","_arrayLikeToArray","_arrayWithoutHoles","from","_iterableToArray","_unsupportedIterableToArray","_nonIterableSpread","toString","slice","constructor","name","test","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","TURNKEY_TARGET_EMBEDDED_KEY","TURNKEY_SETTINGS","parentFrameMessageChannelPort","cryptoProviderOverride","getSubtleCrypto","subtle","globalThis","crypto","window","global","setCryptoProvider","cryptoProvider","loadQuorumKey","_x","_loadQuorumKey","_regeneratorRuntime","mark","_callee","quorumPublic","wrap","_context","prev","next","Error","importKey","namedCurve","abrupt","sent","stop","loadTargetKey","_x2","_loadTargetKey","_callee2","targetPublic","targetKey","_context2","exportKey","getTargetEmbeddedKey","jwtKey","localStorage","getItem","JSON","parse","setTargetEmbeddedKey","setItem","stringify","resetTargetEmbeddedKey","removeItem","setParentFrameMessageChannelPort","port","getSettings","settings","setSettings","uint8arrayFromHexString","hexString","hexWithoutPrefix","startsWith","Uint8Array","match","map","h","parseInt","uint8arrayToHexString","buffer","x","padStart","join","normalizePadding","byteArray","targetLength","paddingLength","padding","fill","concat","expectedZeroCount","zeroCount","additionalAssociatedData","senderPubBuf","receiverPubBuf","s","fromDerSignature","derSignature","derSignatureBuf","index","rLength","sLength","rPadded","sPadded","verifyEnclaveSignature","_x3","_x4","_x5","_verifyEnclaveSignature","_callee5","enclaveQuorumPublic","publicSignature","signedData","TURNKEY_SIGNERS_ENCLAVES","environment","TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY","encryptionQuorumPublicBuf","quorumKey","publicSignatureBuf","signedDataBuf","_context5","prod","preprod","__TURNKEY_SIGNER_ENVIRONMENT__","undefined","verify","hash","sendMessageUp","type","requestId","message","postMessage","parent","content","messageLog","document","getElementById","createElement","innerText","appendChild","logMessage","base58Decode","alphabet","decodedBytes","leadingZeros","indexOf","carry","push","j","currentByte","result","reverse","base58CheckDecode","_x7","_base58CheckDecode","_callee7","decoded","payload","checksum","hash1Buf","hash1","hash2Buf","hash2","computedChecksum","_context7","subarray","digest","decodeKey","_x8","_x9","_decodeKey","_callee8","privateKey","keyFormat","decodedKeyBytes","version","keyAndFlags","_payload","_version","_keyAndFlags","_bech32$decode","prefix","words","bytes","schemeFlag","privkey","_context8","t0","bech32","decode","fromWords","console","warn","validateStyles","styles","element","validStyles","cssValidationRegex","margin","borderWidth","borderStyle","borderColor","borderRadius","fontSize","fontWeight","fontFamily","color","labelColor","backgroundColor","width","height","maxWidth","maxHeight","lineHeight","boxShadow","textAlign","overflowWrap","wordWrap","resize","entries","forEach","_ref","_ref2","_arrayWithHoles","_iterableToArrayLimit","_nonIterableRest","property","styleProperty","trim","styleRegexStr","styleRegex","RegExp","styleValue","SharedTKHQ","applySettings","validSettings","settingsObj","passphraseLabel","mnemonicLabel","passphraseTextarea","plaintextTextarea","enablePassphrase","style","display","border","_slicedToArray","key","documentElement","body","passphraseStyles","_ref3","_ref4","ownKeys","keys","getOwnPropertySymbols","filter","getOwnPropertyDescriptor","_objectSpread","_defineProperty","getOwnPropertyDescriptors","defineProperties","_typeof","toPrimitive","String","_toPrimitive","_toPropertyKey","TURNKEY_HPKE_INFO","TextEncoder","encode","HpkeEncrypt","_HpkeEncrypt","plaintextBuf","receiverPubJwk","kemContext","receiverPub","suite","senderCtx","receiverPubCryptoKey","receiverPubRaw","encappedKeyBuf","aad","ciphertextBuf","ciphertextHex","encappedKeyBufHex","encryptedBundle","DhkemP256HkdfSha256","CipherSuite","kem","kdf","HkdfSha256","aead","Aes256Gcm","createSenderContext","recipientPublicKey","info","enc","seal","encappedPublic","ciphertext"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js b/import/dist/index.bundle.688b106976faef7fb600.js similarity index 74% rename from import/dist/index.bundle.fd323f4d5a9bfc580fd2.js rename to import/dist/index.bundle.688b106976faef7fb600.js index 33fb477..1019481 100644 --- a/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js +++ b/import/dist/index.bundle.688b106976faef7fb600.js @@ -1,3 +1,3 @@ -/*! For license information please see index.bundle.fd323f4d5a9bfc580fd2.js.LICENSE.txt */ -(()=>{"use strict";var e,t,r,n,a,o={954:(e,t,r)=>{var n=r(482),a=r(584);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function i(){var e=l(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var a={throw:1,return:2,break:3,continue:3};function o(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,a[e],t)},delegateYield:function(e,a,o){return t.resultName=a,r(n.d,u(e),o)},finish:function(e){return r(n.f,e)}},r=function(e,r,a){n.p=t.prev,n.n=t.next;try{return e(r,a)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,a){return e.w(o(t),r,n,a&&a.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new v(e,t)},AsyncIterator:d,async:function(e,t,r,a,i){return(n(t)?f:s)(o(e),t,r,a,i)},keys:c,values:u}})()}function u(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function s(e,t,r,n,a){var o=f(e,t,r,n,a);return o.next().then(function(e){return e.done?e.value:o.next()})}function f(e,t,r,n,a){return new d(l().w(e,t,r,n),a||Promise)}function d(e,t){function r(n,a,o,i){try{var u=e[n](a),c=u.value;return c instanceof v?t.resolve(c.v).then(function(e){r("next",e,o,i)},function(e){r("throw",e,o,i)}):t.resolve(c).then(function(e){u.value=e,o(u)},function(e){return r("throw",e,o,i)})}catch(e){i(e)}}var n;this.next||(p(d.prototype),p(d.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,a,o){function i(){return new t(function(t,n){r(e,o,t,n)})}return n=n?n.then(i,i):i()},!0)}function l(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",a=r.toStringTag||"@@toStringTag";function o(r,n,a,o){var c=n&&n.prototype instanceof u?n:u,s=Object.create(c.prototype);return p(s,"_invoke",function(r,n,a){var o,u,c,s=0,f=a||[],d=!1,l={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return o=t,u=0,c=e,l.n=r,i}};function p(r,n){for(u=r,c=n,t=0;!d&&s&&!a&&t3?(a=v===n)&&(c=o[(u=o[4])?5:(u=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>v)&&(o[4]=r,o[5]=n,l.n=v,u=0))}if(a||r>1)return i;throw d=!0,n}return function(a,f,v){if(s>1)throw TypeError("Generator is already running");for(d&&1===f&&p(f,v),u=f,c=v;(t=u<2?e:c)||!d;){o||(u?u<3?(u>1&&(l.n=-1),p(u,c)):l.n=c:l.v=c);try{if(s=2,o){if(u||(a="next"),t=o[a]){if(!(t=t.call(o,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=o.return)&&t.call(o),u<2&&(c=TypeError("The iterator does not provide a '"+a+"' method"),u=1);o=e}else if((t=(d=l.n<0)?c:r.call(n,l))!==i)break}catch(t){o=e,u=1,c=t}finally{s=1}}return{value:t,done:d}}}(r,a,o),!0),s}var i={};function u(){}function c(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=s.prototype=u.prototype=Object.create(f);function v(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,p(e,a,"GeneratorFunction")),e.prototype=Object.create(d),e}return c.prototype=s,p(d,"constructor",s),p(s,"constructor",c),c.displayName="GeneratorFunction",p(s,a,"GeneratorFunction"),p(d),p(d,a,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(l=function(){return{w:o,m:v}})()}function p(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}p=function(e,t,r,n){function o(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},p(e,t,r,n)}function v(e,t){this.v=e,this.k=t}function y(e,t,r,n,a,o,i){try{var u=e[o](i),c=u.value}catch(e){return void r(e)}u.done?t(c):Promise.resolve(c).then(n,a)}function b(e){return function(){var t=this,r=arguments;return new Promise(function(n,a){var o=e.apply(t,r);function i(e){y(o,n,a,i,u,"next",e)}function u(e){y(o,n,a,i,u,"throw",e)}i(void 0)})}}window.TKHQ=n;var h=null,m=new AbortController,g=new AbortController,w=function(){var e=b(i().mark(function e(t){return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!t.data||"INJECT_IMPORT_BUNDLE"!=t.data.type){e.next=9;break}return e.prev=1,e.next=4,x(t.data.value,t.data.organizationId,t.data.userId,t.data.requestId);case 4:e.next=9;break;case 6:e.prev=6,e.t0=e.catch(1),n.sendMessageUp("ERROR",e.t0.toString(),t.data.requestId);case 9:if(!t.data||"EXTRACT_WALLET_ENCRYPTED_BUNDLE"!=t.data.type){e.next=18;break}return e.prev=10,e.next=13,S(t.data.requestId);case 13:e.next=18;break;case 15:e.prev=15,e.t1=e.catch(10),n.sendMessageUp("ERROR",e.t1.toString(),t.data.requestId);case 18:if(!t.data||"EXTRACT_KEY_ENCRYPTED_BUNDLE"!=t.data.type){e.next=27;break}return e.prev=19,e.next=22,O(t.data.keyFormat,t.data.requestId);case 22:e.next=27;break;case 24:e.prev=24,e.t2=e.catch(19),n.sendMessageUp("ERROR",e.t2.toString(),t.data.requestId);case 27:if(!t.data||"APPLY_SETTINGS"!=t.data.type){e.next=36;break}return e.prev=28,e.next=31,_(t.data.value,t.data.requestId);case 31:e.next=36;break;case 33:e.prev=33,e.t3=e.catch(28),n.sendMessageUp("ERROR",e.t3.toString(),t.data.requestId);case 36:case"end":return e.stop()}},e,null,[[1,6],[10,15],[19,24],[28,33]])}));return function(t){return e.apply(this,arguments)}}();function E(e){if(e.includes("\n--PASS--\n"))throw new Error('mnemonic cannot include the string "\\n--PASS--\\n"');if(e.includes("\n"))throw new Error("mnemonic cannot include newline characters")}function x(e,t,r,n){return k.apply(this,arguments)}function k(){return(k=b(i().mark(function e(t,r,a,o){var u,c,s,f;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:c=JSON.parse(t),e.t0=c.version,e.next="v1.0.0"===e.t0?4:34;break;case 4:if(c.data){e.next=6;break}throw new Error('missing "data" in bundle');case 6:if(c.dataSignature){e.next=8;break}throw new Error('missing "dataSignature" in bundle');case 8:if(c.enclaveQuorumPublic){e.next=10;break}throw new Error('missing "enclaveQuorumPublic" in bundle');case 10:if(n.verifyEnclaveSignature){e.next=12;break}throw new Error("method not loaded");case 12:return e.next=14,n.verifyEnclaveSignature(c.enclaveQuorumPublic,c.dataSignature,c.data);case 14:if(e.sent){e.next=17;break}throw new Error("failed to verify enclave signature: ".concat(t));case 17:if(s=JSON.parse((new TextDecoder).decode(n.uint8arrayFromHexString(c.data))),r){e.next=22;break}console.warn('we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass "organizationId" for security purposes.'),e.next=24;break;case 22:if(s.organizationId&&s.organizationId===r){e.next=24;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(s.organizationId,"."));case 24:if(a){e.next=28;break}console.warn('we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass "userId" for security purposes.'),e.next=30;break;case 28:if(s.userId&&s.userId===a){e.next=30;break}throw new Error("user id does not match expected value. Expected: ".concat(a,". Found: ").concat(s.userId,"."));case 30:if(s.targetPublic){e.next=32;break}throw new Error('missing "targetPublic" in bundle signed data');case 32:return u=n.uint8arrayFromHexString(s.targetPublic),e.abrupt("break",35);case 34:throw new Error("unsupported version: ".concat(c.version));case 35:return e.next=37,n.loadTargetKey(new Uint8Array(u));case 37:f=e.sent,n.setTargetEmbeddedKey(f),n.sendMessageUp("BUNDLE_INJECTED",!0,o);case 40:case"end":return e.stop()}},e)}))).apply(this,arguments)}function S(e){return T.apply(this,arguments)}function T(){return(T=b(i().mark(function e(t){var r,o,u,c,s,f;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(null!=(r=n.getTargetEmbeddedKey())){e.next=3;break}throw new Error("no target key found");case 3:if(o=document.getElementById("plaintext").value.trim()){e.next=6;break}throw new Error("no wallet mnemonic entered");case 6:return u=document.getElementById("passphrase").value,E(o),c=""===u?o:"".concat(o,"\n--PASS--\n").concat(u),s=(new TextEncoder).encode(c),e.next=12,(0,a.q)({plaintextBuf:s,receiverPubJwk:r});case 12:f=e.sent,n.resetTargetEmbeddedKey(),n.sendMessageUp("ENCRYPTED_BUNDLE_EXTRACTED",f,t);case 15:case"end":return e.stop()}},e)}))).apply(this,arguments)}function O(e,t){return P.apply(this,arguments)}function P(){return(P=b(i().mark(function e(t,r){var o,u,c,s;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(null!=(o=n.getTargetEmbeddedKey())){e.next=3;break}throw new Error("no target key found");case 3:if(u=document.getElementById("plaintext").value.trim()){e.next=6;break}throw new Error("no private key entered");case 6:return e.next=8,n.decodeKey(u,t);case 8:return c=e.sent,e.next=11,(0,a.q)({plaintextBuf:c,receiverPubJwk:o});case 11:s=e.sent,n.resetTargetEmbeddedKey(),n.sendMessageUp("ENCRYPTED_BUNDLE_EXTRACTED",s,r);case 14:case"end":return e.stop()}},e)}))).apply(this,arguments)}function _(e,t){return I.apply(this,arguments)}function I(){return(I=b(i().mark(function e(t,r){var a;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:a=n.applySettings(t),n.setSettings(a),n.sendMessageUp("SETTINGS_APPLIED",!0,r);case 3:case"end":return e.stop()}},e)}))).apply(this,arguments)}document.addEventListener("DOMContentLoaded",b(i().mark(function e(){var t,r;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(window.addEventListener("message",w,{capture:!1,signal:m.signal}),m.signal.aborted){e.next=9;break}if((t=n.getSettings())&&n.applySettings(t),n.sendMessageUp("PUBLIC_KEY_READY",""),r=document.getElementById("plaintext")){e.next=8;break}return e.abrupt("return");case 8:r.addEventListener("paste",b(i().mark(function e(){var t;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,e.next=3,navigator.permissions.query({name:"clipboard-write"}).catch(function(){return null});case 3:if("granted"!==(null==(t=e.sent)?void 0:t.state)&&"prompt"!==(null==t?void 0:t.state)){e.next=7;break}return e.next=7,navigator.clipboard.writeText("");case 7:e.next=11;break;case 9:e.prev=9,e.t0=e.catch(0);case 11:case"end":return e.stop()}},e,null,[[0,9]])})));case 9:case"end":return e.stop()}},e)})),!1),window.addEventListener("message",function(){var e=b(i().mark(function e(t){var r;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:t.data&&"TURNKEY_INIT_MESSAGE_CHANNEL"==t.data.type&&null!==(r=t.ports)&&void 0!==r&&r[0]&&(m.abort(),(h=t.ports[0]).onmessage=w,n.setParentFrameMessageChannelPort(h),n.sendMessageUp("PUBLIC_KEY_READY",""),g.abort());case 1:case"end":return e.stop()}},e)}));return function(t){return e.apply(this,arguments)}}(),{signal:g.signal})}},i={};function u(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={exports:{}};return o[e](r,r.exports,u),r.exports}u.m=o,e=[],u.O=(t,r,n,a)=>{if(!r){var o=1/0;for(f=0;f=a)&&Object.keys(u.O).every(e=>u.O[e](r[c]))?r.splice(c--,1):(i=!1,a0&&e[f-1][2]>a;f--)e[f]=e[f-1];e[f]=[r,n,a]},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,u.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var a=Object.create(null);u.r(a);var o={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>o[t]=()=>e[t]);return o.default=()=>e,u.d(a,o),a},u.d=(e,t)=>{for(var r in t)u.o(t,r)&&!u.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},u.f={},u.e=e=>Promise.all(Object.keys(u.f).reduce((t,r)=>(u.f[r](e,t),t),[])),u.u=e=>e+".bundle."+{291:"b62abe64ba4ebf68e89b",825:"3a4aff0e743a7540fe25"}[e]+".js",u.miniCssF=e=>{},u.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),u.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},a="import:",u.l=(e,t,r,o)=>{if(n[e])n[e].push(t);else{var i,c;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var a=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),a&&a.forEach(e=>e(r)),t)return t(r)},p=setTimeout(l.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=l.bind(null,i.onerror),i.onload=l.bind(null,i.onload),c&&document.head.appendChild(i)}},u.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},u.p="/",(()=>{var e={57:0};u.f.j=(t,r)=>{var n=u.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var a=new Promise((r,a)=>n=e[t]=[r,a]);r.push(n[2]=a);var o=u.p+u.u(t),i=new Error;u.l(o,r=>{if(u.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var a=r&&("load"===r.type?"missing":r.type),o=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+a+": "+o+")",i.name="ChunkLoadError",i.type=a,i.request=o,n[1](i)}},"chunk-"+t,t)}},u.O.j=t=>0===e[t];var t=(t,r)=>{var n,a,[o,i,c]=r,s=0;if(o.some(t=>0!==e[t])){for(n in i)u.o(i,n)&&(u.m[n]=i[n]);if(c)var f=c(u)}for(t&&t(r);su(954));c=u.O(c)})(); -//# sourceMappingURL=index.bundle.fd323f4d5a9bfc580fd2.js.map \ No newline at end of file +/*! For license information please see index.bundle.688b106976faef7fb600.js.LICENSE.txt */ +(()=>{"use strict";var e,t,r,n,a,o={954:(e,t,r)=>{var n=r(482),a=r(584);function o(e){return o="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},o(e)}function i(){var e=l(),t=e.m(i),r=(Object.getPrototypeOf?Object.getPrototypeOf(t):t.__proto__).constructor;function n(e){var t="function"==typeof e&&e.constructor;return!!t&&(t===r||"GeneratorFunction"===(t.displayName||t.name))}var a={throw:1,return:2,break:3,continue:3};function o(e){var t,r;return function(n){t||(t={stop:function(){return r(n.a,2)},catch:function(){return n.v},abrupt:function(e,t){return r(n.a,a[e],t)},delegateYield:function(e,a,o){return t.resultName=a,r(n.d,u(e),o)},finish:function(e){return r(n.f,e)}},r=function(e,r,a){n.p=t.prev,n.n=t.next;try{return e(r,a)}finally{t.next=n.n}}),t.resultName&&(t[t.resultName]=n.v,t.resultName=void 0),t.sent=n.v,t.next=n.n;try{return e.call(this,t)}finally{n.p=t.prev,n.n=t.next}}}return(i=function(){return{wrap:function(t,r,n,a){return e.w(o(t),r,n,a&&a.reverse())},isGeneratorFunction:n,mark:e.m,awrap:function(e,t){return new v(e,t)},AsyncIterator:d,async:function(e,t,r,a,i){return(n(t)?f:s)(o(e),t,r,a,i)},keys:c,values:u}})()}function u(e){if(null!=e){var t=e["function"==typeof Symbol&&Symbol.iterator||"@@iterator"],r=0;if(t)return t.call(e);if("function"==typeof e.next)return e;if(!isNaN(e.length))return{next:function(){return e&&r>=e.length&&(e=void 0),{value:e&&e[r++],done:!e}}}}throw new TypeError(o(e)+" is not iterable")}function c(e){var t=Object(e),r=[];for(var n in t)r.unshift(n);return function e(){for(;r.length;)if((n=r.pop())in t)return e.value=n,e.done=!1,e;return e.done=!0,e}}function s(e,t,r,n,a){var o=f(e,t,r,n,a);return o.next().then(function(e){return e.done?e.value:o.next()})}function f(e,t,r,n,a){return new d(l().w(e,t,r,n),a||Promise)}function d(e,t){function r(n,a,o,i){try{var u=e[n](a),c=u.value;return c instanceof v?t.resolve(c.v).then(function(e){r("next",e,o,i)},function(e){r("throw",e,o,i)}):t.resolve(c).then(function(e){u.value=e,o(u)},function(e){return r("throw",e,o,i)})}catch(e){i(e)}}var n;this.next||(p(d.prototype),p(d.prototype,"function"==typeof Symbol&&Symbol.asyncIterator||"@asyncIterator",function(){return this})),p(this,"_invoke",function(e,a,o){function i(){return new t(function(t,n){r(e,o,t,n)})}return n=n?n.then(i,i):i()},!0)}function l(){var e,t,r="function"==typeof Symbol?Symbol:{},n=r.iterator||"@@iterator",a=r.toStringTag||"@@toStringTag";function o(r,n,a,o){var c=n&&n.prototype instanceof u?n:u,s=Object.create(c.prototype);return p(s,"_invoke",function(r,n,a){var o,u,c,s=0,f=a||[],d=!1,l={p:0,n:0,v:e,a:p,f:p.bind(e,4),d:function(t,r){return o=t,u=0,c=e,l.n=r,i}};function p(r,n){for(u=r,c=n,t=0;!d&&s&&!a&&t3?(a=v===n)&&(c=o[(u=o[4])?5:(u=3,3)],o[4]=o[5]=e):o[0]<=p&&((a=r<2&&pn||n>v)&&(o[4]=r,o[5]=n,l.n=v,u=0))}if(a||r>1)return i;throw d=!0,n}return function(a,f,v){if(s>1)throw TypeError("Generator is already running");for(d&&1===f&&p(f,v),u=f,c=v;(t=u<2?e:c)||!d;){o||(u?u<3?(u>1&&(l.n=-1),p(u,c)):l.n=c:l.v=c);try{if(s=2,o){if(u||(a="next"),t=o[a]){if(!(t=t.call(o,c)))throw TypeError("iterator result is not an object");if(!t.done)return t;c=t.value,u<2&&(u=0)}else 1===u&&(t=o.return)&&t.call(o),u<2&&(c=TypeError("The iterator does not provide a '"+a+"' method"),u=1);o=e}else if((t=(d=l.n<0)?c:r.call(n,l))!==i)break}catch(t){o=e,u=1,c=t}finally{s=1}}return{value:t,done:d}}}(r,a,o),!0),s}var i={};function u(){}function c(){}function s(){}t=Object.getPrototypeOf;var f=[][n]?t(t([][n]())):(p(t={},n,function(){return this}),t),d=s.prototype=u.prototype=Object.create(f);function v(e){return Object.setPrototypeOf?Object.setPrototypeOf(e,s):(e.__proto__=s,p(e,a,"GeneratorFunction")),e.prototype=Object.create(d),e}return c.prototype=s,p(d,"constructor",s),p(s,"constructor",c),c.displayName="GeneratorFunction",p(s,a,"GeneratorFunction"),p(d),p(d,a,"Generator"),p(d,n,function(){return this}),p(d,"toString",function(){return"[object Generator]"}),(l=function(){return{w:o,m:v}})()}function p(e,t,r,n){var a=Object.defineProperty;try{a({},"",{})}catch(e){a=0}p=function(e,t,r,n){function o(t,r){p(e,t,function(e){return this._invoke(t,r,e)})}t?a?a(e,t,{value:r,enumerable:!n,configurable:!n,writable:!n}):e[t]=r:(o("next",0),o("throw",1),o("return",2))},p(e,t,r,n)}function v(e,t){this.v=e,this.k=t}function y(e,t,r,n,a,o,i){try{var u=e[o](i),c=u.value}catch(e){return void r(e)}u.done?t(c):Promise.resolve(c).then(n,a)}function b(e){return function(){var t=this,r=arguments;return new Promise(function(n,a){var o=e.apply(t,r);function i(e){y(o,n,a,i,u,"next",e)}function u(e){y(o,n,a,i,u,"throw",e)}i(void 0)})}}window.TKHQ=n;var h=null,m=new AbortController,g=new AbortController,w=function(){var e=b(i().mark(function e(t){return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(!t.data||"INJECT_IMPORT_BUNDLE"!=t.data.type){e.next=9;break}return e.prev=1,e.next=4,x(t.data.value,t.data.organizationId,t.data.userId,t.data.requestId);case 4:e.next=9;break;case 6:e.prev=6,e.t0=e.catch(1),n.sendMessageUp("ERROR",e.t0.toString(),t.data.requestId);case 9:if(!t.data||"EXTRACT_WALLET_ENCRYPTED_BUNDLE"!=t.data.type){e.next=18;break}return e.prev=10,e.next=13,S(t.data.requestId);case 13:e.next=18;break;case 15:e.prev=15,e.t1=e.catch(10),n.sendMessageUp("ERROR",e.t1.toString(),t.data.requestId);case 18:if(!t.data||"EXTRACT_KEY_ENCRYPTED_BUNDLE"!=t.data.type){e.next=27;break}return e.prev=19,e.next=22,T(t.data.keyFormat,t.data.requestId);case 22:e.next=27;break;case 24:e.prev=24,e.t2=e.catch(19),n.sendMessageUp("ERROR",e.t2.toString(),t.data.requestId);case 27:if(!t.data||"APPLY_SETTINGS"!=t.data.type){e.next=36;break}return e.prev=28,e.next=31,_(t.data.value,t.data.requestId);case 31:e.next=36;break;case 33:e.prev=33,e.t3=e.catch(28),n.sendMessageUp("ERROR",e.t3.toString(),t.data.requestId);case 36:case"end":return e.stop()}},e,null,[[1,6],[10,15],[19,24],[28,33]])}));return function(t){return e.apply(this,arguments)}}();function E(e){if(e.includes("\n--PASS--\n"))throw new Error('mnemonic cannot include the string "\\n--PASS--\\n"');if(e.includes("\n"))throw new Error("mnemonic cannot include newline characters")}function x(e,t,r,n){return k.apply(this,arguments)}function k(){return(k=b(i().mark(function e(t,r,a,o){var u,c,s,f;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:c=JSON.parse(t),e.t0=c.version,e.next="v1.0.0"===e.t0?4:34;break;case 4:if(c.data){e.next=6;break}throw new Error('missing "data" in bundle');case 6:if(c.dataSignature){e.next=8;break}throw new Error('missing "dataSignature" in bundle');case 8:if(c.enclaveQuorumPublic){e.next=10;break}throw new Error('missing "enclaveQuorumPublic" in bundle');case 10:if(n.verifyEnclaveSignature){e.next=12;break}throw new Error("method not loaded");case 12:return e.next=14,n.verifyEnclaveSignature(c.enclaveQuorumPublic,c.dataSignature,c.data);case 14:if(e.sent){e.next=17;break}throw new Error("failed to verify enclave signature: ".concat(t));case 17:if(s=JSON.parse((new TextDecoder).decode(n.uint8arrayFromHexString(c.data))),r){e.next=22;break}console.warn('we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass "organizationId" for security purposes.'),e.next=24;break;case 22:if(s.organizationId&&s.organizationId===r){e.next=24;break}throw new Error("organization id does not match expected value. Expected: ".concat(r,". Found: ").concat(s.organizationId,"."));case 24:if(a){e.next=28;break}console.warn('we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass "userId" for security purposes.'),e.next=30;break;case 28:if(s.userId&&s.userId===a){e.next=30;break}throw new Error("user id does not match expected value. Expected: ".concat(a,". Found: ").concat(s.userId,"."));case 30:if(s.targetPublic){e.next=32;break}throw new Error('missing "targetPublic" in bundle signed data');case 32:return u=n.uint8arrayFromHexString(s.targetPublic),e.abrupt("break",35);case 34:throw new Error("unsupported version: ".concat(c.version));case 35:return e.next=37,n.loadTargetKey(new Uint8Array(u));case 37:f=e.sent,n.setTargetEmbeddedKey(f),n.sendMessageUp("BUNDLE_INJECTED",!0,o);case 40:case"end":return e.stop()}},e)}))).apply(this,arguments)}function S(e){return O.apply(this,arguments)}function O(){return(O=b(i().mark(function e(t){var r,o,u,c,s,f;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(null!=(r=n.getTargetEmbeddedKey())){e.next=3;break}throw new Error("no target key found");case 3:if(o=document.getElementById("plaintext").value.trim()){e.next=6;break}throw new Error("no wallet mnemonic entered");case 6:return u=document.getElementById("passphrase").value,E(o),c=""===u?o:"".concat(o,"\n--PASS--\n").concat(u),s=(new TextEncoder).encode(c),e.next=12,(0,a.q)({plaintextBuf:s,receiverPubJwk:r});case 12:f=e.sent,n.resetTargetEmbeddedKey(),n.sendMessageUp("ENCRYPTED_BUNDLE_EXTRACTED",f,t);case 15:case"end":return e.stop()}},e)}))).apply(this,arguments)}function T(e,t){return P.apply(this,arguments)}function P(){return(P=b(i().mark(function e(t,r){var o,u,c,s;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(null!=(o=n.getTargetEmbeddedKey())){e.next=3;break}throw new Error("no target key found");case 3:if(u=document.getElementById("plaintext").value.trim()){e.next=6;break}throw new Error("no private key entered");case 6:return e.next=8,n.decodeKey(u,t);case 8:return c=e.sent,e.next=11,(0,a.q)({plaintextBuf:c,receiverPubJwk:o});case 11:s=e.sent,n.resetTargetEmbeddedKey(),n.sendMessageUp("ENCRYPTED_BUNDLE_EXTRACTED",s,r);case 14:case"end":return e.stop()}},e)}))).apply(this,arguments)}function _(e,t){return I.apply(this,arguments)}function I(){return(I=b(i().mark(function e(t,r){var a;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:a=n.applySettings(t),n.setSettings(a),n.sendMessageUp("SETTINGS_APPLIED",!0,r);case 3:case"end":return e.stop()}},e)}))).apply(this,arguments)}document.addEventListener("DOMContentLoaded",b(i().mark(function e(){var t,r;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:if(window.addEventListener("message",w,{capture:!1,signal:m.signal}),m.signal.aborted){e.next=9;break}if((t=n.getSettings())&&n.applySettings(t),n.sendMessageUp("PUBLIC_KEY_READY",""),r=document.getElementById("plaintext")){e.next=8;break}return e.abrupt("return");case 8:r.addEventListener("paste",b(i().mark(function e(){var t;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,e.next=3,navigator.permissions.query({name:"clipboard-write"}).catch(function(){return null});case 3:if("granted"!==(null==(t=e.sent)?void 0:t.state)&&"prompt"!==(null==t?void 0:t.state)){e.next=7;break}return e.next=7,navigator.clipboard.writeText("");case 7:e.next=11;break;case 9:e.prev=9,e.t0=e.catch(0);case 11:case"end":return e.stop()}},e,null,[[0,9]])})));case 9:case"end":return e.stop()}},e)})),!1),window.addEventListener("message",function(){var e=b(i().mark(function e(t){var r;return i().wrap(function(e){for(;;)switch(e.prev=e.next){case 0:t.data&&"TURNKEY_INIT_MESSAGE_CHANNEL"==t.data.type&&null!==(r=t.ports)&&void 0!==r&&r[0]&&(m.abort(),n.setParentOrigin(t.origin),(h=t.ports[0]).onmessage=w,n.setParentFrameMessageChannelPort(h),n.sendMessageUp("PUBLIC_KEY_READY",""),g.abort());case 1:case"end":return e.stop()}},e)}));return function(t){return e.apply(this,arguments)}}(),{signal:g.signal})}},i={};function u(e){var t=i[e];if(void 0!==t)return t.exports;var r=i[e]={exports:{}};return o[e](r,r.exports,u),r.exports}u.m=o,e=[],u.O=(t,r,n,a)=>{if(!r){var o=1/0;for(f=0;f=a)&&Object.keys(u.O).every(e=>u.O[e](r[c]))?r.splice(c--,1):(i=!1,a0&&e[f-1][2]>a;f--)e[f]=e[f-1];e[f]=[r,n,a]},r=Object.getPrototypeOf?e=>Object.getPrototypeOf(e):e=>e.__proto__,u.t=function(e,n){if(1&n&&(e=this(e)),8&n)return e;if("object"==typeof e&&e){if(4&n&&e.__esModule)return e;if(16&n&&"function"==typeof e.then)return e}var a=Object.create(null);u.r(a);var o={};t=t||[null,r({}),r([]),r(r)];for(var i=2&n&&e;("object"==typeof i||"function"==typeof i)&&!~t.indexOf(i);i=r(i))Object.getOwnPropertyNames(i).forEach(t=>o[t]=()=>e[t]);return o.default=()=>e,u.d(a,o),a},u.d=(e,t)=>{for(var r in t)u.o(t,r)&&!u.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},u.f={},u.e=e=>Promise.all(Object.keys(u.f).reduce((t,r)=>(u.f[r](e,t),t),[])),u.u=e=>e+".bundle."+{291:"b62abe64ba4ebf68e89b",825:"3a4aff0e743a7540fe25"}[e]+".js",u.miniCssF=e=>{},u.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(e){if("object"==typeof window)return window}}(),u.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),n={},a="import:",u.l=(e,t,r,o)=>{if(n[e])n[e].push(t);else{var i,c;if(void 0!==r)for(var s=document.getElementsByTagName("script"),f=0;f{i.onerror=i.onload=null,clearTimeout(p);var a=n[e];if(delete n[e],i.parentNode&&i.parentNode.removeChild(i),a&&a.forEach(e=>e(r)),t)return t(r)},p=setTimeout(l.bind(null,void 0,{type:"timeout",target:i}),12e4);i.onerror=l.bind(null,i.onerror),i.onload=l.bind(null,i.onload),c&&document.head.appendChild(i)}},u.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},u.p="/",(()=>{var e={57:0};u.f.j=(t,r)=>{var n=u.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var a=new Promise((r,a)=>n=e[t]=[r,a]);r.push(n[2]=a);var o=u.p+u.u(t),i=new Error;u.l(o,r=>{if(u.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var a=r&&("load"===r.type?"missing":r.type),o=r&&r.target&&r.target.src;i.message="Loading chunk "+t+" failed.\n("+a+": "+o+")",i.name="ChunkLoadError",i.type=a,i.request=o,n[1](i)}},"chunk-"+t,t)}},u.O.j=t=>0===e[t];var t=(t,r)=>{var n,a,[o,i,c]=r,s=0;if(o.some(t=>0!==e[t])){for(n in i)u.o(i,n)&&(u.m[n]=i[n]);if(c)var f=c(u)}for(t&&t(r);su(954));c=u.O(c)})(); +//# sourceMappingURL=index.bundle.688b106976faef7fb600.js.map \ No newline at end of file diff --git a/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js.LICENSE.txt b/import/dist/index.bundle.688b106976faef7fb600.js.LICENSE.txt similarity index 100% rename from import/dist/index.bundle.fd323f4d5a9bfc580fd2.js.LICENSE.txt rename to import/dist/index.bundle.688b106976faef7fb600.js.LICENSE.txt diff --git a/import/dist/index.bundle.688b106976faef7fb600.js.map b/import/dist/index.bundle.688b106976faef7fb600.js.map new file mode 100644 index 0000000..22fb96f --- /dev/null +++ b/import/dist/index.bundle.688b106976faef7fb600.js.map @@ -0,0 +1 @@ +{"version":3,"file":"index.bundle.688b106976faef7fb600.js","mappings":";uBAAIA,ECCAC,EADAC,ECAAC,EACAC,E,24ECAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA5C,EAAAsB,GAAA,KAAAF,EAAApB,EAAA,KAAA6C,EAAAvB,CAAA,UAAAwB,EAAA1C,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAAmC,QAAAC,QAAApC,GAAAqC,KAAA/C,EAAAI,EAAA,UAAA4C,EAAA9C,GAAA,sBAAAH,EAAA,KAAAD,EAAAmD,UAAA,WAAAJ,QAAA,SAAA7C,EAAAI,GAAA,IAAAe,EAAAjB,EAAAgD,MAAAnD,EAAAD,GAAA,SAAAqD,EAAAjD,GAAA0C,EAAAzB,EAAAnB,EAAAI,EAAA+C,EAAAC,EAAA,OAAAlD,EAAA,UAAAkD,EAAAlD,GAAA0C,EAAAzB,EAAAnB,EAAAI,EAAA+C,EAAAC,EAAA,QAAAlD,EAAA,CAAAiD,OAAA,MAIAE,OAAOC,KAAOA,EAGd,IAAIC,EAAoB,KAGlBC,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAK9BE,EAAoB,eAAAC,EAAAZ,EAAAa,IAAAC,KAAG,SAAAC,EAAgBC,GAAK,OAAAH,IAAAI,KAAA,SAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAE,MAAA,WAC1CJ,EAAMK,MAA8B,wBAAtBL,EAAMK,KAAW,KAA2B,CAAAH,EAAAE,KAAA,eAAAF,EAAAC,KAAA,EAAAD,EAAAE,KAAA,EAEpDE,EACJN,EAAMK,KAAY,MAClBL,EAAMK,KAAqB,eAC3BL,EAAMK,KAAa,OACnBL,EAAMK,KAAgB,WACvB,OAAAH,EAAAE,KAAA,eAAAF,EAAAC,KAAA,EAAAD,EAAAK,GAAAL,EAAA,SAEDZ,EAAAA,cAAmB,QAASY,EAAAK,GAAEC,WAAYR,EAAMK,KAAgB,WAAG,WAGnEL,EAAMK,MAA8B,mCAAtBL,EAAMK,KAAW,KAAsC,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE/DK,EAA+BT,EAAMK,KAAgB,WAAE,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAQ,GAAAR,EAAA,UAE7DZ,EAAAA,cAAmB,QAASY,EAAAQ,GAAEF,WAAYR,EAAMK,KAAgB,WAAG,YAGnEL,EAAMK,MAA8B,gCAAtBL,EAAMK,KAAW,KAAmC,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE5DO,EACJX,EAAMK,KAAgB,UACtBL,EAAMK,KAAgB,WACvB,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAU,GAAAV,EAAA,UAEDZ,EAAAA,cAAmB,QAASY,EAAAU,GAAEJ,WAAYR,EAAMK,KAAgB,WAAG,YAGnEL,EAAMK,MAA8B,kBAAtBL,EAAMK,KAAW,KAAqB,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE9CS,EAAgBb,EAAMK,KAAY,MAAGL,EAAMK,KAAgB,WAAE,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAY,GAAAZ,EAAA,UAEnEZ,EAAAA,cAAmB,QAASY,EAAAY,GAAEN,WAAYR,EAAMK,KAAgB,WAAG,yBAAAH,EAAAa,OAAA,EAAAhB,EAAA,yCAGxE,gBArCuBiB,GAAA,OAAApB,EAAAV,MAAA,KAAAD,UAAA,KAoIxB,SAASgC,EAAiBC,GACxB,GAAIA,EAASC,SAAS,gBACpB,MAAM,IAAIC,MAAM,uDAElB,GAAIF,EAASC,SAAS,MACpB,MAAM,IAAIC,MAAM,6CAEpB,CAEA,SAUed,EAAoBe,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,EAAAvC,MAAC,KAADD,UAAA,CAoFnC,SAAAwC,IAFC,OAEDA,EAAAzC,EAAAa,IAAAC,KApFA,SAAA4B,EAAoCC,EAAQC,EAAgBC,EAAQC,GAAS,IAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAArC,IAAAI,KAAA,SAAAkC,GAAA,cAAAA,EAAAhC,KAAAgC,EAAA/B,MAAA,OAKrE4B,EAAYI,KAAKC,MAAMV,GAAOQ,EAAA5B,GAE5ByB,EAAUM,QAAOH,EAAA/B,KAClB,WADkB+B,EAAA5B,GACV,qBAENyB,EAAU3B,KAAM,CAAF8B,EAAA/B,KAAA,cACX,IAAIgB,MAAM,4BAA2B,UAExCY,EAAUO,cAAe,CAAFJ,EAAA/B,KAAA,cACpB,IAAIgB,MAAM,qCAAoC,UAEjDY,EAAUQ,oBAAqB,CAAFL,EAAA/B,KAAA,eAC1B,IAAIgB,MAAM,2CAA0C,WAIvD9B,EAAAA,uBAA6B,CAAF6C,EAAA/B,KAAA,eACxB,IAAIgB,MAAM,qBAAoB,eAAAe,EAAA/B,KAAA,GAErBd,EAAAA,uBACf0C,EAAUQ,oBACVR,EAAUO,cACVP,EAAU3B,MACX,QAJO,GAAA8B,EAAAM,KAKO,CAAFN,EAAA/B,KAAA,eACL,IAAIgB,MAAM,uCAADsB,OAAwCf,IAAS,QAQlE,GAJMM,EAAaG,KAAKC,OACtB,IAAIM,aAAcC,OAAOtD,EAAAA,wBAA6B0C,EAAU3B,QAI7DuB,EAAgB,CAAFO,EAAA/B,KAAA,SAEjByC,QAAQC,KACN,sHACAX,EAAA/B,KAAA,oBAED6B,EAAWL,gBACZK,EAAWL,iBAAmBA,EAAc,CAAAO,EAAA/B,KAAA,eAEtC,IAAIgB,MAAM,4DAADsB,OAC+Cd,EAAc,aAAAc,OAAYT,EAAWL,eAAc,MAChH,WAEEC,EAAQ,CAAFM,EAAA/B,KAAA,SAETyC,QAAQC,KACN,8GACAX,EAAA/B,KAAA,oBACQ6B,EAAWJ,QAAUI,EAAWJ,SAAWA,EAAM,CAAAM,EAAA/B,KAAA,eACrD,IAAIgB,MAAM,oDAADsB,OACuCb,EAAM,aAAAa,OAAYT,EAAWJ,OAAM,MACxF,WAGEI,EAAWc,aAAc,CAAFZ,EAAA/B,KAAA,eACpB,IAAIgB,MAAM,gDAA+C,QAIO,OAAxEW,EAAkBzC,EAAAA,wBAA6B2C,EAAWc,cAAcZ,EAAAa,OAAA,0BAIlE,IAAI5B,MAAM,wBAADsB,OAAyBV,EAAUM,UAAU,eAAAH,EAAA/B,KAAA,GAG/Bd,EAAAA,cAC/B,IAAI2D,WAAWlB,IAChB,QAFKG,EAAkBC,EAAAM,KAGxBnD,EAAAA,qBAA0B4C,GAG1B5C,EAAAA,cAAmB,mBAAmB,EAAMwC,GAAW,yBAAAK,EAAApB,OAAA,EAAAW,EAAA,KACxDxC,MAAA,KAAAD,UAAA,UAYcwB,EAA8ByC,GAAA,OAAAC,EAAAjE,MAAC,KAADD,UAAA,CAkC7C,SAAAkE,IAFC,OAEDA,EAAAnE,EAAAa,IAAAC,KAlCA,SAAAsD,EAA8CtB,GAAS,IAAAI,EAAAmB,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA5D,IAAAI,KAAA,SAAAyD,GAAA,cAAAA,EAAAvD,KAAAuD,EAAAtD,MAAA,OAEC,GAC5B,OADpB8B,EAAqB5C,EAAAA,wBACG,CAAAoE,EAAAtD,KAAA,cACtB,IAAIgB,MAAM,uBAAsB,OAI2B,GAA7DiC,EAAYM,SAASC,eAAe,aAAajG,MAAMkG,OAC7C,CAAFH,EAAAtD,KAAA,cACN,IAAIgB,MAAM,8BAA6B,OAW/C,OARMkC,EAAaK,SAASC,eAAe,cAAcjG,MAEzDsD,EAAiBoC,GAEXE,EACW,KAAfD,EAAoBD,EAAY,GAAHX,OAAMW,EAAS,gBAAAX,OAAeY,GACvDE,GAAe,IAAIM,aAAcC,OAAOR,GAE9CG,EAAAtD,KAAA,IAC8B4D,EAAAA,EAAAA,GAAY,CACxCR,aAAAA,EACAS,eAAgB/B,IAChB,QAHIuB,EAAeC,EAAAjB,KAMrBnD,EAAAA,yBAGAA,EAAAA,cAAmB,6BAA8BmE,EAAiB3B,GAAW,yBAAA4B,EAAA3C,OAAA,EAAAqC,EAAA,KAC9ElE,MAAA,KAAAD,UAAA,UAac0B,EAA2BuD,EAAAC,GAAA,OAAAC,EAAAlF,MAAC,KAADD,UAAA,CA2B1C,SAAAmF,IAFC,OAEDA,EAAApF,EAAAa,IAAAC,KA3BA,SAAAuE,EAA2CC,EAAWxC,GAAS,IAAAI,EAAAmB,EAAAG,EAAAC,EAAA,OAAA5D,IAAAI,KAAA,SAAAsE,GAAA,cAAAA,EAAApE,KAAAoE,EAAAnE,MAAA,OAEP,GAC5B,OADpB8B,EAAqB5C,EAAAA,wBACG,CAAAiF,EAAAnE,KAAA,cACtB,IAAIgB,MAAM,uBAAsB,OAI2B,GAA7DiC,EAAYM,SAASC,eAAe,aAAajG,MAAMkG,OAC7C,CAAFU,EAAAnE,KAAA,cACN,IAAIgB,MAAM,0BAAyB,cAAAmD,EAAAnE,KAAA,EAEhBd,EAAAA,UAAe+D,EAAWiB,GAAU,OAA7C,OAAZd,EAAYe,EAAA9B,KAAA8B,EAAAnE,KAAG,IAGS4D,EAAAA,EAAAA,GAAY,CACxCR,aAAAA,EACAS,eAAgB/B,IAChB,QAHIuB,EAAec,EAAA9B,KAMrBnD,EAAAA,yBAGAA,EAAAA,cAAmB,6BAA8BmE,EAAiB3B,GAAW,yBAAAyC,EAAAxD,OAAA,EAAAsD,EAAA,KAC9EnF,MAAA,KAAAD,UAAA,UAUc4B,EAAe2D,EAAAC,GAAA,OAAAC,EAAAxF,MAAC,KAADD,UAAA,UAAAyF,IAS7B,OAT6BA,EAAA1F,EAAAa,IAAAC,KAA9B,SAAA6E,EAA+BC,EAAU9C,GAAS,IAAA+C,EAAA,OAAAhF,IAAAI,KAAA,SAAA6E,GAAA,cAAAA,EAAA3E,KAAA2E,EAAA1E,MAAA,OAE1CyE,EAAgBvF,EAAAA,cAAmBsF,GAGzCtF,EAAAA,YAAiBuF,GAGjBvF,EAAAA,cAAmB,oBAAoB,EAAMwC,GAAW,wBAAAgD,EAAA/D,OAAA,EAAA4D,EAAA,KACzDzF,MAAA,KAAAD,UAAA,CApSD0E,SAASoB,iBACP,mBAAkB/F,EAAAa,IAAAC,KAClB,SAAAkF,IAAA,IAAAC,EAAAC,EAAA,OAAArF,IAAAI,KAAA,SAAAkF,GAAA,cAAAA,EAAAhF,KAAAgF,EAAA/E,MAAA,OAIK,GAHHf,OAAO0F,iBAAiB,UAAWpF,EAAsB,CACvDyF,SAAS,EACTC,OAAQ7F,EAA0B6F,SAG/B7F,EAA0B6F,OAAOC,QAAS,CAAFH,EAAA/E,KAAA,QAamB,IAXxD6E,EAAgB3F,EAAAA,gBAEpBA,EAAAA,cAAmB2F,GAOrB3F,EAAAA,cAAmB,mBAAoB,IAEjC4F,EAAoBvB,SAASC,eAAe,aAC1B,CAAFuB,EAAA/E,KAAA,eAAA+E,EAAAnC,OAAA,iBAGtBkC,EAAkBH,iBAAiB,QAAO/F,EAAAa,IAAAC,KAAE,SAAAyF,IAAA,IAAAC,EAAA,OAAA3F,IAAAI,KAAA,SAAAwF,GAAA,cAAAA,EAAAtF,KAAAsF,EAAArF,MAAA,cAAAqF,EAAAtF,KAAA,EAAAsF,EAAArF,KAAA,EAIfsF,UAAUC,YAChCC,MAAM,CAAEC,KAAM,oBAAqB,MAC7B,kBAAM,IAAI,GAAC,OAFJ,GAMQ,aAAtBL,OANIA,EAAUC,EAAAhD,WAMJ,EAAV+C,EAAYM,QACU,YAAtBN,aAAU,EAAVA,EAAYM,OAAkB,CAAAL,EAAArF,KAAA,eAAAqF,EAAArF,KAAA,EAExBsF,UAAUK,UAAUC,UAAU,IAAG,OAAAP,EAAArF,KAAA,gBAAAqF,EAAAtF,KAAA,EAAAsF,EAAAlF,GAAAkF,EAAA,kCAAAA,EAAA1E,OAAA,EAAAwE,EAAA,kBAK1C,wBAAAJ,EAAApE,OAAA,EAAAiE,EAAA,KAGP,GAGF3F,OAAO0F,iBACL,UAAS,eAAAkB,EAAAjH,EAAAa,IAAAC,KACT,SAAAoG,EAAgBlG,GAAK,IAAAmG,EAAA,OAAAtG,IAAAI,KAAA,SAAAmG,GAAA,cAAAA,EAAAjG,KAAAiG,EAAAhG,MAAA,OAQjBJ,EAAMK,MACgB,gCAAtBL,EAAMK,KAAW,MACN,QADyC8F,EACpDnG,EAAMqG,aAAK,IAAAF,GAAXA,EAAc,KAGd3G,EAA0B8G,QAI1BhH,EAAAA,gBAAqBU,EAAMuG,SAE3BhH,EAAoBS,EAAMqG,MAAM,IACdG,UAAY7G,EAE9BL,EAAAA,iCAAsCC,GAOtCD,EAAAA,cAAmB,mBAAoB,IAGvCI,EAAsB4G,SACvB,wBAAAF,EAAArF,OAAA,EAAAmF,EAAA,IACF,gBAAAO,GAAA,OAAAR,EAAA/G,MAAA,KAAAD,UAAA,EAnCQ,GAoCT,CAAEoG,OAAQ3F,EAAsB2F,Q,GChJ9BqB,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBvI,EAAI6I,EJzBpBxL,EAAW,GACfkL,EAAoBO,EAAI,CAACC,EAAQC,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASlL,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAK8K,EAAUC,EAAIC,GAAY7L,EAASa,GACpCmL,GAAY,EACPC,EAAI,EAAGA,EAAIN,EAAS9J,OAAQoK,MACpB,EAAXJ,GAAsBC,GAAgBD,IAAa3K,OAAOgL,KAAKhB,EAAoBO,GAAGU,MAAOC,GAASlB,EAAoBO,EAAEW,GAAKT,EAASM,KAC9IN,EAASU,OAAOJ,IAAK,IAErBD,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACbhM,EAASqM,OAAOxL,IAAK,GACrB,IAAIN,EAAIqL,SACEP,IAAN9K,IAAiBmL,EAASnL,EAC/B,CACD,CACA,OAAOmL,CAnBP,CAJCG,EAAWA,GAAY,EACvB,IAAI,IAAIhL,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAKgL,EAAUhL,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAAC8K,EAAUC,EAAIC,ICL3B3L,EAAWgB,OAAOmB,eAAkBiK,GAASpL,OAAOmB,eAAeiK,GAASA,GAASA,EAAa,UAQtGpB,EAAoB5K,EAAI,SAAS4B,EAAOqK,GAEvC,GADU,EAAPA,IAAUrK,EAAQsK,KAAKtK,IAChB,EAAPqK,EAAU,OAAOrK,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAPqK,GAAarK,EAAMuK,WAAY,OAAOvK,EAC1C,GAAW,GAAPqK,GAAoC,mBAAfrK,EAAMoB,KAAqB,OAAOpB,CAC5D,CACA,IAAIwK,EAAKxL,OAAOC,OAAO,MACvB+J,EAAoB3K,EAAEmM,GACtB,IAAIC,EAAM,CAAC,EACX1M,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAI0M,EAAiB,EAAPL,GAAYrK,GAA0B,iBAAX0K,GAAyC,mBAAXA,MAA4B3M,EAAe4M,QAAQD,GAAUA,EAAU1M,EAAS0M,GAC1J1L,OAAO4L,oBAAoBF,GAASG,QAASX,GAASO,EAAIP,GAAO,IAAOlK,EAAMkK,IAI/E,OAFAO,EAAa,QAAI,IAAM,EACvBzB,EAAoBvJ,EAAE+K,EAAIC,GACnBD,CACR,EIxBAxB,EAAoBvJ,EAAI,CAAC2J,EAAS0B,KACjC,IAAI,IAAIZ,KAAOY,EACX9B,EAAoBvK,EAAEqM,EAAYZ,KAASlB,EAAoBvK,EAAE2K,EAASc,IAC5ElL,OAAO0B,eAAe0I,EAASc,EAAK,CAAEtJ,YAAY,EAAMmK,IAAKD,EAAWZ,MCJ3ElB,EAAoB7J,EAAI,CAAC,EAGzB6J,EAAoB7K,EAAK6M,GACjB9J,QAAQ+J,IAAIjM,OAAOgL,KAAKhB,EAAoB7J,GAAG+L,OAAO,CAACC,EAAUjB,KACvElB,EAAoB7J,EAAE+K,GAAKc,EAASG,GAC7BA,GACL,KCNJnC,EAAoBjK,EAAKiM,GAEZA,EAAU,WAAa,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3GhC,EAAoBoC,SAAYJ,MCDhChC,EAAoBqC,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOhB,MAAQ,IAAIiB,SAAS,cAAb,EAChB,CAAE,MAAOpN,GACR,GAAsB,iBAAXuD,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBsH,EAAoBvK,EAAI,CAAC2L,EAAKoB,IAAUxM,OAAOH,UAAU4M,eAAe3L,KAAKsK,EAAKoB,GRA9EvN,EAAa,CAAC,EACdC,EAAoB,UAExB8K,EAAoBpJ,EAAI,CAAC8L,EAAK3L,EAAMmK,EAAKc,KACxC,GAAG/M,EAAWyN,GAAQzN,EAAWyN,GAAKC,KAAK5L,OAA3C,CACA,IAAI6L,EAAQC,EACZ,QAAW1C,IAARe,EAEF,IADA,IAAI4B,EAAU9F,SAAS+F,qBAAqB,UACpCpN,EAAI,EAAGA,EAAImN,EAAQnM,OAAQhB,IAAK,CACvC,IAAIqN,EAAIF,EAAQnN,GAChB,GAAGqN,EAAEC,aAAa,QAAUP,GAAOM,EAAEC,aAAa,iBAAmB/N,EAAoBgM,EAAK,CAAE0B,EAASI,EAAG,KAAO,CACpH,CAEGJ,IACHC,GAAa,GACbD,EAAS5F,SAASkG,cAAc,WAEzBC,QAAU,QACbnD,EAAoBoD,IACvBR,EAAOS,aAAa,QAASrD,EAAoBoD,IAElDR,EAAOS,aAAa,eAAgBnO,EAAoBgM,GAExD0B,EAAOU,IAAMZ,GAEdzN,EAAWyN,GAAO,CAAC3L,GACnB,IAAIwM,EAAmB,CAAC/J,EAAMH,KAE7BuJ,EAAOY,QAAUZ,EAAOa,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU3O,EAAWyN,GAIzB,UAHOzN,EAAWyN,GAClBE,EAAOiB,YAAcjB,EAAOiB,WAAWC,YAAYlB,GACnDgB,GAAWA,EAAQ/B,QAASnB,GAAQA,EAAGrH,IACpCG,EAAM,OAAOA,EAAKH,IAElBsK,EAAUI,WAAWR,EAAiB7M,KAAK,UAAMyJ,EAAW,CAAE6D,KAAM,UAAWC,OAAQrB,IAAW,MACtGA,EAAOY,QAAUD,EAAiB7M,KAAK,KAAMkM,EAAOY,SACpDZ,EAAOa,OAASF,EAAiB7M,KAAK,KAAMkM,EAAOa,QACnDZ,GAAc7F,SAASkH,KAAKC,YAAYvB,EAnCkB,GSH3D5C,EAAoB3K,EAAK+K,IACH,oBAAX9K,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAe0I,EAAS9K,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAe0I,EAAS,aAAc,CAAEpJ,OAAO,KCLvDgJ,EAAoB5J,EAAI,I,MCKxB,IAAIgO,EAAkB,CACrB,GAAI,GAGLpE,EAAoB7J,EAAE4K,EAAI,CAACiB,EAASG,KAElC,IAAIkC,EAAqBrE,EAAoBvK,EAAE2O,EAAiBpC,GAAWoC,EAAgBpC,QAAW7B,EACtG,GAA0B,IAAvBkE,EAGF,GAAGA,EACFlC,EAASQ,KAAK0B,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAIpM,QAAQ,CAACC,EAASoM,IAAYF,EAAqBD,EAAgBpC,GAAW,CAAC7J,EAASoM,IAC1GpC,EAASQ,KAAK0B,EAAmB,GAAKC,GAGtC,IAAI5B,EAAM1C,EAAoB5J,EAAI4J,EAAoBjK,EAAEiM,GAEpDwC,EAAQ,IAAI/J,MAgBhBuF,EAAoBpJ,EAAE8L,EAfFrJ,IACnB,GAAG2G,EAAoBvK,EAAE2O,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAW7B,GACrDkE,GAAoB,CACtB,IAAII,EAAYpL,IAAyB,SAAfA,EAAM2K,KAAkB,UAAY3K,EAAM2K,MAChEU,EAAUrL,GAASA,EAAM4K,QAAU5K,EAAM4K,OAAOX,IACpDkB,EAAMG,QAAU,iBAAmB3C,EAAU,cAAgByC,EAAY,KAAOC,EAAU,IAC1FF,EAAMtF,KAAO,iBACbsF,EAAMR,KAAOS,EACbD,EAAMI,QAAUF,EAChBL,EAAmB,GAAGG,EACvB,GAGuC,SAAWxC,EAASA,EAE/D,GAYHhC,EAAoBO,EAAEQ,EAAKiB,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI6C,EAAuB,CAACC,EAA4BpL,KACvD,IAGIuG,EAAU+B,GAHTvB,EAAUsE,EAAaC,GAAWtL,EAGhB/D,EAAI,EAC3B,GAAG8K,EAASwE,KAAMC,GAAgC,IAAxBd,EAAgBc,IAAa,CACtD,IAAIjF,KAAY8E,EACZ/E,EAAoBvK,EAAEsP,EAAa9E,KACrCD,EAAoBvI,EAAEwI,GAAY8E,EAAY9E,IAGhD,GAAG+E,EAAS,IAAIxE,EAASwE,EAAQhF,EAClC,CAEA,IADG8E,GAA4BA,EAA2BpL,GACrD/D,EAAI8K,EAAS9J,OAAQhB,IACzBqM,EAAUvB,EAAS9K,GAChBqK,EAAoBvK,EAAE2O,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAOhC,EAAoBO,EAAEC,IAG1B2E,EAAqBC,KAAyB,mBAAIA,KAAyB,oBAAK,GACpFD,EAAmBtD,QAAQgD,EAAqBnO,KAAK,KAAM,IAC3DyO,EAAmBxC,KAAOkC,EAAqBnO,KAAK,KAAMyO,EAAmBxC,KAAKjM,KAAKyO,G,KClFvF,IAAIE,EAAsBrF,EAAoBO,OAAEJ,EAAW,CAAC,GAAG,KAAM,IAAOH,EAAoB,MAChGqF,EAAsBrF,EAAoBO,EAAE8E,E","sources":["webpack://import/webpack/runtime/chunk loaded","webpack://import/webpack/runtime/create fake namespace object","webpack://import/webpack/runtime/load script","webpack://import/./src/index.js","webpack://import/webpack/bootstrap","webpack://import/webpack/runtime/define property getters","webpack://import/webpack/runtime/ensure chunk","webpack://import/webpack/runtime/get javascript chunk filename","webpack://import/webpack/runtime/get mini-css chunk filename","webpack://import/webpack/runtime/global","webpack://import/webpack/runtime/hasOwnProperty shorthand","webpack://import/webpack/runtime/make namespace object","webpack://import/webpack/runtime/publicPath","webpack://import/webpack/runtime/jsonp chunk loading","webpack://import/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"import:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import \"./styles.css\";\nimport * as TKHQ from \"./turnkey-core.js\";\nimport { HpkeEncrypt } from \"@shared/crypto-utils.js\";\n\n// Make TKHQ available globally for backwards compatibility\nwindow.TKHQ = TKHQ;\n\n// persist the MessageChannel object so we can use it to communicate with the parent window\nvar iframeMessagePort = null;\n\n// controllers to remove event listeners\nconst messageListenerController = new AbortController();\nconst turnkeyInitController = new AbortController();\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nvar messageEventListener = async function (event) {\n if (event.data && event.data[\"type\"] == \"INJECT_IMPORT_BUNDLE\") {\n try {\n await onInjectImportBundle(\n event.data[\"value\"],\n event.data[\"organizationId\"],\n event.data[\"userId\"],\n event.data[\"requestId\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"EXTRACT_WALLET_ENCRYPTED_BUNDLE\") {\n try {\n await onExtractWalletEncryptedBundle(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"EXTRACT_KEY_ENCRYPTED_BUNDLE\") {\n try {\n await onExtractKeyEncryptedBundle(\n event.data[\"keyFormat\"],\n event.data[\"requestId\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n};\n\n/**\n * Broadcast that the frame is ready and set up the message event listeners\n */\ndocument.addEventListener(\n \"DOMContentLoaded\",\n async function () {\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n if (!messageListenerController.signal.aborted) {\n // If styles are saved in local storage, sanitize and apply them.\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n // This is a workaround for how @turnkey/iframe-stamper is initialized. Currently,\n // init() waits for a public key to be initialized that can be used to send to the server\n // which will encrypt messages to this public key.\n // In the case of import, this public key is not used because the client encrypts messages\n // to the server's public key.\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", \"\");\n\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) return;\n // Clear clipboard after paste to avoid sensitive data lingering in clipboard.\n\n plaintextTextarea.addEventListener(\"paste\", async () => {\n // Let the paste happen first\n try {\n // Check clipboard-write permission first. In new versions of iframe-stamper, we add this permission when creating the iframe. In older versions, this permission is not added.\n const permStatus = await navigator.permissions\n .query({ name: \"clipboard-write\" }) // This is required to avoid error on clipboard write\n .catch(() => null);\n\n // Proceed only if granted or promptable\n if (\n permStatus?.state === \"granted\" ||\n permStatus?.state === \"prompt\"\n ) {\n await navigator.clipboard.writeText(\"\");\n }\n } catch {\n // Silently ignore any errors — no warnings or console noise\n }\n });\n }\n },\n false\n);\n\nwindow.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n // Capture the parent origin for use as targetOrigin in sendMessageUp,\n // preventing messages from being delivered to unintended recipients.\n TKHQ.setParentOrigin(event.origin);\n\n iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n // This is a workaround for how @turnkey/iframe-stamper is initialized. Currently,\n // init() waits for a public key to be initialized that can be used to send to the server\n // which will encrypt messages to this public key.\n // In the case of import, this public key is not used because the client encrypts messages\n // to the server's public key.\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", \"\");\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n);\n\n// make sure the mnemonic does not include our splitter (\\n--PASS--\\n) string or \\n characters\nfunction validateMnemonic(mnemonic) {\n if (mnemonic.includes(\"\\n--PASS--\\n\")) {\n throw new Error('mnemonic cannot include the string \"\\\\n--PASS--\\\\n\"');\n }\n if (mnemonic.includes(\"\\n\")) {\n throw new Error(\"mnemonic cannot include newline characters\");\n }\n}\n\n/**\n * Function triggered when INJECT_IMPORT_BUNDLE event is received.\n * Parses the `import_bundle` and stores the target public key as a JWK\n * in local storage. Sends true upon success.\n * @param {string} bundle\n * Example bundle: {\"targetPublic\":\"0491ccb68758b822a6549257f87769eeed37c6cb68a6c6255c5f238e2b6e6e61838c8ac857f2e305970a6435715f84e5a2e4b02a4d1e5289ba7ec7910e47d2d50f\",\"targetPublicSignature\":\"3045022100cefc333c330c9fa300d1aa10a439a76539b4d6967301638ab9edc9fd9468bfdb0220339bba7e2b00b45d52e941d068ecd3bfd16fd1926da69dd7769893268990d62f\",\"enclaveQuorumPublic\":\"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\"}\n * @param {string} organizationId\n * @param {string} userId\n * @param {string} requestId\n */\nasync function onInjectImportBundle(bundle, organizationId, userId, requestId) {\n let targetPublicBuf;\n let verified;\n\n // Parse the import bundle\n const bundleObj = JSON.parse(bundle);\n\n switch (bundleObj.version) {\n case \"v1.0.0\": {\n // Validate fields exist\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n // Verify enclave signature\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method not loaded\");\n }\n verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(`failed to verify enclave signature: ${bundle}`);\n }\n\n // Parse the signed data. The data is produced by JSON encoding followed by hex encoding. We reverse this here.\n const signedData = JSON.parse(\n new TextDecoder().decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n // Validate fields match\n if (!organizationId) {\n // TODO: throw error if organization id is undefined once we've fully transitioned to v1.0.0 server messages and v2.0.0 iframe-stamper\n console.warn(\n 'we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.'\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n if (!userId) {\n // TODO: throw error if user id is undefined once we've fully transitioned to v1.0.0 server messages and v2.0.0 iframe-stamper\n console.warn(\n 'we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass \"userId\" for security purposes.'\n );\n } else if (!signedData.userId || signedData.userId !== userId) {\n throw new Error(\n `user id does not match expected value. Expected: ${userId}. Found: ${signedData.userId}.`\n );\n }\n\n if (!signedData.targetPublic) {\n throw new Error('missing \"targetPublic\" in bundle signed data');\n }\n\n // Load target public key generated from enclave and set in local storage\n targetPublicBuf = TKHQ.uint8arrayFromHexString(signedData.targetPublic);\n break;\n }\n default:\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n\n const targetPublicKeyJwk = await TKHQ.loadTargetKey(\n new Uint8Array(targetPublicBuf)\n );\n TKHQ.setTargetEmbeddedKey(targetPublicKeyJwk);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when EXTRACT_WALLET_ENCRYPTED_BUNDLE event is received.\n * Prerequisite: This function uses the target public key in local storage that is imported\n * from the INJECT_IMPORT_BUNDLE event.\n * Uses the target public key in local storage to encrypt the text entered in the\n * `plaintext` textarea element. Upon successful encryption, sends\n * an `encrypted_bundle` containing the ciphertext and encapped public key.\n * Example bundle: {\"encappedPublic\":\"0497f33f3306f67f4402d4824e15b63b04786b6558d417aac2fef69051e46fa7bfbe776b142e4ded4f02097617a7588e93c53b71f900a4a8831a31be6f95e5f60f\",\"ciphertext\":\"c17c3085505f3c094f0fa61791395b83ab1d8c90bdf9f12a64fc6e2e9cba266beb528f65c88bd933e36e6203752a9b63e6a92290a0ab6bf0ed591cf7bfa08006001e2cc63870165dc99ec61554ffdc14dea7d567e62cceed29314ae6c71a013843f5c06146dee5bf9c1d\"}\n * @param {string} requestId\n */\nasync function onExtractWalletEncryptedBundle(requestId) {\n // Get target embedded key from previous step (onInjectImportBundle)\n const targetPublicKeyJwk = TKHQ.getTargetEmbeddedKey();\n if (targetPublicKeyJwk == null) {\n throw new Error(\"no target key found\");\n }\n\n // Get plaintext wallet mnemonic\n const plaintext = document.getElementById(\"plaintext\").value.trim();\n if (!plaintext) {\n throw new Error(\"no wallet mnemonic entered\");\n }\n\n const passphrase = document.getElementById(\"passphrase\").value;\n\n validateMnemonic(plaintext);\n\n const combined =\n passphrase === \"\" ? plaintext : `${plaintext}\\n--PASS--\\n${passphrase}`;\n const plaintextBuf = new TextEncoder().encode(combined);\n\n // Encrypt the bundle using the enclave target public key\n const encryptedBundle = await HpkeEncrypt({\n plaintextBuf,\n receiverPubJwk: targetPublicKeyJwk,\n });\n\n // Reset target embedded key after using for encryption\n TKHQ.resetTargetEmbeddedKey();\n\n // Send up ENCRYPTED_BUNDLE_EXTRACTED message\n TKHQ.sendMessageUp(\"ENCRYPTED_BUNDLE_EXTRACTED\", encryptedBundle, requestId);\n}\n\n/**\n * Function triggered when EXTRACT_KEY_ENCRYPTED_BUNDLE event is received.\n * Prerequisite: This function uses the target public key in local storage that is imported\n * from the INJECT_IMPORT_BUNDLE event.\n * Uses the target public key in local storage to encrypt the text entered in the\n * `plaintext` textarea element. Upon successful encryption, sends\n * an `encrypted_bundle` containing the ciphertext and encapped public key.\n * Example bundle: {\"encappedPublic\":\"0497f33f3306f67f4402d4824e15b63b04786b6558d417aac2fef69051e46fa7bfbe776b142e4ded4f02097617a7588e93c53b71f900a4a8831a31be6f95e5f60f\",\"ciphertext\":\"c17c3085505f3c094f0fa61791395b83ab1d8c90bdf9f12a64fc6e2e9cba266beb528f65c88bd933e36e6203752a9b63e6a92290a0ab6bf0ed591cf7bfa08006001e2cc63870165dc99ec61554ffdc14dea7d567e62cceed29314ae6c71a013843f5c06146dee5bf9c1d\"}\n * @param {string} keyFormat\n * @param {string} requestId\n */\nasync function onExtractKeyEncryptedBundle(keyFormat, requestId) {\n // Get target embedded key from previous step (onInjectImportBundle)\n const targetPublicKeyJwk = TKHQ.getTargetEmbeddedKey();\n if (targetPublicKeyJwk == null) {\n throw new Error(\"no target key found\");\n }\n\n // Get plaintext private key\n const plaintext = document.getElementById(\"plaintext\").value.trim();\n if (!plaintext) {\n throw new Error(\"no private key entered\");\n }\n const plaintextBuf = await TKHQ.decodeKey(plaintext, keyFormat);\n\n // Encrypt the bundle using the enclave target public key\n const encryptedBundle = await HpkeEncrypt({\n plaintextBuf,\n receiverPubJwk: targetPublicKeyJwk,\n });\n\n // Reset target embedded key after using for encryption\n TKHQ.resetTargetEmbeddedKey();\n\n // Send up ENCRYPTED_BUNDLE_EXTRACTED message\n TKHQ.sendMessageUp(\"ENCRYPTED_BUNDLE_EXTRACTED\", encryptedBundle, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.\" + {\"291\":\"b62abe64ba4ebf68e89b\",\"825\":\"3a4aff0e743a7540fe25\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.p = \"/\";","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t57: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkimport\"] = self[\"webpackChunkimport\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96,551], () => (__webpack_require__(954)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","window","TKHQ","iframeMessagePort","messageListenerController","AbortController","turnkeyInitController","messageEventListener","_ref","_regeneratorRuntime","mark","_callee","event","wrap","_context","prev","next","data","onInjectImportBundle","t0","toString","onExtractWalletEncryptedBundle","t1","onExtractKeyEncryptedBundle","t2","onApplySettings","t3","stop","_x","validateMnemonic","mnemonic","includes","Error","_x3","_x4","_x5","_x6","_onInjectImportBundle","_callee5","bundle","organizationId","userId","requestId","targetPublicBuf","bundleObj","signedData","targetPublicKeyJwk","_context5","JSON","parse","version","dataSignature","enclaveQuorumPublic","sent","concat","TextDecoder","decode","console","warn","targetPublic","abrupt","Uint8Array","_x7","_onExtractWalletEncryptedBundle","_callee6","plaintext","passphrase","combined","plaintextBuf","encryptedBundle","_context6","document","getElementById","trim","TextEncoder","encode","HpkeEncrypt","receiverPubJwk","_x8","_x9","_onExtractKeyEncryptedBundle","_callee7","keyFormat","_context7","_x10","_x11","_onApplySettings","_callee8","settings","validSettings","_context8","addEventListener","_callee3","styleSettings","plaintextTextarea","_context3","capture","signal","aborted","_callee2","permStatus","_context2","navigator","permissions","query","name","state","clipboard","writeText","_ref4","_callee4","_event$ports","_context4","ports","abort","origin","onmessage","_x2","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","O","result","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","j","keys","every","key","splice","obj","mode","this","__esModule","ns","def","current","indexOf","getOwnPropertyNames","forEach","definition","get","chunkId","all","reduce","promises","miniCssF","g","globalThis","Function","prop","hasOwnProperty","url","push","script","needAttach","scripts","getElementsByTagName","s","getAttribute","createElement","charset","nc","setAttribute","src","onScriptComplete","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","type","target","head","appendChild","installedChunks","installedChunkData","promise","reject","error","errorType","realSrc","message","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","id","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js.map b/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js.map deleted file mode 100644 index 580c53e..0000000 --- a/import/dist/index.bundle.fd323f4d5a9bfc580fd2.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"index.bundle.fd323f4d5a9bfc580fd2.js","mappings":";uBAAIA,ECCAC,EADAC,ECAAC,EACAC,E,24ECAJ,IAAAC,EAAAC,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,aAAA,yBAAAC,EAAAN,EAAAE,EAAAE,EAAAE,GAAA,IAAAC,EAAAL,GAAAA,EAAAM,qBAAAC,EAAAP,EAAAO,EAAAC,EAAAC,OAAAC,OAAAL,EAAAC,WAAA,OAAAK,EAAAH,EAAA,mBAAAV,EAAAE,EAAAE,GAAA,IAAAE,EAAAC,EAAAG,EAAAI,EAAA,EAAAC,EAAAX,GAAA,GAAAY,GAAA,EAAAC,EAAA,CAAAF,EAAA,EAAAb,EAAA,EAAAgB,EAAApB,EAAAqB,EAAAC,EAAAN,EAAAM,EAAAC,KAAAvB,EAAA,GAAAsB,EAAA,SAAArB,EAAAC,GAAA,OAAAM,EAAAP,EAAAQ,EAAA,EAAAG,EAAAZ,EAAAmB,EAAAf,EAAAF,EAAAmB,CAAA,YAAAC,EAAApB,EAAAE,GAAA,IAAAK,EAAAP,EAAAU,EAAAR,EAAAH,EAAA,GAAAiB,GAAAF,IAAAV,GAAAL,EAAAgB,EAAAO,OAAAvB,IAAA,KAAAK,EAAAE,EAAAS,EAAAhB,GAAAqB,EAAAH,EAAAF,EAAAQ,EAAAjB,EAAA,GAAAN,EAAA,GAAAI,EAAAmB,IAAArB,KAAAQ,EAAAJ,GAAAC,EAAAD,EAAA,OAAAC,EAAA,MAAAD,EAAA,GAAAA,EAAA,GAAAR,GAAAQ,EAAA,IAAAc,KAAAhB,EAAAJ,EAAA,GAAAoB,EAAAd,EAAA,KAAAC,EAAA,EAAAU,EAAAC,EAAAhB,EAAAe,EAAAf,EAAAI,EAAA,IAAAc,EAAAG,IAAAnB,EAAAJ,EAAA,GAAAM,EAAA,GAAAJ,GAAAA,EAAAqB,KAAAjB,EAAA,GAAAN,EAAAM,EAAA,GAAAJ,EAAAe,EAAAf,EAAAqB,EAAAhB,EAAA,OAAAH,GAAAJ,EAAA,SAAAmB,EAAA,MAAAH,GAAA,EAAAd,CAAA,iBAAAE,EAAAW,EAAAQ,GAAA,GAAAT,EAAA,QAAAU,UAAA,oCAAAR,GAAA,IAAAD,GAAAK,EAAAL,EAAAQ,GAAAhB,EAAAQ,EAAAL,EAAAa,GAAAxB,EAAAQ,EAAA,EAAAT,EAAAY,KAAAM,GAAA,CAAAV,IAAAC,EAAAA,EAAA,GAAAA,EAAA,IAAAU,EAAAf,GAAA,GAAAkB,EAAAb,EAAAG,IAAAO,EAAAf,EAAAQ,EAAAO,EAAAC,EAAAR,GAAA,OAAAI,EAAA,EAAAR,EAAA,IAAAC,IAAAH,EAAA,QAAAL,EAAAO,EAAAF,GAAA,MAAAL,EAAAA,EAAA0B,KAAAnB,EAAAI,IAAA,MAAAc,UAAA,wCAAAzB,EAAA2B,KAAA,OAAA3B,EAAAW,EAAAX,EAAA4B,MAAApB,EAAA,IAAAA,EAAA,YAAAA,IAAAR,EAAAO,EAAA,SAAAP,EAAA0B,KAAAnB,GAAAC,EAAA,IAAAG,EAAAc,UAAA,oCAAApB,EAAA,YAAAG,EAAA,GAAAD,EAAAR,CAAA,UAAAC,GAAAiB,EAAAC,EAAAf,EAAA,GAAAQ,EAAAV,EAAAyB,KAAAvB,EAAAe,MAAAE,EAAA,YAAApB,GAAAO,EAAAR,EAAAS,EAAA,EAAAG,EAAAX,CAAA,SAAAe,EAAA,UAAAa,MAAA5B,EAAA2B,KAAAV,EAAA,GAAAhB,EAAAI,EAAAE,IAAA,GAAAI,CAAA,KAAAS,EAAA,YAAAV,IAAA,UAAAmB,IAAA,UAAAC,IAAA,CAAA9B,EAAAY,OAAAmB,eAAA,IAAAvB,EAAA,GAAAL,GAAAH,EAAAA,EAAA,GAAAG,QAAAW,EAAAd,EAAA,GAAAG,EAAA,yBAAAH,GAAAW,EAAAmB,EAAArB,UAAAC,EAAAD,UAAAG,OAAAC,OAAAL,GAAA,SAAAO,EAAAhB,GAAA,OAAAa,OAAAoB,eAAApB,OAAAoB,eAAAjC,EAAA+B,IAAA/B,EAAAkC,UAAAH,EAAAhB,EAAAf,EAAAM,EAAA,sBAAAN,EAAAU,UAAAG,OAAAC,OAAAF,GAAAZ,CAAA,QAAA8B,EAAApB,UAAAqB,EAAAhB,EAAAH,EAAA,cAAAmB,GAAAhB,EAAAgB,EAAA,cAAAD,GAAAA,EAAAK,YAAA,oBAAApB,EAAAgB,EAAAzB,EAAA,qBAAAS,EAAAH,GAAAG,EAAAH,EAAAN,EAAA,aAAAS,EAAAH,EAAAR,EAAA,yBAAAW,EAAAH,EAAA,oDAAAwB,EAAA,kBAAAC,EAAA7B,EAAA8B,EAAAtB,EAAA,cAAAD,EAAAf,EAAAE,EAAAE,EAAAH,GAAA,IAAAO,EAAAK,OAAA0B,eAAA,IAAA/B,EAAA,gBAAAR,GAAAQ,EAAA,EAAAO,EAAA,SAAAf,EAAAE,EAAAE,EAAAH,GAAA,SAAAK,EAAAJ,EAAAE,GAAAW,EAAAf,EAAAE,EAAA,SAAAF,GAAA,YAAAwC,QAAAtC,EAAAE,EAAAJ,EAAA,GAAAE,EAAAM,EAAAA,EAAAR,EAAAE,EAAA,CAAA2B,MAAAzB,EAAAqC,YAAAxC,EAAAyC,cAAAzC,EAAA0C,UAAA1C,IAAAD,EAAAE,GAAAE,GAAAE,EAAA,UAAAA,EAAA,WAAAA,EAAA,cAAAS,EAAAf,EAAAE,EAAAE,EAAAH,EAAA,UAAA2C,EAAA5C,EAAAsB,GAAA,KAAAF,EAAApB,EAAA,KAAA6C,EAAAvB,CAAA,UAAAwB,EAAA1C,EAAAH,EAAAD,EAAAE,EAAAI,EAAAe,EAAAZ,GAAA,QAAAD,EAAAJ,EAAAiB,GAAAZ,GAAAG,EAAAJ,EAAAqB,KAAA,OAAAzB,GAAA,YAAAJ,EAAAI,EAAA,CAAAI,EAAAoB,KAAA3B,EAAAW,GAAAmC,QAAAC,QAAApC,GAAAqC,KAAA/C,EAAAI,EAAA,UAAA4C,EAAA9C,GAAA,sBAAAH,EAAA,KAAAD,EAAAmD,UAAA,WAAAJ,QAAA,SAAA7C,EAAAI,GAAA,IAAAe,EAAAjB,EAAAgD,MAAAnD,EAAAD,GAAA,SAAAqD,EAAAjD,GAAA0C,EAAAzB,EAAAnB,EAAAI,EAAA+C,EAAAC,EAAA,OAAAlD,EAAA,UAAAkD,EAAAlD,GAAA0C,EAAAzB,EAAAnB,EAAAI,EAAA+C,EAAAC,EAAA,QAAAlD,EAAA,CAAAiD,OAAA,MAIAE,OAAOC,KAAOA,EAGd,IAAIC,EAAoB,KAGlBC,EAA4B,IAAIC,gBAChCC,EAAwB,IAAID,gBAK9BE,EAAoB,eAAAC,EAAAZ,EAAAa,IAAAC,KAAG,SAAAC,EAAgBC,GAAK,OAAAH,IAAAI,KAAA,SAAAC,GAAA,cAAAA,EAAAC,KAAAD,EAAAE,MAAA,WAC1CJ,EAAMK,MAA8B,wBAAtBL,EAAMK,KAAW,KAA2B,CAAAH,EAAAE,KAAA,eAAAF,EAAAC,KAAA,EAAAD,EAAAE,KAAA,EAEpDE,EACJN,EAAMK,KAAY,MAClBL,EAAMK,KAAqB,eAC3BL,EAAMK,KAAa,OACnBL,EAAMK,KAAgB,WACvB,OAAAH,EAAAE,KAAA,eAAAF,EAAAC,KAAA,EAAAD,EAAAK,GAAAL,EAAA,SAEDZ,EAAAA,cAAmB,QAASY,EAAAK,GAAEC,WAAYR,EAAMK,KAAgB,WAAG,WAGnEL,EAAMK,MAA8B,mCAAtBL,EAAMK,KAAW,KAAsC,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE/DK,EAA+BT,EAAMK,KAAgB,WAAE,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAQ,GAAAR,EAAA,UAE7DZ,EAAAA,cAAmB,QAASY,EAAAQ,GAAEF,WAAYR,EAAMK,KAAgB,WAAG,YAGnEL,EAAMK,MAA8B,gCAAtBL,EAAMK,KAAW,KAAmC,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE5DO,EACJX,EAAMK,KAAgB,UACtBL,EAAMK,KAAgB,WACvB,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAU,GAAAV,EAAA,UAEDZ,EAAAA,cAAmB,QAASY,EAAAU,GAAEJ,WAAYR,EAAMK,KAAgB,WAAG,YAGnEL,EAAMK,MAA8B,kBAAtBL,EAAMK,KAAW,KAAqB,CAAAH,EAAAE,KAAA,gBAAAF,EAAAC,KAAA,GAAAD,EAAAE,KAAA,GAE9CS,EAAgBb,EAAMK,KAAY,MAAGL,EAAMK,KAAgB,WAAE,QAAAH,EAAAE,KAAA,iBAAAF,EAAAC,KAAA,GAAAD,EAAAY,GAAAZ,EAAA,UAEnEZ,EAAAA,cAAmB,QAASY,EAAAY,GAAEN,WAAYR,EAAMK,KAAgB,WAAG,yBAAAH,EAAAa,OAAA,EAAAhB,EAAA,yCAGxE,gBArCuBiB,GAAA,OAAApB,EAAAV,MAAA,KAAAD,UAAA,KAgIxB,SAASgC,EAAiBC,GACxB,GAAIA,EAASC,SAAS,gBACpB,MAAM,IAAIC,MAAM,uDAElB,GAAIF,EAASC,SAAS,MACpB,MAAM,IAAIC,MAAM,6CAEpB,CAEA,SAUed,EAAoBe,EAAAC,EAAAC,EAAAC,GAAA,OAAAC,EAAAvC,MAAC,KAADD,UAAA,CAoFnC,SAAAwC,IAFC,OAEDA,EAAAzC,EAAAa,IAAAC,KApFA,SAAA4B,EAAoCC,EAAQC,EAAgBC,EAAQC,GAAS,IAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAArC,IAAAI,KAAA,SAAAkC,GAAA,cAAAA,EAAAhC,KAAAgC,EAAA/B,MAAA,OAKrE4B,EAAYI,KAAKC,MAAMV,GAAOQ,EAAA5B,GAE5ByB,EAAUM,QAAOH,EAAA/B,KAClB,WADkB+B,EAAA5B,GACV,qBAENyB,EAAU3B,KAAM,CAAF8B,EAAA/B,KAAA,cACX,IAAIgB,MAAM,4BAA2B,UAExCY,EAAUO,cAAe,CAAFJ,EAAA/B,KAAA,cACpB,IAAIgB,MAAM,qCAAoC,UAEjDY,EAAUQ,oBAAqB,CAAFL,EAAA/B,KAAA,eAC1B,IAAIgB,MAAM,2CAA0C,WAIvD9B,EAAAA,uBAA6B,CAAF6C,EAAA/B,KAAA,eACxB,IAAIgB,MAAM,qBAAoB,eAAAe,EAAA/B,KAAA,GAErBd,EAAAA,uBACf0C,EAAUQ,oBACVR,EAAUO,cACVP,EAAU3B,MACX,QAJO,GAAA8B,EAAAM,KAKO,CAAFN,EAAA/B,KAAA,eACL,IAAIgB,MAAM,uCAADsB,OAAwCf,IAAS,QAQlE,GAJMM,EAAaG,KAAKC,OACtB,IAAIM,aAAcC,OAAOtD,EAAAA,wBAA6B0C,EAAU3B,QAI7DuB,EAAgB,CAAFO,EAAA/B,KAAA,SAEjByC,QAAQC,KACN,sHACAX,EAAA/B,KAAA,oBAED6B,EAAWL,gBACZK,EAAWL,iBAAmBA,EAAc,CAAAO,EAAA/B,KAAA,eAEtC,IAAIgB,MAAM,4DAADsB,OAC+Cd,EAAc,aAAAc,OAAYT,EAAWL,eAAc,MAChH,WAEEC,EAAQ,CAAFM,EAAA/B,KAAA,SAETyC,QAAQC,KACN,8GACAX,EAAA/B,KAAA,oBACQ6B,EAAWJ,QAAUI,EAAWJ,SAAWA,EAAM,CAAAM,EAAA/B,KAAA,eACrD,IAAIgB,MAAM,oDAADsB,OACuCb,EAAM,aAAAa,OAAYT,EAAWJ,OAAM,MACxF,WAGEI,EAAWc,aAAc,CAAFZ,EAAA/B,KAAA,eACpB,IAAIgB,MAAM,gDAA+C,QAIO,OAAxEW,EAAkBzC,EAAAA,wBAA6B2C,EAAWc,cAAcZ,EAAAa,OAAA,0BAIlE,IAAI5B,MAAM,wBAADsB,OAAyBV,EAAUM,UAAU,eAAAH,EAAA/B,KAAA,GAG/Bd,EAAAA,cAC/B,IAAI2D,WAAWlB,IAChB,QAFKG,EAAkBC,EAAAM,KAGxBnD,EAAAA,qBAA0B4C,GAG1B5C,EAAAA,cAAmB,mBAAmB,EAAMwC,GAAW,yBAAAK,EAAApB,OAAA,EAAAW,EAAA,KACxDxC,MAAA,KAAAD,UAAA,UAYcwB,EAA8ByC,GAAA,OAAAC,EAAAjE,MAAC,KAADD,UAAA,CAkC7C,SAAAkE,IAFC,OAEDA,EAAAnE,EAAAa,IAAAC,KAlCA,SAAAsD,EAA8CtB,GAAS,IAAAI,EAAAmB,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAA5D,IAAAI,KAAA,SAAAyD,GAAA,cAAAA,EAAAvD,KAAAuD,EAAAtD,MAAA,OAEC,GAC5B,OADpB8B,EAAqB5C,EAAAA,wBACG,CAAAoE,EAAAtD,KAAA,cACtB,IAAIgB,MAAM,uBAAsB,OAI2B,GAA7DiC,EAAYM,SAASC,eAAe,aAAajG,MAAMkG,OAC7C,CAAFH,EAAAtD,KAAA,cACN,IAAIgB,MAAM,8BAA6B,OAW/C,OARMkC,EAAaK,SAASC,eAAe,cAAcjG,MAEzDsD,EAAiBoC,GAEXE,EACW,KAAfD,EAAoBD,EAAY,GAAHX,OAAMW,EAAS,gBAAAX,OAAeY,GACvDE,GAAe,IAAIM,aAAcC,OAAOR,GAE9CG,EAAAtD,KAAA,IAC8B4D,EAAAA,EAAAA,GAAY,CACxCR,aAAAA,EACAS,eAAgB/B,IAChB,QAHIuB,EAAeC,EAAAjB,KAMrBnD,EAAAA,yBAGAA,EAAAA,cAAmB,6BAA8BmE,EAAiB3B,GAAW,yBAAA4B,EAAA3C,OAAA,EAAAqC,EAAA,KAC9ElE,MAAA,KAAAD,UAAA,UAac0B,EAA2BuD,EAAAC,GAAA,OAAAC,EAAAlF,MAAC,KAADD,UAAA,CA2B1C,SAAAmF,IAFC,OAEDA,EAAApF,EAAAa,IAAAC,KA3BA,SAAAuE,EAA2CC,EAAWxC,GAAS,IAAAI,EAAAmB,EAAAG,EAAAC,EAAA,OAAA5D,IAAAI,KAAA,SAAAsE,GAAA,cAAAA,EAAApE,KAAAoE,EAAAnE,MAAA,OAEP,GAC5B,OADpB8B,EAAqB5C,EAAAA,wBACG,CAAAiF,EAAAnE,KAAA,cACtB,IAAIgB,MAAM,uBAAsB,OAI2B,GAA7DiC,EAAYM,SAASC,eAAe,aAAajG,MAAMkG,OAC7C,CAAFU,EAAAnE,KAAA,cACN,IAAIgB,MAAM,0BAAyB,cAAAmD,EAAAnE,KAAA,EAEhBd,EAAAA,UAAe+D,EAAWiB,GAAU,OAA7C,OAAZd,EAAYe,EAAA9B,KAAA8B,EAAAnE,KAAG,IAGS4D,EAAAA,EAAAA,GAAY,CACxCR,aAAAA,EACAS,eAAgB/B,IAChB,QAHIuB,EAAec,EAAA9B,KAMrBnD,EAAAA,yBAGAA,EAAAA,cAAmB,6BAA8BmE,EAAiB3B,GAAW,yBAAAyC,EAAAxD,OAAA,EAAAsD,EAAA,KAC9EnF,MAAA,KAAAD,UAAA,UAUc4B,EAAe2D,EAAAC,GAAA,OAAAC,EAAAxF,MAAC,KAADD,UAAA,UAAAyF,IAS7B,OAT6BA,EAAA1F,EAAAa,IAAAC,KAA9B,SAAA6E,EAA+BC,EAAU9C,GAAS,IAAA+C,EAAA,OAAAhF,IAAAI,KAAA,SAAA6E,GAAA,cAAAA,EAAA3E,KAAA2E,EAAA1E,MAAA,OAE1CyE,EAAgBvF,EAAAA,cAAmBsF,GAGzCtF,EAAAA,YAAiBuF,GAGjBvF,EAAAA,cAAmB,oBAAoB,EAAMwC,GAAW,wBAAAgD,EAAA/D,OAAA,EAAA4D,EAAA,KACzDzF,MAAA,KAAAD,UAAA,CAhSD0E,SAASoB,iBACP,mBAAkB/F,EAAAa,IAAAC,KAClB,SAAAkF,IAAA,IAAAC,EAAAC,EAAA,OAAArF,IAAAI,KAAA,SAAAkF,GAAA,cAAAA,EAAAhF,KAAAgF,EAAA/E,MAAA,OAIK,GAHHf,OAAO0F,iBAAiB,UAAWpF,EAAsB,CACvDyF,SAAS,EACTC,OAAQ7F,EAA0B6F,SAG/B7F,EAA0B6F,OAAOC,QAAS,CAAFH,EAAA/E,KAAA,QAamB,IAXxD6E,EAAgB3F,EAAAA,gBAEpBA,EAAAA,cAAmB2F,GAOrB3F,EAAAA,cAAmB,mBAAoB,IAEjC4F,EAAoBvB,SAASC,eAAe,aAC1B,CAAFuB,EAAA/E,KAAA,eAAA+E,EAAAnC,OAAA,iBAGtBkC,EAAkBH,iBAAiB,QAAO/F,EAAAa,IAAAC,KAAE,SAAAyF,IAAA,IAAAC,EAAA,OAAA3F,IAAAI,KAAA,SAAAwF,GAAA,cAAAA,EAAAtF,KAAAsF,EAAArF,MAAA,cAAAqF,EAAAtF,KAAA,EAAAsF,EAAArF,KAAA,EAIfsF,UAAUC,YAChCC,MAAM,CAAEC,KAAM,oBAAqB,MAC7B,kBAAM,IAAI,GAAC,OAFJ,GAMQ,aAAtBL,OANIA,EAAUC,EAAAhD,WAMJ,EAAV+C,EAAYM,QACU,YAAtBN,aAAU,EAAVA,EAAYM,OAAkB,CAAAL,EAAArF,KAAA,eAAAqF,EAAArF,KAAA,EAExBsF,UAAUK,UAAUC,UAAU,IAAG,OAAAP,EAAArF,KAAA,gBAAAqF,EAAAtF,KAAA,EAAAsF,EAAAlF,GAAAkF,EAAA,kCAAAA,EAAA1E,OAAA,EAAAwE,EAAA,kBAK1C,wBAAAJ,EAAApE,OAAA,EAAAiE,EAAA,KAGP,GAGF3F,OAAO0F,iBACL,UAAS,eAAAkB,EAAAjH,EAAAa,IAAAC,KACT,SAAAoG,EAAgBlG,GAAK,IAAAmG,EAAA,OAAAtG,IAAAI,KAAA,SAAAmG,GAAA,cAAAA,EAAAjG,KAAAiG,EAAAhG,MAAA,OAQjBJ,EAAMK,MACgB,gCAAtBL,EAAMK,KAAW,MACN,QADyC8F,EACpDnG,EAAMqG,aAAK,IAAAF,GAAXA,EAAc,KAGd3G,EAA0B8G,SAE1B/G,EAAoBS,EAAMqG,MAAM,IACdE,UAAY5G,EAE9BL,EAAAA,iCAAsCC,GAOtCD,EAAAA,cAAmB,mBAAoB,IAGvCI,EAAsB4G,SACvB,wBAAAF,EAAArF,OAAA,EAAAmF,EAAA,IACF,gBAAAM,GAAA,OAAAP,EAAA/G,MAAA,KAAAD,UAAA,EA/BQ,GAgCT,CAAEoG,OAAQ3F,EAAsB2F,Q,GC5I9BoB,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBtI,EAAI4I,EJzBpBvL,EAAW,GACfiL,EAAoBO,EAAI,CAACC,EAAQC,EAAUC,EAAIC,KAC9C,IAAGF,EAAH,CAMA,IAAIG,EAAeC,IACnB,IAASjL,EAAI,EAAGA,EAAIb,EAAS6B,OAAQhB,IAAK,CAGzC,IAFA,IAAK6K,EAAUC,EAAIC,GAAY5L,EAASa,GACpCkL,GAAY,EACPC,EAAI,EAAGA,EAAIN,EAAS7J,OAAQmK,MACpB,EAAXJ,GAAsBC,GAAgBD,IAAa1K,OAAO+K,KAAKhB,EAAoBO,GAAGU,MAAOC,GAASlB,EAAoBO,EAAEW,GAAKT,EAASM,KAC9IN,EAASU,OAAOJ,IAAK,IAErBD,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACb/L,EAASoM,OAAOvL,IAAK,GACrB,IAAIN,EAAIoL,SACEP,IAAN7K,IAAiBkL,EAASlL,EAC/B,CACD,CACA,OAAOkL,CAnBP,CAJCG,EAAWA,GAAY,EACvB,IAAI,IAAI/K,EAAIb,EAAS6B,OAAQhB,EAAI,GAAKb,EAASa,EAAI,GAAG,GAAK+K,EAAU/K,IAAKb,EAASa,GAAKb,EAASa,EAAI,GACrGb,EAASa,GAAK,CAAC6K,EAAUC,EAAIC,ICL3B1L,EAAWgB,OAAOmB,eAAkBgK,GAASnL,OAAOmB,eAAegK,GAASA,GAASA,EAAa,UAQtGpB,EAAoB3K,EAAI,SAAS4B,EAAOoK,GAEvC,GADU,EAAPA,IAAUpK,EAAQqK,KAAKrK,IAChB,EAAPoK,EAAU,OAAOpK,EACpB,GAAoB,iBAAVA,GAAsBA,EAAO,CACtC,GAAW,EAAPoK,GAAapK,EAAMsK,WAAY,OAAOtK,EAC1C,GAAW,GAAPoK,GAAoC,mBAAfpK,EAAMoB,KAAqB,OAAOpB,CAC5D,CACA,IAAIuK,EAAKvL,OAAOC,OAAO,MACvB8J,EAAoB1K,EAAEkM,GACtB,IAAIC,EAAM,CAAC,EACXzM,EAAiBA,GAAkB,CAAC,KAAMC,EAAS,CAAC,GAAIA,EAAS,IAAKA,EAASA,IAC/E,IAAI,IAAIyM,EAAiB,EAAPL,GAAYpK,GAA0B,iBAAXyK,GAAyC,mBAAXA,MAA4B1M,EAAe2M,QAAQD,GAAUA,EAAUzM,EAASyM,GAC1JzL,OAAO2L,oBAAoBF,GAASG,QAASX,GAASO,EAAIP,GAAO,IAAOjK,EAAMiK,IAI/E,OAFAO,EAAa,QAAI,IAAM,EACvBzB,EAAoBtJ,EAAE8K,EAAIC,GACnBD,CACR,EIxBAxB,EAAoBtJ,EAAI,CAAC0J,EAAS0B,KACjC,IAAI,IAAIZ,KAAOY,EACX9B,EAAoBtK,EAAEoM,EAAYZ,KAASlB,EAAoBtK,EAAE0K,EAASc,IAC5EjL,OAAO0B,eAAeyI,EAASc,EAAK,CAAErJ,YAAY,EAAMkK,IAAKD,EAAWZ,MCJ3ElB,EAAoB5J,EAAI,CAAC,EAGzB4J,EAAoB5K,EAAK4M,GACjB7J,QAAQ8J,IAAIhM,OAAO+K,KAAKhB,EAAoB5J,GAAG8L,OAAO,CAACC,EAAUjB,KACvElB,EAAoB5J,EAAE8K,GAAKc,EAASG,GAC7BA,GACL,KCNJnC,EAAoBhK,EAAKgM,GAEZA,EAAU,WAAa,CAAC,IAAM,uBAAuB,IAAM,wBAAwBA,GAAW,MCF3GhC,EAAoBoC,SAAYJ,MCDhChC,EAAoBqC,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOhB,MAAQ,IAAIiB,SAAS,cAAb,EAChB,CAAE,MAAOnN,GACR,GAAsB,iBAAXuD,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBqH,EAAoBtK,EAAI,CAAC0L,EAAKoB,IAAUvM,OAAOH,UAAU2M,eAAe1L,KAAKqK,EAAKoB,GRA9EtN,EAAa,CAAC,EACdC,EAAoB,UAExB6K,EAAoBnJ,EAAI,CAAC6L,EAAK1L,EAAMkK,EAAKc,KACxC,GAAG9M,EAAWwN,GAAQxN,EAAWwN,GAAKC,KAAK3L,OAA3C,CACA,IAAI4L,EAAQC,EACZ,QAAW1C,IAARe,EAEF,IADA,IAAI4B,EAAU7F,SAAS8F,qBAAqB,UACpCnN,EAAI,EAAGA,EAAIkN,EAAQlM,OAAQhB,IAAK,CACvC,IAAIoN,EAAIF,EAAQlN,GAChB,GAAGoN,EAAEC,aAAa,QAAUP,GAAOM,EAAEC,aAAa,iBAAmB9N,EAAoB+L,EAAK,CAAE0B,EAASI,EAAG,KAAO,CACpH,CAEGJ,IACHC,GAAa,GACbD,EAAS3F,SAASiG,cAAc,WAEzBC,QAAU,QACbnD,EAAoBoD,IACvBR,EAAOS,aAAa,QAASrD,EAAoBoD,IAElDR,EAAOS,aAAa,eAAgBlO,EAAoB+L,GAExD0B,EAAOU,IAAMZ,GAEdxN,EAAWwN,GAAO,CAAC1L,GACnB,IAAIuM,EAAmB,CAAC9J,EAAMH,KAE7BsJ,EAAOY,QAAUZ,EAAOa,OAAS,KACjCC,aAAaC,GACb,IAAIC,EAAU1O,EAAWwN,GAIzB,UAHOxN,EAAWwN,GAClBE,EAAOiB,YAAcjB,EAAOiB,WAAWC,YAAYlB,GACnDgB,GAAWA,EAAQ/B,QAASnB,GAAQA,EAAGpH,IACpCG,EAAM,OAAOA,EAAKH,IAElBqK,EAAUI,WAAWR,EAAiB5M,KAAK,UAAMwJ,EAAW,CAAE6D,KAAM,UAAWC,OAAQrB,IAAW,MACtGA,EAAOY,QAAUD,EAAiB5M,KAAK,KAAMiM,EAAOY,SACpDZ,EAAOa,OAASF,EAAiB5M,KAAK,KAAMiM,EAAOa,QACnDZ,GAAc5F,SAASiH,KAAKC,YAAYvB,EAnCkB,GSH3D5C,EAAoB1K,EAAK8K,IACH,oBAAX7K,QAA0BA,OAAOI,aAC1CM,OAAO0B,eAAeyI,EAAS7K,OAAOI,YAAa,CAAEsB,MAAO,WAE7DhB,OAAO0B,eAAeyI,EAAS,aAAc,CAAEnJ,OAAO,KCLvD+I,EAAoB3J,EAAI,I,MCKxB,IAAI+N,EAAkB,CACrB,GAAI,GAGLpE,EAAoB5J,EAAE2K,EAAI,CAACiB,EAASG,KAElC,IAAIkC,EAAqBrE,EAAoBtK,EAAE0O,EAAiBpC,GAAWoC,EAAgBpC,QAAW7B,EACtG,GAA0B,IAAvBkE,EAGF,GAAGA,EACFlC,EAASQ,KAAK0B,EAAmB,QAC3B,CAGL,IAAIC,EAAU,IAAInM,QAAQ,CAACC,EAASmM,IAAYF,EAAqBD,EAAgBpC,GAAW,CAAC5J,EAASmM,IAC1GpC,EAASQ,KAAK0B,EAAmB,GAAKC,GAGtC,IAAI5B,EAAM1C,EAAoB3J,EAAI2J,EAAoBhK,EAAEgM,GAEpDwC,EAAQ,IAAI9J,MAgBhBsF,EAAoBnJ,EAAE6L,EAfFpJ,IACnB,GAAG0G,EAAoBtK,EAAE0O,EAAiBpC,KAEf,KAD1BqC,EAAqBD,EAAgBpC,MACRoC,EAAgBpC,QAAW7B,GACrDkE,GAAoB,CACtB,IAAII,EAAYnL,IAAyB,SAAfA,EAAM0K,KAAkB,UAAY1K,EAAM0K,MAChEU,EAAUpL,GAASA,EAAM2K,QAAU3K,EAAM2K,OAAOX,IACpDkB,EAAMG,QAAU,iBAAmB3C,EAAU,cAAgByC,EAAY,KAAOC,EAAU,IAC1FF,EAAMrF,KAAO,iBACbqF,EAAMR,KAAOS,EACbD,EAAMI,QAAUF,EAChBL,EAAmB,GAAGG,EACvB,GAGuC,SAAWxC,EAASA,EAE/D,GAYHhC,EAAoBO,EAAEQ,EAAKiB,GAA0C,IAA7BoC,EAAgBpC,GAGxD,IAAI6C,EAAuB,CAACC,EAA4BnL,KACvD,IAGIsG,EAAU+B,GAHTvB,EAAUsE,EAAaC,GAAWrL,EAGhB/D,EAAI,EAC3B,GAAG6K,EAASwE,KAAMC,GAAgC,IAAxBd,EAAgBc,IAAa,CACtD,IAAIjF,KAAY8E,EACZ/E,EAAoBtK,EAAEqP,EAAa9E,KACrCD,EAAoBtI,EAAEuI,GAAY8E,EAAY9E,IAGhD,GAAG+E,EAAS,IAAIxE,EAASwE,EAAQhF,EAClC,CAEA,IADG8E,GAA4BA,EAA2BnL,GACrD/D,EAAI6K,EAAS7J,OAAQhB,IACzBoM,EAAUvB,EAAS7K,GAChBoK,EAAoBtK,EAAE0O,EAAiBpC,IAAYoC,EAAgBpC,IACrEoC,EAAgBpC,GAAS,KAE1BoC,EAAgBpC,GAAW,EAE5B,OAAOhC,EAAoBO,EAAEC,IAG1B2E,EAAqBC,KAAyB,mBAAIA,KAAyB,oBAAK,GACpFD,EAAmBtD,QAAQgD,EAAqBlO,KAAK,KAAM,IAC3DwO,EAAmBxC,KAAOkC,EAAqBlO,KAAK,KAAMwO,EAAmBxC,KAAKhM,KAAKwO,G,KClFvF,IAAIE,EAAsBrF,EAAoBO,OAAEJ,EAAW,CAAC,GAAG,KAAM,IAAOH,EAAoB,MAChGqF,EAAsBrF,EAAoBO,EAAE8E,E","sources":["webpack://import/webpack/runtime/chunk loaded","webpack://import/webpack/runtime/create fake namespace object","webpack://import/webpack/runtime/load script","webpack://import/./src/index.js","webpack://import/webpack/bootstrap","webpack://import/webpack/runtime/define property getters","webpack://import/webpack/runtime/ensure chunk","webpack://import/webpack/runtime/get javascript chunk filename","webpack://import/webpack/runtime/get mini-css chunk filename","webpack://import/webpack/runtime/global","webpack://import/webpack/runtime/hasOwnProperty shorthand","webpack://import/webpack/runtime/make namespace object","webpack://import/webpack/runtime/publicPath","webpack://import/webpack/runtime/jsonp chunk loading","webpack://import/webpack/startup"],"sourcesContent":["var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var getProto = Object.getPrototypeOf ? (obj) => (Object.getPrototypeOf(obj)) : (obj) => (obj.__proto__);\nvar leafPrototypes;\n// create a fake namespace object\n// mode & 1: value is a module id, require it\n// mode & 2: merge all properties of value into the ns\n// mode & 4: return value when already ns object\n// mode & 16: return value when it's Promise-like\n// mode & 8|1: behave like require\n__webpack_require__.t = function(value, mode) {\n\tif(mode & 1) value = this(value);\n\tif(mode & 8) return value;\n\tif(typeof value === 'object' && value) {\n\t\tif((mode & 4) && value.__esModule) return value;\n\t\tif((mode & 16) && typeof value.then === 'function') return value;\n\t}\n\tvar ns = Object.create(null);\n\t__webpack_require__.r(ns);\n\tvar def = {};\n\tleafPrototypes = leafPrototypes || [null, getProto({}), getProto([]), getProto(getProto)];\n\tfor(var current = mode & 2 && value; (typeof current == 'object' || typeof current == 'function') && !~leafPrototypes.indexOf(current); current = getProto(current)) {\n\t\tObject.getOwnPropertyNames(current).forEach((key) => (def[key] = () => (value[key])));\n\t}\n\tdef['default'] = () => (value);\n\t__webpack_require__.d(ns, def);\n\treturn ns;\n};","var inProgress = {};\nvar dataWebpackPrefix = \"import:\";\n// loadScript function to load a script via script tag\n__webpack_require__.l = (url, done, key, chunkId) => {\n\tif(inProgress[url]) { inProgress[url].push(done); return; }\n\tvar script, needAttach;\n\tif(key !== undefined) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tfor(var i = 0; i < scripts.length; i++) {\n\t\t\tvar s = scripts[i];\n\t\t\tif(s.getAttribute(\"src\") == url || s.getAttribute(\"data-webpack\") == dataWebpackPrefix + key) { script = s; break; }\n\t\t}\n\t}\n\tif(!script) {\n\t\tneedAttach = true;\n\t\tscript = document.createElement('script');\n\n\t\tscript.charset = 'utf-8';\n\t\tif (__webpack_require__.nc) {\n\t\t\tscript.setAttribute(\"nonce\", __webpack_require__.nc);\n\t\t}\n\t\tscript.setAttribute(\"data-webpack\", dataWebpackPrefix + key);\n\n\t\tscript.src = url;\n\t}\n\tinProgress[url] = [done];\n\tvar onScriptComplete = (prev, event) => {\n\t\t// avoid mem leaks in IE.\n\t\tscript.onerror = script.onload = null;\n\t\tclearTimeout(timeout);\n\t\tvar doneFns = inProgress[url];\n\t\tdelete inProgress[url];\n\t\tscript.parentNode && script.parentNode.removeChild(script);\n\t\tdoneFns && doneFns.forEach((fn) => (fn(event)));\n\t\tif(prev) return prev(event);\n\t}\n\tvar timeout = setTimeout(onScriptComplete.bind(null, undefined, { type: 'timeout', target: script }), 120000);\n\tscript.onerror = onScriptComplete.bind(null, script.onerror);\n\tscript.onload = onScriptComplete.bind(null, script.onload);\n\tneedAttach && document.head.appendChild(script);\n};","import \"./styles.css\";\nimport * as TKHQ from \"./turnkey-core.js\";\nimport { HpkeEncrypt } from \"@shared/crypto-utils.js\";\n\n// Make TKHQ available globally for backwards compatibility\nwindow.TKHQ = TKHQ;\n\n// persist the MessageChannel object so we can use it to communicate with the parent window\nvar iframeMessagePort = null;\n\n// controllers to remove event listeners\nconst messageListenerController = new AbortController();\nconst turnkeyInitController = new AbortController();\n\n/**\n * Message Event Handlers to process messages from the parent frame\n */\nvar messageEventListener = async function (event) {\n if (event.data && event.data[\"type\"] == \"INJECT_IMPORT_BUNDLE\") {\n try {\n await onInjectImportBundle(\n event.data[\"value\"],\n event.data[\"organizationId\"],\n event.data[\"userId\"],\n event.data[\"requestId\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"EXTRACT_WALLET_ENCRYPTED_BUNDLE\") {\n try {\n await onExtractWalletEncryptedBundle(event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"EXTRACT_KEY_ENCRYPTED_BUNDLE\") {\n try {\n await onExtractKeyEncryptedBundle(\n event.data[\"keyFormat\"],\n event.data[\"requestId\"]\n );\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n if (event.data && event.data[\"type\"] == \"APPLY_SETTINGS\") {\n try {\n await onApplySettings(event.data[\"value\"], event.data[\"requestId\"]);\n } catch (e) {\n TKHQ.sendMessageUp(\"ERROR\", e.toString(), event.data[\"requestId\"]);\n }\n }\n};\n\n/**\n * Broadcast that the frame is ready and set up the message event listeners\n */\ndocument.addEventListener(\n \"DOMContentLoaded\",\n async function () {\n window.addEventListener(\"message\", messageEventListener, {\n capture: false,\n signal: messageListenerController.signal,\n });\n\n if (!messageListenerController.signal.aborted) {\n // If styles are saved in local storage, sanitize and apply them.\n const styleSettings = TKHQ.getSettings();\n if (styleSettings) {\n TKHQ.applySettings(styleSettings);\n }\n // This is a workaround for how @turnkey/iframe-stamper is initialized. Currently,\n // init() waits for a public key to be initialized that can be used to send to the server\n // which will encrypt messages to this public key.\n // In the case of import, this public key is not used because the client encrypts messages\n // to the server's public key.\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", \"\");\n\n const plaintextTextarea = document.getElementById(\"plaintext\");\n if (!plaintextTextarea) return;\n // Clear clipboard after paste to avoid sensitive data lingering in clipboard.\n\n plaintextTextarea.addEventListener(\"paste\", async () => {\n // Let the paste happen first\n try {\n // Check clipboard-write permission first. In new versions of iframe-stamper, we add this permission when creating the iframe. In older versions, this permission is not added.\n const permStatus = await navigator.permissions\n .query({ name: \"clipboard-write\" }) // This is required to avoid error on clipboard write\n .catch(() => null);\n\n // Proceed only if granted or promptable\n if (\n permStatus?.state === \"granted\" ||\n permStatus?.state === \"prompt\"\n ) {\n await navigator.clipboard.writeText(\"\");\n }\n } catch {\n // Silently ignore any errors — no warnings or console noise\n }\n });\n }\n },\n false\n);\n\nwindow.addEventListener(\n \"message\",\n async function (event) {\n /**\n * @turnkey/iframe-stamper >= v2.1.0 is using a MessageChannel to communicate with the parent frame.\n * The parent frame sends a TURNKEY_INIT_MESSAGE_CHANNEL event with the MessagePort.\n * If we receive this event, we want to remove the message event listener that was added in the DOMContentLoaded event to avoid processing messages twice.\n * We persist the MessagePort so we can use it to communicate with the parent window in subsequent calls to TKHQ.sendMessageUp\n */\n if (\n event.data &&\n event.data[\"type\"] == \"TURNKEY_INIT_MESSAGE_CHANNEL\" &&\n event.ports?.[0]\n ) {\n // remove the message event listener that was added in the DOMContentLoaded event\n messageListenerController.abort();\n\n iframeMessagePort = event.ports[0];\n iframeMessagePort.onmessage = messageEventListener;\n\n TKHQ.setParentFrameMessageChannelPort(iframeMessagePort);\n\n // This is a workaround for how @turnkey/iframe-stamper is initialized. Currently,\n // init() waits for a public key to be initialized that can be used to send to the server\n // which will encrypt messages to this public key.\n // In the case of import, this public key is not used because the client encrypts messages\n // to the server's public key.\n TKHQ.sendMessageUp(\"PUBLIC_KEY_READY\", \"\");\n\n // remove the listener for TURNKEY_INIT_MESSAGE_CHANNEL after it's been processed\n turnkeyInitController.abort();\n }\n },\n { signal: turnkeyInitController.signal }\n);\n\n// make sure the mnemonic does not include our splitter (\\n--PASS--\\n) string or \\n characters\nfunction validateMnemonic(mnemonic) {\n if (mnemonic.includes(\"\\n--PASS--\\n\")) {\n throw new Error('mnemonic cannot include the string \"\\\\n--PASS--\\\\n\"');\n }\n if (mnemonic.includes(\"\\n\")) {\n throw new Error(\"mnemonic cannot include newline characters\");\n }\n}\n\n/**\n * Function triggered when INJECT_IMPORT_BUNDLE event is received.\n * Parses the `import_bundle` and stores the target public key as a JWK\n * in local storage. Sends true upon success.\n * @param {string} bundle\n * Example bundle: {\"targetPublic\":\"0491ccb68758b822a6549257f87769eeed37c6cb68a6c6255c5f238e2b6e6e61838c8ac857f2e305970a6435715f84e5a2e4b02a4d1e5289ba7ec7910e47d2d50f\",\"targetPublicSignature\":\"3045022100cefc333c330c9fa300d1aa10a439a76539b4d6967301638ab9edc9fd9468bfdb0220339bba7e2b00b45d52e941d068ecd3bfd16fd1926da69dd7769893268990d62f\",\"enclaveQuorumPublic\":\"04cf288fe433cc4e1aa0ce1632feac4ea26bf2f5a09dcfe5a42c398e06898710330f0572882f4dbdf0f5304b8fc8703acd69adca9a4bbf7f5d00d20a5e364b2569\"}\n * @param {string} organizationId\n * @param {string} userId\n * @param {string} requestId\n */\nasync function onInjectImportBundle(bundle, organizationId, userId, requestId) {\n let targetPublicBuf;\n let verified;\n\n // Parse the import bundle\n const bundleObj = JSON.parse(bundle);\n\n switch (bundleObj.version) {\n case \"v1.0.0\": {\n // Validate fields exist\n if (!bundleObj.data) {\n throw new Error('missing \"data\" in bundle');\n }\n if (!bundleObj.dataSignature) {\n throw new Error('missing \"dataSignature\" in bundle');\n }\n if (!bundleObj.enclaveQuorumPublic) {\n throw new Error('missing \"enclaveQuorumPublic\" in bundle');\n }\n\n // Verify enclave signature\n if (!TKHQ.verifyEnclaveSignature) {\n throw new Error(\"method not loaded\");\n }\n verified = await TKHQ.verifyEnclaveSignature(\n bundleObj.enclaveQuorumPublic,\n bundleObj.dataSignature,\n bundleObj.data\n );\n if (!verified) {\n throw new Error(`failed to verify enclave signature: ${bundle}`);\n }\n\n // Parse the signed data. The data is produced by JSON encoding followed by hex encoding. We reverse this here.\n const signedData = JSON.parse(\n new TextDecoder().decode(TKHQ.uint8arrayFromHexString(bundleObj.data))\n );\n\n // Validate fields match\n if (!organizationId) {\n // TODO: throw error if organization id is undefined once we've fully transitioned to v1.0.0 server messages and v2.0.0 iframe-stamper\n console.warn(\n 'we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass \"organizationId\" for security purposes.'\n );\n } else if (\n !signedData.organizationId ||\n signedData.organizationId !== organizationId\n ) {\n throw new Error(\n `organization id does not match expected value. Expected: ${organizationId}. Found: ${signedData.organizationId}.`\n );\n }\n if (!userId) {\n // TODO: throw error if user id is undefined once we've fully transitioned to v1.0.0 server messages and v2.0.0 iframe-stamper\n console.warn(\n 'we highly recommend a version of @turnkey/iframe-stamper >= v2.0.0 to pass \"userId\" for security purposes.'\n );\n } else if (!signedData.userId || signedData.userId !== userId) {\n throw new Error(\n `user id does not match expected value. Expected: ${userId}. Found: ${signedData.userId}.`\n );\n }\n\n if (!signedData.targetPublic) {\n throw new Error('missing \"targetPublic\" in bundle signed data');\n }\n\n // Load target public key generated from enclave and set in local storage\n targetPublicBuf = TKHQ.uint8arrayFromHexString(signedData.targetPublic);\n break;\n }\n default:\n throw new Error(`unsupported version: ${bundleObj.version}`);\n }\n\n const targetPublicKeyJwk = await TKHQ.loadTargetKey(\n new Uint8Array(targetPublicBuf)\n );\n TKHQ.setTargetEmbeddedKey(targetPublicKeyJwk);\n\n // Send up BUNDLE_INJECTED message\n TKHQ.sendMessageUp(\"BUNDLE_INJECTED\", true, requestId);\n}\n\n/**\n * Function triggered when EXTRACT_WALLET_ENCRYPTED_BUNDLE event is received.\n * Prerequisite: This function uses the target public key in local storage that is imported\n * from the INJECT_IMPORT_BUNDLE event.\n * Uses the target public key in local storage to encrypt the text entered in the\n * `plaintext` textarea element. Upon successful encryption, sends\n * an `encrypted_bundle` containing the ciphertext and encapped public key.\n * Example bundle: {\"encappedPublic\":\"0497f33f3306f67f4402d4824e15b63b04786b6558d417aac2fef69051e46fa7bfbe776b142e4ded4f02097617a7588e93c53b71f900a4a8831a31be6f95e5f60f\",\"ciphertext\":\"c17c3085505f3c094f0fa61791395b83ab1d8c90bdf9f12a64fc6e2e9cba266beb528f65c88bd933e36e6203752a9b63e6a92290a0ab6bf0ed591cf7bfa08006001e2cc63870165dc99ec61554ffdc14dea7d567e62cceed29314ae6c71a013843f5c06146dee5bf9c1d\"}\n * @param {string} requestId\n */\nasync function onExtractWalletEncryptedBundle(requestId) {\n // Get target embedded key from previous step (onInjectImportBundle)\n const targetPublicKeyJwk = TKHQ.getTargetEmbeddedKey();\n if (targetPublicKeyJwk == null) {\n throw new Error(\"no target key found\");\n }\n\n // Get plaintext wallet mnemonic\n const plaintext = document.getElementById(\"plaintext\").value.trim();\n if (!plaintext) {\n throw new Error(\"no wallet mnemonic entered\");\n }\n\n const passphrase = document.getElementById(\"passphrase\").value;\n\n validateMnemonic(plaintext);\n\n const combined =\n passphrase === \"\" ? plaintext : `${plaintext}\\n--PASS--\\n${passphrase}`;\n const plaintextBuf = new TextEncoder().encode(combined);\n\n // Encrypt the bundle using the enclave target public key\n const encryptedBundle = await HpkeEncrypt({\n plaintextBuf,\n receiverPubJwk: targetPublicKeyJwk,\n });\n\n // Reset target embedded key after using for encryption\n TKHQ.resetTargetEmbeddedKey();\n\n // Send up ENCRYPTED_BUNDLE_EXTRACTED message\n TKHQ.sendMessageUp(\"ENCRYPTED_BUNDLE_EXTRACTED\", encryptedBundle, requestId);\n}\n\n/**\n * Function triggered when EXTRACT_KEY_ENCRYPTED_BUNDLE event is received.\n * Prerequisite: This function uses the target public key in local storage that is imported\n * from the INJECT_IMPORT_BUNDLE event.\n * Uses the target public key in local storage to encrypt the text entered in the\n * `plaintext` textarea element. Upon successful encryption, sends\n * an `encrypted_bundle` containing the ciphertext and encapped public key.\n * Example bundle: {\"encappedPublic\":\"0497f33f3306f67f4402d4824e15b63b04786b6558d417aac2fef69051e46fa7bfbe776b142e4ded4f02097617a7588e93c53b71f900a4a8831a31be6f95e5f60f\",\"ciphertext\":\"c17c3085505f3c094f0fa61791395b83ab1d8c90bdf9f12a64fc6e2e9cba266beb528f65c88bd933e36e6203752a9b63e6a92290a0ab6bf0ed591cf7bfa08006001e2cc63870165dc99ec61554ffdc14dea7d567e62cceed29314ae6c71a013843f5c06146dee5bf9c1d\"}\n * @param {string} keyFormat\n * @param {string} requestId\n */\nasync function onExtractKeyEncryptedBundle(keyFormat, requestId) {\n // Get target embedded key from previous step (onInjectImportBundle)\n const targetPublicKeyJwk = TKHQ.getTargetEmbeddedKey();\n if (targetPublicKeyJwk == null) {\n throw new Error(\"no target key found\");\n }\n\n // Get plaintext private key\n const plaintext = document.getElementById(\"plaintext\").value.trim();\n if (!plaintext) {\n throw new Error(\"no private key entered\");\n }\n const plaintextBuf = await TKHQ.decodeKey(plaintext, keyFormat);\n\n // Encrypt the bundle using the enclave target public key\n const encryptedBundle = await HpkeEncrypt({\n plaintextBuf,\n receiverPubJwk: targetPublicKeyJwk,\n });\n\n // Reset target embedded key after using for encryption\n TKHQ.resetTargetEmbeddedKey();\n\n // Send up ENCRYPTED_BUNDLE_EXTRACTED message\n TKHQ.sendMessageUp(\"ENCRYPTED_BUNDLE_EXTRACTED\", encryptedBundle, requestId);\n}\n\n/**\n * Function triggered when APPLY_SETTINGS event is received.\n * For now, the only settings that can be applied are for \"styles\".\n * Persist them in local storage so they can be applied on every\n * page load.\n * @param {string} settings: JSON-stringified settings\n * @param {string} requestId\n */\nasync function onApplySettings(settings, requestId) {\n // Apply settings\n const validSettings = TKHQ.applySettings(settings);\n\n // Persist in local storage\n TKHQ.setSettings(validSettings);\n\n // Send up SETTINGS_APPLIED message\n TKHQ.sendMessageUp(\"SETTINGS_APPLIED\", true, requestId);\n}\n","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.\" + {\"291\":\"b62abe64ba4ebf68e89b\",\"825\":\"3a4aff0e743a7540fe25\"}[chunkId] + \".js\";\n};","// This function allow to reference async chunks\n__webpack_require__.miniCssF = (chunkId) => {\n\t// return url for filenames based on template\n\treturn undefined;\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","// define __esModule on exports\n__webpack_require__.r = (exports) => {\n\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n\t}\n\tObject.defineProperty(exports, '__esModule', { value: true });\n};","__webpack_require__.p = \"/\";","// no baseURI\n\n// object to store loaded and loading chunks\n// undefined = chunk not loaded, null = chunk preloaded/prefetched\n// [resolve, reject, Promise] = chunk loading, 0 = chunk loaded\nvar installedChunks = {\n\t57: 0\n};\n\n__webpack_require__.f.j = (chunkId, promises) => {\n\t\t// JSONP chunk loading for javascript\n\t\tvar installedChunkData = __webpack_require__.o(installedChunks, chunkId) ? installedChunks[chunkId] : undefined;\n\t\tif(installedChunkData !== 0) { // 0 means \"already installed\".\n\n\t\t\t// a Promise means \"currently loading\".\n\t\t\tif(installedChunkData) {\n\t\t\t\tpromises.push(installedChunkData[2]);\n\t\t\t} else {\n\t\t\t\tif(true) { // all chunks have JS\n\t\t\t\t\t// setup Promise in chunk cache\n\t\t\t\t\tvar promise = new Promise((resolve, reject) => (installedChunkData = installedChunks[chunkId] = [resolve, reject]));\n\t\t\t\t\tpromises.push(installedChunkData[2] = promise);\n\n\t\t\t\t\t// start chunk loading\n\t\t\t\t\tvar url = __webpack_require__.p + __webpack_require__.u(chunkId);\n\t\t\t\t\t// create error before stack unwound to get useful stacktrace later\n\t\t\t\t\tvar error = new Error();\n\t\t\t\t\tvar loadingEnded = (event) => {\n\t\t\t\t\t\tif(__webpack_require__.o(installedChunks, chunkId)) {\n\t\t\t\t\t\t\tinstalledChunkData = installedChunks[chunkId];\n\t\t\t\t\t\t\tif(installedChunkData !== 0) installedChunks[chunkId] = undefined;\n\t\t\t\t\t\t\tif(installedChunkData) {\n\t\t\t\t\t\t\t\tvar errorType = event && (event.type === 'load' ? 'missing' : event.type);\n\t\t\t\t\t\t\t\tvar realSrc = event && event.target && event.target.src;\n\t\t\t\t\t\t\t\terror.message = 'Loading chunk ' + chunkId + ' failed.\\n(' + errorType + ': ' + realSrc + ')';\n\t\t\t\t\t\t\t\terror.name = 'ChunkLoadError';\n\t\t\t\t\t\t\t\terror.type = errorType;\n\t\t\t\t\t\t\t\terror.request = realSrc;\n\t\t\t\t\t\t\t\tinstalledChunkData[1](error);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t};\n\t\t\t\t\t__webpack_require__.l(url, loadingEnded, \"chunk-\" + chunkId, chunkId);\n\t\t\t\t}\n\t\t\t}\n\t\t}\n};\n\n// no prefetching\n\n// no preloaded\n\n// no HMR\n\n// no HMR manifest\n\n__webpack_require__.O.j = (chunkId) => (installedChunks[chunkId] === 0);\n\n// install a JSONP callback for chunk loading\nvar webpackJsonpCallback = (parentChunkLoadingFunction, data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\t// add \"moreModules\" to the modules object,\n\t// then flag all \"chunkIds\" as loaded and fire callback\n\tvar moduleId, chunkId, i = 0;\n\tif(chunkIds.some((id) => (installedChunks[id] !== 0))) {\n\t\tfor(moduleId in moreModules) {\n\t\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t\t}\n\t\t}\n\t\tif(runtime) var result = runtime(__webpack_require__);\n\t}\n\tif(parentChunkLoadingFunction) parentChunkLoadingFunction(data);\n\tfor(;i < chunkIds.length; i++) {\n\t\tchunkId = chunkIds[i];\n\t\tif(__webpack_require__.o(installedChunks, chunkId) && installedChunks[chunkId]) {\n\t\t\tinstalledChunks[chunkId][0]();\n\t\t}\n\t\tinstalledChunks[chunkId] = 0;\n\t}\n\treturn __webpack_require__.O(result);\n}\n\nvar chunkLoadingGlobal = self[\"webpackChunkimport\"] = self[\"webpackChunkimport\"] || [];\nchunkLoadingGlobal.forEach(webpackJsonpCallback.bind(null, 0));\nchunkLoadingGlobal.push = webpackJsonpCallback.bind(null, chunkLoadingGlobal.push.bind(chunkLoadingGlobal));","// startup\n// Load entry module and return exports\n// This entry module depends on other loaded chunks and execution need to be delayed\nvar __webpack_exports__ = __webpack_require__.O(undefined, [96,551], () => (__webpack_require__(954)))\n__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n"],"names":["deferred","leafPrototypes","getProto","inProgress","dataWebpackPrefix","e","t","r","Symbol","n","iterator","o","toStringTag","i","c","prototype","Generator","u","Object","create","_regeneratorDefine2","f","p","y","G","v","a","d","bind","length","l","TypeError","call","done","value","GeneratorFunction","GeneratorFunctionPrototype","getPrototypeOf","setPrototypeOf","__proto__","displayName","_regenerator","w","m","defineProperty","_invoke","enumerable","configurable","writable","_OverloadYield","k","asyncGeneratorStep","Promise","resolve","then","_asyncToGenerator","arguments","apply","_next","_throw","window","TKHQ","iframeMessagePort","messageListenerController","AbortController","turnkeyInitController","messageEventListener","_ref","_regeneratorRuntime","mark","_callee","event","wrap","_context","prev","next","data","onInjectImportBundle","t0","toString","onExtractWalletEncryptedBundle","t1","onExtractKeyEncryptedBundle","t2","onApplySettings","t3","stop","_x","validateMnemonic","mnemonic","includes","Error","_x3","_x4","_x5","_x6","_onInjectImportBundle","_callee5","bundle","organizationId","userId","requestId","targetPublicBuf","bundleObj","signedData","targetPublicKeyJwk","_context5","JSON","parse","version","dataSignature","enclaveQuorumPublic","sent","concat","TextDecoder","decode","console","warn","targetPublic","abrupt","Uint8Array","_x7","_onExtractWalletEncryptedBundle","_callee6","plaintext","passphrase","combined","plaintextBuf","encryptedBundle","_context6","document","getElementById","trim","TextEncoder","encode","HpkeEncrypt","receiverPubJwk","_x8","_x9","_onExtractKeyEncryptedBundle","_callee7","keyFormat","_context7","_x10","_x11","_onApplySettings","_callee8","settings","validSettings","_context8","addEventListener","_callee3","styleSettings","plaintextTextarea","_context3","capture","signal","aborted","_callee2","permStatus","_context2","navigator","permissions","query","name","state","clipboard","writeText","_ref4","_callee4","_event$ports","_context4","ports","abort","onmessage","_x2","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","O","result","chunkIds","fn","priority","notFulfilled","Infinity","fulfilled","j","keys","every","key","splice","obj","mode","this","__esModule","ns","def","current","indexOf","getOwnPropertyNames","forEach","definition","get","chunkId","all","reduce","promises","miniCssF","g","globalThis","Function","prop","hasOwnProperty","url","push","script","needAttach","scripts","getElementsByTagName","s","getAttribute","createElement","charset","nc","setAttribute","src","onScriptComplete","onerror","onload","clearTimeout","timeout","doneFns","parentNode","removeChild","setTimeout","type","target","head","appendChild","installedChunks","installedChunkData","promise","reject","error","errorType","realSrc","message","request","webpackJsonpCallback","parentChunkLoadingFunction","moreModules","runtime","some","id","chunkLoadingGlobal","self","__webpack_exports__"],"sourceRoot":""} \ No newline at end of file diff --git a/import/dist/index.html b/import/dist/index.html index 6866efe..b497886 100644 --- a/import/dist/index.html +++ b/import/dist/index.html @@ -1 +1 @@ -Turnkey Import
\ No newline at end of file +Turnkey Import
\ No newline at end of file diff --git a/import/dist/standalone.html b/import/dist/standalone.html index 5cad7ed..36503b1 100644 --- a/import/dist/standalone.html +++ b/import/dist/standalone.html @@ -1 +1 @@ -Turnkey Import (Standalone Mode)

Initialize Import




Import Wallet


Import Private Key



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file +Turnkey Import (Standalone Mode)

Initialize Import




Import Wallet


Import Private Key



Message log

Below we display a log of the messages sent / received. The forms above send messages, and the code communicates results by sending events via the postMessage API.

\ No newline at end of file diff --git a/import/src/index.js b/import/src/index.js index df90378..3271400 100644 --- a/import/src/index.js +++ b/import/src/index.js @@ -123,6 +123,10 @@ window.addEventListener( // remove the message event listener that was added in the DOMContentLoaded event messageListenerController.abort(); + // Capture the parent origin for use as targetOrigin in sendMessageUp, + // preventing messages from being delivered to unintended recipients. + TKHQ.setParentOrigin(event.origin); + iframeMessagePort = event.ports[0]; iframeMessagePort.onmessage = messageEventListener; diff --git a/import/src/turnkey-core.js b/import/src/turnkey-core.js index f142d73..a8c06e2 100644 --- a/import/src/turnkey-core.js +++ b/import/src/turnkey-core.js @@ -20,6 +20,7 @@ const { additionalAssociatedData, verifyEnclaveSignature, validateStyles, + setParentOrigin, } = SharedTKHQ; /** @@ -127,5 +128,6 @@ export { additionalAssociatedData, verifyEnclaveSignature, validateStyles, + setParentOrigin, applySettings, }; diff --git a/shared/turnkey-core.js b/shared/turnkey-core.js index 131ca98..1081a2f 100644 --- a/shared/turnkey-core.js +++ b/shared/turnkey-core.js @@ -5,15 +5,61 @@ import { bech32 } from "bech32"; * Contains all the core cryptographic and utility functions shared across frames */ +/** + * Constant-time string comparison to prevent timing side-channel attacks. + * Standard `===` / `!==` short-circuits on the first differing byte, leaking + * information about how many leading bytes match. This XOR-based approach + * always compares every byte regardless of mismatches. + * @param {string} a + * @param {string} b + * @returns {boolean} true if strings are equal + */ +function timingSafeEqual(a, b) { + if (typeof a !== "string" || typeof b !== "string") return false; + const enc = new TextEncoder(); + const aBuf = enc.encode(a); + const bBuf = enc.encode(b); + if (aBuf.length !== bBuf.length) { + // Length mismatch already leaks info; still iterate to avoid further leakage. + let diff = 1; + const len = Math.min(aBuf.length, bBuf.length); + for (let i = 0; i < len; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return false; + } + let diff = 0; + for (let i = 0; i < aBuf.length; i++) { + diff |= aBuf[i] ^ bBuf[i]; + } + return diff === 0; +} + /** constants for LocalStorage */ const TURNKEY_EMBEDDED_KEY = "TURNKEY_EMBEDDED_KEY"; const TURNKEY_TARGET_EMBEDDED_KEY = "TURNKEY_TARGET_EMBEDDED_KEY"; const TURNKEY_SETTINGS = "TURNKEY_SETTINGS"; -/** 48 hours in milliseconds */ -const TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 48; +/** + * TTL for the embedded ECDH private key stored in localStorage. + * + * SECURITY NOTE: The P-256 ECDH private key is stored as a JSON-serialized JWK + * in localStorage, where it cannot be reliably zeroed (localStorage values are + * immutable strings managed by the browser). The ideal solution would be to store + * a non-extractable CryptoKey in IndexedDB, but that is a larger refactor. + * As a mitigation, we keep the TTL as short as practical (4 hours) to limit the + * window of exposure if the storage is compromised. + */ +const TURNKEY_EMBEDDED_KEY_TTL_IN_MILLIS = 1000 * 60 * 60 * 4; const TURNKEY_EMBEDDED_KEY_ORIGIN = "TURNKEY_EMBEDDED_KEY_ORIGIN"; let parentFrameMessageChannelPort = null; +/** + * Captured parent origin from the init message. Used as the targetOrigin for + * legacy postMessage calls instead of the wildcard "*", which would allow any + * window to eavesdrop on sensitive messages (e.g. public keys, signed data). + * @type {string|null} + */ +let parentOrigin = null; var cryptoProviderOverride = null; /* @@ -198,6 +244,24 @@ function setParentFrameMessageChannelPort(port) { parentFrameMessageChannelPort = port; } +/** + * Stores the parent frame's origin, captured from the init postMessage event. + * This is used as the targetOrigin for legacy postMessage calls to prevent + * messages from being delivered to unintended recipients. + * @param {string} origin + */ +function setParentOrigin(origin) { + parentOrigin = origin; +} + +/** + * Returns the stored parent origin. + * @returns {string|null} + */ +function getParentOrigin() { + return parentOrigin; +} + /** * Gets the current settings. */ @@ -404,7 +468,14 @@ async function verifyEnclaveSignature( // todo(olivia): throw error if enclave quorum public is null once server changes are deployed if (enclaveQuorumPublic) { - if (enclaveQuorumPublic !== TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY) { + // SECURITY: Use constant-time comparison to prevent timing side-channel + // attacks that could leak the enclave quorum public key byte-by-byte. + if ( + !timingSafeEqual( + enclaveQuorumPublic, + TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY + ) + ) { throw new Error( `enclave quorum public keys from client and bundle do not match. Client: ${TURNKEY_SIGNER_ENCLAVE_QUORUM_PUBLIC_KEY}. Bundle: ${enclaveQuorumPublic}.` ); @@ -461,12 +532,18 @@ function sendMessageUp(type, value, requestId) { if (parentFrameMessageChannelPort) { parentFrameMessageChannelPort.postMessage(message); } else if (window.parent !== window) { + // SECURITY: Prefer the captured parent origin over wildcard "*" to prevent + // messages from being delivered to unintended windows. parentOrigin is set + // during the TURNKEY_INIT_MESSAGE_CHANNEL handshake (iframe-stamper >= v2.1.0). + // For older iframe-stamper versions that never send TURNKEY_INIT_MESSAGE_CHANNEL, + // parentOrigin remains null and we must fall back to "*" for backwards compatibility. + const targetOrigin = parentOrigin || "*"; window.parent.postMessage( { type: type, value: value, }, - "*" + targetOrigin ); } logMessage(`⬆️ Sent message ${type}: ${value}`); @@ -931,4 +1008,6 @@ export { encodeKey, parsePrivateKey, validateStyles, + setParentOrigin, + getParentOrigin, }; diff --git a/shared/turnkey-core.test.js b/shared/turnkey-core.test.js index 6ed8988..fd48f9d 100644 --- a/shared/turnkey-core.test.js +++ b/shared/turnkey-core.test.js @@ -445,4 +445,102 @@ describe("Shared TKHQ Utilities", () => { expect(publicKey.length).toBe(65); // Uncompressed P-256 public key }); }); + + describe("Parent origin management", () => { + beforeEach(() => { + // Reset parent origin before each test + SharedTKHQ.setParentOrigin(null); + }); + + it("returns null when no origin has been set", () => { + expect(SharedTKHQ.getParentOrigin()).toBeNull(); + }); + + it("stores and retrieves a parent origin", () => { + SharedTKHQ.setParentOrigin("https://app.example.com"); + expect(SharedTKHQ.getParentOrigin()).toBe("https://app.example.com"); + }); + + it("overwrites a previously set origin", () => { + SharedTKHQ.setParentOrigin("https://first.example.com"); + SharedTKHQ.setParentOrigin("https://second.example.com"); + expect(SharedTKHQ.getParentOrigin()).toBe("https://second.example.com"); + }); + + it("can be cleared back to null", () => { + SharedTKHQ.setParentOrigin("https://app.example.com"); + SharedTKHQ.setParentOrigin(null); + expect(SharedTKHQ.getParentOrigin()).toBeNull(); + }); + }); + + describe("sendMessageUp uses captured parent origin as targetOrigin", () => { + let postMessageSpy; + let originalParent; + + beforeEach(() => { + SharedTKHQ.setParentOrigin(null); + // Simulate being inside an iframe by making window.parent !== window + originalParent = Object.getOwnPropertyDescriptor(window, "parent"); + postMessageSpy = jest.fn(); + Object.defineProperty(window, "parent", { + configurable: true, + get: () => ({ postMessage: postMessageSpy }), + }); + }); + + afterEach(() => { + if (originalParent) { + Object.defineProperty(window, "parent", originalParent); + } else { + delete window.parent; + } + }); + + it("uses wildcard '*' when no parent origin is set", () => { + SharedTKHQ.sendMessageUp("TEST_TYPE", "test-value", "req-1"); + // Note: window.parent.postMessage path sends { type, value } without requestId + expect(postMessageSpy).toHaveBeenCalledWith( + { type: "TEST_TYPE", value: "test-value" }, + "*" + ); + }); + + it("uses captured parent origin when set", () => { + SharedTKHQ.setParentOrigin("https://app.example.com"); + SharedTKHQ.sendMessageUp("TEST_TYPE", "test-value", "req-2"); + // Note: window.parent.postMessage path sends { type, value } without requestId + expect(postMessageSpy).toHaveBeenCalledWith( + { type: "TEST_TYPE", value: "test-value" }, + "https://app.example.com" + ); + }); + + it("omits requestId from postMessage payload", () => { + SharedTKHQ.setParentOrigin("https://app.example.com"); + SharedTKHQ.sendMessageUp("TEST_TYPE", "test-value"); + const [payload] = postMessageSpy.mock.calls[0]; + expect(payload).not.toHaveProperty("requestId"); + }); + }); + + describe("Embedded key TTL", () => { + it("embedded key expires after 4 hours", async () => { + jest.useFakeTimers().setSystemTime(new Date("2025-01-01T00:00:00Z")); + // Initialize an embedded key + await SharedTKHQ.initEmbeddedKey(); + const key = SharedTKHQ.getEmbeddedKey(); + expect(key).not.toBeNull(); + + // Advance time by 4 hours minus 1 ms -- key should still be valid + jest.advanceTimersByTime(1000 * 60 * 60 * 4 - 1); + expect(SharedTKHQ.getEmbeddedKey()).not.toBeNull(); + + // Advance past the 4-hour TTL -- key should have expired + jest.advanceTimersByTime(2); + expect(SharedTKHQ.getEmbeddedKey()).toBeNull(); + + jest.useRealTimers(); + }); + }); });